paper_id
stringlengths 9
16
| version
stringclasses 26
values | yymm
stringclasses 311
values | created
timestamp[s] | title
stringlengths 6
335
| secondary_subfield
sequencelengths 1
8
| abstract
stringlengths 25
3.93k
| primary_subfield
stringclasses 124
values | field
stringclasses 20
values | fulltext
stringlengths 0
2.84M
|
---|---|---|---|---|---|---|---|---|---|
1501.05139 | 2 | 1501 | 2016-06-23T06:34:02 | Detecting Overlapping Link Communities by Finding Local Minima of a Cost Function with a Memetic Algorithm. Part 1: Problem and Method | [
"cs.SI",
"physics.soc-ph"
] | We propose an algorithm for detecting communities of links in networks which uses local information, is based on a new evaluation function, and allows for pervasive overlaps of communities. The complexity of the clustering task requires the application of a memetic algorithm that combines probabilistic evolutionary strategies with deterministic local searches. In Part 2 we will present results of experiments with with citation networks. | cs.SI | cs |
Detecting Overlapping Link Communities by Finding
Local Minima of a Cost Function with a Memetic Algorithm
Part 1: Problem and Method
Frank Havemann∗
Jochen Glaser†
Michael Heinz‡
Abstract
We propose an algorithm for detecting commu-
nities of links in networks which uses local infor-
mation, is based on a new evaluation function,
and allows for pervasive overlaps of communi-
ties. The complexity of the clustering task re-
quires the application of a memetic algorithm
that combines probabilistic evolutionary strate-
gies with deterministic local searches. In Part 2
we will present results of experiments with cita-
tion networks.
1
Introduction
Communities in networks are commonly defined
as cohesive subgraphs which are well separated
from the rest of the network. This vague concept
of communities is operationalised in a variety
of ways (Fortunato 2010). The utility of algo-
rithms for the detection of communities in net-
works partly depends on their 'conceptual fit',
i.e. on the degree to which they match proper-
ties of the phenomenon that is represented (Hric,
Darst, and Fortunato 2014). Achieving such a
conceptual fit may require unusual combinations
of ideas from network analysis, as is the case
with the question and the algorithm presented
in this paper.
Consider the following three properties of a
network and the task of community detection.
First, links between nodes contain better infor-
mation about communities than the nodes that
are to be clustered. In this case, link clustering
appears to be the method of choice. Construct-
∗Institut fur Bibliotheks- und Informationswissen-
schaft, Humboldt-Universitat zu Berlin, D 10099 Berlin,
Dorotheenstr. 26 (Germany)
†Center for Technology and Society, TU Berlin (Ger-
‡Institut fur Bibliotheks- und Informationswissen-
many)
schaft, Humboldt-Universitat zu Berlin
ing communities by clustering links has been
proposed by Evans and Lambiotte (2009) and by
Ahn, Bagrow, and Lehmann (2010) as a method
for the construction of overlapping communities
of nodes. In addition, clustering links is likely
to be advantageous whenever the information
asymmetry described above occurs, i.e. when-
ever links rather than nodes have the real-world
properties whose similarity shall be reflected by
clusters.
Second, overlapping communities must be a
possible outcome of the algorithm because the
real-world phenomenon under investigation is
known to have such a structure. For the same
reason, pervasive overlaps must be possible, i.e.
overlaps that extend to all nodes rather than just
the boundary nodes of a community. The con-
struction of overlapping communities is by now
a well-known and frequently addressed problem
of network analysis (Fortunato 2010; Xie, Kelley,
and Szymanski 2013; Amelio and Pizzuti 2014).
Third, the phenomena to be represented by
communities are local in that they emerge from
local interactions represented by neighbouring
nodes and links in the network.
If this is the
case, the use of local rather than global
in-
formation may return better communities and
a better community structure of the network
(Clauset 2005; Lancichinetti, Fortunato, and
Kertesz 2009; Havemann, Heinz, Struck, and
Glaser 2011).
All three ideas have been developed in net-
work analysis. However, as reviews of algo-
rithms indicate (Fortunato 2010; Xie et al. 2013;
Amelio and Pizzuti 2014), link clustering, per-
vasively overlapping communities and use of lo-
cal information have not yet been combined all
three, possibly because the task for which this is
necessary has not yet arisen.1
1The only apparent exception is the work by Lei Pan
et al. which, however, compromises in two expects, global
1
There is at least one task for which this com-
bination of link-based approach, pervasive over-
laps and local approach is necessary, namely the
detection of thematic structures (topics) in net-
works of papers.
In networks of papers and their cited sources,
citation links (links between a publication and
the sources it cites) are thematically more ho-
mogenous than nodes (papers), and thus pro-
vide better information for clustering, than the
papers themselves. While papers commonly be-
long to more than one scientific topic, many ci-
tation links can be assumed to be homogenous
in that the link between paper and source be-
longs to only one topic.
If it belongs to more
than one topic these topics often are not very
distant from each other.
Scientific topics are known to overlap perva-
sively, which means that their reconstruction
as communities of papers must reflect this per-
vasive overlap. Topics are also locally emer-
gent phenomena in that they represent coincid-
ing and mutually referring perspectives of re-
searchers (the authors of the papers).
In order to reconstruct scientific topics from
networks of papers and their cited sources, then,
we need an algorithm that clusters links, can
construct pervasively overlapping communities,
and uses mainly local information. In this paper,
we present such an algorithm (in Part 1) and its
application to citation networks (in Part 2). We
propose a local cost function for the indepen-
dent evaluation of each link community by re-
lating its external to its total connectivity in the
network. The cost function is almost completely
based on local information, the only global infor-
mation used is the number of links in the whole
network. The independent evaluation of each
subgraph with a local cost function means that
communities can be constructed independently
from each other, which enables pervasive over-
laps.
The cost function we propose for subgraph
evaluation is solely based on the network's topol-
ogy and not on link similarity. Generally, clus-
tering by optimising a (global or local) evalua-
tion function needs no measure of similarity of
clustered elements but results in clusters the ele-
information used in the end and no pervasive overlap be-
cause link clusters are disjunct (Pan, Wang, Xie, and
Liu 2011; Pan, Wang, and Xie 2012). Furthermore, they
differ from our approach because they propose an evalu-
ation function for link clustering which is derived within
the node clustering approach.
ments of which are seen as similar in some sense.
In contrast, the approach to link clustering pro-
posed by Ahn et al. (2010) is based on link sim-
ilarity. The authors estimate the similarity of
two links by comparing their sets of neighbour-
ing nodes. This is not very appropiate for cita-
tion links because we would estimate thematic
similarity of thematically nearly homogenous el-
ements (citation links) with sets of very inho-
mogenous elements (papers, cited sources). In
the case of citation networks, it would be bet-
ter to measure link similarity by using textual
information from citing and cited documents.
The local construction of topics, their vary-
ing size and pervasive overlaps make it likely
that topics form a poly-hierarchy i.e. a hierar-
chy where a smaller topic can be a subtopic of
two or more larger topics that have no hierar-
chical subtopic relation. This poly-hierarchy of
topics should be reflected in a poly-hierarchy of
communities.
Communities without sub-communities can
be well separated and very cohesive, too, but
inside larger communities there can exist well
separated sub-communities which diminish the
cohesion of their super-community.
Since the cost landscape of link communi-
ties has many local minima, purely determin-
istic search strategies are not efficient. This is
why we designed a memetic search that com-
bines an evolutionary algorithm with determin-
istic adjustments in the cost landscape. Evolu-
tionary algorithms have already been used for
identifying communities in networks (Fortunato
2010, p. 106). Some authors have even applied
evolutionary algorithms to link clustering but all
used global evaluation functions (Pizzuti 2009;
Li, Zhang, Wang, Liu, and Zhang 2013; Shi, Cai,
Fu, Dong, and Wu 2013). Memetic evolutionary
algorithms have also been applied to reconstruct
communities but only for node clustering and
only with global evaluation functions (Gong, Fu,
Jiao, and Du 2011; Pizzuti 2012; Gach and Hao
2012; Ma, Gong, Liu, Cai, and Jiao 2014).
2 Strategy
The strategy we apply in response to the three
challenges described in the introduction consists
of three main steps. We develop an evaluation
function for link communities that uses local in-
formation. This evaluation function makes it
possible to construct each community indepen-
2
dently from all others, which in turn enables per-
vasive overlaps because inner links (links all of
whose neighbours are community members) of
one community can also be inner links of an-
other community. We then design an algorithm
that constructs local communities.
For the first step, we followed a suggestion
by Evans and Lambiotte (2009) to obtain link
clusters by clustering vertices in a network's line
graph. We defined a local cost function Ψ(L)
in the line-graph approach which we call ratio
node-cut. It can be used to identify link commu-
nities by finding local minima in the cost land-
scape. Since Ψ(L) evaluates the boundary be-
tween a subgraph and the rest of the network,
communities can be constructed independently
of all other communities.
The cost landscape of Ψ(L) is often very rough
i.e. has many local minima that may correspond
to very similar subgraphs. Therefore, the reso-
lution of the algorithm must be defined by set-
ting a minimum distance (number of links that
differ) between subgraphs corresponding to dif-
ferent local minima. We define the range of a
community as a distance in which no subgraph
exists that has a lower Ψ-value.
Since the task of finding communities in large
networks is always very complex, heuristics must
be applied. This applies even more strongly to
link clustering because networks contain many
more links than nodes, and particularly to the
rough Ψ-landscape. We chose an evolutionary
algorithm but accelerate evolution by combin-
ing it with a deterministic local search in the
cost landscape. This approach is called memetic
(Neri, Cotta, and Moscato 2012). Memetic algo-
rithms can also find local optima of a local cost
function (Vitela and Castanos 2012).
In evolutionary algorithms,
individuals oc-
cupy places in the cost (or fitness) landscape.
In our local algorithm, populations are sets of
different subgraphs. We start with a random
initialisation of the population of some definite
size. The genetic operators of crossover, mu-
tation, and selection are repeatedly applied to
move the population into optima.
In memetic
algorithms each crossover and each mutation is
followed by a local search.
In large networks exploring the cost landscape
by adding or removing individual links is very
time-consuming. We therefore begin the search
with a coarse search phase that adds or removes
groups of links by adding or removing nodes
with all their links, and follow it with fine search
phase, namely link-wise memetic evolution or at
least a link-wise local search.
3 The cost function:
ratio node-cut
3.1 Node-induced and
link-induced subgraphs
Traditionally, the boundary of a community is
drawn between nodes and therefore cuts the
links between nodes inside and outside the com-
munity. If we consider communities as clusters
of links rather than nodes, the perspective must
be reversed. While the boundary of a node com-
munity cuts links, the boundary of a link com-
munity cuts nodes.
A node community is a connected subgraph
It contains all links
defined by a node set C.
existing between nodes in C. A link community
is a connected link-induced subgraph.
It con-
tains all nodes attached to links of a given set
L. There can be links existing between a link
community's nodes which are not in L.
Cost functions of a subgraph can be defined
by relating a measure of external to a measure of
total connectivity. This ratio should be minimal
for well separated and cohesive subgraphs i.e. for
communities.
Node communities can be defined as con-
nected subgraphs corresponding to minima in
cost landscapes where places correspond to
node-induced subgraphs. Correspondingly, link
communities can be defined as connected sub-
graphs corresponding to minima in cost land-
scapes where places correspond to link-induced
subgraphs.
In the following, we only consider connected
unweighted graphs G = (V, E). The number of
edges (or links) is m = E, the number of ver-
tices (or nodes) is n = V . With ki we denote
the degree of node i. The internal degree of node
i, denoted by kin
i (L), is the number of links at-
tached to node i which are in link set L. The
external degree of node i is kout
i (L).
(L) = ki−kin
i
3.2 External connectivity
We first consider measures of external connec-
tivity of a subgraph which are useful for con-
structing node or link communities. The sim-
plest measure of external connectivity of a node-
3
induced subgraph is the cut size that equals the
sum of weights of boundary links i.e. the links
connecting the subgraph with the rest of the
graph (Fortunato 2010, p. 92). If link weights
represent electrical conductance, cut size mea-
sures the total conductance of all boundary
links. Cut size can be calculated as the sum
of external degrees kout
(L) of boundary nodes
(subgraph members with boundary links).
i
Applying these considerations to the external
connectivity of a link-induced subgraph leads to
a simple measure of external connectivity as the
sum of kout
i /ki of boundary nodes:
i kin
n(cid:88)
i=1
ki
σ(L) =
kout
i
(L)kin
i (L)
.
(1)
i
i kin
Only for boundary nodes of L we have kout
i >
0. That means, we can restrict the sum in the
formula to boundary nodes.
In function σ(L)
the external degrees kout
are weighted with sub-
graph membership-grade kin
i /ki of the boundary
nodes. The function σ(L) can be derived from
the total conductance or cut size of link sets in
the graph's line graph if the line graph's edges
are weighted with 1/ki -- a weighting proposed
by Evans and Lambiotte (2009). The derivation
can be found in Appendix A.
Each term of σ(L) equals the conductance of
a boundary node i i.e. the total conductance
for currents flowing out of the subgraph through
this node. We call σ(L) the node cut of a link-
induced subgraph.
3.3 Internal and total connectivity
induced subgraphs kin(C) =(cid:80)
Now we discuss measures of internal and total
connectivity of subgraphs induced by node and
by link sets, respectively. In the case of node-
i (C) is an
appropriate measure of internal connectivity of
node set C. Total connectivity of C is then the
sum of degrees of all nodes in C:
i∈C kin
ktotal(C) =
kin
i (C) + kout
i
(C) =
ki. (2)
(cid:88)
i∈C
(cid:88)
i∈C
For a link-induced subgraph we can use the sum
of internal degrees, weighted with their member-
ship, as a measure of internal connectivity:
n(cid:88)
τ (L) =
kin
i (L)kin
i (L)
i=1
ki
.
(3)
4
The sum is restricted to nodes attached to links
in L because other nodes have kin
i (L) = 0. To-
tal connectivity of L is then given by the sum
i (L) = kin(L) = 2L.
σ(L) + τ (L) = (cid:80)n
i=1 kin
The derivation can be found in Appendix A.
3.4 Cost function
Relating external to total connectivity leads us
to cost functions whose minima correspond to
well separated and cohesive subgraphs. On the
other hand, we also achieve a size normalisation
when we divide external by total connectivity.
This is welcome, because the boundary length
(measured by external connectivity) tends to in-
crease with size (here measured by total con-
nectivity kin(L) = 2L) -- at least for not too
large subgraphs in not too small networks.
If
a subgraph occupies more than one half of the
network its boundary tends to become shorter
with increasing size. A simple size normalisa-
tion that accounts for the finite size of the net-
work is achieved by adding to the external-total
ratio of a subgraph the same ratio of its comple-
ment. For small subgraphs in a large network
the second ratio is very small. For node-induced
subgraphs this normalisation was introduced by
Wei and Cheng (1989) and named ratio cut. For
link-induced subgraphs we analogously define a
cost function ratio node-cut as
Ψ(L) =
σ(L)
kin(L)
+
σ(E\L)
kin(E\L)
σ(L)
(4)
.
(5)
=
kin(L)(1 − kin(L)/2m)
The expression on the r.h.s. is obtained because
σ(E\L) = σ(L) and kin(E\L) = 2m − kin(L).
Ratio node-cut Ψ is not strictly local but the
only global information needed here is the to-
tal number of links m.
In the limit of small
subgraphs in large networks we achieve approxi-
mately strict locality because we have kin(L) (cid:28)
2m and we therefore obtain
Ψ(L) ≈ σ(L)
kin(L)
,
(6)
which equals a strictly local cost function for
the construction of
link communities intro-
duced by us earlier (Havemann et al. 2012).
Our cost function Ψ(L) rewards separation of
link community L but not really its cohesion.
Yang and Leskovec (2012) found that evaluat-
ing node subgraphs with conductance -- a mea-
sure analogue to σ(L)/kin(L) in the world of
node communities -- can also lead to communi-
ties with low cohesion.
That means, using cost function Ψ we empha-
size separation and require only a minimal cohe-
sion of subgraphs, which is expressed by the de-
mand that subgraphs must be connected. Oth-
erwise an unconnected subgraph with parts in
very different regions of the network could be a
community.
Function σ(L) vanishes for the empty sub-
graph with L = ∅ and for the full graph with
L = E. In both cases, the denominator of the
cost function also vanishes and we obtain zero
divided by zero but it makes sense to define
Ψ(E) = Ψ(∅) = 1 because Ψ of one link (1,
2) with vanishing weight w12 approximates 1:
(k1 − w12)/k1 + (k2 − w12)/k2
Ψ((1, 2)) = w12
2w12(1 − 2w12/2m)
.
(7)
Our cost function is symmetric: Ψ(L) =
Ψ(E\L), i.e. the cost function is the same for
a link-induced subgraph and the subgraph in-
duced by the complementary link set E\L.
3.5 The cost landscape
Each place in the cost landscape represents a
link-induced subgraph. Two places in the land-
scape have a direct relation if and only if the
corresponding subgraphs differ in one link. The
height of each place is given by the value of the
cost function Ψ(L). The global minimum of the
cost function is reached for a division of the set
E of all links that produces the two best link
communities in terms of separation. As a simple
example, we determined the Ψ-landscape of the
bow-tie graph (Figure 1, for calculations see Ap-
pendix B). We expect a cut through the central
node to be the best division in two link commu-
nities (the two triangles). Indeed, the landscape
has two minima with Ψ = 1/3, which correspond
to the two triangles. There are no further local
minima.
We do not restrict the search for link commu-
nities to finding only the global minimum but
define a link community as a connected link-
induced subgraph which corresponds to any lo-
cal minimum in the Ψ-landscape. Since the Ψ-
landscape of larger graphs contains many local
minima, we need a filter to select the locally best
link communities. For this reason, we restrict
our search to those minima with a sufficiently
large distance to any lower place in the cost land-
scape. Thus, we have to define the resolution of
the search by defining this minimal distance in
the landscape. The appropriate resolution de-
pends on the research question about the phe-
nomenon represented by the network. The ex-
tent to which two communities should differ in
content (of links) to consider them as different
depends on the question asked about communi-
ties.
Another place in the cost landscape is reached
by adding links to and by removing links from
the subgraph corresponding to the starting
place. The distance between two places in the
cost landscape equals the sum of the number of
links we have to add and to exclude. In other
words: the distance is the size of the symmetric
difference between the two link sets. We define
the range of a community as the minimal dis-
tance to a subgraph with lower cost. Within a
community's range there is no better subgraph.
The resolution of a search for communities can
be defined as the minimal range of communities
that are accepted as valid solutions. Depending
on the networks real background, a relative reso-
lution can be more appropriate. That means, we
demand that any valid community should have
a range which is larger than a certain percentage
of its size.
In order to determine the range of a com-
munity we would need to know its whole en-
vironment up to the distance to the nearest
lower place in the cost landscape. Otherwise, a
lower place only determines an upper bound of
the community's range. However, searching the
whole environment of a subgraph is practically
impossible for large networks. A selective search
is necessary, which is why we apply evolutionary
and deterministic greedy algorithms. If these al-
gorithms find an upper bound smaller than the
set resolution, we can deselect the community. If
they don't, the community is provisionally kept
Figure 1: Bow-tie graph
5
●●0.00.20.40.60.81.00.00.20.40.60.81.0c(0, 1)c(0, 1)●●●●●but can later be replaced by a better community
within its minimal range defined by the set res-
olution. We assume, however, that later found
better solutions differ only in some links.
4 Memetic search
Memetic algorithms combine random evolution
with deterministic local search. In this section,
we describe
1. the local search we apply, called adaptation
for short,
2. our implementation of the evolutionary ap-
proach,
3. the genetic operators of mutation, cross-
over, and selection we employ in the evo-
lutionary approach.
The memetic algorithm is applied in the
search for link communities, which can be done
by exploring the cost landscape of a network
by adding or removing individual links. For
large subgraphs this is very time-consuming. We
therefore split the search in a coarse phase, in
which we add or remove nodes with all their links
to other nodes in the subgraph, and a finer link-
wise search, which is applied after communities
have been identified by a node-wise search. Af-
ter communities with a minimal range defined
by the set resolution are found in a node-wise
memetic search, they are subjected to a link-
wise memetic search or at least a link-wise local
search.
4.1 Local search
The local search in the cost landscape applies a
greedy algorithm for finding local cost minima
that correspond to communities. The algorithm
starts from the place occupied by the current
subgraph and moves to subgraphs with lower
Ψ-values. The algorithm is greedy because it
always chooses the step that brings the biggest
decrease or the smallest increase of Ψ. A step
includes or excludes a node with all their links
to the nodes already in a subgraph in node-wise
local search, and includes or excludes an indi-
vidual link in link-wise local search.
A valid community can be made invalid and
replaced by a better one if the better one is
within its minimal range which is set by the res-
olution parameter. Therefore, the local search
has not to find subgraphs with lower cost in each
step but can go a number of steps by 'tunneling'
through 'barriers' in the landscape (areas with
higher Ψ) before reaching lower values which in-
validate the community at the tunnel's entrance.
Tunneling makes the algorithm more efficient.
The maximum length of a tunnel through a bar-
rier of higher Ψ-values is determined by the set
resolution.
The local search can begin by a series of either
inclusions or exclusions of nodes (links). When
no further improvement can be achieved, the
search switches from inclusion to exclusion or
vice versa. Inclusion and exclusion are contin-
ued until no further improvement is possible.
If the exclusion of nodes fragments a sub-
graph, we proceed with the subgraph's main
component.
In the link-wise local search the
greedy algorithm is allowed to go through in-
termediary states representing unconnected sub-
graphs. At the end of the link-wise local search
we determine all components of the subgraph. If
the subgraph is unconnected we repeat the pro-
cedure for each component until we obtain only
connected subgraphs with minimal cost.
A greedy algorithm is efficient because the
cost reduction for all possible cases of includ-
ing a neighbour must be calculated only at the
beginning of the local search. In the subsequent
steps, we only calculate or recalculate cost re-
ductions achieved by adding neighbours of the
link (or node) included. Analogously, we pro-
ceed when excluding boundary nodes or links
(Havemann et al. 2012, Appendix). Otherwise
it would be more efficient to include or exclude
just the first node (link) which reduces cost.
4.2 Evolution
The general implementation of the memetic al-
gorithm is described by Algorithm 1.2 The ge-
netic operators of crossover, mutation, and selec-
tion (described below) are applied to each gener-
ation of communities. Subgraphs generated by
crossover and mutation are adapted by a local
search. If the starting subgraph is not connected
we replace it by its main component. Evolution
is terminated when no better best community is
found for many generations.
2The notation is inspired by a pseudocode given by
Merz (2012).
6
4.3 Genetic operators
Mutation: We mutate a community with mu-
tation variance v < 1 by changing maximally a
proportion v of its links or nodes. In node-wise
memetic evolutions we randomly exclude bound-
ary nodes and then include the same number of
neighbouring nodes.
In link-wise memetics we
experiment with two other mutation operators:
we only exclude or include links and concentrate
changes around one randomly chosen boundary
node.
(Details can be found in Appendix of
Part 2.)
Crossover: From two parent subgraphs we
construct two new individuals by taking inter-
section and union of the subgraphs as starting
points for adaptive local searches. Of course, it
has no effect to cross such parents where one of
Algorithm 1 Pseudocode of memetic evolution
for one adapted seed
initialise population P by mutating the
adapted seed with high variance several times
and adapting mutants
while the best community is not too old do
mutate the best community with low vari-
ance and adapt the mutants
if an adapted mutant is new and its cost is
lower than highest cost then
add it to population P
end if
cross the best community with some ran-
domly chosen communities and adapt the
offspring
if adapted offspring is new and its cost is
lower than highest cost then
add it to population P
end if
select the best communities so that the
population size remains constant
if there is no better best community for
some generations and innovation rate is low
then
renew the population by mutating the
best community with high variance and
adapt mutants
select the best communities so that the
population size remains constant
end if
end while
them is part of the other one. Normally, evolu-
tionary algorithms include some randomness in
the crossover, which in our case would mean to
enlarge the intersection by some nodes or links
from the union. In contrast, our crossing pro-
cedure is deterministic because the boundary of
the union of two good communities should also
be not too bad. The same holds for the intersec-
tion. Deterministic crossover should be (and is)
done only once with the same parents. The only
random element of our crossover is the random
selection of parents.
Selection: From the old population and the
results of mutations and crossovers we select the
communities with lowest Ψ-values, keeping the
population size constant. A new best commu-
nity is only included if it is inside the minimal
range of the best community of the original pop-
ulation. Disregarding the best communities out-
side the minimal range assures that we do not
lose communities which can have a range above
the minimum given by the resolution limit we
apply. Deselected communities can be used as
seeds for other memetic searches.
Renewal: Renewal means to mutate the best
community with high variance several times, to
adapt the mutants, and to apply a usual selec-
tion procedure described above.
5 Concluding remarks
In the forthcoming Part 2 of our paper we dis-
cuss test results.
Acknowledgement
This work is part of a project in which we de-
velop methods for measuring the diversity of re-
search. The project was funded by the German
Ministry for Education and Research (BMBF).
We would like to thank the members of the
project's advisory group3 and also all developers
of R.4 We thank Alexander Struck for assisting
our work and for discussions about the new cost
function. We discussed the issue of link similar-
ity in citation networks with Rob Koopman.
3http://141.20.126.172/~div
4http://www.r-project.org
7
Appendix
A Connectivity measures
In this section we derive the connectivity mea-
sures for link sets σ(L) and kin(L) from analogue
measures in the line graph. We closely follow
the arguments given in our earlier paper (Have-
mann, Glaser, Heinz, and Struck 2012).
We here use i, j = 1, . . . , n to denote nodes
and k, l = 1, . . . , m for links. With C(L) we
name the set of nodes attached to links in the
subgraph induced by link set L. If a link k be-
longs to L its membership µk(L) = 1 and zero
otherwise.
To construct a network's line graph we first
define an auxiliary bipartite graph obtained by
putting a node on each link of the original net-
work. The affiliation matrix B of the bipartite
graph -- also called its incidence matrix -- has a
row for each of the n original nodes and a col-
umn for each of the m original links. Each link
column contains only two non-zero elements,
namely the elements in the rows of the nodes
i and j connected by the link. We can project
the bipartite graph back onto the original net-
work with the product BBT which equals its
adjacency matrix A (except for the main diago-
nal).
We obtain the network's line graph by the op-
posite projection BTB of the bipartite graph.
Evans and Lambiotte (2009) underline, that in
all cases of practical intererest the line graph
contains the same amount of information as the
original network. Knowing BTB we can almost
ever calculate BBT and thus also the network's
adjacency matrix A.
Because each node of the original network is
represented as a clique in the line graph Evans
and Lambiotte (2009) weighted the edges of the
line graph with the inverse degree 1/ki of the
node i in the original network. They define the
line graph's adjacency matrix as
n(cid:88)
i=1
Ekl =
BikBil
ki
.
(8)
Weighting the line graph's edges with the in-
verse degrees of nodes in the original network is
equivalent to an Euclidean normalisation of the
nodes' vectors in the affiliation matrix B of the
auxiliary bipartite graph. This becomes clear if
we factorise the terms of the sum in equation 8:
n(cid:88)
i=1
Ekl =
Bik√
ki
Bil√
ki
.
(9)
m(cid:88)
m(cid:88)
k=1
m(cid:88)
m(cid:88)
√
Then we can shortly write E = DTD with Dik =
ki and verify the Euclidean normalisation
Bik/
of the n row vectors of D (for unweighted net-
works for which we have B2
ik = Bik):
D2
ik =
k=1
k=1
B2
ik
ki
=
1
ki
Bik = 1.
(10)
On the other hand, the projection of the nor-
malised bipartite graph described by affiliation
matrix D back on a network of the original nodes
is given by DDT. An element of adjacency ma-
trix DDT is given by
m(cid:88)
BikBjk(cid:112)kikj
Aij(cid:112)kikj
=
.
(11)
DikDjk =
k=1
k=1
Thus, Euclidean normalisation of B's row vec-
tors is equivalent to weighting each link in the
original (unweighted) network with the geomet-
ric mean of its nodes'
inverse degrees. The
weighted graph described by adjacency matrix
E is not the line graph of the unweighted net-
work described by adjacency matrix A but of the
network weighted according to equation 11. It
depends on the real relations we model with the
network whether this is a realistic weighting.
Now we calculate internal connectivity τ (L)
as the sum of internal degrees of vertices in the
line graph:
m(cid:88)
m(cid:88)
k,l=1
τ (L) =
=
µk(L)Eklµl(L)
n(cid:88)
µk(L)
k,l=1
i=1
(12)
BikBil
ki
µl(L).
In the same way, we can calculate external con-
nectivity σ(L) as the sum of external degrees in
the line graph:
m(cid:88)
m(cid:88)
k,l=1
µk(L)Ekl(1 − µl(L)).
n(cid:88)
µk(L)
k,l=1
i=1
BikBil
ki
(1 − µl(L)).
(13)
σ(L) =
=
8
Now we use the relations
µk(L)Bik = kin
i (L)
and
(1 − µl(L))Bil = kout
i
(L),
m(cid:88)
m(cid:88)
k=1
l=1
which directly follow from the definition of the
incidence matrix B. Thus, we get
τ (L) =
(kin
i (L))2
ki
n(cid:88)
n(cid:88)
i=1
i=1
n(cid:88)
and
σ(L) =
kin
i (L)kout
(L)
.
i
ki
From this we easily derive total connectivity of
a link-induced subgraph as the sum
τ (L) + σ(L) =
kin
i (L) = kin(L).
i=1
B Cost-landscape
of the bow-tie graph
For the bow-tie graph we expect two link com-
munities, namely the triangle {1, 2, 3} and its
complement {4, 5, 6}, cf. Figure 2 and Evans and
Lambiotte (2009). To describe the 2m different
possible subgraphs it is advantageous to make
use of the spherical topology of any landscape
of subgraphs.
Indeed, the cost-function land-
scape of a graph's subgraphs can be seen as the
surface of a globe
• with the whole and the empty graph at the
poles,
• with all possible subgraphs of the same size
on each circle of latitude, and
• with complementary subgraphs situated at
antipodes.
The neighbours of a place in the landscape can
be reached by adding an element to the set of
nodes (for node-induced subgraphs) or of links
(for link-induced subgraphs), respectively, or by
deleting an element from this set. That means,
there are no direct relations between places on
the same circle of latitude. Steps (adding or re-
moving nodes or links) are moves between neigh-
bouring circles of latitude.
9
Figure 2: Bow-tie graph with numbered links
We define the north pole as corresponding to
the empty subgraph and the south pole as cor-
responding to the whole graph. The Ψ-globe of
the bow-tie graph has five circles of latitude cor-
responding to six subgraphs with one link, 15
with two, 20 with three, 15 with four, and six
with five links, respectively.
For the empty graph at the north pole σ = 0
and Ψ = 1 (by definition). The six single links
as the smallest real subgraphs are located at the
highest circle of latitude. The two outer links 1
and 6 have σ = 1· 1/2 + 1· 1/2 = 1 and Ψ = 0.6,
the four inner links have σ = 1·1/2+1·3/4 = 5/4
and Ψ = 0.75.
There are ten connected and five unconnected
subgraphs with two links:
• four connected subgraphs with one outer
link and one inner link (e.g. link set {1, 2})
resulting in σ = 1 · 1/2 + 1 · 3/4 = 5/4 and
Ψ ≈ 0.469,
• six connected subgraphs with two inner
links (e.g. link set {2, 3}) and σ = 1 · 1/2 +
2 · 2/4 + 1 · 1/2 = 2 and Ψ = 0.75,
• four unconnected subgraphs with one outer
and one inner link (e.g. link set {1, 4}) and
σ = 9/4 and Ψ ≈ 0.844,
• one unconnected subgraph with two outer
links ({1, 6}) and σ = 2 and Ψ = 0.75.
On the equator of the Ψ-globe there are 20
triples of links which can be classified into four
types:
• the triangle {1, 2, 3} and its complement
{4, 5, 6} with σ = 2 · 2/4 = 1 and Ψ = 1/3,
• four triples of
inner links (e.g.
link set
{2, 3, 4}) and their unconnected comple-
link set {1, 5, 6}) with σ =
ments (e.g.
3/2 + 3/4 = 9/4 and Ψ = 0.75,
●●0.00.20.40.60.81.00.00.20.40.60.81.0c(0, 1)c(0, 1)●●●●●123654• eight subgraphs with one of the two outer
links, one of the two attached inner links
and one of the two inner links not attached
to the outer link (e.g. link set {1, 2, 4}):
they all have σ = 1·1/2+2·2/4+1·1/2 = 2
and Ψ = 2/3,
• the unconnected triple with one outer and
two inner links (set {1, 4, 5}) and its un-
connected complement (set {2, 3, 6}) with
σ = 3 and Ψ = 1.
On the two circles of latitude on the south-
ern hemisphere we find the complements of the
subgraphs on the northern hemisphere with the
same Ψ-values. Next to the equator we find 13
connected and two unconnected subgraphs with
four links each:
• two unconnected quadruples with one trian-
gle and the second outer link (e.g. link set
{1, 2, 3, 6}) which have σ = 2 and Ψ = 0.75,
• the central star with all four inner links
{2, 3, 4, 5} with σ = 4/2 = 2 and Ψ = 0.75,
• four subgraphs containing one of the two
triangles plus one of the two inner links (e.g.
link set {1, 2, 3, 5}) which all have σ = 1 ·
3/4 + 1 · 1/2 = 5/4 and Ψ ≈ 0.469,
• the four subgraphs with both outer links
and two inner links connecting them (e.g.
link set {1, 2, 5, 6}) with σ = 2/2 + 4/4 = 2
and Ψ = 0.75,
• the four subgraphs with one outer link and
three inner links (one of them attached to
the outer link, e.g. link set {1, 2, 4, 5}) with
σ = 3/2 + 3/4 = 9/4 and Ψ ≈ 0.844.
All complements of the six single links contain-
ing the five other links are connected and have
the same Ψ-values as their single-link comple-
ments (cf. above). The full graph at the south
pole with σ = 0 and Ψ = 1 is connected. The
Ψ-landscape of links has two local minima: the
two triangles have a locally and globally mini-
mal Ψ = 1/3. There are no other local minima.
Thus, we obtain the pair of complementary tri-
angles as the only solution.
References
Ahn, Y., J. Bagrow, and S. Lehmann (2010).
Link communities reveal multiscale com-
10
plexity in networks. Nature 466 (7307),
761 -- 764.
Amelio, A. and C. Pizzuti (2014). Overlap-
ping Community Discovery Methods: A
Survey. Social Networks: Analysis and
Case Studies, 105. http://arxiv.org/
abs/1411.3935.
Clauset, A. (2005). Finding local commu-
nity structure in networks. Physical Re-
view E 72 (2), 26132.
Evans, T. and R. Lambiotte (2009). Line
graphs,
link partitions, and overlapping
communities. Physical Review E 80 (1),
16105.
Fortunato, S. (2010). Community detection in
graphs. Physics Reports 486 (3-5), 75 -- 174.
Gach, O. and J.-K. Hao (2012, January). A
memetic algorithm for community detec-
tion in complex networks. In C. A. C.
Coello, V. Cutello, K. Deb, S. Forrest,
G. Nicosia, and M. Pavone (Eds.), Paral-
lel Problem Solving from Nature - PPSN
XII, Number 7492 in Lecture Notes in
Computer Science, pp. 327 -- 336. Springer
Berlin Heidelberg.
Gong, M., B. Fu, L. Jiao, and H. Du (2011,
November). Memetic algorithm for com-
munity detection in networks. Physical Re-
view E 84 (5), 056101.
Havemann, F., J. Glaser, M. Heinz, and
A. Struck (2012). Evaluating overlap-
ping communities with the conductance
of their boundary nodes. arXiv preprint
arXiv:1206.3992 .
Havemann, F., M. Heinz, A. Struck, and
J. Glaser (2011). Identification of Over-
lapping Communities and their Hierarchy
by Locally Calculating Community-
Changing Resolution Levels. Journal of
Statistical Mechanics: Theory and Exper-
iment 2011, P01023. doi: 10.1088/1742-
5468/2011/01/P01023, Arxiv preprint
arXiv:1008.1004.
Hric, D., R. K. Darst, and S. Fortunato (2014,
December). Community detection in net-
works:
Structural communities versus
ground truth. Physical Review E 90 (6),
062805.
Lancichinetti, A.,
and
J. Kertesz (2009). Detecting the overlap-
S. Fortunato,
tion algorithm. Data & Knowledge Engi-
neering 87, 394 -- 404.
Vitela, J. E. and O. Castanos (2012, May). A
sequential niching memetic algorithm for
continuous multimodal function optimiza-
tion. Applied Mathematics and Computa-
tion 218 (17), 8242 -- 8259.
Wei, Y.-C. and C.-K. Cheng (1989, Novem-
ber). Towards efficient hierarchical designs
by ratio cut partitioning. In IEEE Interna-
tional Conference on Computer-Aided De-
sign, 1989. ICCAD-89. Digest of Techni-
cal Papers, pp. 298 -- 301.
Xie, J., S. Kelley, and B. K. Szymanski
(2013, August). Overlapping community
detection in networks: The state-of-the-
art and comparative study. ACM Comput.
Surv. 45 (4), 43:1 -- 43:35.
Yang, J. and J. Leskovec (2012). Defining and
evaluating network communities based on
ground-truth. In Proceedings of the ACM
SIGKDD Workshop on Mining Data Se-
mantics, pp. 3. ACM.
ping and hierarchical community struc-
ture in complex networks. New Journal
of Physics 11, 033015. arXiv:physics.soc-
ph/0802.1218.
Li, Z., X.-S. Zhang, R.-S. Wang, H. Liu,
and S. Zhang (2013, December). Discover-
ing link communities in complex networks
by an integer programming model and
a genetic algorithm. PLoS ONE 8 (12),
e83739.
Ma, L., M. Gong, J. Liu, Q. Cai, and L. Jiao
(2014, June). Multi-level learning based
memetic algorithm for community detec-
tion. Applied Soft Computing 19, 121 -- 133.
Merz, P. (2012, January). Memetic algorithms
and fitness landscapes in combinatorial
optimization. In F. Neri, C. Cotta, and
P. Moscato (Eds.), Handbook of Memetic
Algorithms, Number 379 in Studies in
Computational Intelligence, pp. 95 -- 119.
Springer Berlin Heidelberg.
Neri, F., C. Cotta, and P. Moscato (Eds.)
(2012). Handbook of Memetic Algorithms,
Volume 379 of Studies in Computational
Intelligence. Springer, Berlin.
Pan, L., C. Wang, and J. Xie (2012).
Link communities detection via local ap-
proach. In T. Li, H. Nguyen, G. Wang,
J. Grzymala-Busse, R. Janicki, A. Has-
sanien, and H. Yu (Eds.), Rough Sets and
Knowledge Technology, Volume 7414 of
Lecture Notes in Computer Science, pp.
282 -- 291. Springer Berlin / Heidelberg.
Pan, L., C. Wang, J. Xie, and M. Liu (2011).
Detecting link communities based on lo-
cal approach. In 2012 IEEE 24th Interna-
tional Conference on Tools with Artificial
Intelligence, Volume 0, Los Alamitos, CA,
USA, pp. 884 -- 886. IEEE Computer Soci-
ety.
Pizzuti, C. (2009). Overlapped community de-
tection in complex networks. In GECCO,
Volume 9, pp. 859 -- 866.
Pizzuti, C. (2012). Boosting the detection
of modular community structure with ge-
netic algorithms and local search. In Pro-
ceedings of the 27th Annual ACM Sympo-
sium on Applied Computing, pp. 226 -- 231.
Shi, C., Y. Cai, D. Fu, Y. Dong, and
B. Wu (2013, September). A link cluster-
ing based overlapping community detec-
11
|
1706.08602 | 2 | 1706 | 2017-09-18T21:57:19 | Second-Order Moment-Closure for Tighter Epidemic Thresholds | [
"cs.SI",
"q-bio.PE"
] | In this paper, we study the dynamics of contagious spreading processes taking place in complex contact networks. We specifically present a lower-bound on the decay rate of the number of nodes infected by a susceptible-infected-susceptible (SIS) stochastic spreading process. A precise quantification of this decay rate is crucial for designing efficient strategies to contain epidemic outbreaks. However, existing lower-bounds on the decay rate based on first-order mean-field approximations are often accompanied by a large error resulting in inefficient containment strategies. To overcome this deficiency, we derive a lower-bound based on a second-order moment-closure of the stochastic SIS processes. The proposed second-order bound is theoretically guaranteed to be tighter than existing first-order bounds. We also present various numerical simulations to illustrate how our lower-bound drastically improves the performance of existing first-order lower-bounds in practical scenarios, resulting in more efficient strategies for epidemic containment. | cs.SI | cs |
Second-Order Moment-Closure for Tighter Epidemic
Thresholds
Masaki Ogura1,∗, Victor M. Preciado2
Abstract
In this paper, we study the dynamics of contagious spreading processes tak-
ing place in complex contact networks. We specifically present a lower-bound
on the decay rate of the number of nodes infected by a susceptible-infected-
susceptible (SIS) stochastic spreading process. A precise quantification of this
decay rate is crucial for designing efficient strategies to contain epidemic out-
breaks. However, existing lower-bounds on the decay rate based on first-order
mean-field approximations are often accompanied by a large error resulting
in inefficient containment strategies. To overcome this deficiency, we derive
a lower-bound based on a second-order moment-closure of the stochastic SIS
processes. The proposed second-order bound is theoretically guaranteed to
be tighter than existing first-order bounds. We also present various numerical
simulations to illustrate how our lower-bound drastically improves the per-
formance of existing first-order lower-bounds in practical scenarios, resulting
in more efficient strategies for epidemic containment.
Keywords: Complex networks, spreading processes, stochastic processes,
stability.
∗Corresponding author
Email addresses: [email protected] (Masaki Ogura), [email protected]
(Victor M. Preciado)
1Graduate School of Information Science, Nara Institute of Science and Technology,
Ikoma, Nara 630-0192, Japan
2Department of Electrical and Systems Engineering, University of Pennsylvania,
Philadelphia, PA 19104-6314, USA
Preprint submitted to Elsevier
November 10, 2018
1. Introduction
Understanding the dynamics of spreading processes taking place in com-
plex networks is one of the central questions in the field of network science,
with applications in information propagation in social networks [1], epidemi-
ology [2], and cyber-security [3]. Among various quantities characterizing the
asymptotic behaviors of spreading processes, the decay rate (see, e.g., [4, 5]) of
the spreading size (i.e., the number of nodes affected by the spread) is of fun-
damental importance. Besides quantifying the impact of contagious spread-
ing processes over networks [6, 7], the decay rate has been used to measure
the performance of containment strategies to control epidemic outbreaks [8].
In this direction, the authors in [9] presented an optimization-based approach
for distributing a limited amount of resources to efficiently contain spreading
processes by maximizing their decay rate towards the disease-free equilib-
rium. This framework was later extended to the cases where the underlying
network in which the spreading process is taking place is uncertain [10], tem-
poral [11, 12], and adaptively changing [13, 14]. Recently, the authors in [15]
presented an approach for achieving an optimal resource allocation in order
to maximize the decay rate under sparsity constraints.
However, finding the decay rate of a spreading process is, in general, a
computationally hard problem. Even for the case of the susceptible-infected-
susceptible (SIS) model [2], which is one of the simplest models of spread,
the exact decay rate is given in terms of the eigenvalues of a matrix whose
size grows exponentially fast with respect to the number of nodes in the net-
works [4]. In order to avoid this computational difficulty, it is common in
the literature [9, 10, 15] to use a lower-bound on the decay rate based on
first-order mean-field approximations of the spreading processes. However,
this first-order approximation is not necessarily accurate; in other words, its
approximation error can be significantly large for several important social
and biological networks, as we will demonstrate later in this paper. There-
fore, the design of strategies for epidemic containment based on mean-field
approximations can result in inefficient control policies.
The aim of this paper is to present a tighter lower-bound on the decay
rate of the stochastic SIS process based on a second-order moment closure.
Specifically, we show that the decay rate is bounded from below by the maxi-
mum real eigenvalue of a Metzler matrix whose size grows quadratically with
respect to the number of nodes in the network. In order to derive our lower-
bound, we describe the stochastic dynamics of the SIS process using a system
2
of stochastic differential equations with Poisson jumps. This approach allows
us to conveniently evaluate the dynamics of the first and the second -order
moments of random variables relevant for the spreading processes. Further-
more, we prove theoretically and illustrate numerically that our lower-bound
strictly improves the one based on first-order approximations.
We remark that, although improved decay rates for the discrete-time SIS
model were presented using second-order analysis in [16], their bounds are
applicable only to the special case where the transmission and recovery rates
of nodes are homogeneous and, furthermore, satisfy restrictive algebraic con-
ditions in terms of nonnegativity of infinitely many matrices. Likewise, the
second-order analysis of the continuous-time SIS model by the authors in
[17] uses mean-field approximations and, hence, it is not clear how the anal-
ysis relates to the dynamics of the original stochastic SIS process. Moreover,
their analysis is valid only when a dominant eigenvalue of a certain matrix
(i.e., an eigenvalue having the maximum real part) is real. In contrast with
these limitations of the results in the literature, our framework applies to
the heterogeneous SIS model without any restrictions, and is supported by
rigorous proofs instead of approximations.
This paper is organized as follows. In Section 2, we state the problem
studied in this paper. In Section 3, we present our lower-bound on the decay
rate, and show that this bound strictly improves the one based on first-
order approximations. The effectiveness of our lower-bound is numerically
illustrated in Section 4.
1.1. Mathematical preliminaries
blocks is denoted by (cid:76)n
We denote the identity and the zero matrices by I and O, respectively.
For a vector u, we denote by u\{i} the vector that is obtained after removing
the ith element from u. Likewise, for a matrix A, we let Ai,\{j} denote the row
vector that is obtained after removing the jth element from the ith row of A.
We say that a square matrix A is irreducible if no similarity transformation
by a permutation matrix transforms A into a block upper-triangular matrix.
The block-diagonal matrix containing matrices A1, . . . , An as its diagonal
If the matrices A1, . . . , An have the same
number of columns, then the matrix obtained by stacking A1, . . . , An in
vertical is denoted by col1≤i≤n Ai.
A directed graph is defined as the pair G = (V,E), where V is a finite
ordered set of nodes and E ⊂ V ×V is a set of directed edges. By convention,
if (v, v(cid:48)) ∈ E, we understand that there is an edge from v pointing towards v(cid:48),
i=1 Ai.
3
in which case v is said to be an in-neighbor of v(cid:48). A directed path from v
to v(cid:48) in G is an ordered set of nodes (v0, . . . , v(cid:96)) such that v0 = v, v(cid:96) = v(cid:48),
and (vk, vk+1) ∈ E for k = 0, . . . , (cid:96) − 1. We say that G is strongly connected
if there exists a directed path from v to v(cid:48) for all v, v(cid:48) ∈ V. The adjacency
matrix of G is defined as the square matrix, having the same dimension as
the number of the nodes, such that its (i, j)th entry equals 1 if the jth node
is an in-neighbor of the ith node, and equals 0 otherwise. It is well known
that a directed graph is strongly connected if and only if its adjacency matrix
is irreducible.
A real matrix A (or a vector as its special case) is said to be nonnegative,
denoted by A ≥ 0, if all the entries of A are nonnegative. Likewise, if all the
entries of A are positive, then A is said to be positive. For another matrix B
having the same dimensions as A, the notation A ≤ B implies B − A ≥ 0.
If A ≤ B and A (cid:54)= B, we write A (cid:12) B. For a square matrix A, we say
that A is Metzler [18] if the off-diagonal entries of A are nonnegative. It is
easy to see that eAt ≥ 0 if A is Metzler and t ≥ 0 (see, e.g., [18]). For a
Metzler matrix A, the maximum real part of the eigenvalues of A is denoted
by λmax(A). In this paper, we use the following basic properties of Metzler
matrices:
Lemma 1. The following statements hold for a Metzler matrix A:
1. λmax(A) is an eigenvalue of A. Moreover, if A is irreducible, then there
exists a positive eigenvector corresponding to the eigenvalue λmax(A).
2. If A ≤ B, then λmax(A) ≤ λmax(B). Furthermore, if A is irreducible
and A (cid:54)= B, then λmax(A) < λmax(B).
positive constant ρ such that Au (cid:12) ρu, then λmax(A) < ρ.
3. Assume that A is irreducible. If there exist a positive vector u and a
Proof. The first claim is part of the Perron-Frobenius theorem for Metzler
matrices (see, e.g., [18, Theorems 11 and 17]). The second claim follows
from the Perron-Frobenius theory and the monotonicity of the maximum
real eigenvalue of nonnegative matrices [19, Section 8.4]. To prove the last
statement, let = ρu−Au and define A(cid:48) = A+(cid:76)(1/u1, . . . , n/un), where n
is the length of the vector u. Since A(cid:48)u = Au + = ρu, A(cid:48) is irreducible, and
v is positive, it follows that λmax(A(cid:48)) = ρ from the Perron-Frobenius theorem
for irreducible Metzler matrices [18, Theorem 17]. Since A is irreducible and
A (cid:12) A(cid:48), the second statement of the lemma shows that λmax(A) < λmax(A(cid:48)) =
ρ.
4
2. Problem Statement
We start by giving a brief overview of the SIS model [2]. Let G = (V,E) be
a strongly connected directed graph with nodes v1, . . . , vn. In the SIS model,
at a given (continuous) time t ≥ 0, each node can be in one of two possible
states: susceptible or infected. When a node vi is infected, it can randomly
transition to the susceptible state with an instantaneous rate δi > 0, called
the recovery rate of node vi. On the other hand, if an in-neighbor of node vi
is in the infected state, then the in-neighbor can infect node vi with an
instantaneous rate βi, where βi > 0 is called the infection rate of node vi. It
is easy to see that the SIS model is a continuous-time Markov process and
has a unique absorbing state at which all the nodes are susceptible. Since
this absorbing state is reachable from any other state, the SIS model reaches
this infection-free absorbing state in a finite time with probability one. The
aim of this paper is to study the stability of this infection-free absorbing
state, defined as follows:
Definition 2. Let > 0 and define the probability
pi(t) = Pr(vi is infected at time t).
We say that the SIS model is -exponentially mean stable if there exists a
constant C > 0 such that, for all nodes vi and t ≥ 0, we have pi(t) ≤ Ce−t
for any set of initially infected nodes at time t = 0. Then, we define the decay
rate of the SIS model as ρ = sup{ : SIS model is -exponentially stable}.
The notion of the decay rate was studied in, e.g., [4] and [5] for the
cases of continuous- and discrete-time problem settings, respectively, and is
closely related to other important quantities on spreading processes such as
epidemic thresholds [4] and mean-time-to-absorption [7]. Specifically, a basic
argument from the theory of Markov processes shows that the SIS model is
-exponentially mean stable for a sufficiently small > 0 (with a possibly
large C) and, therefore, it always has a positive decay rate. However, exact
computation of the decay rate is hard in practice. Even in the homogeneous
case, where all nodes share the same infection and recovery rates, the decay
rate equals the modulus of the largest real-part of the non-zero eigenvalues of
a 2n× 2n matrix representing the infinitesimal generator of the SIS model [4].
An alternative approach for analyzing the decay rate is via upper bounds on
the dynamics of the SIS model based on first-order mean-field approxima-
tions. An example of such a first-order upper bound is described below. Let
5
nal matrices B =(cid:76)(β1, . . . , βn) and D =(cid:76)(δ1, . . . , δn). Then, we can show
us define the vector p(t) = col1≤i≤n pi(t) containing the infection probabilities
of the nodes. Also, let A be the adjacency matrix of G and define the diago-
[9] the inequality p(t) ≤ e(BA−D)tp(0), which gives the following lower-bound
on the decay rate:
ρ ≥ ρ1 = −λmax(BA − D).
(1)
Although this lower-bound is computationally efficient to find, there are sev-
eral cases in which we can observe a large gap between this bound and the
exact decay rate, as illustrated in the following example:
Example 3. Let us consider the SIS model over a romantic and sexual net-
work in a high school (Jefferson, n = 288) taken from [20]. For simplicity, we
assume a homogeneous transmission rate βi = 0.9/λmax(A) and a (normal-
ized) recovery rate δi = 1 for all nodes. In order to approximately compute
the true decay rate ρ, we generate 10,000 sample paths of the SIS model over
the time interval [0, 100] starting from the initial state at which all nodes are
infected. From this computation, we obtain a decay rate of ρ ≈ 0.454. On
the other hand, the first-order approximation in (1) equals ρ1 = 0.1, whose
relative error from ρ is around 78%.
Remark 4. We can in fact show that the strict inequality ρ > ρ1 holds in (1).
Let vi be a node having the minimum recovery rate δmin = min1≤i≤n δi > 0
among all nodes, and consider the situation where only the node vi is initially
infected. Since pi(t) ≥ e−δit for every t ≥ 0, we have
ρ ≥ δi = δmin.
(2)
Then, let us take an arbitrary positive constant b < min1≤i≤n βi. Since
δmin = −λmax(−D) and −D ≤ bA − D, Lemma 1.2 shows
− δmin ≤ λmax(bA − D).
(3)
On the other hand, Since bA − D is irreducible (by the strong connectivity
of G) and bA − D (cid:12) BA − D, we also have
λmax(bA − D) < λmax(BA − D) = −ρ1
(4)
by Lemma 1.2.
desired.
Inequalities (2) -- (4) prove the strict inequality ρ > ρ1, as
6
3. Main Result
As we have demonstrated in Example 3, there may be a large gap between
the true decay rate ρ and its first-order approximation ρ1 for the SIS model.
The aim of this paper is to fill in this gap by providing a better lower-bound
on the decay rate. Specifically, the following theorem presents an improved
lower-bound on the decay rate and is the main result of this paper:
Theorem 5. Define the n2 × n2 Metzler matrix
(cid:20)
col1≤i≤n(δiVi) (cid:76)n
−D
i=1
(cid:0)−Γi + colj(cid:54)=i βjAj,\{i}(cid:1)(cid:21)
(cid:76)n
i=1(βiAi,\{i})
,
A =
where Vi ∈ R(n−1)×n is the matrix satisfying Vix = x\{i} for all x ∈ Rn, and
j(cid:54)=i γij for γij = δi + δj + aijβi. Define ρ2 = −λmax(A). Then, we
Γi = (cid:76)
have
ρ ≥ ρ2 > ρ1.
In order to prove this theorem, we use a representation of the SIS model
as a system of stochastic differential equations with Poisson jumps (see, e.g.,
[13]). For this purpose, we define the variable xi(t) as xi(t) = 1 if node vi
is infected at time t, and xi(t) = 0 otherwise. Then, we can see that these
variables obey the following stochastic differential equations with Poisson
jumps:
dxi = −xidNδi +
aik(1 − xi)xkdNβi,
(5)
n(cid:88)
k=1
where aik is the (i, k)th entry of the adjacency matrix and Nδi and Nβi denote
stochastically independent Poisson counters [21, Chapter 1] with rates δi
and βi, respectively. The rest of this section is devoted to the proof of the
theorem. We divide the proof into two parts, namely, the proof of ρ ≥ ρ2
(Subsection 3.1) and ρ2 > ρ1 (Subsection 3.2).
3.1. Proof of ρ ≥ ρ2
From the system (5) of stochastic differential equations, we can easily
show [13] that the expectation pi = E[xi] obeys the differential equation
n(cid:88)
(cid:88)
k=1
k(cid:54)=i
7
dpi
dt
= −δiE[xi] +
= −δipi + βi
aikE[(1 − xi)xk]βi
aikqik,
(6)
where qij(t) = E[(1 − xi(t))xj(t)] is a second-order variable representing
the probability that vi is susceptible and vj is infected at time t. Since
qii ≡ 0 by definition, in the sequel we do not consider the variable of the
form qii. We next derive differential equations to characterize the second-
order variables qij. Applying Ito's formula (see, e.g., [21, Chapter 4]) for
stochastic differential equations with Poisson jumps to the variable (1−xi)xj,
we can show
d((1 − xi)xj) = xixjdNδj − (1 − xi)xj
aikxkdNβi
k=1
− (1 − xi)xjdNδj + (1 − xi)(1 − xj)
n(cid:88)
k=1
(7)
ajkxkdNβj
n(cid:88)
for any distinct pair (vi, vj) of nodes. To proceed, we define the probabil-
ities pij(t) = E[xi(t)xj(t)] and pijk(t) = E[xi(t)xj(t)xk(t)] for nodes vi, vj,
and vk. Then, from (7), we can compute the derivative of qij as
= δjE[xixj] − βi
dqij
dt
aikE[(1 − xi)xjxk]
n(cid:88)
k=1
n(cid:88)
− δjE[(1−xi)xj] + βj
ajkE[(1−xi)(1−xj)xk]
k=1
n(cid:88)
(cid:80)
k(cid:54)=j aik(pjk − pijk) + βj
k=1
= δipij − βiaij(pj − pij) − δjqij + βj
(cid:80)n
k=1 ajk(pjk − pijk) is
where the function ij = βi
nonnegative because pjk ≥ pijk for all nodes vi, vj, and vk. Using the identity
pj − pij = qij and defining the variable γij = δi + δj + aijβi, we obtain
ajk(pk − pik) − ij,
= −γijqij + δipj + βj
dqij
dt
ajkqik − ij.
(8)
(cid:88)
k(cid:54)=i
In order to upper-bound the infection probabilities of the nodes, we define
the vector variables qi = colj(cid:54)=i qij and q = col1≤i≤n qi having dimensions n−1
and n(n− 1), respectively. Then, we can rewrite the differential equation (6)
as dpi/dt = −δipi + βiAi,\{i}qi. Stacking this differential equation in vertical
with respect to i, we obtain
= −Dp +
dp
dt
βiAi,\{i}
q,
(9)
(cid:19)
(cid:18) n(cid:77)
1=1
8
where D =(cid:76)(δ1, . . . , δn). Also, from (8), it follows that dqij/dt = −γijqij +
δipj + βjAj,\{i}qi − ij. Stacking this differential equation with respect to
j ∈ {1, . . . , n}\{i}, we see that
(cid:18)
(cid:19)
= −Γiqi + δiVip +
dqi
dt
(βjAj,\{i})
col
j(cid:54)=i
qi − col
j(cid:54)=i
ij.
By stacking this differential equation with respect to i = 1, . . . , n, we obtain
the following differential equation
(cid:18)
(cid:19)
(cid:18)
n(cid:77)
i=1
dq
dt
=
col
1≤i≤n
δiVi
p +
−Γi + col
j(cid:54)=i
βjAj,\{i}
q − ,
(cid:19)
where = col1≤i≤n colj(cid:54)=i ij is a vector-valued nonnegative function. This
differential equation and (9) show that the variable r = col(p, q) satisfies
dr/dt = Ar − col(0, ).
We are now at the position to prove the inequality ρ ≥ ρ2. Since A is
Metzler and (t) is entry-wise nonnegative for every t ≥ 0, we can obtain
0 eA(t−τ ) col(0, (τ )) dτ ≤ eAtr(0). This
inequality clearly implies that the SIS model is ρ2-exponentially mean stable.
This completes the proof of the inequality.
the upper bound r(t) = eAtr(0) −(cid:82) t
3.2. Proof of ρ2 > ρ1
If ρ2 ≥ δmin, then we trivially have ρ2 > ρ1 because we know δmin > ρ1
from (3) and (4). Let us consider the case of ρ2 < δmin. Let u be a non-zero
vector of A corresponding to the eigenvalue −ρ2 = λmax(A), i.e., assume that
Au = −ρ2u. We split the matrix A as A = M − N using the matrices
(cid:21)
(cid:20)O M12
O M22
M =
, N =
,
(cid:21)
N21 N22
(cid:20) D O
(βjAj,\{i}) −(cid:77)
n(cid:77)
(cid:77)
j(cid:54)=i
(δi + δj).
i=1
j(cid:54)=i
(cid:32)
col
j(cid:54)=i
(cid:33)
aijβi
,
where
n(cid:77)
i=1
M12 =
βiAi,\{i}, M22 =
n(cid:77)
i=1
N21 = − col
1≤i≤n
δiVi, N22 =
9
Then, we have Mu = (N − ρ2I)u and, hence, (N − ρ2I)−1Mu = u, where
the inversion of N − ρ2I is allowed by our assumption ρ2 < δmin. Therefore,
the matrix (N − ρ2I)−1M has an eigenvalue equal to 1. Since this matrix
has the following upper-triangular structure
(N − ρ2I)−1M =
(cid:20)O ∗
(cid:21)
O L
for the Metzler matrix L defined by
L = (N22 − ρ2I)−1(−N21(D − ρ2I)−1M12 + M22),
it follows that L has an eigenvalue equal to 1. This specifically implies that
λmax(L) ≥ 1.
(10)
On the other hand, we can obtain an upper bound on λmax(L) as fol-
lows. The irreducible matrix BA − D has a positive eigenvector v corre-
sponding to the eigenvalue −ρ1 by Lemma 1.1. Define the positive vec-
tor w = col1≤i≤n v\{i}. Then, it is easy to see that M12w = BAv and
M22w = col1≤i≤n(BAv)\{i} − col1≤i≤n colj(cid:54)=i βjaijvi. Using these equalities
and the eigenvalue equation (BA − D)v = −ρ1v, we can show that
w − φ
(11)
for the nonzero and nonnegative vector
φ = col
1≤i≤n
col
j(cid:54)=i
aij(βivj + βjvi)
δi + δj − ρ2
.
Since L is irreducible (for the proof, see Appendix A), the inequality (11)
and Lemma 1.3 show λmax(L) < max1≤i≤n(δi − ρ1)/(δi − ρ2). Since we have
already shown (10), there must exist an i such that 1 < (δi − ρ1)/(δi − ρ2).
This inequality is equivalent to ρ2 > ρ1 because both of δi − ρ1 and δi − ρ2
are positive. This completes the proof.
10
Lw = (N22 − ρ2I)−1 col
+ (N22 − ρ2I)−1 col
i
(cid:0)δiVi(D − ρ2I)−1(D − ρ1I)v(cid:1)
(cid:19)
((D − ρ1I)v)\{i} − φ
− φ
i
(cid:18) δj − ρ1
(cid:19)
δj − ρ2
δi − ρ1
δi − ρ2
vj
= col
i
col
j(cid:54)=i
(cid:18)
≤
max
1≤i≤n
(a) β = 0.9/λmax(A)
(b) β = 0.7/λmax(A)
(c) β = 0.5/λmax(A)
Figure 1: Relative approximation errors of the decay rate ρ for ER (circles), BA (triangles),
and NWS (squares) graphs. Empty markers: first-order bound ρ1, filled markers: second-
order bound ρ2.
11
101102103n0.20.30.40.50.60.70.8e2(ER)e1(ER)e2(NWS)e1(NWS)e2(BA)e1(BA)101102103n0.00.10.20.30.40.5e2(ER)e1(ER)e2(NWS)e1(NWS)e2(BA)e1(BA)101102103n0.000.050.100.150.200.250.300.35e2(ER)e1(ER)e2(NWS)e1(NWS)e2(BA)e1(BA)Figure 2: Relative approximation errors of the decay rate ρ for real networks. Empty
markers: first-order bound ρ1, filled-markers: second-order bound ρ2.
4. Numerical Simulations
In this section, we illustrate the effectiveness of our results with nu-
merical simulations. The simulations are performed using Python 3.6 on
a 4.2 GHz Intel Core i7 processor.
In our simulations, we consider the
SIS model over several complex networks with a homogeneous transmission
rate βi = β and a recovery rate δi = δ for all nodes. We normalize δ = 1
without loss of generality. We first consider the following three random
graphs: 1) Erdos-R´enyi (ER), 2) Barab´asi-Albert (BA), and 3) Newman-
Watts-Strogatz (NWS) graphs. For each of the networks and various network
sizes, we compute the first-order bound ρ1, our second-order bound ρ2, and an
approximation of the true decay rate ρ (by the same procedure used in Exam-
ple 3). We present the sample averages of the relative errors e1 = (ρ − ρ1)/ρ
and e2 = (ρ − ρ2)/ρ in Fig. 1 (20 realizations of random graphs for each
data point) for β = 0.9/λmax(A), 0.7/λmax(A), and 0.5/λmax(A). We can
observe that our second-order bound remarkably improves the first-order
bound, specifically for the cases of BA and NWS networks.
We then consider the SIS model over several real-world networks [22].
Specifically, we compute lower-bounds on the decay rates for 1) a bipar-
tite network from participation of women in social events (Davis, n = 32),
2) a social network of the Zachary's Karate club (Karate, n = 34), 3) the
connectivity network of states in the USA (USA, n = 49), 4) a network
of bottlenose dolphins (Dolphin, n = 62), 5) a network of protein-protein
interactions (PDZBase, n = 212), 6) the high-school network described in
12
DavisKarateUSADolphinPDZBaseJeffersonUniversityHamstersterFacebook0.20.30.40.50.60.70.80.9e1e2Example 3 (Jefferson, n = 288), 7) an email communication network at the
University Rovira i Virgili (University, n = 1133), 8) a friendship network
on hamsterster.com (Hamsterster, n = 1858), and 9) a friendship network
in Facebook (Facebook, n = 2888). We consider the homogeneous case as
in the above simulations for random graphs, and use the transmission rate
β = 0.9/λmax(A) and the recovery rate δ = 1. We show the relative er-
rors e1 and e2 in Fig. 2. These simulations confirm that our second-order
lower-bound can remarkably improve the first-order bound.
5. Conclusion
In this paper, we have presented an improved lower-bound on the decay
rate of the SIS model over complex networks. We have specifically derived a
lower-bound on the decay rate in terms of the maximum real eigenvalue of
an n2 × n2 Metzler matrix, and have shown that our lower-bound improves
existing lower-bound based on mean-field approximations of the SIS model.
For deriving our lower-bound, we have used a linear upper-bounding model
for the first and second-order moments on the SIS model. In our simulations,
we have shown that our lower-bound significantly improves on the first or-
der lower-bound, in the cases of both random and realistic networks. This
improvement suggests that incorporating second-order moments could allow
us to drastically improve the performance of existing strategies for spreading
control [8, 9, 10, 11, 15].
Acknowledgments
This work was supported in part by the NSF under Grants CAREER-
ECCS-1651433 and IIS-1447470.
Appendix A. Irreducibility of L
Since N22 − ρ2I is a diagonal matrix, it is sufficient to show the irre-
ducibility of L(cid:48) = (N22 − ρ2I)L. We can show that the matrix L(cid:48) can be
represented as the block matrix [L(cid:48)
ij]i,j having the block elements
colj(cid:54)=i βjAj,\{i} −(cid:76)
δiβj
δj − ρ2
Vj(ej ⊗ Aj,\{j}),
L(cid:48)
ij =
j(cid:54)=i aijβi,
if i = j,
otherwise.
13
Therefore, the irreducibility of L(cid:48) is equivalent to that of the block ma-
trix L(cid:48)(cid:48) = [L(cid:48)(cid:48)
ij]i,j having the block elements
(cid:40)
L(cid:48)(cid:48)
ij =
colj(cid:54)=i Aj,\{i},
Vj(ej ⊗ Aj,\{j}), otherwise.
if i = j,
To prove the irreducibility of L(cid:48)(cid:48), we notice that L(cid:48)(cid:48) equals the adjacency
matrix of the directed graph G(cid:48)(cid:48) = (V(cid:48)(cid:48),E(cid:48)(cid:48)) having the n(n − 1) nodes
{v1,2, . . . , v1,n, v2,1, v2,3, . . . , v2,n, . . . , vn,1, . . . , vn,n−1}
1 ∪ E(cid:48)(cid:48)
2 , where E(cid:48)(cid:48)
and edges E(cid:48)(cid:48) = E(cid:48)(cid:48)
2 =
{(vi,j, vi,k) : (j, k) ∈ E}. Let us show that G(cid:48)(cid:48) is strongly connected. Take
two arbitrary nodes vi0,j0 and vi1,j1. Since G is strongly connected, we can
) in G. Then, from
find a directed-path of the form (vi0, vk1, . . . , vk(cid:96)1−1, vi1, vk(cid:96)1
the definition of E(cid:48)(cid:48)
1 = {(vi,j, vj,k) : (j, k) ∈ E} and E(cid:48)(cid:48)
1 , we see that the ordered set
(vi0,j0, vj0,k1, vk1,k2, . . . , vk(cid:96)−2,k(cid:96)−1, vk(cid:96)−1,i1, vi1,k(cid:96))
is a directed path in (V(cid:48)(cid:48),E(cid:48)(cid:48)
1 ). In order to continue this directed path to vi1,j1,
we take another directed path (vk(cid:96), vk(cid:96)+1, . . . , vk(cid:96)(cid:48) , vj1) in G. Then, from the
definition of E(cid:48)(cid:48)
2 , we can see that the ordered set (vi1,k(cid:96), . . . , vi1,k(cid:96)(cid:48) , vi1,j1) is a
directed path in (V(cid:48)(cid:48),E(cid:48)(cid:48)
2 ). We have thus shown the existence of a directed
path from vi0,j0 to vi1,j1 in G(cid:48)(cid:48). This shows the strong connectivity of G(cid:48)(cid:48)
because vi0,j0 and vi1,j1 were taken arbitrarily. This proves the irreducibility
of L(cid:48)(cid:48) and, therefore, the irreducibility of L, as desired.
References
[1] K. Lerman, R. Ghosh, Information contagion: An empirical study of
the spread of news on Digg and Twitter social networks, in: Fourth
International AAAI Conference on Weblogs and Social Media, 2010, pp.
90 -- 97.
[2] C. Nowzari, V. M. Preciado, G. J. Pappas, Analysis and control of
epidemics: A survey of spreading processes on complex networks, IEEE
Control Systems 36 (1) (2016) 26 -- 46.
[3] S. Roy, M. Xue, S. K. Das, Security and discoverability of spread dy-
namics in cyber-physical networks, IEEE Transactions on Parallel and
Distributed Systems 23 (9) (2012) 1694 -- 1707.
14
[4] P. Van Mieghem, J. Omic, R. Kooij, Virus spread in networks,
IEEE/ACM Transactions on Networking 17 (1) (2009) 1 -- 14.
[5] D. Chakrabarti, Y. Wang, C. Wang, J. Leskovec, C. Faloutsos, Epi-
demic thresholds in real networks, ACM Transactions on Information
and System Security 10 (4).
[6] A. Lajmanovich, J. A. Yorke, A deterministic model for gonorrhea
in a nonhomogeneous population, Mathematical Biosciences 28 (1976)
(1976) 221 -- 236.
[7] A. Ganesh, L. Massouli´e, D. Towsley, The effect of network topology on
the spread of epidemics, in: 24th Annual Joint Conference of the IEEE
Computer and Communications Societies, 2005, pp. 1455 -- 1466.
[8] Y. Wan, S. Roy, A. Saberi, Designing spatially heterogeneous strategies
for control of virus spread, IET Systems Biology 2 (4) (2008) 184 -- 201.
[9] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, G. J. Pap-
pas, Optimal resource allocation for network protection against spread-
ing processes, IEEE Transactions on Control of Network Systems 1 (1)
(2014) 99 -- 108.
[10] S. Han, V. M. Preciado, C. Nowzari, G. J. Pappas, Data-driven network
resource allocation for controlling spreading processes, IEEE Transac-
tions on Network Science and Engineering 2 (4) (2015) 127 -- 138.
[11] M. Ogura, V. M. Preciado, Optimal design of switched networks of
positive linear systems via geometric programming, IEEE Transactions
on Control of Network Systems 4 (2) (2017) 213 -- 222.
[12] C. Nowzari, M. Ogura, V. M. Preciado, G. J. Pappas, A general class
of spreading processes with non-Markovian dynamics, in: 54th IEEE
Conference on Decision and Control, 2015, pp. 5073 -- 5078.
[13] M. Ogura, V. M. Preciado, Epidemic processes over adaptive state-
dependent networks, Physical Review E 93 (2016) 062316.
[14] M. Ogura, V. M. Preciado, Optimal containment of epidemics in tem-
in: Temporal Networks Epidemiology,
poral and adaptive networks,
Springer-Verlag, in press, 2017.
15
[15] J. Abad Torres, S. Roy, Y. Wan, Sparse Resource Allocation for Linear
Network Spread Dynamics, IEEE Transactions on Automatic Control
62 (4) (2017) 1714 -- 1728.
[16] N. A. Ruhi, C. Thrampoulidis, B. Hassibi, Improved bounds on the
epidemic threshold of exact SIS models on complex networks, in: 55th
IEEE Conference on Decision and Control, 2016, pp. 3560 -- 3565.
[17] E. Cator, P. Van Mieghem, Second-order mean-field susceptible-
infected-susceptible epidemic threshold, Physical Review E 85 (5) (2012)
056111.
[18] L. Farina, S. Rinaldi, Positive Linear Systems: Theory and Applications,
Wiley-Interscience, 2000.
[19] R. Horn, C. Johnson, Matrix Analysis, Cambridge University Press,
1990.
[20] P. S. Bearman, J. Moody, K. Stovel, Chains of affection: the structure of
adolescent romantic and sexual networks, American Journal of Sociology
110 (1) (2004) 44 -- 91.
[21] F. B. Hanson, Applied Stochastic Processes and Control for Jump-
Diffusions: Modeling, Analysis and Computation, Society for Industrial
and Applied Mathematics, 2007.
[22] J. Kunegis, KONECT -- the Koblenz network collection, in: Proceedings
of the 22nd International Conference on World Wide Web, ACM Press,
New York, New York, USA, 2013, pp. 1343 -- 1350.
16
|
1603.02714 | 2 | 1603 | 2016-04-06T18:38:39 | The Rise of Social Botnets: Attacks and Countermeasures | [
"cs.SI"
] | Online social networks (OSNs) are increasingly threatened by social bots which are software-controlled OSN accounts that mimic human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster, which collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence manipulation through real experiments on Twitter and also trace-driven simulations. We also propose the corresponding countermeasures and evaluate their effectiveness. Our results can help understand the potentially detrimental effects of social botnets and help OSNs improve their bot(net) detection systems. | cs.SI | cs | The Rise of Social Botnets: Attacks and
Countermeasures
Jinxue Zhang, Student Member, IEEE, Rui Zhang, Member, IEEE, Yanchao Zhang, Senior Member, IEEE,
and Guanhua Yan
Abstract-Online social networks (OSNs) are increasingly threatened by social bots which are software-controlled OSN accounts that mimic
human users with malicious intentions. A social botnet refers to a group of social bots under the control of a single botmaster, which
collaborate to conduct malicious behavior while mimicking the interactions among normal OSN users to reduce their individual risk of being
detected. We demonstrate the effectiveness and advantages of exploiting a social botnet for spam distribution and digital-influence
manipulation through real experiments on Twitter and also trace-driven simulations. We also propose the corresponding countermeasures
and evaluate their effectiveness. Our results can help understand the potentially detrimental effects of social botnets and help OSNs improve
their bot(net) detection systems.
Index Terms-Social bot, social botnet, spam distribution, digital influence
!
two new social botnet attacks on Twitter, one of the most
popular OSNs with over 302M monthly active users as of June
2015 and over 500M new tweets daily. Then we propose two
defenses on the reported attacks, respectively. Our results help
understand the potentially detrimental effects of social botnets
and shed the light for Twitter and other OSNs to improve their
bot(net) detection systems. More specifically, this paper makes
the following contributions.
Firstly, we demonstrate the effectiveness and advantages of
exploiting a social botnet for spam distribution on Twitter. This
attack is motivated by that Twitter currently only suspends the
accounts that originate spam tweets without punishing those
retweeting spam tweets [16]. If the social botnet is organized
as a retweet tree in which only the root originates spam tweets
and all the others merely retweet spams, all the social bots
except the root bot can escape suspension. Given a set of
social bots, we formulate the formation of the retweeting tree
as a multi-objective optimization problem to minimize the
time taken for a spam tweet to reach a maximum number of
victim Twitter users at the lowest cost of the botmaster. Since
the optimization is NP-hard, we give a heuristic solution and
confirm its efficacy with real experiments on Twitter and trace-
driven simulations.
Secondly, we show that a social botnet can easily manipu-
late the digital influence [17], [18] of Twitter users, which has
been increasingly used in ad targeting [19], [20], customer-
service improvement [21], recruitment [22], and many other
applications. This attack stems from the fact that almost all ex-
isting digital-influence tools such as Klout, Kred, and Retweet
Rank, measure a user's digital influence exclusively based on
his2 interactions with others users on Twitter. If social bots col-
laborate to manipulate the interactions of target Twitter users,
they could effectively manipulate the victims' digital influence.
The efficacy of this attack is confirmed by real experiments on
Twitter.
Finally, we propose two countermeasures to defend against
the two reported attacks, respectively. To defend against the
2. No gender implication.
6
1
0
2
r
p
A
6
]
I
S
.
s
c
[
2
v
4
1
7
2
0
.
3
0
6
1
:
v
i
X
r
a
1 INTRODUCTION
O NLINE social networks (OSNs) are increasingly threat-
ened by social bots [2] which are software-controlled OSN
accounts that mimic human users with malicious intentions.
For example, according to a May 2012 article in Bloomberg
Businessweek,1 as many as 40% of the accounts on Facebook,
Twitter, and other popular OSNs are spammer accounts (or
social bots), and about 8% of the messages sent via social
networks are spams, approximately twice the volume of six
months ago. There have been reports on various attacks,
abuses, and manipulations based on social bots [3], such as
infiltrating Facebook [4] or Twitter [5], [6], launching spam
campaign [7]–[9], and conducting political astroturf [10], [11].
A social botnet refers to a group of social bots under the
control of a single botmaster, which collaborate to conduct
malicious behavior while mimicking the interactions among
normal OSN users to reduce their individual risk of being
detected. For example, social bots on Twitter can follow others
and retweet/answer others' tweets. Since a skewed follow-
ing/followers (FF) ratio is a typical feature for social bots on
Twitter [12], maintaining a balanced FF ratio in the social botnet
makes it much easier for individual bots to escape detection.
Creating a social botnet is also fairly easy due to the open APIs
published by OSN providers. For example, we successfully
created a network of 1,000 accounts on Twitter with $57 to
purchase 1,000 Twitter accounts instead of manually creating
them.
Despite various studies [13]–[15] confirming the existence
of social botnets, neither have the greater danger from social
botnets been unveiled nor have the countermeasures targeted
on social botnets been proposed. In this paper, we first report
The preliminary version of this paper appeared in IEEE CNS 2013 [1].
J. Zhang and Y. Zhang are with the Department of Electrical, Computer,
and Energy Engineering, Arizona State University, Tempe, AZ 85287 (e-mail:
jxzhang, [email protected]).
R. Zhang is with the Department of Electrical Engineering, University of Hawaii,
Honolulu, HI 96822 (e-mail: [email protected]).
G. Yan is with the Department of Computer Science, Binghamton University,
New York, NY 13902 (e-mail: [email protected]).
1. http://www.businessweek.com/articles/2012-05-24/likejacking-
spammers-hit-social-media
botnet-based spam distribution, we maintain a spam score for
each user and update the score whenever the corresponding
user retweets a spam. The user is suspended if his spam
score exceeds a predefined threshold. To defense against the
botnet-based influence manipulation attacks, we propose to
find sufficient credible users and only use the interactions
originated from these credible users for digital-influence mea-
surement. Moreover, based on the measurement in Section §4,
we design a new model to compute the influence score which
is resilient to the manipulation from a single credible social
bot. We confirm the effectiveness of both defenses via detailed
simulation studies driven by real-world datasets.
The rest of the paper is organized as follows. §2 introduces
the construction of a social botnet on Twitter. §3 and §4 show
the efficacy and merits of using the social botnet for spam
distribution and digital-influence manipulation, respectively.
§5 details and evaluates two countermeasures. §6 discusses the
related work. §7 concludes this paper.
2 BUILDING A SOCIAL BOTNET ON TWITTER
In this paper, we focus on networked social bots in Twitter, so
we first outline the Twitter basics to help illustrate our work.
The readers familiar with Twitter can safely skip this paragraph
without any loss of continuity. Unlike Facebook, the social
relationships on Twitter are unidirectional by users following
others. If user A follows user B, A is B's follower, and B is A's
friend. In most cases, a user does not need prior consent from
another user whom he wants to follow. Twitter also allows
users to control who can follow them, but this feature is rarely
used. In addition, users can choose to unfollow others and block
their selected followers. A Twitter user can send text-based
posts of up to 140 characters, known as tweets, which can be
read by all its followers. Tweets can be public (the default
setting) and are visible to anyone with or without a Twitter
account, and they can also be protected and are only visible
to previously approved Twitter followers. A retweet is a re-
posting of someone else's tweet. A user can retweet the tweets
of anyone he follows or does not follow, and his retweets can be
seen by all his followers. Moreover, a user can reply to a post
(tweet or retweet) and ensure that specific users can see his
posts by mentioning them via inserting "@username" for every
specific user into his posts. Finally, each user has a timeline
which shows all the latest tweets, retweets, and replies of his
followers.
We construct a social botnet on Twitter consisting of a
botmaster and a number of social bots which are legitimate
Twitter accounts. Twitter accounts can be manually created
or purchased at affordable prices. For example, we bought
1,000 Twitter accounts with $57 from some Internet sellers for
experimental purposes only. The botmaster is in the form of
a Java application, which we developed from scratch based
on the OAuth protocol [23] and open Twitter APIs. It could
perform all the Twitter operations on behalf of all social bots to
make the bots look like legitimate users.
3 SOCIAL BOTNET FOR SPAM DISTRIBUTION
3.1 Why the Social Botnet for Spam Distribution?
As the popularity of Twitter rapidly grows, spammers have
started to distribute spam tweets which can be broadly defined
as unwanted tweets that contains malicious URLs in most
2
cases or occasionally malicious texts [8], [9], [24]. According
to a study in 2010 [8], roughly 8% of the URLs in tweets are
malicious ones that direct users to scams/malware/phishing
sites, and about 0.13% of the spam URLs will be clicked.
Given the massive scale of Twitter, understanding how spam
tweets are distributed is important for designing effective spam
defenses.
The simplest method for spam distribution is to let social
bots distribute spam tweets independently from each other,
which we refer to as the independent method. In particular,
the botmaster can instruct every bot to directly post spam
tweets which can be seen by all its followers. According to
the Twitter rules,3 the accounts considered as spam originators
will be permanently suspended. Since there are sophisticated
techniques such as [25], [26] detecting malicious URLs, this
independent approach may subject almost all social bots to
permanent suspension in a short time window.
A more advanced method, which we propose and refer
to as the botnet method, is to exploit the fact that Twitter
currently only suspends the originators of spam tweets without
punishing their retweeters. In the simplest case, the botmaster
forms a single retweeting tree, where every bot is associated
with a unique vertex and is followed by its children bots. Then
only the root bot originates spam tweets, and all the others
simply retweet the spam tweets from their respective parent.
Given the same set of social bots, both methods can distribute
spam tweets to the same set of non-bot Twitter users, but
only the root bot will be suspended under the botnet method.
Obviously, the botnet method is economically beneficial for
the botmaster because it involves non-trivial human effort or
money to create a large social botnet.
We use an experiment on Twitter to validate our conjec-
ture for the independent method. Our experiment uses three
different social botnets with each containing 100 bots. The
experiment proceeds in hours. At the beginning of every hour,
every bot in the same botnet almost simultaneously posts a
spam tweet comprising two parts. The first part is different
from every bot and randomly selected from the list of tweets
returned after querying "music," while the second part is an
identical malicious URL randomly selected from the Shalla's
blacklists (http://www.shallalist.de/) and shortened using the
bitly service (http://bitly.com) for use on Twitter. We find that
all the bots in the three botnets are suspected in two, five, and
six hours. Based on this experiment, we can safely conjecture
that the independent method will cause most bots in a larger
botnet to be suspended in a short period, thus putting the
botmaster at serious economic disadvantage.
We use a separate set of experiments to shed light on the
advantage of the botnet method. In this experiment, we first
use 111 bots to build a full 10-ary tree of depth two, i.e., each
node except the leaves has exactly 10 children. The experiment
proceeds in hourly rounds repeatedly on these 111 bots. At
the beginning of every hour of the first round, the root bot
posts a spam tweet, while all its descendants merely retweet
the spam tweet after a small random delay. Then we replace the
suspended bot by a random bot alive from the same network,
re-organize the bot tree, and start the next round. We totally run
the experiments for five rounds, in each of which only the root
bot is suspended after six hours on average, and all other bots
who just retweet the spams (with five times) remain alive. To
3. http://support.twitter.com/articles/18311\#
check whether the bots will be suspended by retweeting more
spams, we reduce the spamming frequency from one per hour
to one per day, and repeat the experiment for ten more rounds,
and all the retweeting bots were still alive at the end of the
experiment. In addition, we use the similar methodology to test
three other different botnets of 2, 40, and 100 bots, respectively,
and obtain the similar results.
It has been very challenging in the research community to
conduct experimental studies about the attacks on online social
networks and also the corresponding countermeasures. In the
experiments above, we have to control the social bots to post
malicious URLs to evaluate Twitter's suspension policy, which
may harm benign users. To minimize the negative impact on
the legitimate users, we adopted a methodology similar to
[4], [9], [27], [28]. Specifically, none of the purchased accounts
followed any legitimate user and thus were very unlikely to be
followed by legitimate users, which greatly reduced the pos-
sibility of the posted spams being viewed by legitimate users.
In addition, we deleted every spam tweet immediately after
the experiment to further avoid it being clicked by legitimate
users. Our experiments clearly show that Twitter has a much
more strict policy against posting original spam tweets than
retweeting spam tweets.
3.2 Optimal Social Botnet for Spam Distribution
§3.1 motivates the benefits of using the social botnet for spam
distribution on Twitter. Given a set of social bots, what is the
optimal way for spam distribution? We give an affirmative
answer to this important question in this section.
overlapping non-bot followers. We further let F = (cid:83)n
3.2.1 Problem Setting and Performance Metrics
We consider a botnet V of n bots, where each bot i ∈ [1, n]
can be followed by other bots and also other Twitter users
outside the botnet (called non-bot followers hereafter). Let Fi
denote the non-bot followers of bot i. Note that Fi ∩ Fj may
be non-empty (∀i (cid:54)= j), meaning that any two bots may have
i=1 Fi.
How to attract non-bot followers for the bots is related to social
engineering [29] and orthogonal to the focus of this paper. Note
that it is very easy in practice for a bot to attract many non-bot
followers, as shown in [4], [5], [14], [15].
The botmaster distributes spam tweets along one or multi-
ple retweeting trees, and the vertices of every retweeting tree
corresponds to a disjoint subset of the n bots. In addition,
every bot in a retweeting tree is followed by its children. As
discussed, the root of every retweeting tree will originate spam
tweets, which will appear in the Twitter timeline of its children
bots and then be retweeted. The distribution of a particular
spam tweet finishes until all the bots on all the retweeting trees
either tweet or retweet it once and only once.
Given a set V with n bots and F, we propose three metrics
to evaluate the efficacy of botnet-based spam distribution.
• Coverage: Let C denote the non-bot receivers of a given
spam tweet and be called the coverage set. The coverage
of spam distribution is then defined as
• Delay: We define the delay of spam distribution, de-
noted by τ, as the average time for each user in C to
see a given spam tweet since it is generated by the root
bot. A user may follow multiple bots and thus see the
same spam tweet multiple times, in which case only the
first time is counted.
C
F ∈ [0, 1].
• Cost: We use S and S to define the cost of spam
distribution, where S denotes the indices of suspended
bots after distributing a given spam, and S denotes
the set of non-bot followers will be lost due to the
suspension of S, i.e., S = C \ ((cid:83)
i∈V\S Fi).
3
The above metrics motivates three design objectives. First,
we obviously want to maximize the coverage to be one, which
happens when all the n bots participate in spam distribution
by belonging to one retweeting tree. Second, many malicious
URLs in spam tweets are hosted on compromised servers and
will be invalidated once detected, and Twitter will remove
spam tweets as soon as they are identified. It is thus also im-
portant to minimize the delay. Finally, since it incurs non-trivial
human effort or money to create bots and attract followers for
them, it is critical to minimize the cost as well.
3.2.2 Design Constraints
A major design challenge is how to circumvent Twitter's sus-
pension rules4 that are evolving in accordance with changing
user (mis)behavior. We classify the suspension rules into strict
and loose ones. Violators of strict rules will be immediately
suspended. The strict rule most relevant to our work is that the
users originate spam tweets containing malicious URLs will be
suspended. In contrast, a violator of loose rules will initially
become suspicious and later be suspended if his violations of
related loose rules exceed some unknown threshold Twitter
defines and uses internally. Examples of loose rules include
repeatedly posting others' tweets as your own or the same
tweet, massively following/unfollowing people in a short time
period, etc. In addition, the research community have discov-
ered many useful loose rules for spam-tweet detection such
as those in [25], [30]–[35] which are likely to be or have been
adopted by Twitter into their evolving suspension-rule list. As
discussed, we use the botnet method for spam distribution in
order to largely circumvent this strict rule. In the following, we
introduce five design constraints related to some loose rules
we consider most relevant. By following these constraints, the
social bots can cause much less suspicion to Twitter and thus
are much less likely to be suspended.
1. The maximum height of a retweeting tree is K = 10
according to [30]. Hence we claim that any spam tweet will not
be retweeted more than 10 times.
2. A bot only retweets the spam tweets posted by its parent
bot on the retweeting tree it follows, as retweeting the tweets
from non-followed users is known to be effective in detecting
spam tweets [33].
3. Any spam tweet from an arbitrary bot will be retweeted
by at most 100r percent of its followers. As r approaches
one, the bot will become increasingly suspicious according to
community-based spam detection algorithms [24], [36]. Recall
that the followers of any bot i ∈ [1, n] comprise other bots
and also non-bot users (i.e., Fi). Note that non-bot followers
rarely retweet spam tweets in practice, but we require all bot
followers to retweet spam tweets. Then bot i can have no more
than (cid:100) rFi
4. The retweeting lag at any hop j ∈ [1, K] is a random
variable ti which follows a hop-wise statistical distribution
according to [30], as it is quite abnormal for a user to immedi-
ately retweet a post once seeing it. Here the retweeting lag is
1−r (cid:101) bot followers.
4. http://support.twitter.com/articles/18311#
4
What is the optimal way to form a retweeting tree as in
Fig. 1(c) given the cost, coverage, and delay requirements?
Recall that the cost is defined by S and S. Since S = c
under the budget constraint, we just need to minimize S. To
mathematically express the cost and coverage requirements,
we let {Vk}K
k=1 denote K disjoint subsets of the bot indices
{1, . . . , n}, where K = 10 is the maximum height of the
retweeting tree (see Constraint 1), Vk denote the bot indices
k=1 Vi ⊆ {1, . . . , n}.
If the optimal retweeting tree eventually found is of depth
k=K∗+1 will all be empty. Recall that Fi
K∗ < K, the sets {Vk}K
denotes the set of non-bot followers of bot i ∈ [1, n] and that
i∈Vk,k∈[M +1,K∗] Fi)
i∈Vk,k∈[1,K] Fi ⊆ F and need
to maximize C. Since S ⊆ C, we can combine the cost
S
C and then
and coverage requirements into a single metric
attempt to minimize it.
at level k of the retweeting tree, and (cid:83)K
F = (cid:83)n
i=1 Fi. Then we have S = C \ ((cid:83)
and the coverage set C = (cid:83)
and Φk = (cid:83)
Fi −(cid:83)k−1
Constraint 4, it takes(cid:80)k
It is a little more complicated to derive the delay. As
discussed, a non-bot user may follow multiple bots at differ-
ent levels, in which case it is considered a follower on the
lowest level among those. Let Φk denote the set of non-bot
followers at k ∈ [1, K]. It follows that Φ1 = Fi (i ∈ V1)
l=1 Φl for k ∈ [1, K]. According to
j=1 tj for a spam tweet to reach level-k
non-bot followers, where tj denotes the retweeting lag of hop
j ∈ [1, K], and t1 = 0. Since there are totally Φk non-bot
followers at level k and C non-bot followers across all levels,
we can compute the delay as
i∈Vk
K(cid:88)
k(cid:88)
k=1
j=1
τ =
1
C
tjΦk .
Finally, we reduce the three-objective optimization problem
to the following single-objective minimization problem.
S
C + (1 − α)τ
min f ({Vk}K
s.t.
k=1
k=1) = αβ
Vi ⊆ {1, . . . , n}
K(cid:91)
Vi ∩ Vj = φ,∀i (cid:54)= j ∈ [1, K]
M(cid:91)
(cid:88)
Vi ≤ c
(cid:100) rFi
1 − r
k=1
i∈Vk
(1)
(cid:101) ≥ Vk+1,∀k ∈ [M − 1, K − 1]
We have two remarks here. First, α ∈ [0, 1] is a adjustable
weight that reflects the relative importance of coverage and
delay, and β is a fixed scaling factor to unify two different
objective units. Second, the last constraint is due to the afore-
mentioned third design constraint.
The above optimization problem can be viewed as a varia-
tion of classical set partition problem (SPP), which is NP-hard.
In what follows, we introduce a heuristic approximation solu-
tion by constructing a collection of disjointed subsets {Vk}K
from the botnet set.
k=0
3.2.4 Heuristic Solution
Our intuition is to use all the budget c and fill the first M hops
of the retweeting trees with the bots having the lowest sus-
pension cost in terms of the number of lost non-bot followers.
Fig. 1. Exemplary retweeting trees with 12 bots, where M = 3 and the
botmaster's suspension budget is c = 5.
defined as the time elapsed when a bot sees a spam tweet until
it retweets it.
5. The social bots within the first M hops will be suspended
once Twitter finds that they are involved in (re)tweeting a
spam tweet. This constraint is motivated by recent findings [14]
that spammer accounts on Twitter tend to be connected and
clustered by mutual followings. It is thus reasonable to assume
that Twitter either have been utilized or will soon utilize
these research findings to suspend the accounts involved in
distributing a spam tweet within the first M > 0 hops. After
introducing this constraint, we relax the third one by allowing
arbitrary topology in the first M hops because all of its bots
will be suspended.
3.2.3 Problem Formulation
Give the above design objectives and constraints, we now
attempt to formulate botnet-based spam distribution as an
optimization problem. The major challenge lies in the infea-
sibility of simultaneously achieving the maximum coverage,
the minimum delay, and the minimum cost. Fig. 1 shows
an example with 12 bots and M = 3, and we assume that
every bot has the same number of non-bot followers. In one
extreme shown in Fig. 1(a), we can minimize the delay τ by
letting every bot be a root bot, but the cost is obviously the
maximum possible because all the bots will be suspended. In
the other extreme shown in Fig. 1(b), we can form a single
retweeting tree with exactly three bots within the first three
hops, in which case we can achieve the minimum possible cost,
but the achievable delay will always be larger than that in the
first case no matter how the retweeting tree beyond three hops
is formed. In addition, we assume for the second case that the
retweeting tree can include all the 12 bots, leading to the same
coverage of one as in the first case. If there are too many bots,
however, some of them may not be able to be incorporated into
the retweeting tree due to the first and third design constraints,
and the resulting coverage will be smaller than that of the first
case.
To deal with the above challenge, assume that the botmaster
has a suspension budget c ∈ [M, n] bots, referring to the
maximum number of suspended bots it can tolerate. Note that
the more bots in the first M hops, the more non-bot followers
in F closer to the root bot which can receive a given spam
tweet in shorter time, and thus the smaller the delay. Under the
budget constraint, the minimum delay can hence be achieved
only when there are exactly c bots within the first M hops, as
shown in Fig. 1(c) with c = 5.
M = 3(a)(b)(c)c = 55
(a) α = 0.4
(b) α = 0.65
(c) α = 0.9
Fig. 2. Performance comparison of independent and botnet methods in spam distribution at different αs in terms of the single objective f.
subsets, each corresponding to one of the first M levels. A
heuristic observation here is that we need to maximize VM, as
the more non-bot followers of the social bots in the Mth level,
the more social bots in level M + 1 and subsequent levels, and
also the lower average delay according to the last constraint in
(1). Given the budget S = c, we obtain VMmax = c − M + 1
when the retweeting forest has a single tree whose first M − 1
levels form a straight line, as shown in Fig. 1(b). The bots in the
Mth level is then determined by using MAXCOVER to choose
the c − M + 1 bots from S with the maximum number of non-
bot followers.
To determine the level for each of the remaining M −1 bots,
we sort the remaining M − 1 bots in S in the descending order
according to the number of their non-bot followers and assign
them to the corresponding level, e.g., the bot with the highest
number of non-bot followers will be assigned to the first level.
Note that it is possible that after we maximizing the number
of bots at the Mth level, the remaining bots are less than the
allowed on the Mth level, so the (M + 1)-th is not full. To
further reduce the average delay in such cases, we move the
exceeding bots in the Mth level to the first level.
set
{1, . . . , n}, we can then build the final retweeting forest (tree).
Specifically, the number of retweeting trees is equal to the
cardinality of V1, which is one if the (M + 1)-th level is full
or greater than one otherwise. We then randomly choose one
social bot from V1 to be the root of the retweeting tree with
more than one level, which is followed by the bots from the
second to Mth level determined by V2 to VM , respectively.
Finally, we build the level from k = M + 1 to K by select-
ing certain number of social bots from Vk according the last
constraint in Eq. (1).
After determining {Vi}K
i=1
from the
social-bot
3.3 Trace-driven Evaluation
We conduct trace-driven simulations to compare the perfor-
mance of spam distribution using the independent and botnet
methods, as well as evaluating the tradeoffs among the multi-
ple goals in the botnet method.
The evaluation for independent bots is straightforward. In
particular, given the bot set V with V = n, we place all the
bots in the first level which will be suspended completely. We
then have C = S = n, and τ = 0. The single objective in
Problem (1) is thus f = α.
To evaluate the botnet method, we set up the simulations
according to existing measurement data and heuristics. We set
(a) #lost legitimate followers
(b) Average delay τ (hours)
Fig. 3. Performance comparison of independent and botnet methods in
spam distribution in terms of separate objective.
We then recursively place the bots with the highest number of
non-bot followers from level M + 1 to the last level, in order to
reduce the average latency as well as cost.
To begin with, our approximation is built on the solutions
to the traditional maximum coverage problem (or MAXCOVER)
and the minimum coverage problem (MINCOVER), which is to
select k sets from a collection of subsets of a ground set so that
the their union is maximized [37] or minimized, respectively.
MAXCOVER and MINCOVER problems are both NP-hard and
have greedy approximation algorithms by iteratively selecting
the maximum or minimum subset after extracting the selected
elements, respectively.
Our solution consists of the following two steps. First, given
the budget c for S and that all the followers in S will be lost
because of the suspension, we minimize the objective S by
using MINCOVER to choose c bots as S with the minimum total
number of non-bot followers. In doing so, we can determine
the union of the bot set for the first M level. The bot subset in
each level will be determined later. Here we just assume that
S has been divided into the M groups, each corresponding
to the bots in one of the first M levels. Second, we construct
{Vk}K
k=M +1 to greedily increase the coverage C and at the
same time lower the average delay T . Specifically, assuming
that we have known VM , to determine VM +1, we first set the
(cid:100) rFi
1−r (cid:101) according to
the last constraint in (1) and then use MAXCOVER to choose
a subset of VM +1 bots from the remaining bot set with the
maximum number of non-bot followers. We repeat this greedy
selection for every level k = M + 2, . . . , K.
The remaining problem is how to partition S into M
cardinality of VM +1 be equal to (cid:80)
i∈Vk
0204060801000.40.50.60.70.80.911.11.21.31.4Sf n=100, botnetn=300, botnetn=500, botnetn=*, independent0204060801000.580.60.620.640.660.680.70.720.74Sf n=100, botnetn=300, botnetn=500, botnetn=*, independent0204060801000.20.30.40.50.60.70.80.91Sf n=100, botnetn=300, botnetn=500, botnetn=*, independent02040608010000.20.40.60.81SCost n=100, botnetn=300, botnetn=500, botnetn=*, independent02040608010000.511.522.5SDelay n=100, botnetn=300, botnetn=500, botnetn=*, independentK = 10, and t1 = 0, ti = 0.5i hour for i = 2, . . . K according
to [30]. To build {Fi}n
i=1, we generate Fi according to the
Gaussian distribution with µ = 32 as the average number of
followers in the dataset of [30]. We also set the variance to
σ2 = 5, generate a legitimate follower set F with F = 6000,5
and randomly choose Fi followers from the set F for each bot
i. In addition, according to [14], the average path length of the
spammer community is 2.60, so we set M = 3 to suspend the
bots in the first three hops of F. Finally, we set β to one and
the retweeting ratio r = 0.2. Due to space constraints, we focus
on on the impact of α, c, and n and do not report the impact of
F, σ2, r, M, or β in this paper.
Fig. 2 compares the independent and botnet methods using
the objective function f with different weights α. As stated
before, f is simply equal to α for the independent case because
τ = 0 and S = C. For the botnet method, the objective f is
S
the weighted sum of
C and the delay τ. When α is small, τ
S
has higher impact on f than
C
will dominate f. Specifically, we can see from Fig. 2(a) that
when α = 0.4, the independent method outperforms the botnet
method with smaller f. However, as shown in Fig. 2(b), when
α increases to 0.65, the botnet method can achieve lower f than
the independent method does. This trend is more obvious for
the same reason in Fig. 2(c) where α = 0.9.
S
C , while when α is large,
Figs. 3 compare the two methods in terms of separate
objectives including the number of lost legitimate followers
and the average delay under different budget S = c. We can
see that both methods have the same coverage C, which is
equal to F, as well as the maximum value of C. In addition,
we can see from Fig. 3(b) that the delay of the independent
method is zero, while that of botnet method could be on the
order of hours. Finally, Fig. 3(a) shows that the botnet method
has significant advantage than the independent method in
terms of S, the number of lost legitimate followers, as S
is always equal to F for the independent scheme.
Finally, the botnet size n also has some impact on separate
S
C decreases
objectives in the botnet case. Fig. 3(a) shows that
as n increases. The reason is that the larger n, the more bots
with less non-bot followers will be assigned to the first M
S
levels, resulting in smaller S and thus larger
C . In addition,
Fig. 3(b) shows that the larger n, the higher the average delay
τ, which is also expected.
In summary, from the view point of the botmaster, these
evaluations show that the botnet scheme is more flexible than
the independent method when considering multiple objectives
of the spam distribution at the same time.
4 SOCIAL BOTNET FOR DIGITAL-INFLUENCE MANIP-
ULATION
In this section, we first briefly introduce digital influence and
then experimentally show the efficacy of using the social botnet
to manipulate digital influence.
4.1 Rise of Digital Influence
Digital influence is one of the hottest trends in social media
and is defined as "the ability to cause effect, change behavior,
and drive measurable outcomes online" in [38]. The huge
6
commercial potential of digital influence is in line with the
increasingly recognized importance of word-of-mouth mar-
keting on social networks. There are also growing business
cases in which various companies successfully promoted their
services/products by reaching out to most influential social-
network users in their respective context [38].
The future of digital influence also relies on effective tools
to measure it. As reported in [38], there are over 20 popular
digital-influence software vendors such as Klout [39] , Kred
[40], Retweet Rank [41], PeerIndex [42], TwitterGrade [43]
and Twitalyzer [44]. Every vendor has its proprietary method
to compute an influence score for a given user based on his
activities within his affiliated social network such as Twitter,
Facebook, Google+, and LinkedIn, and higher scores represent
greater influence. As shown in Table 1, Klout, Kred, and
PeerIndex use normalized scores with different average values
and scales, while RetweetRank, TweetGrader, and Twitalyzer
represent digital-influence scores using percentile.
The typical business model of digital-influence vendors
is based around connecting businesses with individuals of
high influence. Companies have paid to contact individuals
with high influence scores in hopes that free merchandise and
other perks will influence them to spread positive publicity
for them. For example, in 2011 Chevy offered 139 3-day test
drives of its 2012 Sonic model to selected participants with
the Klout score of at least 35 [19]. As another example, it
has been reported that some recruiters have used the digital-
influence scores to select qualified candidates [22]. In addition,
customer service providers like Genesys prioritize customer
complaints according to their digital-influence scores to avoid
the amplification of complaints by influential users in OSNs
[21]. Klout announced a growth of 2,000 new partners over a
one year period in May 2012.
4.2 Botnet-based Digital-influence Manipulation
Given the great potential of digital influence, whether it can
be maliciously manipulated is an important research issue.
For example, assume that malicious users could collude to
significantly increase their influence scores. A company using
the digital-influence service may consider them most influen-
tial and choose them as the targets of important marketing
campaigns by mistake, thus having potentially huge financial
loss, while malicious users can potentially benefit, e.g., by
getting free sample products. In addition, malicious users may
attract more legitimate followers who tend to follow most
influential users and thus become more influential.
As the first work of its kind, we now explore the feasibility
of using the botnet to manipulate digital influence. Our stud-
ies involve three most popular digital-influence vendors for
Twitter users: Klout, Kred, and Retweet Rank. For clarity, we
summarize their key features as follows.
• Klout: The Klout score of a Twitter user is on the scale of
1 to 100 and updated daily based on how frequently he
or she is retweeted and mentioned in the last 90 days.
The average Klout score is close to 20, and the score of
the 90th percentile is over 50.6
• Kred: The Kred score of a Twitter user is on the scale
of 1 to 1,000 and updated in real time according to how
5. For the Gaussian distribution with µ = 32 and σ2 = 5, the probability
for generating a negative Fi is negligible.
6. http://therealtimereport.com/2012/04/11/
how-good-is-your-klout-score/
Vendor
Klout
Kred
PeerIndex
Retweet Rank
Tweet Grader
Twitalyzer
Start
2008
2011
2009
2008
2010
2009
#users (M) Update
daily
620+
Scale
0-100
-
50+
3.5
10+
1
hourly
daily
hourly
daily
daily
0-1000
0-100
0-100
0-100
0-100
7
Target OSNs
Twitter, Facebook, LinkedIn, Google+, Insta-
gram, Foursquare
Twitter, LinkedIn, Facebook, Quora
Twitter, Facebook
Twitter
Twitter
Twitter
Digital-influence score
Average
90-percentile
20
500
19
50
50
50
TABLE 1
50
656
42
90
90
90
Six popular digital-influence software vendors. The data was collected at October, 2014.
frequently he or she is retweeted, replied, mentioned,
and followed on Twitter in the last 1,000 days.7
• Retweet Rank: It ranks the users based on how many
times they each have been retweeted recently and how
many followers/friends they each have.8 Retweet ranks
are updated on an hourly basis, and a retweet rank
of x means that the corresponding user is the xth
most influential on Twitter. A retweet rank can also be
translated into a percentile score ranging from 1 to 100,
indicating how the user score relative to other Twitter
users.
Given a social botnet of n bots, we want to investigate
whether it is feasible to generate an arbitrary influence score
di for every bot i ∈ [1, n] under each of the above three tools.
Since every bot is usually indistinguishable from a legitimate
user, our investigation can also shed light on the feasibility
of using the botnet to manipulate the influence score of an
arbitrary Twitter user. Since every digital-influence vendor
(including the above three) usually keeps confidential its de-
tailed algorithm for computing influence scores, our studies are
purely based on real Twitter experiments. According to [38], we
conjecture that the following three factors play the important
role in determining a user's digital-influence score.
• Actions. Both the number and the type of actions have
large impacts on a user's digital-influence score. Intu-
itively, the more actions the user can attract, the higher
his digital-influence score. Moreover, different types
of actions may have different impacts. For example,
retweeting or replying should be more indicative than
following because the latter has been shown to be more
vulnerable to fake [14].
• Audiences. Given a target user u, we define all the users
who have retweeted or replied u's tweets, or mentioned
or followed u as u's audiences. We conjecture that the
larger the audience size, the higher the digital-influence
scores. The intuition is that the target user is more
influential if each of his 100 tweets is retweeted by a
different user than all 100 tweets are retweeted by the
same one user. We also conjecture that the higher the
digital-influence scores his audience have, the higher
the target user's digital-influence score.
• Popularity of tweets. The digital-influence score of a tar-
get user is determined by the popularity of his tweets.
We want to explore how the distribution of the tweet
popularity determines the overall influence of the target
user.
Based on these three factors, we then present how to or-
chestrate the social botnets to manipulate the digital-influence
scores.
4.2.1 Impact of Different Actions
Since almost all digital-influence tools measure a Twitter users
digital influence as his ability to drive others to actions, our first
experiment aims to evaluate the social botnet's impact with
following, retweeting, and mentioning. We do not consider
replying, as replying is treated by Twitter as a special type
of mentioning and is thus expected to have the same effect as
mentioning.
The first set of experiments involves n = 1, 000 social bots,
each of which has no interaction with any other Twitter account
and hence is not scored by Klout, Kred, or Retweet Rank. Note
that Klout assigns an influence score of 10 to new users, while
Kred and Retweet Rank both assign a zero score to new users.
We randomly choose three disjoint groups, each containing 10
social bots and performing a unique action. For every social bot
in the following group, we add 10 randomly chosen social bots
as followers each day of the first 10 days and then 100 followers
each day of the next 10 days. Likewise, every social bot in the
retweeting (or mentioning) group is retweeted (or mentioned) by
randomly chosen social bots 10, 100 and 1000 times each day
in the first, second, and the last 10 days, respectively. Since
different vendors have different schedules for score updating,
we report the social bots' influence scores observed at every
midnight. In addition, since the three vendors have different
score scales, we normalize different influence scores with re-
spect to the corresponding maximum scores to facilitate direct
comparison. In particular, we show x/100 and y/1000 for a
Klout score x and a Kred score y, respectively, and report the
percentile score for Tweet Rank.
Figs. 6(a)∼6(b) show the impact of following and retweet-
ing9 actions on Klout, Kred, and Retweet Rank influence scores,
where every data point is the average across the same group.
We can see from Fig. 6(a) that the Klout influence score is
not affected by the number of followers, while both Kred
and Retweet Rank influence scores increase as the number of
followers increases. This indicates that a social botnet can easily
boost the Kred and Retweet Rank influence scores of its mem-
bers by purposely following each other. Moreover, we can see
from Fig. 6(b) that all three types of influence scores increase
as the number that a user is retweeted increases. On the one
hand, this makes much sense, as the higher the frequency in
which a user is retweeted, the higher influence of that user
has in its local neighborhood. On the other hand, this also
renders the influence score measurement system vulnerable to
7. http://kred.com/rules
8. http://www.retweetrank.com/view/about
9. Mentioning action has similar result with retweeting [1]. We omitted
here due to space constraints.
8
(a) Klout Scores
(b) Kred and Retweet Rank Scores
(a) Klout Scores
(b) Kred and Retweet Rank Scores
Fig. 4. Manipulation by social botnets with different audience sizes.
Fig. 5. Manipulation by acting on different number of tweets.
social bots would yield the same result as 100 incoming actions
from a single social bot.
To verify which of the two conjectures is correct, we build
three social botnets with 1, 10, and 100 bots, respectively. For
each social botnet, we set 10 target users and retweet 100 tweets
of each target each day for seven days. In other words, each
bot in the three social botnets retweets 100, 10, and 1 times
per day, respectively. Fig 4 shows the digital-influence scores
of the 30 targets. As we can see, the audience size has no
impact on both Kred and Retweet Rank scores but has large
impact on the Klout scores. Specifically, the larger the audience
size, the higher the Klout scores, and vice versa. Moreover,
the Klout scores experience a sharp increase in the first day
and then increase much slower in the following days. As a
result, a single social bot can manipulate a target user's Kred
and Retweet Rank scores with a large number of actions, while
both large audience sizes and significant actions are necessary
to obtain high Klout scores. We also conclude that Klout is
more resilient to the social botnet than Kred and Retweet Rank
are.
4.2.3 Impact of Tweet Popularity
From the first set of experiments, we can see that the retweeting
is the most effective way to manipulate a target user's digital-
influence score. Given the same audience, the attacker can
either retweet a single tweet of the target user to make this
tweet very popular or retweet many of target user tweets
so that each tweet will be less popular. We would like to
answer which strategy will yield higher digital-influence score,
i.e., whether tweet popularity has any impact on the digital-
influence scores? To answer this question, we build a social
botnet with 100 bots. We then select two groups with each
containing 10 target users for manipulation. For the first group,
each target first publishes a tweet, which is then retweeted
by all the 100 social bots; while for the second group, each
target user publishes 100 tweets, each of which is retweeted by
one social bot. We repeat this process daily and measure the
digital-influence scores of the 20 targets. As we can see from
Fig 5, the tweet popularity has no impact on both Klout and
Kred scores and limited impact on the Retweet Rank score. In
particular, adopting the second strategy will lead to a slightly
higher Retweet Rank score of the target user.
4.2.4 Speed of Digital-influence Manipulation
Our last experiment targets evaluating how fast influence
scores can be manipulated. Same with the last set of experi-
ments, we choose the retweeting as the action due to its effec-
tiveness. For this purpose, we randomly select another three
(a) Impact of following
(b) Impact of retweeting
Fig. 6. Manipulating digital influence by following and retweeting.
social botnets, as colluding social bots can fake arbitrarily high
retweeting frequency for any target user.
We can also see from Figs. 6(a) and 6(b) that none of our
experiments has been able to escalate a user's influence score to
an extremely high value, and we conjecture that there are two
reasons for such difficulty. First, the audience size is limited, as
we only have 1,000 social bots for experiment. We will show
in the next set of experiments that the audience size has a
large impact on the digital-influence scores. Second, it is likely
that all the vendors have set up rules such that it is extremely
difficult to achieve almost full digital-influence scores [39]–[41].
Nevertheless, at the end of the experiments, Table 1 shows
that all the digital-influence scores being manipulated have
exceeded the 90-th percentile.
4.2.2 Impact of Different Audience Sizes
In this set of experiments, we measure the impact of different
audience sizes on digital-influence scores. Recall that we define
a user u's audiences as the set of users who have retweeted,
mentioned, or followed u. We then try to answer the following
questions. First, for two users with different audience sizes but
the same numbers of actions, will the one with more audiences
have a higher digital-influence score than the other? Second, it
there an upper limit for a single social bot to manipulate the
influence score of a target user? There could be two alternative
answers to each of the two questions. On the one hand, if
the digital-influence scores are related to both the number of
incoming actions and the audience size, a single user should
have limited power to manipulate the target user's influence
score, and we thus need a large social botnet to manipulate the
target user's influence score to some extremely high value. On
the other hand, if the digital-influence scores may not relate to
the audience size, then 100 incoming actions from 100 different
Number of retweetings0100200300400500600700Scores00.10.20.30.40.50.60.70.80.91100 social bots10 social bots1 social botNumber of retweetings0100200300400500600700Scores00.10.20.30.40.50.60.70.80.91100 bots, Retweet Rank10 bots, Retweet Rank1 bot, Retweet Rank100 bots, Kred10 bots, Kred1 bot, Kred010020030040050060070000.10.20.30.40.50.60.70.80.91Number of retweetingsScores 100 tweetsSingle tweetNumber of retweetings0100200300400500600700Scores00.10.20.30.40.50.60.70.80.911 tweet, Retweet Rank100 tweets, Retweet Rank1 tweet, Kred100 tweets, Kred020040060080000.20.40.60.81The number of followersScores retweetrankKredKlout010002000300040005000600000.20.40.60.81The number of retweetingsScores retweetrankKredKlout9
user's outgoing interactions, as it is difficult for bots to attract
incoming interactions from legitimate users.
5 DEFENSES
In this section, we propose two countermeasures for the two
attacks above, respectively.
5.1 Defense against Botnet-based Spam Distribution
Recall that in social botnet-based spam distribution, the at-
tacker exploits retweeting trees to distribute spams (i.e., tweets
with malicious URLs) such that only the bots on the first M
(e.g., M = 1 in Twitter currently) levels of retweeting trees will
be suspended.
To defend against this attack, we propose to track each
user's history of participating in spam distribution and sus-
pend a user if his accumulated suspicious behaviors exceed
some threshold. Specifically, for each user v we maintain a spam
score sv, which is updated every time user v retweets a spam.
Once sv exceeds a predefined threshold, user v is labeled as a
spammer and suspended.
We now discuss how sv is updated. Our intuition is that
the closer the user to the spam source, the more likely he
is a member of the social botnet. The reason is that social
botnet usually prefers shorter retweeting path for fast spam
dissemination, while a spam tweet traversing a long retweeting
path, i.e., sequentially retweeted by many accounts, incurs
large delay and gives more time for Twitter to detect them. To
reflect this idea, whenever a user retweets a spam, we update
his spam score as
sv = sv + γd ,
(2)
where d is the number of retweeting hops between the spam
source to v, and γ ≤ 1 is the attenuation factor of distance.
Note that d = 0 if user v is the source of a spam. In this way,
any user who has retweeted spams is punished by having his
spam score increased. Once a user's spam score exceeds certain
predetermined threshold, the user is suspended. Note that
Twitter currently suspends a user whenever he has published
one spam tweet. To mimic the current Twitter policy, we can
set the threshold as one.
5.1.1 Evaluation
Similar to Section 3.3, we built a Twitter subnet composed of
6000 legitimate users and 400 social bots. Each social bot has
Fi legitimate followers, where Fi is drawn from Gaussian
distribution with µ = 32 and δ2 = 5, and each social bot
follows all other social bots. We assume that the attacker builds
the optimal retweeting tree according to Section 3.2.4. We adopt
similar parameters as in Section 3.3 by setting M = 3, α = 0.2,
c = 10, and K = 10.
To model the spam campaign, we conduct the experiment
in multiple rounds. In each round, we randomly select one
social bot to publish a spam tweet and other social bots that
have not been suspended to retweet the spam tweet according
to the retweeting forest. We assume that the legitimate users
retweet the spam occasionally with probability β. At the end
of each round, we update the spam scores for each bot and
legitimate user according to Eq. (2). If sv ≥ 1 for some user
v, we remove v from the simulated network. We then start
the next round by randomly selecting a bot as the new source
and continue the spam distribution. To reduce the randomness,
(a) 80-th Percentile
(b) 90-th Percentile
Fig. 7. Under different retweeting speeds, the number of days needed
to manipulate digital
influence scores from nothing into 80-th and 90-th
percentiles.
(a) True Positive rate
(b) False Positive rate
Fig. 8. The true and false positive rates with different γs.
different groups of social bots, each containing 10 target bots.
Every bot in the first, second, and third groups is retweeted 10,
100, and 1,000 times every day by random bots until the scores
reach the 90th percentile, which corresponds to 50, 656, and 90
in Klout, Kred, and Retweet Rank, respectively.
Fig. 7 further shows the impact of retweeting frequency
on the change of influence scores, where every data point
represents the average across the same bot group. In particular,
we can see that the number of days needed to increase the
group average influence score from the initial value to 80-th
or 90-th percentile is approximately inversely proportional to
the retweeting frequency. In addition, we can see that for all
three vendors, it is possible by retweeting 1000 times per day
to reach the 80-th percentile and the 90-th percentile with only
one and two days, respectively.
4.2.5 Remarks
We have two remarks to make.
First, at the end of the experiments, no account was sus-
pended by Twitter, as none of the accounts had conducted
illegitimate activities such as spamming and aggressively fol-
lowing and unfollowing which could trigger suspension by
Twitter.
In addition, both the spam distribution and the digital
influence manipulation attacks show that social botnet has
significant advantage over isolated bots. In particular, even
though the attacker can disseminate spams to the same le-
gitimate recipients using isolated bots, those isolated bots
will be quickly suspended under Twitter's current policy or
its variation and thus incurs significant cost for the attacker.
Moreover, it is extremely difficult for the attacker to boost a
single bot's digital influence score solely by letting the target
bot tweet or retweet other legitimate users' tweets, as long
as the digital influence score is not entirely determined by
101102103100101102The number of retweetings per dayThe number of days used KredKloutretweetrank101102103100101102The number of retweetings per dayThe number of days used KredKloutretweetrankRound0246810True Positive Rate00.20.40.60.81.=0.9.=0.8.=0.7.=0.6.=0.5Round0246810False Positive Rate#10-400.20.40.60.811.21.4.=0.9.=0.8.=0.7.=0.6.=0.510
(a) True positive rate (Recall)
(b) False positive rate
(c) Precision
(d) Overall performance
Fig. 9. Performance Comparison.
we repeat each experiment 100 times and report the average
results.
We evaluate the proposed defense in comparison with three
other baseline defenses as follows.
• Defense I. The original defense that suspends the users
in the first M levels from the spam source, which is
considered by the attacker to launch the optimal spam
distribution as discussed in Section 3.2.
• Defense II. Any user who retweets δ spams is sus-
pended, regardless of its distance to the spam source,
where δ is a system parameter.
• Defense III. Assume that user v has retweeted a spam
tweet t within M hops from the source and that t has
been retweeted by nt users in total. The spam score for
v is updated as
sv = sv + 1/ log(1 + nt) .
Defense III extends Defense I and II by taking the
popularity of individual spam tweet into account. The
intuition is that the more users retweet a spam tweet,
the more deceiving the spam tweet, and the less likely
that any individual user who retweets it is a bot. We also
use the system parameter δ as the suspending threshold
for this defense scheme.
• Defense IV. The proposed defense.
We use four metrics to compare the proposed defense
with the three baseline defenses. Let Nbots and Nlegit be the
numbers of social bots and legitimate users, respectively. Also
let Sbots and Slegit be the numbers of suspended social bots
and legitimate users, respectively. We define the following four
metrics.
•
• True positive rate (TPR): the ratio of the suspended
bots over the total bots, which can be computed as
Sbots/Nbots. This metric is also referred to as recall.
False positive rate (FPR): the ratio of suspended legit-
imate users over all the legitimate users, which can be
computed as Slegit/Nlegit.
• Precision: the ratio of suspended bots over all sus-
pended users, which can be computed as Sbots/(Slegit +
Sbots).
• Overall performance: TPR − P · FPR where P is the
penalty parameter for FPR.
and incurs severer consequences than a social bot evading
detection.
Fig. 8 shows the true positive and false positive rates with
different γs which are the attenuation factors of distance. As
we can see, the proposed defense could quickly detect all the
social bots when γ is large. Specifically, when γ = 0.9, all
the social bots can be detected and suspended in the second
round. Moreover, as expected, the ratio of true suspension at
the same round will decrease as γ decreases. Finally, there is
an anticipated tradeoff between false and true positive rates for
different γs. The larger γ, the higher true positive rate but also
the higher false positive rate, and vice versa. In the following
experiments, we set γ = 0.7 by default.
Fig. 9 compares the proposed defense with the three base-
lines under different βs, i.e., the probability of a legitimate user
retweeting a spam tweet. We can make five observations here.
First, Fig. 9(a) shows that β has no impact on the TPR, but
Fig. 9(b) shows that the larger β, the higher FPR for all four
defenses, which is consistent with the definition of β. Second,
Fig. 9(a) shows that Defense II has the highest TPR = 100% in
every round. The reason is that when δ = 1.0 all the social bots
will be suspended after the first round. Defense IV has the
second highest TPR and needs about five rounds to approach
100%. Defense I and III both have lower TPR because they only
examine the users in the first M = 3 levels instead of the whole
network. Third, Fig. 9(b) shows that the FPR of the proposed
defense is lower than those of Defenses I and II but slightly
higher than that of Defense III. This is because Defense I and
II have much less restrict conditions for suspending users than
Defense IV. Fourth, Fig. 9(c) shows that Defenses IV and
III have the precision close to 100% after the first and sixth
rounds, respectively, as they both incur low false positives and
sufficiently high true positives. Defense III has 0% of precision
before the sixth round because it did not suspend any social
bot in the first five rounds. In contrast, both Defense I and II
have relatively low precision because they misclassified many
normal users as bots. Finally, Fig. 9(d) shows that the proposed
defense has better overall performance than all three baselines
with penalty factor P varying from 10 to 10000. The reason is
that Defense IV has much lower FPR than Defense I and II
and higher TPR than Defense III. In summary, the proposed
defense outperforms all three baselines as it can effectively
detect social bots while being friendly to legitimate users.
We adopted overall performance here because FPR has much
larger impact than TPR from the service provider's point of
view, as suspending a legitimate user damages its reputation
5.2 Defense against Digital-influence Manipulation
As discussed in Section 4, all the digital-influence software
vendors consider the number of actions and/or the audience
0246810Round00.20.40.60.81True Positive RateDefense II, -=0.01Defense II, -=0.1Defense IV, -=0.01Defense IV, -=0.1Defense I, -=0.01Defense I, -=0.1Defense III, -=0.01Defense III, -=0.10246810Round10-5100False Positive RateDefense II, -=0.1Defense II, -=0.01Defense I, -=0.1Defense I, -=0.01Defense IV, -=0.1Defense IV, -=0.01Defense III, -=0.1Defense III, -=0.010246810Round00.20.40.60.81PrecisionDefense IV, -=0.1Defense III, -=0.1Defense I, -=0.1Defense II, -=0.1101001000100000.00.20.40.60.81.0Overall PerformanceP Defense I Defense II Defense III Defense IV11
(a) Top-10-percent accuracy
(b) Social-bot influence ranking
(a) Top-10-percent accuracy
(b) Social-bot influence ranking
Fig. 10. The performance under the random attack.
Fig. 11. The performance under the seed-targeting attack.
Four action networks for evaluation, where 'F' and 'I' refer to following and
TABLE 2
interaction, respectively.
Area
Tucson (TS)
Philadelphia (PI)
Chicago (CI)
Los Angeles (LA)
#Users
28,161
144,033
318,632
300,148
#F-edges
830,926
5,462,013
14,737,526
18,333,774
#I-edges (#Weights)
162,333 (669,006)
1,434,375 (4,972,689)
3,631,469 (12,010,986)
4,391,542 (14,048,838)
size as the major factors in evaluating a user's digital-influence,
which makes them vulnerable to the social botnet. To address
this vulnerability, we propose a new digital-influence measure-
ment scheme inspired by [45]. The key idea is to find sufficient
credible users and only use the actions from them to compute
digital-influence scores for other users. Specifically, given a
social network with user set V and all the actions (including
following, retweeting, mentioning, and replying) among the
users, we first find a subset V ∗ ⊆ V of users that are credible.
We then define the digital-influence score of each user v
based on the actions from the credible user set V ∗. Specifically,
assume that user v has received aj actions from each user j ∈
V ∗. The digital influence score for v is then given by as
(cid:88)
j∈V ∗
score(v) =
where
f (aj) =
(cid:40)
aj
1 + λ · exp(− 1
aj
f (aj)
if aj = 0, 1,
else,
)
(3)
(4)
and λ is a system parameter that represents the maximum
impact of actions from a single user on one's score. In practice,
we can set λ = 1 such that a single user could contribute
the score by at most 2. It is easy to see that the above score
definition takes both the number of actions and the audience
size into account, which captures the key ideas behind Klout,
Kred, Retweet Rank scores as well our findings in Section 4.2.
The challenge is then how to find the credible user set V ∗.
To tackle this challenge, we observe that although the actions
among the social bots and from the social bots to the legiti-
mate users are unpredictable, legitimate users usually carefully
choose whom to interact, so there are much fewer actions from
legitimate users to social bots. Based on this observation, we
first find a small number of trusted users, which could either be
the verified users maintained by Twitter or manually verified.
We then assign each trusted user some initial credits and
distribute the credits along the action edges in multiple rounds.
In each round, every user with credits keeps one unit of
credit for himself and distributes the remaining credits to
his neighbors along the action edges. The credit distribution
process terminates when no user has extra credits to distribute.
Since legitimate users are more likely to receive credits than
social bots during the process, every user who has received at
least one unit of credit is considered credible.
More specifically, we first construct an action graph for
credit distribution. Given the user set V and all their actions
during the period T , we build a weighted and directed action
graph G = (V, E), where each user corresponds to a vertex in
V , and there is an arc eij from user i to user j an edge with
the weight wij if user i has retweeted, replied, or mentioned
user j for wij times during the period T . We do not consider
the following action because it has been reported that normal
users could carelessly follow back whoever has followed them
[14], [15].
We then design a credit distribution scheme on G = (V, E),
which consists of seeds selection, initial credit assignment,
iterative credit distribution, and termination. To initiate credit
distribution, we first select a seed set S from V which are
trusted users such as the verified users maintained by Twitter
or manually verified, and partition the whole graph into a
tree of multiple levels, in which the seed users occupy the
first level, their one-hop outgoing neighbors occupy the second
level, and so on. A node is assigned to the highest level if its
incoming neighbors appear at different levels. We then assign
each seed s with the amount of credits proportional to the sum
s∈S wo(s),
where Ctotal is the total amount of initial credits, and wo(s) is
the sum of weights of the seed s's all outgoing edges. We then
distribute the credit from the seed users along the tree level by
level. Specifically, if a user v at the nth level has c(v) units of
credit, he holds one unit of credit for himself and distributes
the remaining c(v) − 1 units of credit to its outgoing neighbors
at the (n + 1)th level, where the amount of credits received by
neighbor v(cid:48) is proportional to the edge weight evv(cid:48). In other
u∈O(v)wvu units
of credits. The credits could only be distributed from one level
to the immediate higher level and are rounded to the closest
integer. The credit distribution terminates if none of the nodes
has any extra credit to distribute to its outgoing neighbors.
of weights of its outgoing edges, i.e., wo(s)Ctotal/(cid:80)
words, neighbor v(cid:48) receives wvv(cid:48)(c(v) − 1)/(cid:80)
The choice of Ctotal represents the tradeoff between true
and false positive rates. On the one hand, with a larger
Ctotal, we could discover more credible users and compute
digital-influence scores for more legitimate users at the cost
of more social bots obtaining credits and being labelled as
credible users. On the other hand, a smaller Ctotal will result
in fewer credible users being discovered as well as fewer
social bots being labelled as credible users. As in [46], we set
Ctotal = O((cid:112)V ) to strike a good balance between true and
Attack strength#10-5246810Accuracy (%)5060708090100PICITSLAAttack strength#10-5246810Social-bot Ranking (Percentile)020406080100KredTSPICILAAttack strength#10-5246810Accuracy (%)5060708090100PICITSLAAttack strength#10-5246810Social-bot Ranking (Percentile)020406080100KredCIPITSLAfalse positive rates. The idea is that at the end of credit distribu-
tion, approximately Ctotal users will each hold one unit of credit
and be labelled as credible. If we set Ctotal = O((cid:112)V ) and
the interaction graph is well-connected, with high probability
there exists at least one arc from some credible users to each
of the V users while the credit distribution will terminate in
O(log V ) levels with decreasing credits per arc such that each
attack arc from legitimate users to social bots is expected to
receive only O(1) of credits [46].
5.2.1 Evaluation
We follow the approach taken by [47]–[49] to evaluate the
performance of the digital-influence measurement scheme.
Specifically, we first use the Twitter geo-search API [50] to
collect the users in a specific metropolitan area and then crawl
the latest 600 tweets of each user to extract the interactions such
as retweets, replies, and mentions. We create four datasets from
the four representative area in U.S. as shown in Table 2.
For each dataset, we build one ground-truth network com-
posed of both legitimate users and social botnets. Specifically,
we first build one legitimate action subgraph from the interac-
tions among the legitimate users in the that area, where each
vertex corresponds with one legitimate user, and an edge from
one user to another corresponds to interaction from the former
to the latter. We further create a completely-connected social
botnet with the same number of social bots as the legitimate
users. We then construct a ground-truth network by connecting
the legitimate action subgraph and the social botnet with a
number of attack edges from legitimate action subgraph to the
social botnet. Here we assume that there is no edge from the
social botnet to the legitimate action subgraph, which is clearly
in favor of the social bots, as the social bots would only lose
credits through such edges.
The attack edges are constructed in the following way.
Assuming that there are total g edges in the legitimate action
subgraph, we create ωg attack edges with unit weight, where
ω is the ratio representing attack strength. As in [49], we vary
the ω from 10−5 to 10−4 of the total edges in each legitimate
subgraph. We use ground-truth networks to conduct the credit
distribution and find the credible user subset V ∗.
As in [48], we consider two types of attacks. In the random
attack, we randomly choose ωg legitimate users and connect
each of them to one randomly chosen social bot with an
attack edge. In this case, the attacker is unaware of which
users are seed. In the seed-targeting attack, we create ωg attack
edges between the social botnet and ωg users randomly chosen
from 100ωg legitimate users with shortest distances to the
seeds. This type of attack mimics the case that the attacker
tries to acquire positions close to the seed users to gain more
credits during credit distribution. For both attacks, we assume
that the social botnet can arbitrarily distribute received credits
internally. For example, suppose that the social botnet receives
Cbots credits after the credit distribution, they distribute these
credits to Cbots social bots each with one credit, such that all
Cbots bots become credible users.
We evaluate the performance of the proposed digital-
influence measurement scheme using the following metrics.
• Top-K-percent accuracy. Let U1 be the list of legitimate
users ranked by their total numbers of incoming inter-
actions. Also let U2 be the list of legitimate users ranked
by their digital influence scores obtained by applying
the proposed digital-influence measurement scheme to
12
(a) Random Attack
(b) Seed-targeting Attack
Fig. 12. The impact of K on the top-K-percent accuracy.
U1(K)
the ground-truth network. Further let U1(K) and U2(K)
be the top-K-percent users in U1 and U2, respectively.
U1(K)∩U2(K)
The top-K-percent accuracy is defined as
.
The more accurate of the proposed scheme, the higher
the ratio of common users in these two top-K lists, and
vice versa.
Social-bot influence ranking. Let bot b be the bot with the
highest digital influence score output by the proposed
digital-influence measurement scheme. Social-bot influ-
ence ranking is defined as b's rank in percentile in U1.
The lower the bot's percentile, the higher resilience to
the social botnet, and vice versa.
•
Fig. 10 and Fig. 11 show the top-10-percent accuracy and
the social-bot influence ranking under two types of attacks with
attack strength varying from 10−5 to 10−4. In general, we
see similar trend in all scenarios for all the four datasets,
meaning that the results are consistent across different datasets.
Moreover, in all cases, the accuracy is always larger than
70%, meaning that the proposed digital-influence measure-
ment scheme can discover 70% of top-10% influential users
under the social botnet attack. We can also see in Fig. 10(a)
and Fig. 11(a) that the the accuracy is insensitive to the change
of attack strength. The reason is that the top influential users
attract actions from many legitimate users, who have higher
chances to acquire the credits and become credible users in the
presence of attack edges. In contrast, as shown in in Fig. 10(b)
and Fig. 11(b), the social-bot influence ranking increases as the
attack strength increases under both types of attacks. This is
expected, because as attack strength increases, more social bots
will acquire credits to become credible users and affect target
bots' influence scores. We can also see from Figs. 10(b) and
11(b) that the social-bot influence ranking is below top 40% and
top 20% under the random attack and seed-targeting attack,
respectively.
Fig. 10(b) and Fig. 11(b) also compare the proposed defense
with the existing influence measurement vendor Kred.10 As
we can see, the bot's influence score could always rank at the
first position because we assumed that there are infinite actions
between any two bots in the botnet. In contrast, the proposed
scheme could effectively defend against the manipulation from
social botnets.
Fig. 12 shows the impact of K on the top-K-percent accu-
racy, which generally increases until to 100% when K increases
from 10 to 100. Overall, the accuracy is higher than 70% in the
10. we choose Kred because only Kred has publish its influence score
model on http://kred.com/rules.
TopK (%)020406080100Accuracy (%)707580859095100LACIPITSTopK (%)020406080100Accuracy (%)707580859095100LACIPITSfigures, and K = 10 in previous experiments is representative
among the worst cases.
In summary, experiment results show that the proposed
digital-influence measurement scheme is resilient to the social
botnet attack.
6 RELATED WORK
In this section, we discuss the prior work tightly related to our
work in this paper.
The social botnet has received attention only recently. Fer-
rara et al. summarized the research on social bots in [2].
Boshmaf et al. showed that a social botnet is very effective
in connecting to many random or targeted Facebook users
(i.e., large-scale infiltration) [4]. The work in [6], [28] shows
how the spammers become smarter to embed themselves into
Twitter. Messias et al. used two sicalbots to manipulate the
Klout and Twitalyzer scores by following and tweeting actions
[27]. Our preliminary work [1] was independently done from
[27] and shows how social bots could cooperate to manipulate
the influence scores of Klout, Kred, and Retweet Rank.
There is a rich literature on spam detection in OSNs. The
first line of work such as [12], [25], [31]–[36], [51], [52] considers
independent spam bots and comes up with different methods
to characterize and detect them. For example, Song et al. found
that the distance between the sender and receiver of a message
is larger for spammers than legitimate users [33]. Zhang et al.
found that automated spammers usually show some temporal
pattern which can be used for detection [35]. Another features
and the corresponding machine learning effort can be found in
[12], [25], [31], [32], [34], [36], [51], [52]. Some of these results
such as [33] have been incorporated into our design constraints
in § 3.2.2.
The second line of work such as [7]–[9], [14], [15], [24]
focuses on characterizing and detecting organized spam cam-
paigns launched by an army of spam bots. We discover a new
method for effective spam campaign in this paper, and whether
the results in [7]–[9], [14], [15], [24] can be directly or adapted
to detect our method is certainly challenging and worthy
of further investigation. Moreover, spam bots are evolving
towards more intelligence. Yang et al. found that instead of
separate communities, spam bots embedded themselves into
the network by building small-world-like networks between
them and also maintaining tight links with external legitimate
users [14]. Meanwhile, Ghosh et al. discovered the similarly
rich connections between spam bots and the legitimate users
[15]. Our work is consistent with this trending and explore the
new attacks by using the spam bots' growing intelligence.
There are effective solutions such as [46]–[48], [53]–[55]
to detecting Sybil accounts in distributed systems under the
control of a single attacker. These solutions commonly assume
that the link between two accounts corresponds to a real
social relationship difficult to establish and impossible to forge.
Moreover, all of these system assume that the connection is
undirected. In this paper, we designed the defense scheme for
directed and weighted Twitter network by using the similar
observation that the amount of interactions from a legitimate
user to a social bot is usually far less than that in the reverse
direction in § 5.2. We also found that using the interaction
network yields better defense performance than the following
networks. Although § 5.2 has illustrate an example by using the
trustworthiness of interactions to defend against the specific
13
digital-influence manipulation attack, we can use the same
observation but different methods to identify the social botnets
and then eliminate them from the microblogging system.
Also related is the research on computing the digital influ-
ence score [17], [18], [56]. For example, Cha et al., compared
three influence ranking lists in Twitter by counting the num-
ber of retweets, mentions and followers and found that the
influenced defined by the number of followers is very different
with the other two metrics [17]. Bakshy et al. [56] proposed to
measure user influence based on his ability to post the tweets
that generates a cascade of retweets. This line of research does
not consider the impact of the social botnet.
7 CONCLUSION
In this paper, we firmly validated the efficacy and merits of
botnet-based spam distribution and digital-influence manip-
ulation on Twitter through thorough experiments and trace-
driven simulations. We also propose the countermeasures cor-
responding to these two attacks and demonstrate their effec-
tiveness.
REFERENCES
[1]
J. Zhang, R. Zhang, Y. Zhang, and G. Yan, "On the impact of social
botnets for spam distribution and digital-influence manipulation," in
CNS'13, Washington D.C., Oct. 2013, pp. 46–54.
[2] E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, "The rise
of social bots," Communications of the ACM, 2015, in press.
[3] E. Ferrara, "Manipulation and abuse on social media," SIGWEB
Newsl., no. Spring, pp. 4:1–4:9, Apr. 2015.
[4] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "The social-
bot network: when bots socialize for fame and money," in ACSAC'11,
Orlando, FL, Dec. 2011, pp. 93–102.
[5] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All your contacts are
belong to us: automated identity theft attacks on social networks," in
WWW'09, Madrid, Spain, Apr. 2009, pp. 551–560.
[6] C. Freitas, F. Benevenuto, S. Ghosh, and A. Veloso, "Reverse engineer-
ing socialbot infiltration strategies in twitter," in ASONAM'15, Paris,
France, 2015, pp. 25–32.
[7] H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Zhao, "Detecting
and characterizing social spam campaigns," in IMC'10, Melbourne,
Australia, Nov. 2010, pp. 35–47.
[8] C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: the under-
ground on 140 characters or less," in CCS'10, Chicago, IL, Oct. 2010.
[9] K. Thomas, C. Grier, V. Paxson, and D. Song, "Suspended accounts in
retrospect:an analysis of twitter spam," in IMC'11, Berlin, Germany,
Nov. 2011, pp. 243–258.
[10] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, A. Flammini, and
F. Menczer, "Detecting and tracking political abuse in social media,"
in ICWSM'11, Barcelona, Spain, July 2011, pp. 297–304.
[11] J. Ratkiewicz, M. Conover, M. Meiss, B. Gonc¸alves, S. Patil, A. Flam-
mini, and F. Menczer, "Truthy: mapping the spread of astroturf in
microblog streams," in WWW'11, Hyderabad, India, Mar. 2011.
[12] A. H. Wang, "Don't follow me - spam detection in twitter," in
SECRYPT'10, Athens, Greece, Jul. 2010, pp. 142–151.
[13] S. Ghosh, G. Korlam, and N. Ganguly, "Spammers' networks within
online social networks: a case-study on twitter," in WWW'11, Hyder-
abad, India, Mar. 2011, pp. 41–42.
[14] C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu, "Analyzing
spammers' social networks for fun and profit – a case study of cyber
criminal ecosystem on twitter," in WWW'12, Lyon, France, Apr. 2012.
[15] S. Ghosh, B. Viswanath, F. Kooti, N. K. Sharma, K. Gautam, F. Ben-
evenuto, N. Ganguly, and K. Gummadi, "Understanding and com-
bating link farming in the twitter social network," in WWW'12, Lyon,
France, Apr. 2012, pp. 61–70.
[16] "The twitter rules," https://support.twitter.com/articles/18311-the-
twitter-rules.
[17] M. Cha, H. Haddadi, F. Benevenuto, and K. Gummadi, "Measuring
user influence in twitter: The million follower fallacy," in ICWSM'10,
Washington, D.C., May 2010, pp. 10–17.
[18] J. Weng, E.-P. Lim, J. Jiang, and Q. He, "TwitterRank: finding topic-
sensitive influential twitterers," in WSDM'10, New York, NY, Feb.
2010, pp. 261–270.
[55] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: a near-
optimal social network defense against sybil attacks," IEEE/ACM
Transactions on Networking, vol. 18, pp. 885–898, June 2010.
[56] E. Bakshy, J. Hofman, W. Mason, and D. Watts, "Everyone's an
influencer: quantifying influence on twitter," in WSDM'11, Hong
Kong, China, Feb. 2011, pp. 65–74.
14
[19] S. Williams, "Chevy gives 3-day sonic drives to those with
big klout," http://adage.com/article/news/chevy-tests-sonics-high-
klout-scores/231220/, Nov. 2011.
[20] "Klout perks: A healthy two years," http://corp.klout.com/blog/
2012/06/klout-perks-a-healthy-two-years/.
[21] A. Knapp, "A high klout score can lead to better customer
service," http://www.forbes.com/sites/alexknapp/2012/06/12/a-
high-klout-score-can-lead-to-better-customer-service/, Jun. 2012.
[22] V. Hernandez, "Measuring influence online: A q&a with klout's
ceo," http://www.cnn.com/2012/02/23/tech/social-media/klout-
joe-fernandez/index.html?hpt=hp bn6, Feb. 2012.
[23] "Oauth open authentication system," http://oauth.net/.
[24] Z. Chu, I. Widjaja, and H. Wang, "Detecting social spam campaigns
on twitter," in ACNS'12, Singapore, June 2012, pp. 455–472.
[25] K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, "Design and
evaluation of a real-time url spam filtering service," in IEEE S&P'11,
Okland, CA, May 2011, pp. 447–462.
[26] R. Mac,
"Twitter
acquires web
security
firm dasient,"
http://www.forbes.com/sites/ryanmac/2012/01/24/twitter-
acquires-web-security-firm-dasient/, Jan. 2012.
[27] J. Messias, L. Schmidt, R. Oliveira, and F. Benevenuto, "You followed
my bot! transforming robots into influential users in twitter," First
Monday, vol. 18, no. 7, Nov. 2013.
[28] C. Yang, J. Zhang, and G. Gu, "A taste of tweets: Reverse engineering
twitter spammers," in ACSAC'14, New Orleans, LA, Dec. 2014.
[29] Z. Coburn and G. Marra, "Realboy: Believable twitter bots,"
http://ca.olin.edu/2008/realboy/index.html, 2008.
[30] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter, a social
network or a news media?" in WWW'10, Raleigh, NC, 2010.
[31] K. Lee, J. Caverlee, and S. Webb, "Uncovering social spammers: social
honeypots + machine learning," in SIGIR'10, Geneva, Switzerland,
Dec. 2010, pp. 435–442.
[32] G. Stringhini, C. Kruegel, and G. Vigna, "Detecting spammers on
social networks," in ACSAC'10, Austin, TX, 2010, pp. 1–9.
[33] J. Song, S. Lee, and J. Kim, "Spam filtering in twitter using sender-
receiver relationship," in RAID'11, Menlo Park, CA, Sep. 2011.
[34] C. Yang, R. Harkreader, and G. Gu, "Die free or live hard? empirical
evaluation and new design for fighting evolving twitter spammers,"
in RAID'11, Menlo Park, CA, Sep. 2011, pp. 318–337.
[35] C. Zhang and V. Paxson, "Detecting and analyzing automated activity
on twitter," in PAM'11, Atlanta, GA, Mar. 2011, pp. 102–111.
[36] H. Gao et al., "Towards online spam filtering in social networks," in
NDSS'12, San Diego, CA, Feb. 2012, pp. 1–16.
[37] F. Chierichetti, R. Kumar, and A. Tomkins, "Max-cover in map-
reduce," in WWW'10, Raleigh, NC, Apr. 2010, pp. 231–240.
[38] B. Solis, "The rise of digital influence," Altimeter Group, Research
Report, Mar. 2012.
[39] "Klout," http://klout.com/.
[40] "Kred," http://kred.com/.
[41] "Retweet rank," http://www.retweetrank.com/.
[42] "Peerindex," http://www.peerindex.com/.
[43] "Twitter grader," http://twitter.grader.com/.
[44] "Twitalyzer," http://twitalyzer.com/.
[45] Z. Gyongyi, H. Garcia-Molina, and J. Pedersen, "Combating web
spam with trustrank," in VLDB'04, Toronto, Canada, 2004.
[46] N. Tran, M. Bonan, J. Li, and L. Subramanian, "Sybil-resilient online
content voting," in NSDI'09, Boston, MA, Apr. 2009, pp. 15–28.
[47] H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "SybilGuard:
defending against sybil attacks via social networks," in SIGCOMM'06,
Pisa, Italy, Sep. 2006, pp. 267–278.
[48] Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection
of fake accounts in large scale social online services," in NSDI'12, San
Jose, CA, Apr. 2012, pp. 1–15.
[49] J. Zhang, R. Zhang, J. Sun, Y. Zhang, and C. Zhang, "TrueTop: A
sybil-resilient system for user influence measurement on twitter,"
IEEE/ACM Transactions on Networking, vol. PP, no. 99, pp. 1–1, 2015.
[50] "REST API v1.1 resources," https://dev.twitter.com/docs/api/1.1/,
2013, twitter.
[51] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, "Detecting
spammers on twitter," in CEAS'10, Redmond, WA, Jul. 2010.
[52] S. Lee and J. Kim, "WARNINGBIRD: Detecting suspicious urls in
twitter stream," in NDSS'12, San Diego, CA, Feb. 2012, pp. 1–13.
[53] B. Viswanath, M. Mondal, A. Clement, P. Druschel, K. Gummadi,
A. Mislove, and A. Post, "Exploring the design space of social
network-based sybil defenses," in COMSNETS'12, Bangalore, India,
Jan. 2012, pp. 1–8.
[54] B. Viswanath, A. Post, K. Gummadi, and A. Mislove, "An analysis of
social network-based sybil defenses," in SIGCOMM'10, New Delhi,
India, Aug. 2010, pp. 363–374.
|
1902.04506 | 1 | 1902 | 2019-02-12T17:15:17 | RTbust: Exploiting Temporal Patterns for Botnet Detection on Twitter | [
"cs.SI",
"cs.AI",
"cs.CR",
"cs.CY"
] | Within OSNs, many of our supposedly online friends may instead be fake accounts called social bots, part of large groups that purposely re-share targeted content. Here, we study retweeting behaviors on Twitter, with the ultimate goal of detecting retweeting social bots. We collect a dataset of 10M retweets. We design a novel visualization that we leverage to highlight benign and malicious patterns of retweeting activity. In this way, we uncover a 'normal' retweeting pattern that is peculiar of human-operated accounts, and 3 suspicious patterns related to bot activities. Then, we propose a bot detection technique that stems from the previous exploration of retweeting behaviors. Our technique, called Retweet-Buster (RTbust), leverages unsupervised feature extraction and clustering. An LSTM autoencoder converts the retweet time series into compact and informative latent feature vectors, which are then clustered with a hierarchical density-based algorithm. Accounts belonging to large clusters characterized by malicious retweeting patterns are labeled as bots. RTbust obtains excellent detection results, with F1 = 0.87, whereas competitors achieve F1 < 0.76. Finally, we apply RTbust to a large dataset of retweets, uncovering 2 previously unknown active botnets with hundreds of accounts. | cs.SI | cs | RTbust: Exploiting Temporal Patterns
for Botnet Detection on Twitter
Michele Mazza
IIT-CNR, Italy
[email protected]
Stefano Cresci∗
IIT-CNR, Italy
[email protected]
Marco Avvenuti
University of Pisa, Italy
[email protected]
Walter Quattrociocchi
Ca' Foscari University of Venice, Italy
[email protected]
Maurizio Tesconi
IIT-CNR, Italy
[email protected]
9
1
0
2
b
e
F
2
1
]
I
S
.
s
c
[
1
v
6
0
5
4
0
.
2
0
9
1
:
v
i
X
r
a
ABSTRACT
Within OSNs, many of our supposedly online friends may instead be
fake accounts called social bots, part of large groups that purposely
re-share targeted content. Here, we study retweeting behaviors on
Twitter, with the ultimate goal of detecting retweeting social bots.
We collect a dataset of 10M retweets. We design a novel visualiza-
tion that we leverage to highlight benign and malicious patterns
of retweeting activity. In this way, we uncover a "normal" retweet-
ing pattern that is peculiar of human-operated accounts, and 3
suspicious patterns related to bot activities. Then, we propose a
bot detection technique that stems from the previous exploration
of retweeting behaviors. Our technique, called Retweet-Buster
(RTbust), leverages unsupervised feature extraction and cluster-
ing. An LSTM autoencoder converts the retweet time series into
compact and informative latent feature vectors, which are then
clustered with a hierarchical density-based algorithm. Accounts
belonging to large clusters characterized by malicious retweeting
patterns are labeled as bots. RTbust obtains excellent detection
results, with F1 = 0.87, whereas competitors achieve F1 ≤ 0.76.
Finally, we apply RTbust to a large dataset of retweets, uncovering
2 previously unknown active botnets with hundreds of accounts.
KEYWORDS
Social bots, retweet patterns, OSN security, Twitter
ACM Reference Format:
Michele Mazza, Stefano Cresci, Marco Avvenuti, Walter Quattrociocchi,
and Maurizio Tesconi. 2019. RTbust: Exploiting Temporal Patterns for
Botnet Detection on Twitter. In Proceedings of ACM Web Science Conference
2019 (WebSci 2019). ACM, New York, NY, USA, 10 pages.
1 INTRODUCTION
In 2016 the Oxford dictionary elected "Post-Truth" as the word
of the year and in 2017 Collins dictionary did the same for "Fake
News". In 2017 the World Economic Forum raised a warning on the
∗This is the corresponding author.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than the
author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or
republish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
© 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM.
potential distortion effect of social media on user perceptions of
reality1. Recent studies, targeting Facebook, showed the tendency
of the users to interact with information adhering to their preferred
narrative [3, 14] and to ignore dissenting information [49]. Confir-
mation bias seems to account for user decisions about consuming
and spreading content and at the same time, aggregation of favored
information within those communities reinforces selective expo-
sure and group polarization [39, 43]. As we interact with our peers,
we are exposed to the effects of echo chambers, which may result in
polarization and hate speech [15]. In this scenario the role of bots is
not clear, both for the difficulties in quantifying their impact as well
as for the accuracy of detection algorithms. However, any of our
supposedly online friends may instead be fake, automated accounts
(social bots), and a part of large coordinated groups that purposely
(re-)share targeted content [17]. Along this challenge, in this work
we propose a new method for the detection of groups of bots, ac-
counting for their statistical traces induced by their coordinated
behavior on Twitter.
Specifically, we focus on re-sharing (i.e., retweeting) patterns
with the ultimate goal of detecting retweeting social bots. Indeed,
by artificially boosting retweet counts, these bots may affect users'
popularity or influence, thus "reshaping political debates [4, 41].
They can defraud businesses and ruin reputations"2. Moreover, large
retweet counts indicate influential users, and can be monetized.
Thus, there are strong economic and sociopolitical incentives for
malicious bots to tamper with retweets [19, 42]. Hence, fast and
accurate removal of these bots might be crucial for ensuring the
healthiness of our online social ecosystems.
Both researchers and OSN administrators have recently been
very active towards the detection of social bots, and many different
techniques have been proposed to this end. Unfortunately, the same
also applies to malicious bot developers. In fact, as soon as new
detection techniques are deployed, bot developers tweak the charac-
teristics of their accounts, thus allowing them to evade detection [9].
This "never-ending clash" led to the current situation where so-
cial bots are so sophisticatedly engineered as to mimic legitimate
accounts, becoming almost indistinguishable from them [44]. A
straightforward consequence of this situation is that standard ma-
chine learning classification approaches, where each account is
analyzed individually, are no longer profitable. Instead, the scien-
tific frontier of bot detection now focuses on groups of suspicious
accounts as a whole. Analyzing groups has the advantage that,
1http://reports.weforum.org/global-risks-2017/acknowledgements/
2https://www.nytimes.com/interactive/2018/01/27/technology/social-media-bots.html
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
M. Mazza et al.
no matter how sophisticated a single bot can be, a large enough
group of them will still leave traces of automation, since they do
share a common goal (e.g., increasing someone's popularity) [9].
For the same reasons, unsupervised approaches are preferred over
supervised ones [47].
The possibility to exploit more data for the analysis, opened
up by the approaches that target groups rather than individual ac-
counts, is however counterbalanced by the difficulties in collecting
and processing that much data. For instance, the behavior-based
technique described in [8, 10] requires collecting and comparing
data of the Twitter timelines of all analyzed accounts. Similarly,
graph-based techniques such as [27, 48] require building and ana-
lyzing the social graph of a large group of accounts. The amount of
data and computational power needed to complete these analyses,
inevitably limits the large-scale applicability of these techniques. In
short, the next generation of bot detection techniques should strike
the balance between accuracy and data/algorithmic efficiency.
Contributions. We propose a novel technique for the detection
of retweeting social bots, called Retweet-Buster (RTbust), hav-
ing all the desirable features previously discussed. Our technique
only requires the timestamps of retweets (and of the retweeted
tweets) for each analyzed account, thus avoiding the need for full
user timelines or social graphs. Then, it compares the temporal
patterns of retweeting activity of large groups of users. Leveraging
previous findings in the field, RTbust looks for groups of accounts
with distinctive and synchronized patterns. Evaluation results on a
large dataset of retweets demonstrate excellent bot detection per-
formances, with F1 = 0.87, whereas competitors achieve F1 ≤ 0.76.
Summarizing, our detailed contributions are as follows.
• We analyze retweeting behaviors of a large set of users by
introducing a simple -- yet effective -- visualization, which
we then leverage to highlight benign and malicious patterns
of retweeting activity.
• We design a group-analysis technique that is capable of
detecting accounts having the same retweeting patterns. Ac-
counts belonging to a large group characterized by the same
malicious patterns are labeled as bots.
• We compare detection results of our technique with those
obtained by baselines and other state-of-the-art techniques,
demonstrating the effectiveness of our approach.
• By applying our technique to a large dataset of retweets, we
uncover 2 previously unknown active botnets.
2 RELATED WORK IN BOT DETECTION
The vast majority of previous attempts at bot detection are based on
supervised machine learning [9]. The first challenge in developing
a supervised detector is related to the availability of a ground truth
(i.e., labeled) dataset, to be used in the learning phase of the classifier.
In most cases, a real ground truth is lacking and the labels are simply
given by human operators that manually analyze the data. Critical
issues arise since there is no "standard" definition of what a social
bot is [35, 47]. Moreover, humans have been proven to largely
fail at spotting sophisticated bots, with only ≃ 24% bots correctly
labeled as such [9]. As anticipated, these criticalities support the
development of unsupervised techniques.
Regarding features to exploit for the detection, 3 classes have
been mainly considered: (i) profile features [13, 29, 46]; (ii) features
extracted from the posts, such as posting behavior and content
of posted messages [6, 31, 37]; and (iii) features derived from the
social or interaction graph of the accounts [27, 28, 32, 48]. The
classes of features exploited by the detection technique have a
strong impact on both the performances of the detector as well as
its efficiency [7]. For instance, in Twitter it has been demonstrated
that those features that mostly contribute towards the predictive
power of bot detectors (e.g., measures of centrality in the social
graph), are also the most costly ones.
The difficulties in detecting sophisticated bots with supervised
approaches that are based on the analysis of individual accounts,
recently gave rise to a new research trend that aims to analyze
groups of accounts as a whole [9]. This new approach to bot de-
tection is proving particularly effective at detecting coordinated
and synchronized bots, such as those targeted in our work. For
instance, the technique discussed in [8, 10] associates each account
to a sequence of characters that encodes its behavioral information.
Such sequences are then compared between one another to find
anomalous similarities among sequences of a subgroup of accounts.
The similarity is computed by measuring the longest common sub-
sequence shared by all the accounts of the group. Accounts that
share a suspiciously long subsequence are then labeled as bots. In-
stead, the family of systems described in [27, 32, 33] build a bipartite
graph of accounts and their interactions with content (e.g., retweets
to some other tweets) or with other accounts (e.g., becoming fol-
lowers of other accounts). Then, they aim to detect anomalously
dense blocks in the graph, which might be representative of coor-
dinated and synchronized attacks. A possible drawback of group
approaches is that they exacerbate challenges related to data and
algorithmic costs, since they typically involve a large number of
comparisons between all accounts in a given group [10, 45].
Lastly, a trailblazing direction of research involves the applica-
tion of adversarial machine learning to bot detection. Until now,
bot detection has mostly followed a reactive schema, where coun-
termeasures are taken only after having witnessed evidence of bot
mischiefs [44]. Instead, in [44] is proposed an adversarial framework
enabling proactive analyses. The framework has been later instanti-
ated in [11] by using evolutionary algorithms to test current detec-
tion techniques against a wider range of unseen, sophisticated bots.
Another preliminary work in adversarial bot detection is described
in [22]. Among the positive outcomes of adversarial approaches
to bot detection, is a more rapid understanding of the drawbacks
of current detectors and the opportunity to gain insights into new
features for achieving more robust and more reliable detectors.
3 DATA COLLECTION AND ANNOTATION
Our dataset for this study is composed of all Italian retweets shared
in a 2 weeks time span -- specifically, between 17 and 30 June,
2018 (inclusive). Overall, our dataset comprises 9,989,819 retweets,
shared by 1,446,250 distinct users. Thus, on average, each user in
our dataset retweeted 7 times per day, in line with recent statistics
reporting between 2 and 50 daily retweets for legitimate users [18].
However, our dataset also includes many "extreme" users, as visible
in Figure 1 showing the distribution of retweets per day per user,
RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
Figure 1: Daily retweets per
user.
Figure 2: Total retweets per
tweet.
Figure 3: Hourly volume of retweets across the
2 considered weeks.
which features a typical heavy-tailed shape. The 9,989,819 retweets
are related to 1,691,865 distinct original tweets, which are also
included in the dataset. Figure 2 shows the distribution of retweets
per original tweet, while Figure 3 shows the hourly volume of
retweets across the 2 considered weeks.
For each tweet, retweet, and user in our dataset we have access to
all Twitter metadata fields, as provided by Twitter APIs. To collect
this dataset, we resorted to Twitter Premium Search API3 with
the following query parameters4: lang:IT and is:retweet. Here,
the exploitation of the Premium Search API is important since
it allowed us to build a complete dataset of retweets. In fact, the
Standard Search API5 used in the majority of previous works, does
not guarantee completeness, meaning that not all tweets matching
the query criteria are returned. Notably, although our dataset for
this study is limited to tweets in the Italian language, both the
data collection approach and the analytical process described in
the remainder of the paper, are totally language independent. The
language of collected tweets can be easily changed with the lang:
parameter, and our analyses only exploit timestamps.
After data collection, we performed data filtering and annotation.
A manual inspection of those users exhibiting the largest number of
retweets per day quickly revealed their automated nature. However,
it turned out that all such accounts, despite being bots, were not
malicious ones. Their automated nature was manifest, they did not
try to disguise as human-operated accounts, and they were not
acting coordinatedly nor trying to inflate the popularity of some
specific content. The presence of this kind of bots is well known [20].
They do not pose a threat to OSNs and, in fact, some of them are
even benign [2, 40]. Thus, we excluded such accounts from future
analyses, since they are not the target of our work. Similarly, we
also excluded accounts featuring a very small number of retweets.
Operationally, we set our filtering thresholds by leveraging statistics
in [18] -- that is, we retained only those users with a mean number of
retweets per day ≥ 2 and ≤ 50. In this way, we ended up with 63,762
distinct users exhibiting human-like retweeting behaviors. The goal
of our next analyses is to tell apart the sophisticated human-like
bots from the real human-operated accounts.
Although our detection technique is unsupervised and hence it
does not require a labeled ground truth, we nonetheless carried out
manual annotation of a small subset of our dataset. This is useful
3https://developer.twitter.com/en/docs/tweets/search/api-reference/premium-search.html
4https://developer.twitter.com/en/docs/tweets/search/overview/premium#AvailableOperators
5https://developer.twitter.com/en/docs/tweets/search/api-reference/get-search-tweets.html
in order to evaluate the extent to which our technique is capable of
correctly spotting the bots. We thus annotated ≃ 1, 000 accounts
from our dataset, following the latest annotation guidelines for
datasets containing social bots [9]. We ended up with an almost
balanced annotated dataset, comprising 51% bots and 49% legitimate
(i.e., human-operated) accounts.
4 PATTERNS OF RETWEETING ACTIVITY
Here, we investigate the temporal dynamics of retweeting activity
of all the 63,762 accounts in our dataset. By also leveraging class
labels of the annotated accounts, we aim at highlighting retweeting
behaviors that are indicative of normal versus suspicious activity.
To ease the exploration of a user's retweeting activity, we pro-
pose a compact -- yet informative -- scatterplot visualization called
ReTweet-Tweet (RTT). Given a user and the list of all his retweets,
RTT plots the timestamp of each retweet (x axis) against the times-
tamp of the corresponding original tweet (y axis). By the definition
of RTT, points laying in different areas of the plot imply different
retweeting behaviors. Figure 4a shows the semantics of this visu-
alization, by means of a visual explanation of the most common
behaviors caught by the RTT plot. In detail, no point can ever ap-
pear above the main diagonal of the plot, since that would break
causality (i.e., it would correspond to a retweet that anticipates the
original tweet, which is clearly impossible). Points laying near to
the main diagonal represent retweets occurring rapidly after the
publication time of the original tweet. Conversely, points that lay
far from the diagonal imply a large temporal distance between a
tweet and its retweet (i.e., retweets of very old tweets), which is an
uncommon behavior.
Normal behaviors -- droplet pattern. Figure 4b shows the
typical RTT plot of a "normal", legitimate user. As shown, the vast
majority of points concentrates slightly below the main diagonal.
This is the expected behavior on the past-paced Twitter OSN, since
retweets typically occur with short delay (e.g., between 1 and 10
minutes) from the original tweets [21]. Occasionally, legitimate
users retweet a sequence of tweets with increasing delays. In RTT
plots, this retweeting behavior creates a few vertically-stacked
points that we refer to as droplets. We found this pattern to be
frequent among legitimate users. In fact, the droplet pattern occurs
each time a user retweets a Twitter feed (e.g., search results) or
a user timeline. Since feeds and timelines are rendered -- both in
the Web application and via APIs -- in reverse chronological order,
10010110210310410510610-1100101102103retweets per dayusers100101102103104105106100101102103104105retweetstweets020406017 Jun18192021222324252627282930 Juntimeretweets/hour (thousands)WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
M. Mazza et al.
(a) Semantics of RTT plots.
(b) Droplet pattern.
(c) Straight line pattern.
(d) Triangular pattern.
(e) Waterfall pattern.
(f) An extreme waterfall pattern.
Figure 4: RTT plots depicting a normal tweeting behavior (blue colored) and many suspicious ones (red colored). The insets of
RTT plots show the empirical probability density function (PDF) and a rug plot of retweet delays.
retweeting a sequence of such tweets results in increasing retweet
delays, just because tweets retweeted last are actually the oldest
ones. Apart from these observations, no other clear pattern emerges
in the RTT plot of Figure 4b. The possible presence of distinctive
patterns in RTT plots is particularly relevant since it implies some
form of regularity in a user's retweeting activity. In turn, striking
regularities are typically caused by automated actions -- that is, they
are representative of bot behaviors, as previous literature already
highlighted [6, 10, 32].
Suspicious behaviors -- straight line pattern. The RTT plot
in Figure 4c shows different retweeting behaviors. Almost all points
in the plot are laying precisely above the main diagonal, meaning
that the user almost always retweets in a matter of a few seconds
from the original tweets. The user's activity is also clearly split
into different sessions, separated by small gaps denoting inactivity.
Suspicious behaviors -- triangular pattern. Figure 4d shows yet
another suspicious pattern. This time the activity sessions are very
regular, with always roughly the same length and the same inac-
tivity time that separates subsequent sessions. Moreover, sessions
seem to create a peculiar triangular pattern below the diagonal
of the RTT plot. This means that, within a given session, the user
retweets past tweets only up to a fixed point in time that roughly
corresponds to the starting time of the session.
Suspicious behaviors -- waterfall pattern. Finally, Figure 4e
shows the behavior of a user whose retweets go way back in time.
In figure, this is represented by points forming solid vertical lines.
These lines are significantly longer than those representing droplets
in Figure 4b and are probably caused by systematic retweeting of a
Twitter feed or timeline in reverse chronological order. Since many
vertical lines are present in the RTT plots showing this retweeting
behavior, we call this a waterfall pattern. Apart from the vertical
lines, mild signs of retweeting sessions are also visible in the plot.
Although the presence of the waterfall pattern shown in Figure 4e
is already indicative of automated behaviors, for some users this
behavior is truly extreme, as shown in Figure 4f.
As highlighted by the previous analyses, the RTT plot is useful
for studying the retweeting behavior of a given user. It is a valuable
tool per se, that can empower human analysts for getting insights
into the behaviors of Twitter accounts. Moving forward, in the next
section we build on the results of these analyses by designing a
fully automatic technique for spotting malicious retweeting bots.
5 INTRODUCING RETWEET-BUSTER
As highlighted in the previous sections, unsupervised group-based
approaches currently represent the most promising research di-
rection for social bot detection [9, 47]. Thus, in this section we
propose an unsupervised technique that leverages the temporal
distribution of the retweets of large groups of users, in order to
detect malicious retweeting bots. Since we aim to design an unsu-
pervised technique, we can not simply learn a detector for spotting
the suspicious patterns identified in Section 4. Instead, our goal
is to develop a technique that is capable of spotting such suspi-
cious patterns, as well as possible other patterns that might exist in
a dataset describing temporal retweeting activities. In other words,
the technique should be able to automatically identify meaningful
patterns from the data, rather than be able to recognize only those
patterns that we manually labeled as suspicious.
RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
ri,0 ri,1 · · ·
0
0
Ri = 3
0
4
0
6
9
· · ·
· · ·
ri,n
20
3
-3
4
-1
6
9
· · ·
20
Figure 6: Excerpt of a retweet time series compressed with
RLE. Observations affected by RLE are orange-colored.
series by compressing the many consecutive zeros that represent
no retweeting activity. Since we only need to compress zeros, we
do not need to use the typical RLE <value, length> tuples. In fact,
just the length will suffice. We have however to make a distinction
between RLE lengths and the t(x) − tREF observations that repre-
sent retweets. Since by definition, ri, j observations that represent
retweets are always positive, one straightforward way to make such
distinction is to substitute consecutive zeros with the opposite of
RLE lengths. Figure 6 graphically summarizes this data preparation
and compression step. As a result of this step, we have one single
compact time series for each user. Furthermore, such time series
efficiently encodes multiple information, such as inactivity periods
as well as tweets and retweets timestamps.
Unsupervised feature extraction. So far, we obtained a com-
pact representation of the temporal retweeting behaviors of our
users. Now, we need to turn this representation into a limited num-
ber of highly-informative features. Specifically, we have 3 goals for
this step: (i) obtain features for a subsequent machine learning task
(i.e., density-based clustering) in an unsupervised way; (ii) obtain
fixed-length feature vectors, whereas user time series have variable
length; (iii) maximize the amount of information in our features,
while minimizing the number of features.
Basically, all our goals can be achieved with a well thought
out application of dimensionality reduction techniques to our run-
length-encoded time series. Specifically, we take a feature projec-
tion approach, where we aim to transform our compressed time
series into lower-dimensional feature vectors. Feature projection
can be achieved via a large number of different techniques. Here, we
propose a solution based on variational autoencoders, a particular
type of deep neural networks, because of their favorable charac-
teristics [30]. In Section 6 we also show comparisons with other
dimensionality reduction and feature projection techniques (e.g.,
PCA, TICA).
Variational autoencoders (VAEs) are an unsupervised learning
technique that leverages neural networks for learning a probabilis-
tic representation (i.e., learning features) of the input. As shown in
Figure 5, a VAE is composed of 2 main modules: an encoder network
and a decoder network. The encoder takes the original input and
learns a compressed knowledge representation. Dually, the decoder
takes the compressed representation and tries to reconstruct the
original input at its best. During the (unsupervised) training phase
of the network, the encoder learns to create a meaningful and infor-
mative compressed representation of the input, so that the decoder
can accurately reconstruct it. Notably, if the input dimensions are
largely independent of one another, the compression performed by
Figure 5: Main logical components of RTbust.
Thus, building on these considerations, we propose a retweeting
bot detection technique, called Retweet-Buster (RTbust), based
on automatic unsupervised feature extraction. Then, in order to
implement a group-analysis technique, such automatically-learned
features are passed to a density-based clustering algorithm. The
rationale for clustering stems from previous research in human and
bot behaviors, in that humans have been proven to exhibit much
more behavioral heterogeneity than automated accounts [6, 12]. As
a consequence, we expect that the heterogeneous humans will not
be sufficiently "dense" to be clustered. In fact, they will act pretty
much like a background noise in the features space. Conversely,
groups of coordinated and synchronized bots will be organized in
much denser groups in the features space, thus resulting in nice
density-based clusters. In detail, our proposed RTbust technique
is organized in 3 main steps, as also shown in Figure 5: (i) time
series data preparation and compression; (ii) unsupervised feature
extraction; and (iii) user clustering.
Data preparation and compression. Let tREF be a reference
timestamp set at the start of the analysis time window. In our case
tREF corresponds to 17 June, 2018 at 00:00:00. Then, t(x) denotes
the publication timestamp of tweet ID = x. The raw data exploited
to carry out bot detection with RTbust is the same used in the
RTT plots of Section 4, that is tweet and retweet timestamps. In
RTbust such timestamps are organized as a retweet time series
Ri = {ri,0, ri,1, . . . , ri,n} for each user ui, where,
(cid:40)t(x) − tREF
ri, j =
0
if ui retweeted tweet ID = x at time tj
if ui did not retweet at time tj
The temporal granularity of our time series is that of seconds, which
is the same granularity as Twitter timestamps. That is, we have one
ri, j observation per second per user. Hence, our time series have
a very fine temporal grain. However, overall they are very sparse
because users retweet, on average, only once in a few minutes.
At this step, we want to maximize the informativeness of our
time series, while minimizing the amount of data to store and pro-
cess. To beat this trade off, we employ a modified version of the
run-length encoding (RLE) compression scheme. RLE is a simple
and widely-used lossless sequence compression scheme that en-
codes consecutive equal data values with one single <value, length>
tuple. In our case, we use RLE to reduce the sparsity in our time
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
M. Mazza et al.
the encoder results in a loss of valuable information and the sub-
sequent reconstruction becomes a very difficult task. However, if
some sort of structure (i.e., patterns) exists in the input data, such as
the peculiar patterns that we uncovered in Section 4, that structure
can be learned by the encoder and consequently leveraged when
converting the input into its compressed representation. In other
words, this encoding learns latent features of the input data, which
is precisely what we require from this unsupervised feature extrac-
tion step. Because deep neural networks are capable of learning
nonlinear relationships, this encoding can be thought of as a more
powerful generalization of PCA [36]. In our work, the decoder is
only used for training the VAE, since we are not really interested in
reconstructing our time series. Instead, once trained, the encoder
becomes our unsupervised feature extractor. The dimension of the
latent feature vector generated by the encoder is a parameter of the
VAE, with which we extensively experiment in the next section. The
lower the dimension, the more compressed is the representation
of the input. However, a low-dimensional representation mitigates
possible issues during the subsequent clustering step, caused by
the curse of dimensionality [16].
Regarding the deep learning architecture used for implementing
the VAE, we relied on a long short-term memory (LSTM) network.
LSTMs are well-known and widely used recurrent neural networks.
Because of their memory states, they are well-suited for performing
tasks on time series, which are often characterized by temporal
correlations and by lags of unknown duration between relevant
events [24]. Specifically, LSTMs have been proven very accurate
at extracting patterns in input space, where input data spans over
long sequences. Furthermore, they are also suitable for dealing with
sequences of variable length, such as our time series, while still
being able to produce fixed-lengths data representations.
User clustering. Now that our users are represented by their
latent feature vectors computed by the LSTM encoder, we can apply
density-based clustering in order to check for common retweet-
ing behaviors. If large clusters of users are found, then we might
have detected a coordinated and synchronized group of accounts,
possibly constituting a retweeting botnet. We base our clustering
step on a recent efficient algorithm that combines density- and
hierarchical-based clustering: HDBSCAN [5]. Among the advan-
tages of this algorithm is its effectiveness in finding clusters with
variable degrees of density, a much desirable feature when dealing
with noisy real-world data. In addition, HDBSCAN also proved
about twice as fast as its predecessor DBSCAN. Regarding algo-
rithm parameters, HDBSCAN removed the need to specify a global
density threshold (the ϵ parameter in DBSCAN) by employing an
optimization strategy for finding the best cluster stability [5]. The
only mandatory parameter to set is the minimum cardinality of the
clusters found by HDBSCAN. We experiment with this parameter
in the next section. Concluding, after running our density-based
clusering step, we label as bots all those accounts that end up clus-
tered. Conversely, we label as legitimate all those account that are
treated as noise (i.e., that are not clustered) by HDBSCAN.
6 EXPERIMENTS AND RESULTS
Here we present results obtained while searching for the best set
of parameters of RTbust, as well as overall bot detection results.
feature
RT users entropy
RT days entropy
RT rate
daily mean RTs
RT days
1
2
3
4
5
the distribution of
description
Shannon entropy of
retweeted users
Shannon entropy of the distribution of the
publication days of retweeted tweets
number of retweets per time unit
daily mean of the number of retweets
number of distinct days during which the user
retweeted at least once
minimum of the inter-retweet times
mean of the inter-retweet times
standard deviation of the inter-retweet times
minimum IRT
mean IRT
stdev IRT
minimum RT delay minimum of the retweet delays
6
7
8
9
10 mean RT delay
11
stdev RT delay
12
RT sessions
Table 1: List of handcrafted features computed for each user.
mean of the retweet delays
standard deviation of the retweet delays
number of detected retweeting sessions
Evaluation methodology. In all the experiments described in
this section we analyze all 63,762 accounts of our dataset. Then, we
evaluate the effectiveness of different techniques, possibly executed
with different configurations of parameters, in correctly classifying
the ≃ 1, 000 annotated accounts. Thus, the bot detection task is
framed as a binary classification task, with the 2 classes being: bot
(positive class) and human (negative class). For presenting evalu-
ation results we rely on 5 standard, well-known metrics used for
evaluating binary machine learning classifiers, specifically: pre-
cision, recall, accuracy, F1-Score (F1), and Matthews correlation
coefficient (MCC) [38].
Comparisons. While evaluating the bot detection results of RT-
bust, we also perform extensive comparisons with other baselines
and state-of-the-art techniques for social bot detection.
In Section 5 we grounded the unsupervised feature extraction
step of RTbust on a variational autoencoder. However, a number
of other techniques could be used to achieve the same goal. Thus,
for the sake of experimentation we implemented 2 more versions
of RTbust that are based respectively on principal component
analysis (PCA) and time independent component analysis (TICA)
for feature extraction [26]. PCA is a well-known linear statistical
technique for dimensionality reduction. By choosing an appropriate
number of principal components found by PCA, it is possible to
greatly reduce the dimensionality of a problem, while minimizing
the loss of information. Similarly, TICA is another dimensionality
reduction technique that is particularly suitable for dealing with
time series. While PCA finds high-variance linear combinations
of the input dimensions, TICA aims to find high-autocorrelation
linear combinations. Thus, when using PCA and TICA for feature
extraction, the features resulting from PCA are likely to convey
different information with respect to those obtained from TICA.
As typically done for many machine learning tasks, we also
experiment with a small set of handcrafted features. These features
take into account characteristics of the retweet time series of the
users (e.g., inter-retweet times, retweeting delays and sessions), as
well as other characteristics not available from retweet time series,
but that might still contribute to bot detection (e.g., the distribution
RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
of clusters, all 3 implementations show the same qualitative behav-
ior. When considering a very limited number of features, HDBSCAN
finds a large number of clusters. Increasing the number of features
results in fewer clusters, up to a point (size of latent feature vector
= 10) where the number of clusters stops decreasing. Regarding bot
detection performance, Figure 7 shows a very different behavior
between the VAE implementation of RTbust, with respect to the
PCA and TICA ones. Features extracted by PCA and TICA seem
to provide significantly less information for bot detection with re-
spect to those extracted by the VAE, as demonstrated by a lower
F1. Moreover, increasing the number of considered PCA and TICA
features seems of no help, since the F1 remains almost the same for
each latent feature vector size. Instead, the VAE implementation
shows a behavior that is consistent with the results obtained for the
number of clusters. The F1 rapidly increases when considering a
larger number of features, up to a point (size of latent feature vector
= 8) where it reaches and maintains its maximum (apart from a few
fluctuations). Overall, these results demonstrate that the VAE is
much more powerful than PCA and TICA for the unsupervised fea-
ture extraction from our retweet time series. Furthermore, as little
as 8 VAE features seem to be enough for stabilizing the clustering
and achieving good bot detection results.
We repeated this experiment by also varying the minimum clus-
ter cardinality (i.e., the only HDBSCAN parameter). We omit de-
tailed results due to space limitations, however we report finding
the best results with clusters larger than 10 accounts, a threshold
that is both intuitive (i.e., it is not very meaningful to look for
minuscule botnets) and operationally effective.
Quantitative evaluation of bot detection. Next, we present
detailed bot detection results for all the considered techniques. For
the VAE, PCA and TICA implementations of RTbust, we use only
8 features, leveraging results of our previous experiment.
Table 2 shows retweeter bot detection results. The best detection
performances (F1 = 0.87) are achieved by the proposed RTbust
technique using the VAE for unsupervised feature extraction. In
fact, it beats all other competitors in each evaluation metric, with
the only exception of the recall metric. All other implementations
of RTbust achieve worse results, with F1 ≤ 0.67. As anticipated,
this is a strong point in favor of the VAE for extracting informa-
tive features from our retweet time series. The second best overall
results are obtained by the Social fingerprinting, achieving an en-
couraging F1 = 0.76. Instead, the other state-of-the-art techniques
obtain much worse results, with Botometer's F1 = 0.43 and Holo-
Scope's F1 = 0.01. Interestingly, the majority of evaluated tech-
niques achieve their worst results in the precision metric, meaning
that many legitimate accounts are misclassified as bots. This results
is in contrast with previous results in bot detection [9]. However,
previous works mainly experimented with supervised techniques,
while here we mainly explore unsupervised ones. Thus, combined
results of our study and previous ones might suggest that super-
vised approaches to social bot detection are more prone to type II
errors (false negatives), while unsupervised approaches are more
prone to type I errors (false positives).
In Figure 8, we use t-SNE [34] for plotting our annotated accounts
in a bi-dimensional space, where each account is colored according
to the RTbust (VAE) cluster it belongs to, and 2 different symbols
represent bots and legitimate accounts according to our ground
Figure 7: Dependence of clustering stability and bot detec-
tion performances on the number of features extracted by
PCA, TICA and the VAE. Best results are obtained with the
VAE, starting from 8 features (dashed vertical line).
of retweeted accounts). Table 1 lists the 12 handcrafted features.
Notably, some of them -- such as inter-retweet times -- have been
largely used in previous retweeter bot detection systems [25, 45]. In
our subsequent experiments, these handcrafted features are tested
in RTbust in place of those automatically extracted by PCA, TICA,
and the VAE.
Regarding comparisons with other state-of-the-art bot detection
techniques, we experiment with the supervised version of the Social
fingerprinting technique proposed in [8, 10] and with the unsuper-
vised HoloScope technique proposed in [32]. Both techniques are
designed to detect synchronized and coordinated groups of bots,
and have been briefly described in Section 2. In addition, we also
experiment with the Botometer system [13]. Botometer is a publicly-
available service6 to evaluate the similarity of a Twitter account
with the known characteristics of social bots. It leverages an off-
the-shelf supervised machine learning classifier that exploits more
than 1,000 features of the accounts under investigation. Similarly
to the majority of existing systems, Botometer performs account-
by-account analyses, rather than group analyses.
Finally, as a simple comparison baseline we also try classifying
as bots all those accounts whose retweet rate (i.e., retweets per unit
of time) is higher than a fixed threshold. We set this threshold as
the third quartile of the distribution of retweet rates for our 63,762
accounts. This comparison helps understand if simply looking at
the number of retweets is enough for gaining insights into the
nature (bot/legitimate) of an account.
Parameters configuration. The most important parameter of
RTbust is the dimension of the latent feature vectors generated
by the VAE. It affects both the quality of the subsequent clustering
step, which in turn affects bot detection performances, as well as
the time/computation needed to complete it. The same also applies
to the number of projected dimensions obtained with PCA or TICA.
Thus, we designed an experiment to evaluate the performances
of RTbust, implemented with VAE, PCA, and TICA for feature
extraction, in relation to the number of considered latent features.
Figure 7 shows results for this experiment, in terms of the overall
F1 obtained for the classification of bots and humans, and of the to-
tal number of clusters found by HDBSCAN. Regarding the number
6https://botometer.iuni.iu.edu
0.000.250.500.751.0005001000150020002500826101418222630343842465054586264size of latent feature vectorF1number of clustersVAEPCATICAWebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
M. Mazza et al.
technique
baseline
retweet rate
comparisons
Botometer [13]
HoloScope [32]
Social fingerprinting [8, 10]
our contributions
RTbust (handcrafted features)
RTbust (PCA)
RTbust (TICA)
RTbust (VAE)
type
--
features
precision
recall
accuracy
F 1
MCC
evaluation metrics
1
0.3534
0.3585
0.3440
0.3559 −0.3124
supervised
unsupervised
supervised
> 1, 000
--
--
0.6951
0.2857
0.6562
0.3098
0.0049
0.8978
0.5830
0.4908
0.7114
0.4286
0.2051
0.0096 −0.0410
0.7582
0.4536
unsupervised
unsupervised
unsupervised
unsupervised
12
8
8
8
0.5284
0.5111
0.5228
0.9304
0.7707
0.9512
0.9512
0.8146
0.5364
0.5154
0.5364
0.8755
0.6270
0.6649
0.6747
0.8687
0.0767
0.0446
0.1168
0.7572
Table 2: Retweeter bot detection results of RTbust and comparison with a baseline and other state-of-the-art techniques. Best
results in each evaluation metric are shown in bold.
Figure 8: Visual exploration of RTbust (VAE) bot detection
results, and comparison with t-SNE.
(a) Cars botnet.
(b) Singer botnet.
Figure 9: RTT plots of the 2 botnets discovered with RTbust.
truth. Since in RTbust each clustered account is labeled as bot
while unclustered ones are labeled as humans, by comparing colors
and symbols of the accounts in figure, it is possible to visually
assess the quality of bot classification. Furthermore, Figure 8 also
allows a comparison between our clustering and that resulting
from t-SNE. Regarding bot detection, we can see few clustered
legitimate accounts. Similarly, only a minority of bots are grey-
colored (i.e., unclustered). Concerning the comparison between t-
SNE and RTbust, the 2 algorithms produce rather different clusters.
For instance, multiple RTbust clusters collapse in a single t-SNE
cluster and vice versa. However, the overall distinction between
bots and humans seem to hold for both RTbust and t-SNE. The
majority of legitimate accounts are both grey-colored and spread
across the central region of Figure 8. In other words, they do not
belong to any cluster neither for t-SNE nor for RTbust. Dually, the
majority of bots appear as colored and positioned near other bots.
Thus, both t-SNE and RTbust seem to recognize bot similarities
although organizing the bots differently, despite the very different
inner functioning of the 2 techniques. Given the usefulness and
widespread application of t-SNE, these similarities support results
of RTbust (VAE).
Qualitative evaluation of bot detection. Given the good re-
sults achieved by RTbust (VAE) at spotting the annotated bots in
Figure 10: A subset of accounts from the singer botnet.
our dataset, we now analyze also those non-annotated accounts
that have been labeled as bots by the same technique. This manual
and qualitative validation might serve as an additional evaluation
of the outcomes of RTbust.
In particular, RTbust found 2 notable clusters of non-annotated
accounts. The smallest of such clusters counts 44 accounts. A man-
ual inspection of these accounts revealed that they actually belong
RTBust: Exploiting Temporal Patterns for Botnet Detection on Twitter
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
to a small botnet with some peculiar characteristics. First and fore-
most, they almost only retweet 3 accounts (@peugeotitalia, @cit-
roenitalia and @motorionline). Thus, this botnet has a specific focus
on cars. Moreover, they only post retweets or images, no account
of the botnet has a real profile picture, and they are loosely syn-
chronized, meaning that they tend to retweet the same tweets but
at different moments in time. In order to get further insights into
their behavior, we produced a combined RTT visualization of all the
accounts of the botnet, as shown in Figure 9a. Each point in figure is
a retweet made by one of the botnet's account and colors represent
different bots. Interestingly, clear patterns emerge in some portions
of the RTT plot, as seen in the inset of Figure 9a. Such patterns
testify the synchronized retweeting activity of the botnet.
The other notable cluster of bot accounts found by RTbust is
composed of almost 300 accounts that almost exclusively retweet
2 accounts (@Valerio_Scanu and @ArmataScanu). Similarly to the
previous smaller botnet, also this larger one seems to retweet with
a specific focus -- that is, publicizing tweets related to the Italian
pop singer Valerio Scanu7. Figure 9b shows the RTT plot of this
botnet, which exhibits a mixture of the triangular and waterfall
patterns that we described in Section 4. Figure 10 also displays the
appearance of the profiles of some of these accounts. As seen, some
accounts of the botnet are tightly synchronized, while the botnet
as a whole is loosely synchronized.
This qualitative evaluation revealed that, not only did RTbust
achieve good results on the annotated accounts, but it also allowed
to discover 2 previously unknown active retweeting botnets.
7 DISCUSSION
Visualizing suspicious behaviors. In this work we provided sev-
eral contributions. The first of such contributions is the develop-
ment of the RTT visualization. In figures 4 and 9 we showed that
RTT plots represent a useful tool for analyzing the retweeting be-
havior of an account, or of a group of accounts. Human analysts can
gain valuable insights into the behaviors of suspicious accounts by
leveraging RTT plots. The possibility to leverage RTT plots might
be particularly valuable in future data annotation tasks, consider-
ing the current difficulties faced by human annotators in correctly
labeling social bots [9]. Another favorable application scenario is
related to the banning of bots from OSNs. Indeed, despite the recent
advances in machine learning-based detectors, manual verification
of accounts to assess their degree of automation is still carried out
by OSN administrators [17]. To this end, RTT plots might contribute
to speed-up the process and to reduce possible human mistakes.
Notably, a few previous works also proposed some simple vi-
sualizations with the goal of highlighting suspicious behaviors in
OSNs [19, 27, 28]. However, previous visualizations for spotting sus-
picious behaviors require much more data than that needed by RTT
plots. For example, the visualizations used in [27] are based on the
full social graph of considered accounts. Similarly, the visualizations
proposed in [19] require building retweet threads/cascades, which
in turn require friend/followers information of each retweeter. Con-
versely, with RTT plots we can spot suspicious retweeting behaviors
with as little information as retweet-tweet timestamps.
7https://en.wikipedia.org/wiki/Valerio_Scanu
Generalizability and robustness. Our second, and largest,
contribution is the development of the Retweet-Buster (RTbust)
bot detection technique. RTbust is an unsupervised technique that
is capable of automatically spotting meaningful patterns in retweet
data. Because of this feature, RTbust is potentially capable of de-
tecting retweeting bots exhibiting a behavior that has not been
witnessed before. We believe this to be an important feature, con-
sidering that we still lack a "standard" and "well-agreed" definition
of what a social bot is [35, 47] -- and consequently, of its expected
behaviors [1]. Hence, the capability to spot a broad set of differ-
ent behaviors, surely comes in handy. Moreover, it has been now
largely demonstrated that social bots do evolve to escape detection
techniques [9, 44]. Thus, the generalizability of RTbust and its
robustness to evasion is a much desirable feature because it allows
us to better withstand the next evolution of social bots.
Explainability. Model and decision explainability has now be-
come one of the major practical and ethical concerns around AI [23].
To this regard, one of the possible drawbacks of RTbust lies in the
difficulty to "explain" the reasons for labeling an account as bot or
legitimate. This is largely due to the difficulty in interpreting the
latent features used for clustering, which in turn depend on the
adoption of the "black-box" variational autoencoder for unsuper-
vised feature extraction. This issue is not peculiar of our technique,
but it is rather a well-known limitation of all deep learning tech-
niques [23]. Here, to mitigate this issue we again propose to resort
to RTT plots. As demonstrated in Figure 9, our visualization can be
profitably used also after the application of RTbust, with the goal
of understanding the characteristics of those accounts that have
been labeled as bots.
8 CONCLUSIONS
In this work, we investigated patterns of retweeting activity on
Twitter, with the specific goal of detecting malicious retweeting
bots. To this end, our work provides several contributions.
Firstly, we proposed a novel visualization technique called ReTweet-
Tweet (RTT). As thoroughly shown, RTT plots are an effective and
efficient mean to gain valuable insights into the retweeting behav-
iors of Twitter accounts. By leveraging RTT plots we analyzed the
"normal" retweeting behavior of legitimate users, and we uncovered
3 suspicious behaviors that are caused by automated retweeting
-- and thus, that are representative of bot activities. Furthermore,
we discussed how RTT plots can empower human analysts when
manually annotating a dataset comprising social bots, as well as
OSN administrators looking for evidence of automation when de-
ciding about banning accounts from social platforms. Finally, we
highlighted that RTT plots can also be used to explain decisions of
black-box bot detectors, thus contributing towards explainable and
interpretable AI.
Next, we designed an unsupervised group-analysis technique,
called Retweet-Buster (RTbust), for detecting retweeting social
bots. The core of RTbust is an LSTM variational autoencoder that
we trained to extract a minimum number of highly informative
latent features from the retweet time series of each account. The
decision about an account (whether it is bot or legitimate) is based
on the outcome of a hierarchical density-based clustering algorithm.
In detail, accounts belonging to large clusters are labeled as bots,
WebSci 2019, June 30 -- July 3, 2019, Boston, MA, USA
M. Mazza et al.
while unclustered accounts are labeled as legitimate. We compared
different implementations of RTbust with baselines and state-of-
the-art social bot detection techniques. RTbust outperformed all
competitors achieving F1 = 0.87, in contrast with F1 ≤ 0.76 of
other techniques. By applying RTbust to a large dataset of retweets,
we also discovered 2 previously unknown active botnets comprising
hundreds of accounts.
For future work we plan to improve the decisions taken by RT-
bust. In fact, here we adopted a rather naive solution revolving
around accounts being clustered or not. However, we can augment
the final decision step of RTbust by considering additional infor-
mation, such as the hierarchy of clusters produced by the clustering
algorithm and other internal and external clustering validation mea-
sures. In this way, we could prune some clusters or some accounts
belonging to a cluster, thus improving precision. Similarly, we could
expand some clusters by adding borderline accounts, thus possibly
also improving recall, which currently is the bottleneck of RTbust.
Other than improving RTbust, we also plan to apply it in the wild
for discovering and analyzing active botnets.
REFERENCES
[1] Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Man-
sour Alsaleh, Vivek K Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex Sandy
Pentland. 2014. Twitter: who gets caught? observed trends in social micro-
blogging spam. In ACM WebSci.
[2] Marco Avvenuti, Salvatore Bellomo, Stefano Cresci, Mariantonietta Noemi
La Polla, and Maurizio Tesconi. 2017. Hybrid crowdsensing: A novel paradigm
to combine the strengths of opportunistic and participatory crowdsensing. In
ACM WWW Companion.
[3] Alessandro Bessi, Mauro Coletto, George Alexandru Davidescu, Antonio Scala,
Guido Caldarelli, and Walter Quattrociocchi. 2015. Science vs conspiracy: Collec-
tive narratives in the age of misinformation. PloS one 10, 2 (2015).
[4] Alexandre Bovet and Hernán A Makse. 2019. Influence of fake news in Twitter
during the 2016 US presidential election. Nature communications 10, 1 (2019).
[5] Ricardo JGB Campello, Davoud Moulavi, and Jörg Sander. 2013. Density-based
clustering based on hierarchical density estimates. In PAKDD.
[6] Nikan Chavoshi, Hossein Hamooni, and Abdullah Mueen. 2016. DeBot: Twitter
Bot Detection via Warped Correlation. In IEEE ICDM.
[7] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and
Maurizio Tesconi. 2015. Fame for sale: Efficient detection of fake Twitter followers.
Decision Support Systems 80 (2015).
[8] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and
Maurizio Tesconi. 2016. DNA-inspired online behavioral modeling and its appli-
cation to spambot detection. IEEE Intelligent Systems 31, 5 (2016).
[9] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and
Maurizio Tesconi. 2017. The Paradigm-Shift of Social Spambots: Evidence, Theo-
ries, and Tools for the Arms Race. In ACM WWW Companion.
[10] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and
Maurizio Tesconi. 2018. Social Fingerprinting: detection of spambot groups
through DNA-inspired behavioral modeling. IEEE TDSC 15, 4 (2018).
[11] Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, and Stefano Tognazzi.
2019. On the capability of evolved spambots to evade detection via genetic
engineering. Online Social Networks and Media 9 (2019).
[12] Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and
Maurizio Tesconi. 2017. Exploiting digital DNA for the analysis of similarities in
Twitter behaviours. In IEEE DSAA.
[13] Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and
Filippo Menczer. 2016. BotOrNot: A System to Evaluate Social Bots. In ACM
WWW Companion.
[14] Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio
Scala, Guido Caldarelli, H Eugene Stanley, and Walter Quattrociocchi. 2016. The
spreading of misinformation online. PNAS 113, 3 (2016).
[15] Michela Del Vicario, Gianna Vivaldo, Alessandro Bessi, Fabiana Zollo, Anto-
nio Scala, Guido Caldarelli, and Walter Quattrociocchi. 2016. Echo chambers:
Emotional contagion and group polarization on facebook. Scientific reports 6
(2016).
[16] Pedro Domingos. 2012. A few useful things to know about machine learning.
Commun. ACM 55, 10 (2012).
[17] Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro
Flammini. 2016. The rise of social bots. Commun. ACM 59, 7 (2016).
[18] Syeda Nadia Firdaus, Chen Ding, and Alireza Sadeghian. 2018. Retweet: A popular
information diffusion mechanism -- A survey paper. Online Social Networks and
Media 6 (2018).
[19] Maria Giatsoglou, Despoina Chatzakou, Neil Shah, Christos Faloutsos, and
Athena Vakali. 2015. Retweeting activity on twitter: Signs of deception. In
PAKDD.
[20] Zafar Gilani, Ekaterina Kochmar, and Jon Crowcroft. 2017. Classification of twitter
accounts into automated agents and human users. In IEEE/ACM ASONAM.
[21] Manuel Gomez-Rodriguez, Krishna P Gummadi, and Bernhard Schoelkopf. 2014.
Quantifying Information Overload in Social Media and Its Impact on Social
Contagions. In AAAI ICWSM.
[22] Christian Grimme, Dennis Assenmacher, and Lena Adam. 2018. Changing Per-
spectives: Is It Sufficient to Detect Social Bots?. In SCSM.
[23] Riccardo Guidotti, Anna Monreale, Salvatore Ruggieri, Franco Turini, Fosca
Giannotti, and Dino Pedreschi. 2018. A survey of methods for explaining black
box models. ACM CSUR 51, 5 (2018).
[24] Tian Guo, Zhao Xu, Xin Yao, Haifeng Chen, Karl Aberer, and Koichi Funaya.
2016. Robust online time series prediction with recurrent neural networks. In
IEEE DSAA.
[25] Sonu Gupta, Ponnurangam Kumaraguru, and Tanmoy Chakraborty. 2019. Mal-
ReG: Detecting and Analyzing Malicious Retweeter Groups. In ACM CoDS-
COMAD.
[26] Carlos X Hernández, Hannah K Wayment-Steele, Mohammad M Sultan, Brooke E
Husic, and Vijay S Pande. 2018. Variational encoding of complex dynamics.
Physical Review E 97, 6 (2018).
[27] Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2016.
Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach.
ACM TKDD 10, 4 (2016).
[28] Meng Jiang, Peng Cui, Alex Beutel, Christos Faloutsos, and Shiqiang Yang. 2016.
Inferring lockstep behavior from connectivity pattern in large graphs. KAIS 48,
2 (2016).
[29] Christian Kater and Robert Jäschke. 2016. You shall not pass: detecting malicious
users at registration time. In ACM WebSci Workshops.
[30] Diederik P Kingma and Max Welling. 2013. Auto-encoding variational bayes. In
[31] Sangho Lee and Jong Kim. 2014. Early filtering of ephemeral malicious accounts
on Twitter. Computer Communications 54 (2014).
[32] Shenghua Liu, Bryan Hooi, and Christos Faloutsos. 2017. HoloScope: Topology-
and-Spike Aware Fraud Detection. In ACM CIKM.
[33] Shenghua Liu, Bryan Hooi, and Christos Faloutsos. 2018. A Contrast Metric for
Fraud Detection in Rich Graphs. IEEE TKDE (2018).
[34] Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE.
Journal of machine learning research (2008).
[35] Gregory Maus. 2017. A Typology of Socialbots (Abbrev.). In ACM WebSci.
[36] Qinxue Meng, Daniel Catchpoole, David Skillicom, and Paul J Kennedy. 2017.
Relational autoencoder for feature extraction. In IEEE IJCNN.
[37] Zachary Miller, Brian Dickinson, William Deitrick, Wei Hu, and Alex Hai Wang.
Information
2014. Twitter spammer detection using data stream clustering.
Sciences 260 (2014).
[38] David Martin Ward Powers. 2011. Evaluation: from Precision, Recall and F-
Measure to ROC, informedness, markedness and correlation. International Journal
of Machine Learning Technologies 2, 1 (2011).
[39] Walter Quattrociocchi. 2017. Inside the echo chamber. Scientific American 316, 4
IEEE ICML.
(2017).
[40] Saiph Savage, Andres Monroy-Hernandez, and Tobias Höllerer. 2016. Botivist:
Calling volunteers to action using online bots. In ACM CSCW.
[41] Massimo Stella, Emilio Ferrara, and Manlio De Domenico. 2018. Bots increase
exposure to negative and inflammatory content in online social systems. PNAS
115, 49 (2018).
[42] L Steward, Ahmer Arif, and Kate Starbird. 2018. Examining Trolls and Polarization
with a Retweet Network. In ACM WSDM Workshops.
[43] Cass R Sunstein. 2002. The law of group polarization. Journal of political philoso-
phy 10, 2 (2002).
[44] Stefano Tognazzi, Stefano Cresci, Marinella Petrocchi, and Angelo Spognardi.
2018. From Reaction to Proaction: Unexplored Ways to the Detection of Evolving
Spambots. In ACM WWW Companion.
[45] Nguyen Vo, Kyumin Lee, Cheng Cao, Thanh Tran, and Hongkyu Choi. 2017.
Revealing and detecting malicious retweeter groups. In IEEE/ACM ASONAM.
[46] Chao Yang, Robert Harkreader, and Guofei Gu. 2013. Empirical evaluation and
new design for fighting evolving Twitter spammers. IEEE TIFS 8, 8 (2013).
[47] Kai-Cheng Yang, Onur Varol, Clayton A Davis, Emilio Ferrara, Alessandro Flam-
mini, and Filippo Menczer. 2019. Arming the public with AI to counter social
bots. Human Behavior and Emerging Technologies (2019).
[48] Zhi Yang, Christo Wilson, Xiao Wang, Tingting Gao, Ben Y Zhao, and Yafei Dai.
2014. Uncovering social network sybils in the wild. ACM TKDD 8, 1 (2014).
[49] Fabiana Zollo, Alessandro Bessi, Michela Del Vicario, Antonio Scala, Guido
Caldarelli, Louis Shekhtman, Shlomo Havlin, and Walter Quattrociocchi. 2017.
Debunking in a world of tribes. PloS one 12, 7 (2017).
|
1504.03033 | 2 | 1504 | 2015-10-30T15:06:05 | On the stability of the PWP method | [
"cs.SI",
"physics.soc-ph"
] | The PWP method was introduced by Diaz in 2009 as a technique for measuring indirect influences in complex networks. It depends on a matrix D, provided by the user, called the matrix of direct influences, and on a positive real parameter which is part of the method itself. We study changes in the method's predictions as D and the parameter vary. | cs.SI | cs |
On the stability of the PWP method
Rafael D´ıaz
and Angelica Vargas
Abstract
The PWP method was introduced by D´ıaz in 2009 as a technique for measuring
indirect influences in complex networks. It depends on a matrix D, provided by
the user, called the matrix of direct influences, and on a positive real parameter λ
which is part of the method itself. We study changes in the method's predictions
as D and λ vary.
1
Introduction
One of the main problems in network theory is to define a ranking on the vertices of a
network reflecting the importance that each vertex plays in the network. Thus, for the
case of weighted directed networks, one is looking for maps
wdigraphs −→ rankings on vertices
sending a weighted directed graph to a ranking on its set of vertices. Asking for a lin-
ear order on vertices is clearly too much since there could be vertices playing equally
important roles in the network. A ranking on a set X is a pre-order defined by a map
r : X −→ R such that x ≤ y if and only if r(x) ≤ r(y). Clearly, different maps r may
give rise to the same pre-order, i.e. to the same ranking.
Finding a suitable map as above is not an easy task, and it is probably a problem
with no universal solution. A first approach to this problem is via the total degree map
G : wdigraphs −→ rankings on vertices
which orders vertices according to their total degree, i.e. the sum of weights of edges
reaching or leaving a given vertex. With this ordering strongly connected vertices are
deemed as having greater importance for the network.
We work with networks of influences. As it often happens in mathematics, it is better
to leave some terms undefined and let examples tell us the intended meaning. So, allow
1
us to review a few of examples of networks of influences.
Author Citation Networks.
Vertices in these networks are authors of scientific publications. An author j has
exerted an influence on author i, if there is at least one publication of i citing a publication
of j. The matrix of direct influences is given by
Dij =
♯ publications of i citing a publication of j
♯ publications of i
.
The PWP method is designed to study indirect influences in networks of this sort.
Business Providers Networks.
Vertices are businesses in a group or economic sector. A business j influences business
i if j provides products (or services) to i. The matrix of direct influences is given by
Dij =
amount spend by bussines i buying products from bussines j
budget of bussines i
.
International Trade Network.
Vertices are countries. A country j exerts an influence on the economy of country i
if there is trade between i and j. Thus the network itself is undirected, but the weight
on edges do take direction into account. The matrix of direct influences is given by
Dij =
Ii,j + Ei,j
Ci
,
is the total amount that i imports from j, Ei,j
where Ii,j
is the total amount that i
exports to j, and Ci counts the total amount of international trade of country i (total
of imports plus total of exports.) This example have been studied by D´ıaz and G´omez [6].
Process-Matter Networks.
In these networks we have two types of vertices: black vertices for processes and
white vertices for matter. The network represents a production system consisting of sev-
eral processes. Each process takes some materials as input, and produces other materials
as output, which may in turn be the inputs of other processes, and so on ... A matter
vertex m influences a process vertex p if m is one of the inputs that p needs to operate;
2
Figure 1: A Process-Matter Network.
a process vertex p influences a matter vertex m, if m is one of the outputs that p produces.
Clearly these type of networks can be use to model a host of phenomena: chemical
networks, metabolic networks, business organization systems, etc. The choice of weights
for a process-matter network depend on the intended application, but they will always
have the form:
(cid:18) 0 M
P 0 (cid:19)
where indices for the first block of columns represent processes, indices in the second
block of columns represent materials, the matrix P represents the influences of processes
on materials, and the matrix N represents the influences of materials on processes.
It is often useful to study influences among processes themselves, and also influences
among materials themselves. This can be readily achieved by using, respectively, the
product matrices
M P
and
P M.
In words, a process p influences a process q if an output of p is used by q as input, and
similarly a material m influences a material n is there is at least one process that uses
m as input and produces n as output. Figure 1 shows an example of a process-matter
network. Figure 2 displays the associated networks of influences among processes them-
selves, and among materials themselves.
With these examples in mind we go back to our main problem. From the viewpoint
of networks of influences, we say that the total degree map G defines a ranking of vertices
based on their direct importance. Although of interest, ranking by total direct degree
fails to acknowledge that some direct influences may be short lived (if exerted over an
isolated vertex) or may be enhanced (if exerted over a highly connected vertex.) Thus
3
2
3
4
5
6
1
5
2
7
8
3
6
9
1
4
10
Figure 2: Left: Associated Processes Network. Right: Associated Matter Network.
although G should not be overlooked, it should not be regarded as the unique or final
answer.
A deeper approach to our problem should take indirect influences into account; how-
ever there are many alternative ways for doing so. To proceed forward we look for a
map
R : wdigraphs −→ rankings on vertices
of the form:
wdigraphs
T−→ wdigraphs
R−→ rankings on vertices
where the map T transforms a network of direct influences into a network of indirect
influences, and L is any ranking method computed from direct influences.
To be able to pick a particular map T among the many possibilities some choices
must be made. The PWP method for counting indirect influences [5] was founded over
the following principles:
1. Indirect influences arise from the concatenation of direct influences.
2. Indirect influences do not arise in any other way.
3. The weight of a concatenation of direct influences is proportional to the product
of the weight of the direct influences that it comprehends, suitable modified to be
compatible with our next principles.
4. As a rule, the longer a concatenation of direct influences, the lesser the indirect
influence exerted by it.
5. Stochastic direct influences should generate stochastic indirect influences.
4
6. Robust convergency properties are expected.
7. The map should be equivariant under to conjugation.
The PWP method is defined via the mapping
wdigraphs
T−→ wdigraphs,
which can be described in simpler terms as a map
Mn(R)
T−→ Mn(R),
from real square matrices of size n to itself, since we can identify (simple) weighted di-
rected graphs with their adjacency matrices once a linear order has been fixed on their
vertices.
The map T depends on a real parameter λ > 0, and is given on D ∈ Mn(R) by
T(D, λ) =
eλD
+
eλ
+
=
eλD − I
eλ − 1
k!
.
k=1 Dk λk
= P∞
P∞
λk
k!
k=1
The map T satisfies our six requirements. Properties 1, 2, and 3 hold since the entries of
matrix Dk count weighted-paths of length k, i.e. concatenations of k direct influences.
The dividing factor 1
k! implies property 4. Property 5 justifies the inclusion of the nor-
malizing factor eλ
k!. Property 7 can be easily
verified.
+. Property 6 is insured by the factors 1
There is a number of other good choices for the map T, for example: the Katz index
[9], the MICMAC of Godet [8], the PageRank of Google [1, 2, 10], the Heat Kernel of
Chung [4], and the communicability method of Estrada and Hatano [7]. These well-tested
methods fail to satisfy some of the above requirements for the following reasons:
• The Katz index (1953) when suitable extended for weighted networks and normal-
ized, satisfies most of our requirements; however its convergency properties are not
1
k! are included in the
as strong as desired, this is the main reason why the factors
PWP method.
• MICMAC (70's) considers paths of a fixed length k, thus it fails to satisfy 1.
• PageRank (1999) computes indirect influences by first transforming the matrix of
direct influences into a Markovian matrix D; in this process influences are created
using a mechanism different to concatenation. Thus PageRank fails to satisfy 2.
5
• Heat Kernel (2007) comes pretty close to satisfying our principles. However, it
introduces indirect self-influences not coming from the matrix D, thus it fails to
satisfy property 2. This is the main reason why the PWP method uses the function
ex
+, instead of the exponential map ex.
• Communicability (2007) corresponds (after normalization) to the λ = 1 case in the
heat kernel method; so the same arguments as above apply. Note that in both
cases, starting with vanishing direct influences one obtains non-vanishing indirect
influences. In contrast, in the absence of direct influences, the PWP method yields
vanishing indirect influences, as also does the Katz index.
Pre-composing any ranking based on the matrix of direct influences with the PWP
map one obtains a new ranking that takes indirect influences into account. We consider
three ranking methods:
• The ranking by total degree G, which after composition with the PWP map we call
ranking by importance.
• The ranking by outgoing degree F, which after composition with the PWP map we
call ranking by indirect influence.
• The ranking by incoming degree E, which after composition with the PWP map
we call ranking by indirect dependence.
The orderings by incoming, outgoing, and total degrees may be thought, respectively,
as maps
E, F, G : Mn(R) −→ rankings on [n]
where for a matrix D the place of a vertex in the respective orders is proportional to the
values of the maps
Ei =
n
Xj=1
Dij,
Fi =
n
Xj=1
Dji,
and
Gi =
n
Xj=i
(Dij + Dji).
Pre-composing these maps with the PWP map we obtain, respectively, maps
E, F, I : Mn(R) −→ rankings on [n]
where for a matrix of direct influences D the place of a vertex in the respective orders is
proportional to the values of the maps
Ei =
n
Xj=1
Tij,
Fi =
n
Xj=1
Tji,
and
Ii =
n
Xj=i
(Tij + Tji),
6
defined in terms of the PWP matrix of indirect influences T = TD.
Since there is only a finite number of rankings on a finite set, the maps E, F and I
can be continuous only if they are constant. Our main interest in this work is to study
the regions of continuity of these maps, i.e. the regions where they are constant maps.
Note that the rankings imposed by E, F and I on the set of vertices depend ultimately
on D and λ. We consider continuity with respect to D and λ separately, as they play
quite different roles: discontinuity with respect to D is taken as a manifestation of data
sensitivity, in itself a positive phenomena, whereas discontinuity with respect to λ is
taken as a sign of the care required in the choice of λ in the applications. The main
question is whether or not changing λ will let the PWP method to impose a more or
less arbitrary ranking among the vertices. Our results, although partial, indicate that
the opposite is the case: even if several rankings may result as λ varies, they are seldom
arbitrary, and evolve following a rigid pattern.
2 Data Sensitivity of the PWP Method
In this section we analyze the continuity of the map
I : Mn(R) −→ rankings on [n]
obtained from the ordering by total degree after an application of the PWP map T (D, λ).
We set λ = 1 and consider discontinuities of the map I with respect to matrix D of direct
influences. Note that the matrix D is provided by the user, and we are going to test the
sensitivity of the method to small changes in the matrix D. As expected, small changes
in D can lead to quite different rankings on [n], stressing the need for a judicious choice
of data.
Let L6 be the linear graph with 6 nodes, see Figure 4, and let L6(ǫ) be a perturbation
of it obtained by adding a new edge of weight ǫ as shown in Figure 3. For ǫ = 0 we
recover the graph L6, further studied in Section 3, and as ǫ grows the new edge becomes
more relevant and modifies the ranking by importance of the vertices.
Constructed numerically, Table 2 shows how the ranking of vertices by importance
changes as ǫ varies. Already for ǫ = 0.01 we see that a change occurs, for example, the
pairs of vertices {3, 4}, {2, 5} and {1, 6} have the same importance for ǫ = 0, but for
ǫ = 0.01 all of them have different importance. Further changes in ranking were located
at ǫ = 0.28, 0.69, 2.1, 2.8, 7, and 23.9. Note that the vertex 4 is on the leading position
up to ǫ = 2.8, where the vertex 2 becomes the most important one. Note also that
7
1
2
3
4
5
6
2
1
3
6
4
5
Figure 3: Left: Graph L6(ǫ). Right: Graph C6(ǫ).
vertex 3 begins at the leading position, and for ǫ ≥ 7 becomes the less important ver-
tex. After we reach 23.9 our numerical experiments showed no further changes in ranking.
This fairly simple example, already shows the high data sensitivity of the ranking of
vertices by importance based on the PWP method.
ǫ
0
0.01
0.28
0.69
2.1
2.8
7
23.9
Order by Importance
3, 4 > 2, 5 > 1, 6
4 > 3 > 2 > 5 > 1 > 6
4 > 2 > 3 > 5 > 1 > 6
4 > 2 > 5 > 3 > 1 > 6
4 > 2 > 5 > 1 > 3 > 6
2 > 4 > 5 > 1 > 3 > 6
2 > 4 > 5 > 1 > 6 > 3
2 > 4 > 1 > 5 > 6 > 3
Let us consider a second example, the circuit graph C6(ǫ) with 6 nodes extended by
a new edge of weight ǫ as shown in Figure 3. For ǫ = 0 all vertices, as will be shown in
Section 4, are equally important. But as soon as ǫ reaches 0.0001 we find the ranking
3, 6 > 1, 2 > 4, 5,
which, according to our numerical calculations, remains stable for higher values of ǫ. This
example displays both behaviours a highly sensitive one at the beginning, followed by a
fairly stable one for higher values of ǫ.
We close this section with a remark on the impact that a change of scale, at data-level,
have on the applications of the PWP method, i.e. we let our matrix of direct influences
D be replaced by a new matrix of direct influences cD, with c ∈ R+. We have that:
T (cD, λ) =
1
eλ
+
∞
Xk=1
(cD)k λk
k!
=
1
eλ
+
∞
Xk=1
Dk (cλ)k
k!
=
ecλ
+
eλ
+
T (D, cλ).
8
As ecλ
is a positive real number, it does not affect the rankings by dependence, influence
+
eλ
+
or importance. Therefore in the applications of the PWP method rescaling data by a
factor amounts to rescaling λ by the same factor, and thus stability with respect to data
rescaling is a particular case of stability with respect to changes in λ.
3 Stability on Linear Graphs
In this section we begin our study of the stability of the PWP method with respect to
changes in the parameter λ > 0. Recall that whereas the matrix of direct influences D
comes directly from the user's knowledge and experience, the parameter λ comes from
the PWP method itself. So, it is important to have a good control of the dependence of
the PWP method on the choice of λ.
We consider the linear directed graph Ln with n vertices. Before considering the
general case we deal with three simple but illustrative examples, namely, the graphs
L2, L3, and L6 shown in Figure 4.
1
2
1
2
3
1
2
3
4
5
6
Figure 4: Linear graphs L2, L3 and L6.
For L2, it is easy to check that for all values of λ both vertices 1 and 2 have the same
importance given by
λ
eλ − 1
=
∞
Xn=0
Bn
λn
n!
,
where Bn are the Bernoulli numbers [5]. Thus as λ goes to infinity the importance of
both vertices goes to zero, meaning that the network becomes less connected, each vertex
becomes more isolated, and thus its importance for the network decreases. See Figure 5.
Regarding influences, vertex 1 has influence
eλ−1 while vertex 2 has influence 0. Thus
vertex 1 is always on top of vertex 2 in the order of influences, however as λ goes to
infinity both influences tend to be equal to zero. Therefore for the graph L2 the PWP
method is fully stable both in importance and in influence.
λ
9
0.35
0.30
0.25
0.20
0.15
0.10
0.05
2
0.8
0.7
0.6
0.5
1,3
0.90
2,5
3,4
1,6
0.85
0.80
4
6
8
10
12
14
1.8
2.0
2.2
2.4
3.3
3.4
3.5
3.6
Figure 5: Curves of importance for the graphs L2, L3, and L6.
Let us now consider the case of the linear graph L3 with three vertices. Regarding
importance, one can show that there is symmetry around the center of mass of the
graph, as we will show below happens for all linear graphs Ln. Thus vertices 1 and 3
have the same importance, and therefore we only need to consider vertices 1 and 2. Here
something interesting happens, as shown in Figure 5, for small values of λ vertex 2 is the
most important, but as λ grows vertex 1 overcomes vertex 2 in importance. The matrix
of indirect influences T for L3 is given by:
T =
1
eλ
+
0
0 0
λ 0 0
λ2
2 λ 0
And thus the importance of vertex 1 and 2 are given, respectively, by:
I1(λ) =
2λ + λ2
2eλ
+
and
I2(λ) =
2λ
eλ
+
.
I1(λ) < I2(λ) for 0 < λ < 2, and I2(λ) < I1(λ) for 2 < λ.
Thus I1(2) = I2(2),
Therefore, for the graph L3 the three possible rankings of its vertices by importance,
after taking symmetry into account, actually occur, see Figure 5. Influences in turn are
fully stable as we have that
F1(λ) =
λ + λ2
2
eλ
+
>
λ
eλ
+
= F2(λ).
Let us consider the graph L6 with six vertices. The matrix of indirect influences is
given by
eλ
+T =
0
λ
λ2
2!
λ3
3!
λ4
4!
λ5
5!
0
0
λ
λ2
2!
λ3
3!
λ4
4!
0
0
0
λ
λ2
2!
λ3
3!
10
0 0
0
0 0
0
0 0
0
0
0 0
λ 0 0
λ2
2! λ 0
By symmetry it is enough to consider the vertices 1, 2 and 3, with importance given by
eλ
+I1(λ) = λ +
λ2
2
+
λ3
3!
+
λ4
4!
+
λ5
5!
, eλ
+I2(λ) = 2λ +
λ2
2
+
λ3
3!
+
λ4
4!
, eλ
+I3(λ) = 2λ + 2
λ2
2
+
λ3
3!
.
Figure 5 shows the evolution of I3(λ) as λ varies. For λ small we have the ranking
1 < 2 < 3 in importance. Thus, initially vertex 1 is the less important one, and as λ
grows it first overcomes vertex 2 and then overcomes vertex 3 reaching the top position.
Later on vertex 2 overcomes vertex 3, the ranking 3 < 2 < 1 is achieved, and it remains
stable for large values of λ. Indirect influences in turn are given by
eλ
+F1(λ) = λ +
λ2
2
+
λ3
3!
+
λ4
4!
+
λ5
5!
, eλ
+F2(λ) = λ +
λ2
2
+
λ3
3!
+
λ4
4!
, eλ
+F3(λ) = λ +
λ2
2
+
λ3
3!
,
and thus the ranking 1 > 2 > 3 is stable for all values of λ. Note however that the three
values for importance approach 0 as λ goes to infinity. Thus, although the comparative
values change in order, the overall values converge to zero.
Next, we consider the linear graph Ln with n vertices. The matrix D of direct influ-
ences and the matrix T of indirect influences are given, respectively, by
Dij =
1
0
if i = j + 1,
otherwise,
eλ
+Tij =
λi−j
(i−j)!
if
i > j,
0
otherwise.
Proposition 1. The importance of the vertex j in the graph Ln is given by
eλ
+Ij(λ) =
j−1
Xi=1
λj−i
(j − i)!
+
n
Xi=j+1
λi−j
(i − j)!
,
or equivalently:
1. For j = 1, n, we have that
eλ
+I1(λ) = eλ
+In(λ) = λ + · · · + λn−1
(n−1)! .
2. For 1 < j ≤ n+1
2 , we have that
eλ
+Ij(λ) = 2λ +
2λ2
2
+ · · · + 2
λj−1
(j − 1)!
+
λj
j!
+ · · · +
λn−j
(n − j)!
,
3. For n+1
2 ≤ j < n, we have that
eλ
+Ij(λ) = 2λ + · · · + 2
λn−j
(n − j)!
+
λn−j+1
(n − j + 1)!
+ · · · +
λj−1
(j − 1)!
.
11
4. The importance Ij(λ) → 0, as λ → ∞.
Proof. The first identity follows directly from the definitions. The other three identities
follow from the first after specialization and simple changes of variables. Part 4 follows
from the previous formulae.
Next result gives us the symmetry in importance around the center of mass for the
the graphs Ln.
Proposition 2. The importance of vertices in the linear graph Ln is invariant under the
change j −→ n + 1 − j,
i.e. we have for j ∈ [n] that
Ij(λ) = In+1−j(λ).
Proof. We already know from Proposition 1 that I1(λ) = In(λ). Assume 1 < j ≤ n+1
2 ,
thus we have that n > n + 1 − j ≥ n+1
2 , and thus Proposition 1 implies that:
eλ
+In+1−j(λ) = 2λ + · · · +
2λn−(n−j+1)
(n − (n − j + 1))!
+
λn−(n−j+1)+1
(n − (n − j + 1) + 1)!
+ · · · +
λn−j+1−1
(n − j)!
=
2λ + · · · +
2λj−1
(j − 1)!
+
λj
j!
+ · · · +
λn−j
(n − j)!
= eλ
+Ij(λ).
By symmetry we only need to consider vertices to the left of the center of mass:
namely for n = 2k or n = 2k −1 we only need to consider vertices j such that 1 ≤ j ≤ k.
Consider the maps of importance Ij : (0, ∞) −→ R and the corresponding curves
{ (λ, Ij(λ)) λ > 0 } ⊆ R2.
Our next result shows that the order in importance for large λ is the reverse of the order
in importance for small λ.
Lemma 3. For n = 2k or n = 2k − 1 we have that:
1. If λ is small enough, then Ii(λ) < Ij(λ) for 1 ≤ i < j ≤ k.
2. If λ is large enough, then Ii(λ) > Ij(λ) for 1 ≤ i < j ≤ k.
12
Proof. According to Proposition 1, for the smallest potency of λ at which Ii(λ) and Ij(λ)
differ are, respectively, of the form
λi
i!
and
2
λi
i!
.
These terms control the behaviour of Ii(λ) and Ij(λ) for small λ, and thus Ii(λ) < Ij(λ)
since i < j. For large λ, we look for the largest powers in λ in Ii(λ) and Ij(λ) which are
given, respectively, by
λn−i
(n − i)!
and
λn−j
.
(n − j)!
Since i < j, we have that Ii(λ) > Ij(λ) for large λ.
Next we make a rather plausible statement which we have been able to verify numer-
ically in many instances.
Conjecture 4. Consider the linear graph Ln, with n = 2k or n = 2k − 1, and let
1 ≤ i < j ≤ k. The curves of importance Ii(λ) and Ij(λ) intersect each other in a unique
point λ = cij ∈ (0, ∞). These intersection points occur in the order
cil < cjm
for
i < l ≤ k and j < m ≤ k.
The meaning of Conjecture 4 is that the curve I1(λ) begins at the bottom and crosses
all other curves, first I2(λ), then I3(λ) and so on, until it reaches the top; next the curve
I2(λ) raises from the bottom to the second highest position, just below I1(λ), crossing
the curves I3(λ), I4(λ), etc, in exactly that order. After all crossings have taken place
the reverse order to the original one has been achieved, i.e. I1(λ) > I2(λ) > ..., and this
order remains stable up to infinity.
The numerical evidence for Conjecture 4 is quite solid. Figure 6 suggests that it holds
for the linear graph L11 .
Next result allow us to locate the crossing points of consecutive curves of importance.
Theorem 5. Let Ln be the linear graph with n = 2k or n = 2k − 1, and 1 ≤ i < k − 1.
The curves of importance Ii(λ) and Ii+1(λ)
intersect each other in a unique point
λ = ci,i+1 ∈ (0, ∞) given by
ci,i+1 = (cid:16) (n − i)!
i!
(cid:17)
1
n−2i
.
Thus for n = 2k and n = 2k − 1 we, respectively, have that
ci,i+1 = (cid:16) (2k − i)!
i!
(cid:17)
1
2(k−i)
and
13
ci,i+1 = (cid:16) (2k − i − 1)!
i!
(cid:17)
1
2(k−i)−1
.
1.15
1.10
1.05
1.00
0.95
0.90
0.85
5.2
5.4
5.6
5.8
6.0
6.2
Figure 6: Curves of Importance for L11.
Proof. The crossing point ci,i+1 is defined by the equation
2λ +
2λ +
2λ2
2
2λ2
2
+ · · · + 2
λi−1
(i − 1)!
+
λi
i!
+ · · · +
+ · · · + 2
λi
i!
+
λi+1
(i + 1)!
+ · · · +
λn−i
(n − i)!
=
λn−i−1
(n − i − 1)!
,
which after cancelling terms is equivalent to the equation
with a unique solution given by
λn−i
(n − i)!
=
λi
i!
,
ci,i+1 = (cid:16) (n − i)!
i!
(cid:17)
1
n−2i
.
Corollary 6. Let Ln be the linear graph with n = 2k or n = 2k−1, and let 1 ≤ i < k−1.
1. For n = 2k, k ≥ 2, the crossing points c1,2 and ck−1,k are given by
c1,2 = (2k − 1)!
1
2k−2
and
ck−1,k = (k(k + 1))
1
2 .
2. For n = 2k − 1, k ≥ 2, the crossing points c1,2 and ck−1,k are given by
c1,2 = (2k − 2)!
1
2k−3
and
ck−1,k = k.
The following result may be regarded as further evidence in favor of Conjecture 4.
Theorem 7. The intersection points ci,i+1 of the curves Ii(λ) and Ii+1(λ) occur in the
order
c1,2 < c2,3 < · · · · · · < ck−2,k−1 < ck−1,k.
14
Proof. We use a simple fact for positive integers: if c < a − 1, then
ac < (a − 1)(c + 1).
Choose i such that 2(i + 1) ≤ n,
i.e. such that n − 2i − 2 ≥ 0 or equivalently
We have the following chain of equivalent inequalities
i + 1 < n − i − 1.
ci,i+1 < ci+1,i+2,
1
n−2i
(cid:16) (n − i)!
i!
(cid:17)
< (cid:16)(n − i − 1)!
(i + 1)! (cid:17)
1
n−2i−2
,
(n − i)!n−2i−2(i + 1)!n−2i < (n − i − 1)!n−2ii!n−2i−2,
(n − i)n−2i−2(i + 1)n−2i−2(i + 1)!2 < (n − i − 1)!2,
(n − i)n−2i−2(i + 1)n−2i−2 < (n − i − 1)2 · · · (i + 2)2,
((n − i)(i + 1))n−2i−2 < (n − i − 1)2 · · · (i + 2)2
Using the fact mentioned at the beggining , it is clear that in order to show the latter
inequality it is enough to check that
(n − i)(i + 1) < (n − i − 1)(i + 2),
which holds since i + 1 < n − i − 1.
Example 8. Set n = 12 and i = 3. In this case the inequality
((n − i)(i + 1))n−2i−2 < (n − i − 1)2 · · · (i + 2)2
simply says that (9.4)4 < (8.7.6.5)2, or equivalently
(9.4)(9.4)(9.4)(9.4) < (8.5)(7.6)(7.6)(8.5).
Note that if Conjecture 4 holds, then there are exactly
k(k − 1)
2
crossing points among the curves of importance Ij(λ), and thus that same number of
different orderings by importance on the vertices of Ln as λ varies, where n = 2k or
n = 2k − 1.
Indeed vertex 1 begins as the less important and have to surpass k − 1
vertices to reach the top. Then vertex 2 have to surpass k − 2 vertices to reach the
15
second position, etc. Thus the number of crossing is the sum of the first k − 1 natural
numbers, yielding the desired result.
Although the number of reachable orderings grows to infinity, it is nevertheless a
negligible quantity, for large n, relative to the number of all possible orderings as
Lim
k→∞
k(k − 1)
2k!
= 0.
Therefore even though it is possible to reach many different orderings by choosing an
appropriated λ, a random ordering will not be reachable.
According to Conjecture 4, for the linear graph Ln with n = 2k or n = 2k − 1, the
first change in the ordering of vertices by importance occurs at c1,2, while the last change
occurs at ck−1,k. The interval of stability (0, c1,2) is dominated by the direct influences,
while the interval of stability (ck−1,k, ∞) is dominated by long indirect influences, yielding
the reverse ordering. All reordering happens in the interval [c1,2, ck−1,k].
Finally, we consider the ranking of the vertices of Ln by influence, and in this case we
find full stability.
Proposition 9. For any λ > 0, the ordering by indirect influences on the vertices of the
linear graph Ln is given by 1 > 2 > · · · > n.
Proof. It follows since Fn = 0 and for 1 ≤ i < n we have that:
Fi(λ) = λ +
λ2
2
+ · · · +
λi−1
(i − 1)!
+
λi
i!
+ · · · +
λn−i
(n − i)!
.
Note however that while the ordering is completely stable, all influences approach 0
as λ goes to infinity.
4 Stability on Circuits
In the previous section we saw that linear chains of direct influences tend to have a desta-
bilizing effect on the applications of the PWP method with respect to changes in λ, to
the point of allowing complete reversal in ordering for small and large values of λ. In this
section we are going to see that, in contrast, the presence of circuits have a stabilizing
effect with respect to changes in λ.
16
Consider the circuit on the Zn group of integers module n given by
0 −→ 1 −→ · · · −→ n − 1 −→ 0.
For i, j, ∈ Zn and k ∈ [n], the matrices of direct and indirect influences are given by
Dij =
1
0
if i = j + 1,
otherwise,
and
eλ
+Tj+k,j =
∞
Xl=0
λk+ln
(k + ln)!
.
Note that Tj+k,j(λ) does not depend on j, thus we can use the simpler notation Tk(λ).
Next result shows the full stability of the PWP for circuits: stability in the rankings by
importance, in influence, and even in the relative strength of indirect influences for small
values of λ.
Theorem 10. For i, j ∈ Zn we have that:
1. All vertices in Zn have equal importance, that is Ii(λ) = Ij(λ).
2. All vertices in Zn have equal influences, that is Fi(λ) = Fj(λ).
3. For λ ∈ (0, 2) indirect influences are ordered as follows:
T1(λ) > · · · > Tn(λ).
Proof. Properties 1 and 2 follow from the identities
Fj(λ) = T1(λ) + · · · + Tn(λ)
and
Ij(λ) = 2Fj(λ).
Property 3 is shown as follows. Recall that for k ∈ [n − 1] we have
Tk(λ) =
∞
Xl=0
λk+ln
(k + ln)!
,
thus the inequality Tk(λ) > Tk+1(λ) holds for each summand in the respective series
expansions if and only if
λk+ln
λk+1+ln
or equivalently
(k + ln)!
>
(k + 1 + ln)!
,
Thus for λ < 2, we have that
λ < k + 1 + ln.
λ < 2 = 1 + 1 ≤ k + 1 ≤ k + 1 + ln,
and we obtain the desired inequality.
Thus we see that the presence of circuits in a complex network have a stabilizing
effect in the applications of the PWP method with respect to changes in λ.
17
5 Stability on R-Diagonalizable Networks
Assume that our matrix of direct influences D is diagonalizable in R, i.e. there is an
invertible matrix A ∈ Mn(R) such that D = AEA−1 where E is a diagonal matrix whose
entries Eii give the eigenvalues of D. This condition holds, for example, if the eigen-
values of A are all real and distinct, a generic condition among matrices with only real
eigenvalues.
The PWP map is equivariant with respect to conjugation, thus we have that
T(D, λ) = AT(E, λ)A−1.
The matrix T(E, λ) is rather simple to compute, indeed it is a diagonal matrix with
entries
T(E, λ)ii =
eEii
+
eλ
+
.
Theorem 11. For a R-diagonalizable network there can be only a finite number of
changes in the ranking of the vertices of the network by importance or by influence.
Proof. We must show that only a finite number of crossing points may occur, both for the
curves of importance and the curves of indirect influences. Since D is a diagonalizable
matrix in R it has n real eigenvalues (counted with multiplicity). Assume it has m dif-
ferent eigenvalues which we write in increasing order d1 < . . . < dm. The key observation
is that the entries of the matrix
are all of the form
eλ
+T(D, λ) = eλ
+AT(E, λ)A−1
a1ed1λ
+ + · · · + amedmλ
+ ,
and the functions of influence
and therefore the functions of importance
eλ
+Fj(λ) are also of the same form. Therefore, finding the crossing points for the curves
of importance or influence boils down to finding solutions to equations of the form
eλ
+Ij(λ),
a1ed1λ
+ + · · · + amedmλ
+ = 0.
Some of the resulting equations may be trivial, i.e. all the coefficients ai may be zero,
meaning that some of the importance or influences functions are identically equal, which
actually reduces the scope of possibilities for crossing points. We are going to show that
as soon as one of these equations is non-trivial there can only be a finite number of
+ = ex − 1, the equation above is equivalent to a equation of the form
solutions. Since ex
a1ed1λ + · · · + amedmλ = a
(E)
18
with a = a1 + . . . + am. Without lost of generality we assume that am 6= 0. If it is the
only non-vanishing coefficient, then (E) reduces to amedmλ = am which is either trivial if
dm = 0, or has no solution at all.
If another coefficient besides am is non-zero, we may assume without lost of generality
that a1 6= 0. We show that if (E) has infinitely many solutions they must be contained in
a bounded interval around 0. Assume that dm > 0, otherwise all the eigenvalues di must
be negative, and then as t → 0 we have that
a1ed1λ + · · · + amedmλ → 0,
and therefore (E) has no solutions for large λ if a 6= 0. If a = 0, then (E) is equivalent to
a2e(d2 −d1)λ + · · · + ame(dm−d1)λ = −a1,
and we are back in the case where the last coefficient dm − d1 is positive.
Dividing (E) by edmλ and letting λ go to infinity we find that am = 0, a contra-
diction, and thus no large λ can be a solution of (E). So, if (E) have infinitely many
solutions they must be contained in an interval around 0, and these solutions must have
an accumulation point. Let us show that this point of accumulation can not be 0. We
argue by contradiction. Assume that (E) has infinitely many solutions tl with tl → 0 as
l → ∞. Then the derivative of the left-hand side of (E) will have infinitely many zeroes
accumulating at 0, and thus the second derivative will also have infinitely many zeroes
accumulating at 0, and so on ... Therefore the coefficients a1, . . . , am must be such that
the identities
1 + · · · + amdk
hold for k ∈ N>0. Dividing the equation above by dk
that am = 0, a contradiction.
a1dk
m = 0,
m and letting k go to infinity we find
Finally, assume that our infinitely many solutions tl of (E) have an accumulation
point c 6= 0. Set tl = c + sl, then the points sl give infinitely many solutions to the
equation
(a1ed1c)ed1λ + · · · + (amedmc)edmλ = a
accumulating at 0. Therefore we must have that
a1ed1c = · · · = amedmc = 0,
and so a1 = · · · = am = 0.
19
Remark 12. If we allow complex eigenvalues, then besides exponential functions, trigono-
metric functions may appear in the calculation of the matrix of indirect influences.
Trigonometric functions can have infinitely many crossing points.
Thus for a diagonalizable network only a finite number of changes in ordering either
by importance or influence can occur, and thus for such networks there exists λd ∈ (0, ∞)
where the first change in order occurs, and a λi ∈ (0, ∞) where the last change in order
occurs. Thus the PWP method for λ in the interval (0, λd) is dominated by the direct
influences, and the PWP method for λ in the interval (λi, ∞) is dominated by the indirect
influences. All reordering happens in the interval [λd, λi].
6 Conclusion
In this work we have considered the stability of the PWP method for ranking vertices in
a complex network by importance and indirect influences. We have found that the PWP
method is quite sensitive with respect to data, a fact that we regard as being positive.
Stability with respect to the parameter λ seems to involve, at least, two opposite forces.
On the one hand, long directed path increases instability, to the extreme of allowing full
order reversal, and other hand the presence of circuits tends to stabilize the applications
of the method, again to the extreme of allowing full uniformization both in importance
and influence. Must networks, of course, include both directed paths and circuits, and the
stability of the PWP method with respect to changes in λ will involve a subtle balance
between these opposite forces. We have shown that for a network diagonalizable in R only
a finite number of changes in ranking may occur, both in importance and in influence. In
contrast, the presence of complex eigenvalues opens the door for infinitely many changes
in order. The next challenge, left for future research, is to study the stability of the PWP
method for randomly generated networks.
Acknowledgements
We thank Jorge Catumba for many helpful comments and suggestions. Numerical com-
putations in this work were done using the Scilab module "Indirect Influences for Graphs"
developed by Jorge Catumba [3].
References
[1] S. Brin, L. Page, R. Motwani, T. Winograd, The Anatomy of a Large-Scale Hyper-
textual Web Search Engine, Comp. Netw. ISDN Sys. 30 (1998) 107-117.
20
[2] S. Brin, L. Page, R. Motwani, T. Winograd, The PageRank citation ranking: Bring-
ing order to the Web, Technical Report, Stanford Digital Library Technologies
Project (1998).
[3] J. Catumba, Indirect Influences for Graphs, http:atoms.scilab.org/toolboxes/indinf.
[4] F. Chung, The heat kernel as the pagerank of a graph, Proc. Natl. Acad. Sci. U.S.A.
104 (2007) 19735-19740.
[5] R. D´ıaz, Indirect Influences, Adv. Stud. Contemp. Math. 23 (2013) 29-41.
[6] R. D´ıaz, L. G´omez, Indirect Influences in International Trade, Netw. Heterog. Media
10 (2015) 149-165.
[7] E. Estrada, N. Hatano, Communicability in complex networks, Phys. Rev. E 77
(2008) 036111.
[8] M. Godet, De l'Anticipation `a l'Action, Dunod, Par´ıs 1992.
[9] L. Katz, A new status index derived from sociometric analysis, Psychmetrika 18
(1953) 39-43.
[10] A. Langville, C. Meyer, Deeper Inside PageRank, Internet Math. 1 (2004) 335-400.
[email protected],
Departamento de Matem´aticas,
Universidad Javeriana, Bogot´a, Colombia
[email protected]
Escuela de Ciencias Exactas e Ingener´ıas,
Universidad Sergio Arboleda, Bogot´a, Colombia
21
|
1506.02449 | 2 | 1506 | 2015-06-09T13:45:27 | Empirical comparison of network sampling techniques | [
"cs.SI",
"physics.soc-ph"
] | In the past few years, the storage and analysis of large-scale and fast evolving networks present a great challenge. Therefore, a number of different techniques have been proposed for sampling large networks. In general, network exploration techniques approximate the original networks more accurately than random node and link selection. Yet, link selection with additional subgraph induction step outperforms most other techniques. In this paper, we apply subgraph induction also to random walk and forest-fire sampling. We analyze different real-world networks and the changes of their properties introduced by sampling. We compare several sampling techniques based on the match between the original networks and their sampled variants. The results reveal that the techniques with subgraph induction underestimate the degree and clustering distribution, while overestimate average degree and density of the original networks. Techniques without subgraph induction step exhibit exactly the opposite behavior. Hence, the performance of the sampling techniques from random selection category compared to network exploration sampling does not differ significantly, while clear differences exist between the techniques with subgraph induction step and the ones without it. | cs.SI | cs |
Empirical comparison of network sampling techniques
Neli Blagus, Lovro Subelj, Marko Bajec
University of Ljubljana, Faculty of Computer and Information Science, Ljubljana, Slovenia
Abstract
In the past few years, the storage and analysis of large-scale and fast evolving networks
present a great challenge. Therefore, a number of different techniques have been proposed
for sampling large networks.
In general, network exploration techniques approximate
the original networks more accurately than random node and link selection. Yet, link
selection with additional subgraph induction step outperforms most other techniques. In
this paper, we apply subgraph induction also to random walk and forest-fire sampling.
We analyze different real-world networks and the changes of their properties introduced
by sampling. We compare several sampling techniques based on the match between the
original networks and their sampled variants. The results reveal that the techniques
with subgraph induction underestimate the degree and clustering distribution, while
overestimate average degree and density of the original networks. Techniques without
subgraph induction step exhibit exactly the opposite behavior. Hence, the performance of
the sampling techniques from random selection category compared to network exploration
sampling does not differ significantly, while clear differences exist between the techniques
with subgraph induction step and the ones without it.
Keywords:
subgraph induction, sampling accuracy
complex networks, network sampling, comparison of sampling techniques,
1. Introduction
Real-world networks are often very large and fast evolving. Therefore, not only
their storage poses a problem, but their analysis and understanding present a great
challenge. In the past few years, a number of different techniques have been proposed for
sampling large networks to allow for their faster and more efficient analysis. However,
some information about the network is lost through sampling, thus it is of key importance
to understand the changes in the network structure introduced by sampling.
Several studies on network sampling analyze the match between the original net-
works and their sampled variants [1, 2, 3], while only few of them focus on comparing
the performance of different sampling techniques [4, 5, 6]. In general, network exploration
techniques like random walk and forest-fire sampling approximate the original networks
Email addresses: [email protected] (Neli Blagus), [email protected] (Lovro
Subelj), [email protected] (Marko Bajec)
Preprint submitted to Journal of Physics A: Mathematical and Theoretical
October 24, 2018
more accurately than random node and link selection [4]. However, Ahmed et al. [7] pro-
posed link selection with additional subgraph induction step, where the sampled network
consists of randomly selected links (i.e. random link selection) and any additional links
between their endpoints (i.e. subgraph induction). In this way, not only the performance
of random link selection is improved, the proposed technique also outperforms several
other sampling techniques.
In this paper, we apply subgraph induction also to random walk and forest-fire sam-
pling. We consider ten real-world networks and analyze the changes of their properties
introduced by sampling. We compare eight sampling techniques based on the match
between the original and sampled networks. The results reveal that techniques with sub-
graph induction step tend to underestimate the degree and clustering distribution, while
other techniques tend to overestimate both properties. Moreover, the techniques with
subgraph induction overestimate the average degree and density of the original networks,
in contrast, techniques without subgraph induction underestimate them. It appears that
the performance of the sampling techniques from random selection category compared
to network exploration sampling does not differ significantly, while clear differences exist
between the techniques with subgraph induction step and the ones without subgraph
induction.
The rest of the paper is structured as follows.
In Section 2, we first present the
background on network sampling and expose the sampling techniques used in the study.
The results of the empirical analysis are reported and formally discussed in Section 3,
while Section 4 concludes the paper and suggests directions for further research.
2. Network sampling
Let the network be represented by a simple undirected graph G = (V, E), where V
denotes the set of nodes (n = V ) and E is the set of links (m = E). The goal of
network sampling is to create a sampled network G(cid:48) = (V (cid:48), E(cid:48)), where V (cid:48) ⊂ V , E(cid:48) ⊂ E
and n(cid:48) = V (cid:48) << n, m(cid:48) = E(cid:48) << m. The sample G(cid:48) is obtained in two steps. In the
first step, nodes or links are sampled using a particular strategy like random selection
and network exploration sampling.
In the second step, the sampled nodes and links
are retrieved from the original network. The sampled network is called a subgraph of
the original network, if it consists of sampled nodes or sampled links only. Otherwise,
if sampled nodes and all their mutual links are included in the sample or the sample
consists of sampled links and any additional links among their endpoints, the sampled
network is called an induced subgraph of the original network (i.e., subgraph induction).
However, the previous studies have shown that the size n(cid:48) of the sample affects the
performance of network sampling. Expectedly, larger samples approximate the original
networks more accurately [6]. Still, the sample size of 10 − 30% of the original network
achieves the balance between small sample and accurate approximation [4, 8, 6].
The changes of network properties introduced by sampling depend also on the adopted
sampling technique, since different techniques are suitable for matching different sets of
network properties. Thus, sampling techniques can be roughly divided into two cat-
egories: random selection and network exploration techniques.
In the first category,
nodes or links are included in the sample uniformly at random or proportional to some
particular characteristic like degree. In the second category, the sample is constructed
2
(a) RNS
(b) RND
(c) RLS
(d) RLI
Figure 1: Random selection techniques applied to a small toy network. Highlighted nodes and links
represent the samples obtained by different techniques. (a) In random node selection, the sample consists
of nodes selected uniformly at random and all their mutual links. (b) In random node selection by degree,
the nodes are selected to the sample with probability proportional to their degree, while all their mutual
links are included in the sample. (c) In random link selection, links are selected to the sample uniformly
at random.
(d) In random link selection with subgraph induction, the sample consists of randomly
selected links (solid lines) and also any additional links between their endpoints (dashed lines).
by retrieving a neighborhood of a randomly selected seed node using different strategies
like breadth-first search, random walk and forest-fire.
2.1. Random selection
For the purpose of this study, we consider four techniques from the random selection
category. We first adopt random node selection [4] (RNS), where the sample consists of
nodes selected uniformly at random and all their mutual links (Fig. 1(a)). RNS accu-
rately approximates the degree mixing [5] and preserves the relationship of transitivity
and density between the original and sampled networks [6]. Moreover, it shows better
performance on larger samples than on smaller [6]. Yet, RNS overestimates the degree
and betweenness centrality exponent and fails to match the clustering coefficient [5],
degree distribution [9] and the average path length [10] of the original network.
Furthermore, we adopt random node selection by degree [4] (RND), which improves
the performance of RNS. Here, the nodes are selected randomly with probability propor-
tional to their degrees and all their mutual links are included in the sample (Fig. 1(b)).
RND matches in-degree and out-degree distributions and also spectral properties of the
original network better than RNS [4]. Besides, it constructs samples with larger weakly
connected component [6]. Nevertheless, despite a fully connected original network, both
RNS and RND can construct a disconnected sampled network.
Next, we adopt random link selection [4] (RLS), where the sample consists of links
selected uniformly at random (Fig. 1(c)). RLS matches well degree mixing [5] and the
distribution of sizes of weakly connected components [4]. It constructs sparse samples
and accurately approximates the average path length of the original network [11]. Yet,
RLS fails to match most of other network properties [4]. Like RNS, RLS overestimates
the degree and betweenness centrality exponent and underestimates the clustering coef-
ficient [5].
We last adopt random link selection with subgraph induction [7] (RLI), which im-
proves the performance of RLS. Here, the sample consists of links selected uniformly at
random and any additional links between their endpoints (Fig. 1(d)). RLI outperforms
several other techniques in matching the degree, path length and clustering coefficient
distribution of the original networks [7]. It selects nodes with higher degree more likely
3
(a) RWS
(b) RWI
(c) FFS
(d) FFI
Figure 2: Network exploration techniques applied to a small toy network. Highlighted nodes and links
represent the samples obtained by different techniques. (a) In random walk sampling, the sample consists
of links, retrieved from a simulation of a random walker on the network starting at a randomly selected
seed node. (b) In random walk sampling with subgraph induction, the sample consists of links selected
with random walk sampling (solid lines) and also any additional links between their endpoints (dashed
lines). (c) In forest-fire sampling, the broad neighborhood of a randomly selected seed node is retrieved
using partial breadth-first search, where only a fraction of links is included in the sample on each step.
(d) In forest-fire sampling with subgraph induction, the sample consists of links selected with forest-fire
sampling (solid lines) and also any additional links between their endpoints (dashed lines).
than other random selection techniques, which increases the connectivity of the sample.
Moreover, RLI is suitable for sampling large networks that can not fit into the main mem-
ory and can also be implemented as a technique for sampling streaming networks [11].
2.2. Network exploration
We consider four sampling techniques from the network exploration category (note
that in the literature, this category of sampling techniques is also called topology based
sampling [7], traversal based sampling [12] or link-trace sampling [13]). First, we adopt
random walk sampling [4] (RWS), where the random walk is simulated on the network,
starting at a randomly selected seed node (Fig. 2(a)). The sample consists of links, which
are visited by a random walker and represents a connected subgraph of the original net-
work. RWS outperforms random selection techniques in matching the transitivity [13],
clustering coefficient distribution and spectral properties and also shows good perfor-
mance on smaller samples [4]. Yet, RWS is biased towards selecting nodes with high
degree [14] and fails to match the degree distribution [15].
Next, we adopt forest-fire sampling [4] (FFS). Here, a broad neighborhood of a ran-
domly selected seed node is retrieved from partial breadth-first search (Fig. 2(c)). The
number of links sampled on each step is selected from a geometric distribution with mean
p/(1− p), where p is set to 0.7 [4]. Thus, on average 2.33 links are included in the sample
on each step. FFS matches well spectral properties [4] and together with RWS shows
the best overall performance among several techniques [4]. However, FFS fails to match
the path length and clustering coefficient of the original networks [11].
Moreover, we apply subgraph induction step to random walk and forest-fire sampling,
which we term random walk sampling with subgraph induction (RWI) and forest-fire
sampling with subgraph induction (FFI). Here, the sample consists of links, sampled
with random walk (Fig. 2(b)) or forest-fire sampling (Fig. 2(d)), while any additional
links among the endpoints of sampled links are also included in the sample. To the
best of our knowledge, RWI has not been analysed in any of the previous studies. On
the other hand, FFI shows worse performance than RLI in matching the path length,
4
degree and clustering distributions [11]. Still, the performance of FFI has not yet been
compared to a larger set of sampling techniques.
3. Analysis and discussion
In the following sections, we present the adopted framework for comparison of sam-
pling techniques (Section 3.1), report the results of the empirical analysis and formally
discuss the findings (Section 3.2).
3.1. Statistical comparison
Sampling techniques are compared through four network properties (see Section 3.2)
on ten real-world networks (see Table 1). For each property, we compute externally stu-
dentized residuals of the properties of sampled networks that measure the consistency of
each sampling technique with the rest. We expose statistically significant inconsistencies
between the techniques with two-tailed Student t−test [16] and calculate the residuals
as introduced below (see also [17]).
Let xij denote some property value of j−th network for i−th sampling technique.
Externally studentized residual xij is calculated as
xij − µij
1 − 1
σij
(cid:113)
xij =
N
,
(1)
where N is the number of sampling techniques (N = 8 in our case), µij is the mean
value and σij is the standard deviation of the considered property. The mean value and
standard deviation are computed for all sampling techniques, excluding the observed one
.
(2)
(3)
(cid:88)
(cid:88)
k(cid:54)=i
xkj
,
(N − 1)
k(cid:54)=i
(xkj − µij)2
(N − 2)
µij =
σ2
ij =
Assuming that the errors in x are independent and normally distributed, the resid-
uals x have Student t−distribution with N − 2 degrees of freedom. Statistically signifi-
cant inconsistencies between the sampling techniques are revealed by two-tailed Student
t−test [16] at P−value of 0.05, rejecting the null hypothesis that the values of the con-
sidered property are consistent across the sampling techniques.
3.2. Empirical analysis
The empirical analysis is performed on ten social and information networks. Their
main characteristics are presented in Table 1. Due to a large number of networks con-
sidered, the detailed description is omitted. Networks are considered to be undirected,
although some of them are directed. For each network, we perform 100 realizations of
each sampling technique, where we consider sample sizes of 15% of the original networks
as suggested in [4, 6]. For each run of the network exploration techniques, the sample
was constructed from a new randomly selected seed node.
5
Table 1: Real-world networks considered in the study.
Network
Description
Nodes
Links
Average
degree
Clustering
coefficient
ca-hep
ca-astro
cit-hep
brightkite
slashdot
flickr
ca-dblp
nd.edu
youtube
road-tx
High E. Phys. collaboration [19]
Astro Phys. collaboration [19]
High E. Phys. citation [20]
Brightkite friendship [21]
Slashdot friendship [22]
Flickr images metadata [23]
DBLP collaboration [24]
Web graph of nd.edu [25]
Youtube friendship [26]
Texas road network [22]
12,008
18,772
27,240
58,228
82,168
105,938
317,080
325,729
1,134,890
1,379,917
237,010
396,160
342,437
214,078
948,464
2,316,948
1,049,866
1,497,134
2,987,624
1,921,660
39.5
42.2
25.1
7.4
23.1
43.7
6.6
9.1
5.2
5.5
0.660
0.318
0.120
0.111
0.024
0.402
0.306
0.097
0.006
0.060
Density
3.3 × 10−3
2.2 × 10−3
9.2 × 10−4
1.3 × 10−4
2.8 × 10−4
4.1 × 10−4
2.1 × 10−5
2.8 × 10−5
4.5 × 10−6
3.9 × 10−6
We analyze different properties of the original and sampled networks, including degree
distribution (probability distribution of degrees of all nodes), distribution of clustering
coefficient (probability distribution of the proportions of connected neighbors of each
node [18]), average degree (average number of neighbors of nodes over the whole network),
and density (the ratio of existing links to all possible links). We compare sampling
techniques based on the match between the original and sampled networks; Section 3.2.1
reports the results for degree and clustering distributions, while in Section 3.2.2 we
analyze the average degree and density.
3.2.1. Degree and clustering coefficient distributions
We first analyze the performance of sampling techniques based on the match of the
degree and clustering coefficient distributions between the original and sampled networks.
To compare the distributions of properties, we use Kolmogorov-Smirnov D−statistics,
which is commonly used in similar studies [4, 11, 6]. Kolmogorov-Smirnov test checks the
null hypothesis that the distributions of property of the original network and its sampled
variant are the same, while the D−statistics measures the distance between the observed
distributions. Based on the values of Kolmogorov-Smirnov D−statistics, we compare the
adopted sampling techniques (see Section 3.1).
The comparison of sampling techniques based on the degree distribution is shown
in Fig. 3. We observe that in most cases, the difference between the techniques with
subgraph induction step (i.e., RNS, RND, RLI, RWI, FFI) and those without subgraph
induction (i.e., RLS, RWS, FFS) is clear. The first group of techniques approximates the
degree distribution of the original networks more accurately. In addition, the techniques
with subgraph induction step improve the performance of the corresponding techniques
without subgraph induction in the case of RLS and FFS. Since the subgraph induction
increases the degrees of the nodes in the sample [7], this clearly contributes to better
match the degree distribution between the original and sampled networks.
RNS and RND show comparable accuracy to network exploration techniques with
subgraph induction, even though they construct disconnected samples. The latter in-
dicates that the connectivity of the sample does not affect the match of the degree
distribution. On the other hand, among the techniques without subgraph induction,
RWS shows the best performance, which could be explained by its bias towards selecting
high degree nodes and exploring densely connected parts of the network [4]. In contrast,
the samples constructed by FFS are sparse, a large fraction of the nodes in the samples
6
has low degree, while the number of nodes with higher degree is underestimated [7].
Accordingly, FFS is the least accurate among all techniques.
Moreover, we compare the sampling techniques based on the clustering coefficient
distribution. The results are presented in Fig. 4. The techniques show more comparable
accuracy than in the case of the degree distribution.
In general, the techniques with
subgraph induction underestimates the clustering distribution, while others overestimate
it. FFS and RWS prove as the best performing techniques. This indicates that in the case
of matching the clustering distribution of the original networks, including all the links
among sampled nodes is not the best choice. However, RNS shows the worst performance,
which could be explained by its tendency to construct samples with a large number of
low clustered nodes [7].
In summary, the sampling techniques with subgraph induction step underestimate
the degree and clustering coefficient distributions of the original networks. On the other
hand, the techniques without subgraph induction, overestimates both properties. The
best overall performance is provided by RWI, which shows the most stable accuracy for
matching both distributions on all considered networks. However, it appears that the
properties of the original networks have relevant effect on the accuracy of the sampling
techniques. For example, the techniques with subgraph induction match the degree
distribution of the networks with larger average degree more accurately than when the
average degree is lower and the techniques without subgraph induction also perform well.
We aim to study that kind of relations in future work, since they should be observed in
an even larger set of real-world networks to obtain statistically significant results.
3.2.2. Average degree and density
In the second part of the analysis, we study the performance of sampling techniques
based on the match of the average degree and density between the original and sampled
networks. We compare the properties between networks based on the actual values of
properties. Furthermore, we modify Eq. (1) and (3) and use the true value of considered
property of the original networks instead of the mean values µij (see Section 3.1) to
compare the sampling techniques.
Fig. 5 shows the comparison of sampling techniques based on the average degree. We
observe that the techniques with subgraph induction tend to overestimate the average
degree, while others underestimate it. Among the techniques with induction step, only
RNS underestimate the average degree. The samples constructed with RNS consist of a
large fraction of low-degree nodes [7] and have a low average degree particularly in the
smaller samples [5]. Therefore, RNS underestimates the average degree of the networks,
especially compared to the techniques, which are biased in selecting nodes with higher
degree (i.e., RND).
Lastly, we analyze the density of the networks. Fig. 6 shows the comparison of the
sampling techniques based on the density. In general, all techniques overestimate the
density, yet the techniques without subgraph induction step approximate the density
more accurately than the techniques with subgraph induction. Additionally, techniques
without subgraph induction improve the performance of the corresponding techniques
with subgraph induction. In the previous study [27], we proved the power-law relation-
ship between the size and density of real-world networks and their sampled variants.
The results show that the network density decreases with its size. However, the tech-
niques with subgraph induction do follow the latter relationship, while the techniques
7
without induction construct sparser samples than expected. Therefore, the accuracy of
the sampling techniques based on the density is relative and depends on whether the
samples should accurately match the density of the original networks or the relationship
between the size and density of the original networks and their sampled variants should
be preserved.
In addition to all above, we analyze the performance of the techniques with partial
subgraph induction, where we include a different portion of mutual links between the
sampled nodes in the sample (i.e., we randomly select 10% − 90% links from all possible
links). The results are not described, since the techniques with partial subgraph induction
did not improve the performance of the techniques with subgraph induction and they
did not perform worse than techniques without subgraph induction.
In summary, the sampling techniques with subgraph induction step tend to overes-
timate the average degree and the density of the original networks.
In contrast, the
techniques without subgraph induction underestimate the average degree and approxi-
mate the density of the original networks more accurately than other techniques. Yet,
the accuracy of sampling techniques does not depend only on the characteristics of the
adopted technique, but also on the characteristics of the original networks. However,
from exploration sampling techniques, the best performance is provided by RWI, while
the best overall performance is provided by RNS, which shows very stable accuracy in
matching considered properties.
4. Conclusion
In this paper, we analyze different real-world networks and study the changes of their
properties introduced by network sampling. We consider eight sampling techniques with
and without subgraph induction step and compare them based on the match of properties
between the original networks and their sampled variants.
The results reveal that the techniques with subgraph induction underestimate the de-
gree and clustering distribution, while they overestimate the average degree and density
of the original networks. On the other hand, the techniques without subgraph induc-
tion step exhibit opposite behavior, since they overestimate the degree and clustering
distribution and underestimate the average degree and density. The techniques without
subgraph induction approximate the density most accurately. However, from the ran-
dom selection category, random node selection shows the best overall performance, while
from the network exploration category, the most stable accuracy is provided by random
walk sampling with subgraph induction. Still, it appears that the performance of the
sampling techniques from random selection category compared to network exploration
sampling does not differ significantly, while clear differences exist between the techniques
with subgraph induction step and the ones without subgraph induction. Following this,
a suitable classification of network sampling techniques would be a class of techniques
with subgraph induction and a class without it.
Some of the results suggest that the characteristics of the original networks affect the
accuracy of the network sampling. Thus, our future work will mainly focus on analyzing
relations between network properties and accuracy of the sampling techniques on a larger
set of real-world networks. Besides, a prominent direction for further study is the analysis
of the time and space efficiency of sampling techniques, since, for example, fitting even
8
a sampled network in the main memory becomes challenging with significant growth of
real-world networks in the past few years.
Acknowledgment
This work has been supported in part by the Slovenian Research Agency ARRS within
the Research Program No. P2-0359, by the Slovenian Ministry of Education, Science and
Sport Grant No. 430-168/2013/91, and by the European Union, European Social Fund.
References
References
[1] C. Hubler, H. P. Kriegel, K. Borgwardt, Z. Ghahramani, Metropolis algorithms for representative
subgraph sampling, in: Proceedings of the 8th International Conference on Data Mining, IEEE,
2008, pp. 283 -- 292.
[2] H. Sethu, X. Chu, A new algorithm for extracting a small representative subgraph from a very large
graph, e-print arXiv:1207.4825.
[3] N. Blagus, L. Subelj, G. Weiss, M. Bajec, Sampling promotes community structure in social and
information networks, Physica A 432 (2015) 206 -- 215.
[4] J. Leskovec, C. Faloutsos, Sampling from large graphs, in: Proceedings of the 12th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, ACM, 2006, pp. 631 -- 636.
[5] S. H. Lee, P. J. Kim, H. Jeong, Statistical properties of sampled networks, Phys. Rev. E 73 (1)
(2006) 016102.
[6] N. Blagus, L. Subelj, M. Bajec, Assessing the effectiveness of real-world network simplification,
Physica A 413 (2014) 134 -- 146.
[7] N. Ahmed, J. Neville, R. R. Kompella, Network sampling via edge-based node selection with graph
induction, Tech. rep., Purdue University (2011).
[8] C. Doerr, N. Blenn, Metric convergence in social network sampling, in: Proceedings of the 5th ACM
workshop on HotPlanet, ACM, 2013, pp. 45 -- 50.
[9] M. P. H. Stumpf, C. Wiuf, R. M. May, Subnets of scale-free networks are not scale-free: sampling
properties of networks, P. Natl. Acad. Sci. USA 102 (12) (2005) 4221 -- 4224.
[10] N. K. Ahmed, J. Neville, R. Kompella, Reconsidering the foundations of network sampling, in:
Proceedings of the 2nd Workshop on Information in Networks, 2010.
[11] N. K. Ahmed, J. Neville, R. Kompella, Network sampling: from static to streaming graphs, e-print
arXiv:11211.3412.
[12] P. Hu, W. C. Lau, A survey and taxonomy of graph sampling, e-print arXiv:1308.5865.
[13] A. S. Maiya, T. Y. Berger-Wolf, Benefits of bias: towards better characterization of network sam-
pling, in: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining, ACM, 2011, pp. 105 -- 113.
[14] L. Lov´asz, Random walks on graphs: A survey, Combinatorics: Paul Erdos is eighty 2 (1) (1993)
1 -- 46.
[15] M. Kurant, A. Markopoulou, P. Thiran, On the bias of BFS, in: Proceedings of the 22nd Interna-
tional Teletraffic Congress, IEEE, 2010, pp. 1 -- 8.
[16] R. D. Cook, S. Weisberg, Residuals and influence in regression, New York: Chapman and Hall,
1982.
[17] L. Subelj, D. Fiala, M. Bajec, Network-based statistical comparison of citation topology of biblio-
graphic databases, Sci. Rep. 4 (2014) 6496.
[18] D. J. Watts, S. H. Strogatz, Collective dynamics of "small-world" networks, Nature 393 (6684)
(1998) 440 -- 442.
[19] J. Leskovec, J. Kleinberg, C. Faloutsos, Graph evolution: Densification and shrinking diameters,
ACM Trans. Knowl. Discov. Data 1 (1) (2007) 1 -- 40.
[20] KDD Cup '03, http://www.cs.cornell.edu/projects/kddcup/ (2013).
[21] E. Cho, S. A. Myers, J. Leskovec, Friendship and mobility: user movement in location-based social
networks, in: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining, ACM, 2011, pp. 1082 -- 1090.
9
[22] J. Leskovec, K. J. Lang, A. Dasgupta, M. W. Mahoney, Community structure in large networks:
Natural cluster sizes and the absence of large well-defined clusters, Internet Math. 6 (1) (2009)
29 -- 123.
[23] J. McAuley, J. Leskovec, Learning to discover social circles in ego networks, in: Advances in Neural
Information Processing Systems 25, 2012, pp. 548 -- 556.
[24] J. Yang, J. Leskovec, Community-affiliation graph model for overlapping network community de-
tection, in: Proceedings of the 12th International Conference on Data Mining, IEEE, 2012, pp.
1170 -- 1175.
[25] R. Albert, H. Jeong, A.-L. Barab´asi, Internet: Diameter of the world-wide web, Nature 401 (6749)
(1999) 130 -- 131.
[26] J. Yang, J. Leskovec, Defining and evaluating network communities based on ground-truth, Knowl-
edge and Information Systems 42 (1) (2015) 181 -- 213.
[27] N. Blagus, L. Subelj, M. Bajec, Self-similar scaling of density in complex real-world networks,
Physica A 391 (8) (2012) 2794 -- 2802.
10
(a) Degree distribution
(b) Degree distribution
Figure 3: Statistical comparison of the degree distribution of the original networks and their sam-
pled variants obtained by different sampling techniques. We show externally studentized residuals that
measure the consistency of each sampling technique with the rest and expose statistically significant in-
consistencies between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded
region corresponds to 95% confidence intervals). Merely for complete understanding, we present average
externally studentized residuals over all networks (see (b); the star marker indicate the residuals for the
original networks, while error bars display standard deviations). Notice that techniques with subgrah
induction step (full markers) approximate the degree distribution more accurately than the techniques
without subgraph induction (empty markers).
11
(a) Clustering coefficient distribution
(b) Clustering coefficient distribution
Figure 4: Statistical comparison of the clustering coefficient distribution of the original networks and their
sampled variants obtained by different sampling techniques. We show externally studentized residuals
that measure the consistency of each sampling technique with the rest and expose statistically significant
inconsistencies between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded
region corresponds to 95% confidence intervals). Merely for complete understanding, we present average
externally studentized residuals over all networks (see (b); the star marker indicate the residuals for the
original networks, while error bars display standard deviations). Notice that techniques with subgrah
induction step (full markers) improve the performance of the corresponding techniques without subgraph
induction (empty markers).
12
(a) Average degree
(b) Average degree
Figure 5: Statistical comparison of the average degree of the original networks and their sampled variants
obtained by different sampling techniques. We show externally studentized residuals that measure the
consistency of each sampling technique with the rest and expose statistically significant inconsistencies
between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded region corre-
sponds to 95% confidence intervals). Merely for complete understanding, we present average externally
studentized residuals over all networks (see (b); the star marker indicates the residuals for the original
networks, while error bars display standard deviations). Notice that techniques with subgrah induc-
tion step (full markers) tend to overestimate the average degree, while the techniques without subgraph
induction (empty markers) underestimate it.
13
(a) Density
(b) Density
Figure 6: Statistical comparison of the density of the original networks and their sampled variants ob-
tained by different sampling techniques. We show externally studentized residuals that measure the
consistency of each sampling technique with the rest and expose statistically significant inconsistencies
between the techniques with two tailed Student t−test at P−value of 0.05 (see (a); shaded region corre-
sponds to 95% confidence intervals). Merely for complete understanding, we present average externally
studentized residuals over all networks (see (b); the star marker indicates the residuals for the original
networks, while error bars display standard deviations). Notice that the techniques without subgraph
induction step (empty markers) approximate the density more accurately than the corresponding tech-
niques with subgraph induction (full markers).
14
|
1504.06827 | 1 | 1504 | 2015-04-26T14:15:36 | Nowcasting Disaster Damage | [
"cs.SI",
"physics.soc-ph"
] | Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of the United States and find a strong relationship between proximity to Sandy's path and hurricane-related social media activity. We show that real and perceived threats -- together with the physical disaster effects -- are directly observable through the intensity and composition of Twitter's message stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Our findings suggest that massive online social networks can be used for rapid assessment ("nowcasting") of damage caused by a large-scale disaster. | cs.SI | cs | Nowcasting Disaster Damage
Yury Kryvasheyeu a,b, Haohui Chen a,b, Nick Obradovich c,d, Esteban Moro e, Pascal Van Hentenryck a,f, James Fowler c,g,
and Manuel Cebrian a,h,*
a National Information and Communications Technology Australia, Melbourne, Victoria 3003, Australia; b Faculty of Information Technology, Monash University,
Melbourne, Victoria 3145, Australia; c Department of Political Science, University of California at San Diego, La Jolla, California 92093, USA; d Center for Marine
Biodiversity and Conservation, Scripps Institution of Oceanography, La Jolla, California 92093, USA; e Department of Mathematics & GISC, Universidad Carlos III de
Madrid, Madrid, Leganés 28911, Spain; f Research School of Computer Science, Australian National University, Canberra, ACT 0200, Australia; g Division of Medical
Genetics, University of California at San Diego, La Jolla, CA 92093; h Department of Computer Science and Engineering, University of California at San Diego, La
Jolla, California 92093, USA a
*Corresponding author: MC, [email protected]
Could social media data aid in disaster response and damage assess-
ment? Countries face both an increasing frequency and intensity of natu-
ral disasters due to climate change. And during such events, citizens are
turning to social media platforms for disaster-related communication and
information. Social media improves situational awareness, facilitates
dissemination of emergency information, enables early warning systems,
and helps coordinate relief efforts. Additionally, spatiotemporal distribu-
tion of disaster-related messages helps with real-time monitoring and
assessment of the disaster itself. Here we present a multiscale analysis of
Twitter activity before, during, and after Hurricane Sandy. We examine the
online response of 50 metropolitan areas of the United States and find a
strong relationship between proximity to Sandy’s path and hurricane-
related social media activity. We show that real and perceived threats –
together with the physical disaster effects – are directly observable
through the intensity and composition of Twitter’s message stream. We
demonstrate that per-capita Twitter activity strongly correlates with the
per-capita economic damage inflicted by the hurricane. Our findings sug-
gest that massive online social networks can be used for rapid assess-
ment (“nowcasting”) of damage caused by a large-scale disaster.
social media disaster management damage assessment
Introduction
Natural disasters are costly. They’re costly in terms of
property, in terms of political stability, and in terms of
lives lost [1-3]. Unfortunately – due to climate change –
natural disasters like hurricanes, floods, and tornadoes are
also likely to become more common, more intense, and
subsequently more costly in the future [4-7]. Developing
rapid response tools to aid in adapting to these coming
changes is critical [8].
As society faces this need, the use of social media on
platforms like Facebook and Twitter is on the rise. Unlike
traditional media, these platforms enable data collection
on an unprecedented scale, documenting public reaction
to events unfolding in both virtual and physical worlds.
This makes social media platforms attractive large-scale
laboratories for social science research [9-11]. Opportuni-
ties provided by social media are utilized in various do-
mains including the economic [12], political, [13-16] and
social [14, 17-21] sciences, as well as in public health [22,
23].
Because of their potential, the use of massive online
social networks in disaster management has attracted sig-
nificant public and research interest [24-26]. In particular,
the micro-blogging platform Twitter has been especially
useful during emergency events [27-29]. Twitter allows
its users to share short 140-character messages and follow
public messages from any other registered user. Such
openness leads to a network topology characterized by a
high number of accounts an average user follows, placing
Twitter somewhere in-between a purely social and a pure-
ly informational network [30]. The information network
properties of Twitter facilitate and accelerate the global
spread of information; its social network properties ease
access to geographically and personally relevant infor-
mation, and the message length limit encourages informa-
tive exchange. These factors combine to make Twitter
especially well suited for a fast-paced emergency envi-
ronment.
Existing research on Twitter in emergency context
studies its role in gathering and disseminating news [31,
32], the way it contributes to situational awareness [33,
34], practical aspects of classifying disaster messages,
detecting events, and identifying messages from crisis
regions [35-39]. Other research utilizes Twitter’s network
properties to devise sensor techniques for early awareness
[40], to gauge the dynamics of societal response [41], and
to crowdsource relief efforts [42].
More recently researchers have begun using social
media platforms to derive information about disaster
events themselves. For instance, the number of photo-
graphs uploaded to Flickr was shown to correlate strongly
with physical variables that characterize natural disasters
(atmospheric pressure during Hurricane Sandy) [43]. Alt-
hough it is unclear what causes the link – external infor-
mation, network effects, or direct observer effects – the
correlation suggests that digital traces of a disaster can
help measure its strength or impact. Based on a similar
concept, other studies verify the link between the spatio-
temporal distribution of tweets and the physical extent of
floods [44] and the link between the prevalence of disas-
ter-related tweets and a distribution of Hurricane Sandy
damage predicted from modeling [45].
Here, we present a hierarchical multiscale analysis of
disaster-related Twitter activity. We start at the national
level and progressively employ finer spatial resolution of
counties, and zip code tabulation areas. First, we examine
how geographical and socio-cultural differences across
the United States manifest through Twitter activity during
a large-scale natural disaster – Hurricane Sandy. We in-
vestigate the response of cities to the hurricane and identi-
fy general features of disaster-related behavior on the
community level. Second, we study the distribution of
geo-located messages at the state level within the two
most affected states (New Jersey and New York) and –
for the first time – analyze the relationship between Twit-
ter activity and the ex-post assessment of damage inflicted
by the hurricane.
Context of the study, data and methods
Hurricane Sandy was the largest hurricane of the 2012
season and one of the costliest disasters in the history of
the United States. Sandy was a late season hurricane that
formed on 22 October 2012 southwest of Jamaica, peaked
in strength as a Category 3 hurricane over Cuba, passed
the Bahamas, and continued to grow in size while moving
northeast along the United States coast. The hurricane
made its landfall on the continental United States at 12:00
UTC on 29 October 2012 near Brigantine, New Jersey
with winds reaching 70 knots and the storm surge as high
as 3.85 meters. According to the National Hurricane Cen-
ter [46], Sandy caused 147 direct fatalities and is respon-
sible for damage in excess of $50 billion, including 650
thousand destroyed or damaged buildings and over 8.5
million people left without power – some of them for
weeks.
Both broadcast and online media extensively covered
Hurricane Sandy, generating a large dataset of Twitter
messages that became the basis for this study. The raw
data comprises two distinct sets of messages. The first
consists of messages with the hashtag “#sandy” posted
between 15 October and 12 November 2012. This period
precedes the formation of the hurricane and extends be-
yond its dissipation. The data includes the text of the mes-
sages and a range of additional information, such as mes-
sage identifiers, user identifiers, followee counts, re-tweet
statuses, self-reported or automatically detected location,
timestamps, and sentiment scores. The second dataset has
a similar structure and was collected within the same
timeframe; however, instead of a hashtag, it includes all
messages that contain one or more instances of specific
keywords, considered to be relevant to the event and its
consequences (“sandy”, “hurricane”, “storm”, “super-
storm”, “flooding”, “blackout”, “gas”, “power”, “weath-
er”, “climate”, etc. – see supplementary Table S1 for the
full list). We obtained both datasets through the analytics
company Topsy Labs [47], and reconstructed relationship
graphs (list of followees for each user) using Twitter’s
API. Sentiment scores in raw data are measured by a pro-
prietary algorithm from Topsy, which we additionally
verify with free alternatives – Linguistic Inquiry and
Word Count [48] and SentiStrength [49]. In total we have
52.55 million messages from 13.75 million unique users.
Since we are interested in a spatiotemporal analysis of
Twitter activity, we focus exclusively on messages and
users with known location. Only a fraction of the messag-
es (about 1.2% for the hashtag dataset and 1.5% for the
keywords dataset) are geo-tagged by Twitter. To expand
the data, we include messages from users whose profile-
listed address returns a match against the US Census Bu-
reau Topologically Integrated Geographic Encoding and
Referencing (TIGER) database. The resulting subset of
geo-coded messages contains 9.7 million tweets from 2.2
million unique accounts.
We perform the analysis on the national and state lev-
els. On the national level, we use cities as a natural – in
terms of spatial extent and population size – basis for ag-
gregation and comparison. Cities are important due to
their dominant [50, 51] and increasing [52, 53] socio-
economic role in all aspects of human life [54-56], both in
the real world and online. Additionally, similarities or
differences in the way cities react to a major natural disas-
ter like Sandy are of interest to social scientists and cli-
mate adaptation policymakers alike [8, 57]. Our analysis
covers the 50 most populous urban areas according to the
2010 US Census. On the state level we use a progressive-
ly finer granularity of counties, and finally zip code tabu-
lation areas (ZCTA) to analyze the local distributions of
Twitter activity and hurricane damage. On every level, we
aggregate messages that have latitude and longitude fall-
ing within the boundaries of a respective region of interest
(metropolitan area, county or ZCTA). The boundaries and
population estimates of all administrative areas are deter-
mined by the 2010 US Census. Finally, for every city, we
determine the shortest distance to the path of the hurri-
cane [58], as an indication of the proximity to the disaster.
After aggregating the tweets by location, we use
timestamps for temporal analysis. We allocate messages
into non-overlapping bins of either 1- or 24-hour duration.
Comparison metrics include the total number of active
users, number of messages posted, classification of these
messages into original and re-tweeted messages (includ-
ing identification of the source as local or external to a
particular community), and sentiment. Since the number
of tweets originating from different urban or zip code
areas varies greatly, we compare characteristics as nor-
malized by the total count of distinct users for each area,
active at any time between the start and end of the data
collection period.
Results
Dynamics of Twitter activity across regions and hurricane-
related topics
The messages studied here cover a range of keywords,
with varying relevance to Hurricane Sandy. Because of
this, we deal with three dimensions in our analysis – spa-
tial, temporal and topical.
Figure 1 illustrates some of the characteristic features
of Twitter activity. The pattern demonstrated by key-
words strongly related to the hurricane (“sandy”, “storm”,
“hurricane”, “frankenstorm”, etc.) is shown in Figure 1A
– the number of messages slowly increases with a strong
peak on the hurricane’s landfall day, followed by a gradu-
al decline in the tweet activity level. Geographically, the
trend is similar almost everywhere, but the magnitude of
the normalized response changes depending on the prox-
imity to the hurricane.
An alternative way to summarize the activity is shown
in the Figure 1B, where the normalized activity is pre-
sented as a two-dimensional heatmap. We rank cities by
their proximity to the hurricane and words by their mes-
sage count. At the peak of the disaster, event-related key-
words rank higher and activity increases with proximity.
Consequently, we see that the upper left corner of our
city/topic matrix shows a high level of activity. In sum-
mary, as the disaster approaches and peaks in intensity, so
does the normalized local Twitter response. Additionally,
the content of the message stream changes and keywords
most associated with the event dominate the agenda.
Figure 1 Example of spatiotemporal evolution of Twitter activity across keywords. Panel A shows the geographical and topical variation of
normalized activity (the number of daily messages divided by the number of local users active at any stage of the entire observation period).
The horizontal axis is an offset in hours with respect to the landfall time of the hurricane (00:00 UTC on October 30, 2012). Activity on the
hurricane-related words like “sandy” increases and reaches its peak in the day of landfall, and then gradually falls off. Qualitatively similar
trends are observed everywhere, with distance to the path of the hurricane affecting the strength of the response (compare magnitudes of
activity peaks between New York, Chicago and Miami). Different temporal patterns are exhibited by different keywords: “gas”-related discus-
sion peaks with delay corresponding to the post-hurricane fuel shortages, and activity on “storm” has a secondary spike due to November
“Nor’easter” storm. Panel B summarizes activity depending on both variables – topic and location. The color corresponds to the level of nor-
malized activity (blue is low and red is high). In columns, places are ranked according to their proximity to the path of the hurricane (closest
on the left, farthest on the right). In rows, words are ranked according to the total number of messages posted on the topic. Evolution of the
event brings disaster-related words to the top of the agenda, with North East showing highest level of activity.
Figure 2 Characteristic features of Twitter activity across locations (labeled by color according to hurricane proximity – blue is further and red
closer to disaster). In all panels a primary plot shows results for messages with keyword “sandy”, and an inset for keyword “weather”, to con-
trast behavior between event-related and neutral words. A primary feature is the sharp decline of normalized activity as the distance between
a location and the path of the hurricane increases (Panel A). After the distance exceeds 1200-1500 km its effect on the strength of response
disappears. This trend may be caused by a combination of factors, with direct observation of disaster effects and perception of risk both in-
creasing the tweet activity of the East Coast cities. Anxiety, anticipation, and risk perception evidently contribute to the magnitude of re-
sponse, since many of the communities falling into the decreasing trend were not directly hit or were affected only marginally; while New
Orleans for example shows significant tweeting level that reflects its historic experiences with damaging hurricanes, like Katrina. The re-tweet
rate (Panel B) is inversely related to activity, with affected areas producing more original content. Popularity of the content created in the
disaster area is also higher and therefore increases with activity as well (Panel C). None of the features discussed above are present for
neutral words (see the insets in all panels).
When we aggregate our data over the period between
20 October and 12 November 2012, we find that tweet
activity declines with increasing distance from the hurri-
cane path up to 1500 km and is nearly constant for all
places further away. These features are summarized in
Figure 2A and supplementary Figure S1 (for all key-
words). This relationship between proximity and activity
level is a dominant feature, accompanied by two other
relationships. The first one is an inverse relationship be-
tween content creation and consumption. The areas di-
rectly hit by – or close to – the disaster show a lower ratio
of re-tweets (more original content) in the stream of mes-
sages generated, as can be seen in Figure 2B and Figure
S2. The second relationship is between the activity and
global popularity (count of messages that get re-tweeted,
normalized by the local user count) of local content (Fig-
ure 2C and Figure S3), with content from affected areas
attracting attention elsewhere. The activity-popularity
(and to a lesser degree activity-originality) relationship is
very strong for the event-related keywords, but virtually
absent for neutral or more general keywords. We illustrate
this in Figure 2 by the inset plots for keyword “weather” –
a general word that is used frequently and is not neces-
sarily associated with extreme weather events, even when
such events take place.
Direct relationship between online activity and prox-
imity to the hurricane naturally raises the question of fac-
tors that stimulate such an activity. Is it extensive media
coverage, or perception of risk, or witnessing hurricane’s
meteorological effects (winds, precipitation, storm surge)
and damage (power and fuel shortages, flooding, loss of
personal property, casualties)? The latter, especially the
extent to which quantifiable properties of online activity –
recorded during and shortly after disaster – reflect the
severity of disaster-related damage, is especially interest-
ing from the disaster management point of view. Real-
time analysis of online activity as a predictor of damage
would be a valuable tool in optimizing allocation of lim-
ited emergency and recovery resources, and may com-
plement other predictive models used in the joint assess-
ment and recovery of damaged infrastructures [59].
Therefore, we investigate if the damage to property across
the most severely hurricane-affected regions correlates
with the recorded Twitter activity.
Damage
Since the hurricane damage was mostly confined to
several states, we perform damage analysis at finer spatial
granularity by looking at counties and ZCTAs. We exam-
ine both aggregation levels to determine the limits of spa-
tial resolution achievable in such a “nowcasting” tech-
nique.
Two primary sources of data contribute to our esti-
mate of damage. The first is data on FEMA Household
Assistance grants to homeowners and renters [60]. These
grants are provided to relieve the hardship of households
exposed to disaster and to enable bringing the original
property back to a habitable condition. The second source
is data on insurance claims associated with Hurricane
Sandy [61, 62], including National Flood Insurance, resi-
dential, commercial, vehicle and marine insurance claims.
We use these indicators as both are expressed in monetary
terms and are reported by individuals, rather than admin-
istrative entities like municipalities. A more holistic index
of community hardship could be developed, like the one
in [63] taking into account other metrics: the number of
people served at shelters, effects of power loss (using the
number of days schools were closed as a proxy), gas
shortages (through the number of calls to State Emergen-
cy Hotline from gas stations) and FEMA Public Assis-
tance grants to help with municipal infrastructure. Alt-
hough such methodology gives a broader picture of the
hardship on the ground, the metrics involved do not have
a standard way of measurement and do not share a com-
mon unit to be integrated together, which leaves certain
freedom to assign arbitrary weights to each contributing
factor. To avoid this ambiguity, we only include the data
reported by individuals and measured directly as mone-
tary loss.
We analyze the damage estimates, aggregated within
either counties or zip code tabulation areas, against Twit-
ter activity in the same boundaries. The data available on
damage allows us to look at several aspects, including the
total damage claimed, the total damage covered by FEMA
and insurance, the number of applications and successful
applications, and severity categories based on the cost.
We look at the relationship between normalized quantities
– per-capita Twitter message count and per-capita damage
– to avoid correlations artificially induced by population
counts (more populous areas produce higher message
counts and experience higher damage). To estimate
whether activity quantitatively reflects the severity of the
disaster, we test the independence of two distributions:
activity versus damage. We consider activity on the core
set of messages strongly associated with the hurricane
(see supplementary Table S2 for the rankings and Table
S3 for the results across all keywords).
The estimate of damage is a snapshot from November
2014, while activity varies significantly over the data col-
lection period. Both in the interest of capturing predictive
capacity and in a practical attempt to determine the best
analysis window to get the strongest predictive effect, we
calculate the correlations on a daily basis between the
22nd of October and the 12th of November. In addition to
examining the activity-to-damage correlation, we also
check the sentiment-to-damage correlation. Previous stud-
ies [40] suggest that a drop of the average sentiment in an
area may indicate an emergency, and we aim to verify
whether the sentiment also serves as a quantitative predic-
tor of damage.
The correlation coefficient dynamics is presented in
Figure 3. Because we discard inactive areas – ZCTAs
with no messages posted during an analysis period – the
length of vectors subject to an independence test varies
over time, and we choose to ignore correlation coeffi-
cients earlier than October 22 and later than November
11. Within this period, we consistently have more than
200 active ZCTAs, see Figure 3A. Figure 3B shows that
the rank correlation coefficients are moderately positive,
indicating a weak correlation.
The correlation is present for several days before the
landfall, which might reflect a-priori knowledge of local
hurricane vulnerability based on historical experience
within particular areas and obvious risk factors like prox-
imity to the shoreline. This positive correlation decreases
on the day of landfall across all correlation measures.
Despite the highest total count of messages, the peak of
the disaster has the weakest damage-predictive power.
However, in the following two days, the activity-to-
damage correlation steadily increases. From the third day
onwards, it fluctuates around a moderate level (0.25 Ken-
dall τ and 0.35 Spearman’s ρ). We examined these trends
both combining all data as well as for different keywords
separately, without much of a difference in pattern or
magnitude of coefficients.
Arguably, this trend – a drop on the day of the hurri-
cane followed by a steady increase in the relationship
between activity and damage – could be explained by the
universally high tweet activity on the day of hurricane
landfall, fuelled not only by the severity of the storm, but
also by widespread coverage of the hurricane in all forms
of the media. In places that were spared significant con-
sequences of the hurricane, the interest of the public
quickly diminishes. But in affected areas, the topic persis-
tently remains at the top of the agenda and makes post-
event activity an indicator of the damage caused by the
hurricane.
Figure 3 The predictive capacity of Hurricane Sandy’s digital traces. The horizontal axis is an offset in hours with respect to the landfall time
of the hurricane (00:00 UTC on October 30, 2012). Panel A shows the number of messages as a function of time (labeled on the secondary y-
axis on the right) and the number of “active” – with at least one message posted – zipcode tabulation areas (labeled on the primary y-axis on
the left). Panel B shows evolution of the rank correlation coefficients between the normalized per-capita activity (number of the original mes-
sages divided by the population of a corresponding ZTCA) and per-capita damage (comprised of FEMA Individual Assistance grants and
Sandy-related insurance claims). Additionally, the dashed trend shows Kendall rank correlations between average sentiment and per-capita
damage. The correlation rises from pre-landfall to post-landfall stage of the hurricane, with a drop on the landfall day. We conclude that the
post-disaster stage, or persistent activity on the topic in the immediate aftermath of an event, is a good predictor of damage inflicted locally.
Strength of the average sentiment of tweets does not seem to be a good predictor, at least at this level of spatial granularity (ZCTA resolu-
tion).
Figure 4 Spatial distributions and mutual correlations between Hurricane Sandy damage, Twitter activity, and average sentiment of tweets.
Correlations between per capita Twitter activity and damage are illustrated on ZCTA-level (Panel A) and county level (Panel B). In this nor-
malized form both variables follow a quasi log-normal distribution (see the histograms along the axes of scatter plot in Panel A). There is a
moderately strong positive correlation between post-landfall activity and damage, with rank coefficients approximately equal at either level of
resolution (see inset tables in scatter plots in panels A and B for exact statistics and P-values). ZCTA analysis covers only the state of New
Jersey and spatial distribution shows that both activity and damage reach highest levels along the coast and in a densely populated metropol-
itan area around New York City. There is no correlation between sentiment and damage at the level of ZCTA granularity (Kendall-tau rank
coefficient is -2.52 10-3). County-level analysis in Panel B shows that the strength of the activity-to-damage correlation holds, and there is
also weakly negative correlation between sentiment and damage.
Focusing on the period where the relationship between
activity and damage is the strongest – between October 31
and November 12 – we measure rank correlation coeffi-
cients for all ZCTAs in New Jersey and for selected coun-
ties in New Jersey and New York. Results are summa-
rized in Figure 4 and Figure S4. ZCTA-based distribu-
tions of per-capita activity and per-capita damage are ap-
proximately log-normal, with histograms shown in Figure
4A. The Kendall rank correlation reaches 0.32, the
Spearman rank correlation 0.46, and the Pearson correla-
tion coefficient approaches 0.5. Analysis on the basis of
counties (Figure 4B) reveals similar results: Kendall
τ = 0.34, Spearman ρ = 0.5 and Pearson ρ = 0.47 for 34
counties across New Jersey and New York. All measures
are statistically significant with P-values below 0.05 and
indicate a moderate positive correlation between damage
and tweet activity. Spatial distributions confirm the rela-
tionship, with pronounced concentration of both damage
and normalized activity along the coastline of New Jer-
sey. Alternative normalization (by Twitter user count in-
stead of actual population) does not alter the strength of
the correlation – see supplementary Table S4.
Following Guan and Chen [45], we also analyze the
relationship between Twitter activity and damage esti-
mates produced by the FEMA Modeling Task Force
(based on the Hazus-MH model of hurricane wind and
storm surge damage to housing and infrastructure). This
approach results in correlations of similar strength (Ken-
dall τ = 0.34, Spearman ρ = 0.51 and Pearson ρ = 0.41).
Comparison of the alternative damage estimates and their
negligible effect on the strength of the observed activity-
damage correlation is summarized in the supplementary
tables S5 and S6.
Our previous study [40] suggested that the negative
average sentiment may indicate an emergency situation,
based on the fact that the sentiment experiences a drop for
a sustained period of time before and after the landfall of
Hurricane Sandy. Here, we re-examine the sentiment-
damage relationship and find that daily ranking correla-
tion coefficients oscillate around zero for the entire ob-
servation period (see Figure 3B). Within the most favora-
ble prediction window (October 31 to November 12)
Kendall τ = -0.029 (P = 0.31), suggesting independence
of the underlying distributions, or that analysis at ZCTA-
resolution is under-powered. Change of spatial resolution
from ZCTAs to counties results in a more definitive rela-
tionship with τ = -0.19 (P = 0.11), and normalization by
Twitter user count yields more significant results yet –
τ = -0.23 (P = 0.06) – confirming our previous findings
and making sentiment weakly predictive of damage (see
supplementary Table S7 for the summary of results).
Discussion and conclusions
We found that Twitter activity during a large-scale
natural disaster – in this instance Hurricane Sandy – is
related to the proximity of the region to the path of the
hurricane. Activity drops as the distance from the hurri-
cane increases and, after a distance of approximately 1200
– 1500 km, the influence of proximity disappears. Addi-
tionally, the areas close to the disaster have a lower frac-
tion of re-tweets (more original content) and generate
more interest by producing content popular elsewhere –
the findings confirmed by other studies [37].
In the first study of its kind based on the actual ex-post
damage assessments, we demonstrated that the per-capita
number of Twitter messages corresponds directly to disas-
ter-inflicted monetary damage. The correlation is espe-
cially pronounced for persistent post-disaster activity and
is weakest at the peak of the disaster. We established that
per-capita activity and per-capita damage both have ap-
proximately log-normal distribution and Pearson correla-
tion coefficient between the two can reach 0.5 for a care-
fully selected observation period in the aftermath of the
landfall. This makes social media a viable platform for
preliminary rapid damage assessment in the chaotic time
immediately after disaster. Our results suggest that, dur-
ing a disaster, officials should pay attention to the normal-
ized activity levels, rates of original content creation, and
rates of content rebroadcast to identify in real time the
hardest hit areas. Immediately after a disaster they should
focus on persistence in activity levels to assess which
areas are likely to need the most assistance.
The role of proximity as the primary factor that ex-
plains activity suggests that individuals realistically assess
danger based on personal experiences [64], and their level
of interest is moderated accordingly. The cutoff in the
activity-to-distance relationship is on the same order of
magnitude as the footprint of a large atmospheric system,
indicating that once people feel safe where they are, the
level of engagement is uniform and most likely depends
on the intensity of media coverage. Activity within the
zone of the disaster sharply rises with proximity to its
epicenter, probably due to a combination of factors in-
cluding heightened anxiety, sense of direct relevance, and
observation of the associated effects (wind and precipita-
tion, physical damage). Our findings echo other studies,
like the correlation of the number of Flickr photos tagged
“#sandy” with atmospheric pressure over New Jersey,
emphasizing that online activity is increasing with the
intensity of the event [43]. What is striking however, with
all the different factors that motivate people to tweet, is
that a simple normalized measure of this activity – per-
capita number of messages – serves as an efficient as-
sessment tool for the physical damage caused by the dis-
aster.
Damage forecasts issued by FEMA’s Modeling Task
Force rely on the sophisticated multi-hazard modeling.
Although these forecasts are timely (generated before or
immediately after a disaster), their verification with aerial
imagery and physical site inspections is resource and
time-consuming. Social media nowcasting provides addi-
tional low-cost tool in the arsenal of authorities to expe-
dite the allocation of relief funds. In the long term, the
technique can be used to check the integrity of damage
assessment process itself, especially in light of protracted
settlement timeframes and allegations of irregularities that
recently prompted a blanket review of all insurance
claims by FEMA [65]. It can be used to inform stochastic
optimization algorithms for the joint assessment and re-
pair of complex infrastructures such as power systems
[59].
The correlation we observed is not definitive in its
strength, and care should be taken in the attempt to devise
practical applications, however we believe there is poten-
tial to fine-tune the method. More robust estimates of
damage through other data sources – for instance an in-
Knutson TR, et al. (2010) Tropical cyclones and climate change. Nature Geosci 3(3):157-
Klomp J & Valckx K (2014) Natural disasters and economic growth: A meta-analysis. Global
Cole S, Healy A, & Werker E (2012) Do voters demand responsive governments? Evidence
Elsner J, Elsner S, & Jagger T (2014) The increasing efficiency of tornado days in the United
Patz JA, Frumkin H, Holloway T, Vimont DJ, & Haines A (2014) Climate change: Challenges
clusion of municipal losses and non-monetary indicators
like power losses and emergency shelters statistics [63] -
may reinforce the relationship. Composite metrics that
combine per-capita activity with other properties of Twit-
ter message stream, e.g. fraction of disaster related tweets
[45] and sentiment (provided that activity is high and the
volume of data is sufficient for sentiment to be predic-
tive), may prove even more sensitive to damage. More
broadly, our study suggests that the distribution of per-
capita online activity on a specific topic has potential to
describe and quantify other natural, economic or cultural
phenomena.
References
1.
Environmental Change 26(0):183-195.
2.
from Indian disaster relief. Journal of Development Economics 97(2):167-181.
3.
and opportunities for global health. JAMA 312(15):1565-1580.
4.
163.
5. Webster PJ, Holland GJ, Curry JA, & Chang H-R (2005) Changes in Tropical Cyclone
Number, Duration, and Intensity in a Warming Environment. Science 309(5742):1844-1846.
6.
States. Clim Dyn:1-9.
7. Mendelsohn R, Emanuel K, Chonabayashi S, & Bakkensen L (2012) The impact of climate
change on global tropical cyclone damage. Nature Clim. Change 2(3):205-209.
8. Morss RE, Wilhelmi OV, Meehl GA, & Dilling L (2011) Improving Societal Outcomes of
Extreme Weather in a Changing Climate: An Integrated Perspective. Annual Review of
Environment and Resources 36(1):1-25.
9. Watts DJ (2007) A twenty-first century science. Nature 445(7127):489-489.
10. Lazer D, et al. (2009) Life in the network: the coming age of computational social science.
Science 323(5915):721-723.
11. The virtual lab (2013). Proceedings of the sixth ACM international conference on Web search
and data mining. Rome, Italy: ACM. pp. 1-2.
12. Llorente A, Cebrian M, & Moro E (2014) Social media fingerprints of unemployment. arXiv
preprint arXiv:1411.3140.
13. Bond RM, et al. (2012) A 61-million-person experiment in social influence and political
mobilization. Nature 489(7415):295-298.
14. Conover MD, et al. (2013) The geospatial characteristics of a social movement
communication network. PLoS ONE 8(3):e55957.
15. Conover MD, Ferrara E, Menczer F, & Flammini A (2013) The digital evolution of Occupy
Wall Street. PLoS ONE 8(5):e64679.
16. O'Connor B, Balasubramanyan R, Routledge BR, & Smith NA (2010) From tweets to polls:
Linking text sentiment to public opinion time series. ICWSM 11:122-129.
17. Hodas NO & Lerman K (2014) The Simple Rules of Social Contagion. Sci. Rep. 4.
18. Toole JL, Cha M, & González MC (2012) Modeling the adoption of innovations in the
presence of geographic and media influences. PloS one 7(1):e29528.
19. Golder SA & Macy MW (2011) Diurnal and seasonal mood vary with work, sleep, and
daylength across diverse cultures. Science 333(6051):1878-1881.
20. Friendship Paradox Redux: Your Friends Are More
Interesting Than You (2013).
Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media
(ICWSM). pp. 225-233.
21. Garcia-Herranz M, Moro E, Cebrian M, Christakis NA, & Fowler JH (2014) Using Friends as
Sensors to Detect Global-Scale Contagious Outbreaks. PLoS ONE 9(4):e92413.
22. Chew C & Eysenbach G (2010) Pandemics in the Age of Twitter: Content Analysis of Tweets
during the 2009 H1N1 Outbreak. PLoS ONE 5(11):e14118.
23. Chunara R, Andrews JR, & Brownstein JS (2012) Social and News Media Enable Estimation
of Epidemiological Patterns Early in the 2010 Haitian Cholera Outbreak. The American Journal of
Tropical Medicine and Hygiene 86(1):39-45.
24. Wang D, Lin Y-R, & Bagrow JP (2012) Social Networks in Emergency Response.
Encyclopedia of Social Network Analysis and Mining).
25. Watts D, Cebrian M, & Elliot M (2013) Dynamics of Social Media. Public Response to Alerts
and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research
Gaps, (The National Academies Press), pp 22-33.
26. Van Hentenryck P (2013) Computational disaster management. Proceedings of the Twenty-
Third international joint conference on Artificial Intelligence, (AAAI Press), pp 12-18.
27. Hughes AL & Palen L (2009) Twitter adoption and use in mass convergence and emergency
events. International Journal of Emergency Management 6(3):248-260.
28. Freeman M (2011) Fire, wind and water: Social networks in natural disasters. Journal of
Cases on Information Technology (JCIT) 13(2):69-79.
29. Skinner J (2013) Natural disasters and Twitter: Thinking from both sides of the tweet. First
Monday; Volume 18, Number 9 - 2 September 2013.
30. Myers SA, Sharma A, Gupta P, & Lin J (2014) Information network or social network?: the
structure of the twitter follow graph. Proceedings of the companion publication of the 23rd
international conference on World wide web companion, (International World Wide Web
Conferences Steering Committee), pp 493-498.
31. Guy M, Earle P, Ostrum C, Gruchalla K, & Horvath S (2010) Integration and dissemination of
citizen reported and seismically derived earthquake information via social network technologies.
Advances in intelligent data analysis IX, (Springer), pp 42-53.
32. Li J & Rao H (2010) Twitter as a rapid response news service: An exploration in the context
of the 2008 China Earthquake. The Electronic Journal of Information Systems in Developing
Countries 42(4):1-22.
33. Vieweg S, Hughes AL, Starbird K, & Palen L (2010) Microblogging during two natural
hazards events: what twitter may contribute to situational awareness. Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems, (ACM), pp 1079-1088.
34. Power R, Robinson B, Colton J, & Cameron M (2014) Emergency Situation Awareness:
Twitter Case Studies. Information Systems for Crisis Response and Management in Mediterranean
Acknowledgements Authors would like to thank Colleen O’Dea (NJ Spotlight,
www.njspotlight.com) for helpful suggestions and advice on obtaining the data
for Hurricane Sandy damage, Federal Emergency Management Agency, New
Jersey State Department of Banking and Insurance, and New York State De-
partment of Financial Services. Yury Kryvasheyeu, Haohui Chen, Pascal Van
Hentenryck and Manuel Cebrian acknowledge the support of the Australian
Government represented by the Department of Broadband, Communications
and Digital Economy and the Australian Research Council through the ICT
Centre of Excellence program. This research was also supported by the Army
Research Laboratory under Cooperative Agreement Numbers W911NF-09-2-
0053 and W911NF-11-1-0363, the National Science Foundation under grant
0905645, and DARPA/Lockheed Martin Guard Dog Programme under PO
4100149822.
Information Systems
Imran M, Elbassuoni SM, Castillo C, Diaz F, & Meier P (2013) Extracting information nuggets
Countries, Lecture Notes in Business Information Processing, eds Hanachi C, Bénaben F, &
Charoy F (Springer International Publishing), Vol 196, pp 218-231.
35. Earle PS, Bowden DC, & Guy M (2012) Twitter earthquake detection: earthquake monitoring
in a social world. Annals of Geophysics 54(6):708-715.
36. Sakaki T, Okazaki M, & Matsuo Y (2010) Earthquake shakes Twitter users: real-time event
detection by social sensors. Proceedings of the 19th international conference on World wide
web:851-860.
37. Kumar S, Hu X, & Liu H (2014) A behavior analytics approach to identifying tweets from
crisis regions. Proceedings of the 25th ACM conference on Hypertext and social media, (ACM), pp
255-260.
38.
from disaster-related messages in social media. Proc. of ISCRAM, Baden-Baden, Germany.
39. Classifying text messages for the Haiti earthquake (2011). Proceedings of the 8th
International Conference on
for Crisis Response and Management
(ISCRAM2011).
40. Kryvasheyeu Y, Chen H, Moro E, Van Hentenryck P, & Cebrian M (2015) Performance of
Social Network Sensors during Hurricane Sandy. PLoS ONE 10(2):e0117288.
41. Wang Q & Taylor JE (2014) Quantifying Human Mobility Perturbation and Resilience in
Hurricane Sandy. PLOS ONE 9(11):e112608.
42. Harnessing the crowdsourcing power of social media for disaster relief (2011). DTIC
Document.
43. Preis T, Moat HS, Bishop SR, Treleaven P, & Stanley HE (2013) Quantifying the Digital
Traces of Hurricane Sandy on Flickr. Sci. Rep. 3:3141.
44. Herfort B, de Albuquerque JP, Schelhorn S-J, & Zipf A (2013) Does the spatiotemporal
distribution of tweets match the spatiotemporal distribution of flood phenomena? A study about the
River Elbe Flood in June 2013.
45. Guan X & Chen C (2014) Using social media data to understand and assess disasters.
Natural Hazards:1-14.
46. Tropical Cyclone Report. Hurricane Sandy (AL182012) 22 – 29 October 2012 (2013).
National Hurricane Center.
47. Topsy Labs (2012), Topsy website. Available: http://www.topsylabs.com, Accessed 2012
November 20
48. Pennebaker J, Francis M, & Booth R (2001) Linguistic inquiry and word count. LIWC2001
(Mahwah, NJ: Erlbaum Publishers).
49. Thelwall M, Buckley K, Paltoglou G, Cai D, & Kappas A (2010) Sentiment strength detection
in short informal text. Journal of the American Society for Information Science and Technology
61(12):2544-2558.
50. Bettencourt L & West G (2010) A unified theory of urban living. Nature 467(7318):912-913.
51. Bettencourt LM, Lobo J, Helbing D, Kühnert C, & West GB (2007) Growth, innovation,
scaling, and the pace of life in cities. Proceedings of the National Academy of Sciences
104(17):7301-7306.
52. Becker GS, Glaeser EL, & Murphy KM (1999) Population and economic growth. American
Economic Review:145-149.
53. Crane P & Kinzig A (2005) Nature in the Metropolis. Science 308(5726):1225.
54. Jacobs J (1969) The economy of cities (Random House).
55. Chapin FS (1974) Human activity patterns in the city: Things people do in time and in space
(Wiley New York).
56. Scott AJ (1997) The cultural economy of cities. International journal of urban and regional
research 21(2):323-339.
57. Harrington JR & Gelfand MJ (2014) Tightness–looseness across the 50 united states.
Proceedings of the National Academy of Sciences 111(22):7990-7995.
58. National Hurricane Center (2013), NHC GIS Archive - Tropical Cyclone Best Track
(AL182012).
http://www.nhc.noaa.gov/gis/archive_besttrack_results.php?id=al18&
year=2012&name=Hurricane SANDY, Accessed 2013 February 12
59. Joint Assessment and Restoration of Power Systems (2012). ECAI. pp. 792-797.
60. Federal Emergency Management Agency (2014), Archived Housing Assistance Program
Data. Available: http://www.fema.gov/media-library/assets/documents/30714?id=6963
61. Open Public Records Act data request #C91085 (2014). Department of Banking &
Insurance, State of New Jersey
62. Freedom of Information Law request #2014-001128-NYC (2014). Department of Financial
Services, New York State.
63. Halpin S (2013) The Impact of Superstorm Sandy on New Jersey Towns and Households.
Rutgers-Newark: School of Public Affairs 111.
64. Howe P, Boudet H, Leiserowitz A, & Maibach E (2014) Mapping the shadow of experience of
extreme weather events. Climatic Change 127(2):381-389.
65. New York Times, FEMA to Review All Flood Damage Claims From Hurricane Sandy.
Available:
http://www.nytimes.com/2015/03/13/nyregion/fema-to-review-hurricane-sandy-flood-
claims-amid-scandal-over-altered-reports.html?_r=0, Accessed 12 March 2015
Available:
Nowcasting Disaster Damage: Supplementary Information.
Yury Kryvasheyeu a,b, Haohui Chen a,b, Nick Obradovich c,d, Esteban Moro e, Pascal Van Hentenryck a,f, James Fowler c,g, and
Manuel Cebrian a,h,*
a National Information and Communications Technology Australia, Melbourne, Victoria 3003, Australia; b Faculty of Information Technology, Monash University,
Melbourne, Victoria 3145, Australia; c Department of Political Science, University of California at San Diego, La Jolla, California 92093, USA; d Center for Marine
Biodiversity and Conservation, Scripps Institution of Oceanography, La Jolla, California 92093, USA; e Department of Mathematics & GISC, Universidad Carlos III de
Madrid, Madrid, Leganés 28911, Spain; f Research School of Computer Science, Australian National University, Canberra, ACT 0200, Australia; g Division of Medical
Genetics, University of California at San Diego, La Jolla, CA 92093; h Department of Computer Science and Engineering, University of California at San Diego, La
Jolla, California 92093, USA a
*Corresponding author: MC, [email protected]
Could social media data aid in disaster response and damage assessment? Countries face both an increasing frequency and intensity of natural disasters
due to climate change. And during such events, citizens are turning to social media platforms for disaster-related communication and information. Social
media improves situational awareness, facilitates dissemination of emergency information, enables early warning systems, and helps coordinate relief
efforts. Additionally, spatiotemporal distribution of disaster-related messages helps with real-time monitoring and assessment of the disaster itself. Here
we present a multiscale analysis of Twitter activity before, during, and after Hurricane Sandy. We examine the online response of 50 metropolitan areas of
the United States and find a strong relationship between proximity to Sandy’s path and hurricane-related social media activity. We show that real and
perceived threats – together with the physical disaster effects – are directly observable through the intensity and composition of Twitter’s message
stream. We demonstrate that per-capita Twitter activity strongly correlates with the per-capita economic damage inflicted by the hurricane. Our findings
suggest that massive online social networks can be used for rapid assessment (“nowcasting”) of damage caused by a large-scale disaster.
Table S1 List of keywords included in
the analysis, with their corresponding
message counts.
Keyword
power
sandy
hurricane
weather
storm
gas
Governor
stay safe
recovery
climate
FEMA
flooding
no power
climate change
wall st
blackout
mta
frankenstorm
Cuomo
prayforusa
Count
4 825 717
4 745 099
4 680 290
3 333 025
2 555 196
1 991 524
498 135
484 732
431 591
420 217
329 789
264 132
261 998
236 009
233 411
213 520
206 504
205 467
92 014
91 293
Figure S1 Normalized local activity on the topic as a function of distance to the hurricane path. For the words
strongly related to Hurricane Sandy (top row) activity decreases with distance, and after the distance of 10-15 de-
grees (1200 – 1500 km) proximity does not affect the level of activity. Because if this, and also because for some
words (“gas”, “power”, etc.) trends for East and West coasts differ, we use rank correlation for East coast cities as a
measure of relevance. The values of these correlation coefficients between activity and distance are shown in insets.
Figure S2 Originality of the content, expressed through the fraction of re-tweets in the stream of messages. Most of
the words show the inverse relationship between normalized activity and re-tweet rate; however, in the event-related
keywords this trend is more pronounced (compare “sandy” or “frankenstorm” with “weather” or “climate”).
Figure S3 Global popularity of local content. Words are sorted, as in Figure S1, according to relevance based on the
strength of activity-distance correlation for East Coast cities. Event-related keywords show a strong linear relation-
ship between activity and global popularity of messages generated locally. As relevance of the word to the disaster
weakens, so does the correlation between activity and popularity.
Table S2 Ranking of the keywords included into analysis according
to strength of the correlation between the distance and activity for
East Coast cities. Event- and effect-related words on the top are
used for further analysis of activity, including its relationship to dam-
age.
Spearman rank
ρ
-0.851
-0.8240
-0.778
-0.735
-0.731
-0.71
-0.673
-0.651
-0.470
-0.382
-0.365
-0.306
-0.284
-0.089
-0.134
-0.122
-0.101
-0.091
0.087
-0.038
P-value
1.28 10-11
2.02 10-10
9.26 10-9
1.5 10-7
1.84 10-7
5.82 10-7
3.74 10-6
9.46 10-6
0.003
0.018
0.024
0.062
0.084
0.596
0.422
0.467
0.545
0.585
0.604
0.822
keyword
hurricane
storm
sandy
power
flooding
frankenstorm
no power
Governor
blackout
weather
mta
FEMA
Cuomo
climate change
gas
stay safe
climate
prayforusa
wall st
recovery
Kendall rank
τ
-0.690
-0.644
-0.596
-0.548
-0.548
-0.533
-0.519
-0.477
-0.343
-0.272
-0.231
-0.215
-0.179
-0.084
-0.081
-0.081
-0.081
-0.05
0.044
-0.038
P-value
1.07 10-9
1.23 10-8
1.38 10-7
1.29 10-6
1.29 10-6
2.42 10-6
4.46 10-6
2.54 10-4
0.002
0.016
0.042
0.058
0.113
0.458
0.474
0.474
0.474
0.66
0.697
0.734
Table S3 Activity-damage correlations across keywords, in order of decreasing strength. Note that event-related
keywords (on the basis of activity-distance relationship) are most predictive of damage. For the final analysis we use
the following selection: “sandy”, ”hurricane”, ”storm”, ”power”, and “flooding” (“mta” is excluded because of insuffi-
cient number of active ZCTAs)
keyword
sandy
flooding
power
hurricane
mta
no power
storm
gas
blackout
climate
Governor
change
FEMA
prayforusa
frankenstorm
climate
recovery
stay safe
Cuomo
weather
wall st
active ZCTAs
517
169
532
494
65
450
478
505
207
97
282
272
4
52
128
255
209
71
476
83
Kendall rank
τ
0.33
0.27
0.26
0.26
0.24
0.21
0.21
0.18
0.18
0.19
0.17
0.16
0.
0.13
0.13
0.12
0.097
0.071
0.067
0.067
P-value
4.3 10-29
1.3 10-7
8.1 10-20
6.2 10-18
5.3 10-3
2.3 10-11
1.4 10-11
6.2 10-10
7.9 10-5
6. 10-3
3.1 10-5
6.5 10-5
1.
1.7 10-1
2.6 10-2
3.3 10-3
3.7 10-2
3.8 10-1
2.8 10-2
3.7 10-1
Spearman rank
ρS
P-value
2.2 10-29
0.47
7. 10-8
0.4
1.2 10-19
0.38
1.3 10-17
0.37
5.1 10-3
0.34
4.7 10-11
0.3
1.6 10-11
0.3
2.3 10-10
0.28
1. 10-4
0.27
8.6 10-3
0.27
2.9 10-5
0.25
9.5 10-5
0.23
8. 10-1
0.2
1.6 10-1
0.2
2.9 10-2
0.19
3.6 10-3
0.18
3.6 10-2
0.15
2.9 10-1
0.13
2.7 10-2
0.1
3.9 10-1
0.096
Pearson
ρP
0.5
0.37
0.42
0.38
0.36
0.31
0.31
0.32
0.31
0.28
0.29
0.24
0.52
0.094
0.2
0.2
0.16
0.32
0.17
0.08
P-value
2.4 10-34
5.5 10-7
5.2 10-24
1. 10-18
3.7 10-3
9.3 10-12
3.5 10-12
9. 10-14
6.5 10-6
6.2 10-3
8. 10-7
8.4 10-5
4.8 10-1
5.1 10-1
2. 10-2
1.1 10-3
1.7 10-2
5.7 10-3
1.8 10-4
4.7 10-1
Figure S4 Comparison of predictive capacity of activity and sentiment. The figure maps all zipcode tabulation areas
shaded by color, with saturation reflecting discrepancy of the area’s rank in two corresponding distributions. For in-
stance, if a particular zipcode is 5th in the ranking of activity, but 100th in the ranking of damage the discrepancy is
equal to 95. Discrepancies are normalized by the maximum observed deviation. The stronger the correlation is be-
tween the distributions the more uniform and light the map would be, as is the case for activity-vs.-damage map on
the left.
Table S4 Effect of normalization variable choice on the strength of activity-damage relationship
(ZCTA-resolution)
Variables normalized by …
… Census population
statistic
0.32
0.46
0.49
P-value
2.58 10-29
1.92 10-29
8.18 10-34
… “Twitter population”
P-value
statistic
8.35 10-29
2.92 10-29
6.7 10-34
0.32
0.45
0.49
Correlation measure
Kendall τK
Spearman ρS
Pearson ρP
Table S5 County level estimates of damage: modeling (Hazus-MH) and ex-post data on insurance and FEMA Indi-
vidual Assistance grants.
Damage estimates
ex-post, $M
Hazus-MH, $M
County
Atlantic
Bergen
Burlington
Camden
Cape May
Cumberland
Essex
Gloucester
Hudson
Middlesex
Monmouth
Ocean
Passaic
Salem
Union
Bronx
Kings
Nassau
New York
Orange
Putnam
Queens
Richmond
Rockland
Suffolk
Ulster
Westchester
Population
275422
918888
451336
513539
96304
157785
787744
289586
652302
823041
629384
580470
502885
65774
543976
1408473
2565635
1349233
1619090
374512
99607
2272771
470728
317757
1499273
181791
961670
Tweets
1580
9516
1684
1004
997
521
8260
1106
9322
8070
8246
4404
3840
122
5946
2459
10040
9085
50767
1310
568
9453
3538
2046
11851
400
6347
Users
574
2727
670
588
331
265
1908
470
2140
2102
1865
1052
1237
92
1360
944
3111
2363
15558
608
218
2662
699
509
3119
233
2234
954
729
54.6
147
29.3
12.7
844
6.29
314
406
919
587
41.8
18.6
87.2
50.6
660
1590
252
39.2
0.2
832
353
83.3
569
0.524
237
1630
1070
164
103
740
128
375
151
3600
776
1930
3240
34.2
167
395
635
5470
6860
4820
22.7
0.405
3650
1880
86.8
2720
8.03
1320
Table S6 Strength of activity-damage correlations for different damage estimates
… by modeling (Hazus-MH)
… from insurance and FEMA claims
Damage is estimated …
statistic
0.29
0.45
0.37
P-value
0.035
0.020
0.056
statistic
0.34
0.50
0.40
P-value
0.013
0.007
0.036
Correlation measure
Kendall τK
Spearman ρS
Pearson ρP
Table S7 Predictive power of sentiment, analyzed at different spatial resolutions and normalized either by
the area Census population or local Twitter user count (“Twitter population”)
Normalization
Census population
Twitter users count
statistic
-0.029
-0.07
P-value
0.31
0.014
Kendall τ for sentiment-damage relationship
County
ZCTA
statistic
-0.19
-0.23
P-value
0.11
0.06
|
1807.06655 | 1 | 1807 | 2018-07-17T20:20:41 | Devam vs. Tamam: 2018 Turkish Elections | [
"cs.SI"
] | On June 24, 2018, Turkey held a historical election, transforming its parliamentary system to a presidential one. One of the main questions for Turkish voters was whether to start this new political era with reelecting its long-time political leader Recep Tayyip Erdogan or not. In this paper, we analyzed 108M tweets posted in the two months leading to the election to understand the groups that supported or opposed Erdogan's reelection. We examined the most distinguishing hashtags and retweeted accounts for both groups. Our findings indicate strong polarization between both groups as they differ in terms of ideology, news sources they follow, and preferred TV entertainment. | cs.SI | cs |
Devam vs. Tamam: 2018 Turkish Elections
Mucahid Kutlu1, Kareem Darwish2, and Tamer Elsayed1
1 Qatar University, Qatar
2 Qatar Computing Research Institute, HBKU, Qatar
[email protected]
[email protected]
[email protected]
Abstract. On June 24, 2018, Turkey held a historical election, trans-
forming its parliamentary system to a presidential one. One of the main
questions for Turkish voters was whether to start this new political era
with reelecting its long-time political leader Recep Tayyip Erdogan or
not. In this paper, we analyzed 108M tweets posted in the two months
leading to the election to understand the groups that supported or op-
posed Erdogan's reelection. We examined the most distinguishing hash-
tags and retweeted accounts for both groups. Our findings indicate strong
polarization between both groups as they differ in terms of ideology, news
sources they follow, and preferred TV entertainment.
Keywords: Turkish Elections, Erdogan, Turkey, Political Polarization
1
Introduction
On April 18, 2018, the Turkish president Recep Tayyip Erdogan announced
early elections for the presidency and the parliament that would bring into force
the constitutional changes that were approved by referendum on April 16, 2017.
The constitutional changes would transform Turkey from a parliamentary system
to a presidential system. With the office of the president enjoying significantly
increased powers, these elections are highly consequential for Turkey. There were
several presidential candidates representing the different Turkish political blocks
such as conservatives, seculars, nationalists, and Kurds. Given the front runner
status of the incumbent candidate Recep Tayyib Erdogan, we focus in this paper
on those who support him and those who oppose him in favor of other candidates.
Ten days after the announcement of the elections, we started to crawl tweets
by tracking keywords relevant to the elections. As of June 23, 2018 (i.e., until the
elections), we crawled 108M tweets. Using a semi-automatic labeling followed by
a label propagation method, we labeled roughly 652.7K twitter users, of which
279.2K are pro-Erdogan and 373.5K are anti-Erdogan.
Next, we analyzed the most distinguishing hashtags and retweeted accounts
for each group. In our analysis, we found that anti- and pro-Erdogan groups
follow different news media, have different demands from the governments and
even watch different TV series, suggesting strong polarization that goes beyond
political preferences.
2
Kutlu et al.
2 Background
Turkey has been enjoying democratic elections since 1950. While official results
are announced by Supreme Election Council of Turkey3, votes are counted by
the members of political parties collectively, with each of them obtaining a copy
of election results for each ballot box. Furthermore, elections and the counting
process are also observed by international institutions. Therefore, the election
process is usually considered secure and the results are accepted peacefully by
all political parties.
As a result of referendum on April 16, 2017, Turkey has made significant
changes in its constitution, giving more power to the president. While the first
election with the new constitution had been scheduled for 2019, the Turkish
president Recep Tayyip Erdogan announced early elections to be held on June
24, 2018. In this election, Turkish citizens cast two different ballots, one for
the presidency and the second for parliament. Voter participation rate in both
ballots was 86.24%.
Eight political parties participated in parliamentary elections, namely:
1. The Justice and Development Party (AKP) which is Erdogan's party
2. The Nationalist Movement Party (MHP)
3. The Republican People's Party (CHP)
4. The People's Democratic Party (HDP)
5. The Iyi (good) Party (IYI)
6. The Saadet (felicity) Party (SP)
7. The Free Cause Party (Huda-Par)
8. The Motherland Party (VP)
These parties offer a wide ideological spectrum for Turkish voters. For the first
time in Turkish elections history, parties were also allowed to make alignments
for parliamentary elections. AKP and MHP formed the "Public's Alignment",
while CHP, IYI and SP formed the "Nation's Alignment", bringing parties with
different ideological background together. Table 1 lists the political parties who
participated in parliamentary elections and their election results.
In the presidential elections, there were 6 candidates, namely Recep Tayyip
Erdogan (AKP), Muharrem Ince (CHP), Selahattin Demirtas (HDP), Meral
Aksener (IYI), Temel Karamollaoglu (SP), and Dogu Perincek (VP). MHP and
Huda-Par announced their support for Erdogan in the presidential election. Ta-
ble 2 lists the results of the presidential election.
Other organizations with political influence include the Liberal Democratic
Party, which is a liberal party, and the Hizmet Hareketi (service movement),
which is a civil movement that the government refers to it as Gulenist Terror
Organization (FET O) and accuses it of orchestrating the failed coup attempt in
2016. Also, Kemalist ideology, referring to principals of Mustafa Kemal Ataturk,
is prevalent in Turkey, with adherents belonging to varying secular and nation-
alist parties.
3 http://www.ysk.gov.tr/
Devam vs. Tamam: 2018 Turkish Elections
3
Party Description
AKP
MHP
CHP
IYI
Erdogan's party
Turkish nationalist party
Secular party founded by Ataturk
Turkish nationalist party founded by
mostly ex-members of MHP
Islamist party
Secular Kurdish party that is mostly criti-
cized for not distancing itself from the Kur-
distan Workers Party (PKK), which is con-
sidered a terrorist group by Turkey, USAb
and many European countries.
SP
HDP
Huda-Par Kurdish Islamist party
VP
Left-wing nationalist party
None
None
Alignment Election Resultsa
Public
42.56%
11.1%
Public
22.65%
Nation
Nation
9.96%
Nation
None
1.34%
11.7%
0.31%
0.23%
Table 1. Political parties participated for parliamentary elections on June 24, 2018.
Abbreviations are used based on their official Turkish name.
a http://ysk.gov.tr/doc/dosyalar/docs/24Haziran2018/KesinSecimSonuclari/
2018MV-96C.pdf
b https://www.state.gov/j/ct/rls/other/des/123085.htm
Candidate Name
Recep Tayyip Erdogan AKP
CHP
Muharrem Ince
HDP
Selahattin Demirtas
Meral Aksener
IYI
Temel Karamollaoglu SP
Dogu Perincek
VP
Party Election Resultsa
52.59%
30.64%
8.40%
7.29%
0.89%
0.20%
Table 2. Presidential candidates and election results.
a http://ysk.gov.tr/doc/dosyalar/docs/24Haziran2018/KesinSecimSonuclari/
2018CB-416D.pdf
3 Data Collection and Labeling
We collected tweets relating to Turkey and the elections starting on April 29,
2018 until June 23, 2018 – the day before the election. We tracked keywords
related to the elections including political party names, candidate names, popu-
lar hashtags during this process (e.g., #tamam and #devam), famous political
figures (e.g., Abdullah Gul, the former president of Turkey) and terms that may
impact people's vote (e.g., economy, terrorism and others). We wrote keywords
in Turkish with Turkish alphabet, which contains some additional letters that
do not exist in the English alphabet (e.g., ¸c, g, u). Next, we added versions of
these keywords written strictly with English letters (e.g., "Erdogan" instead of
"Erdogan") allowing us to catch non-Turkish tweets about elections.
4
Kutlu et al.
In the process we collected 108 million tweets. Our first step was to label as
many users by their stance as possible. The labeling process was done in two
steps, namely:
– Manual labeling based on user names. We assigned labels to users who
explicitly specify their party affiliation in their Twitter name and screen
name. We made one simplifying assumption, namely that the supporter of
a particular party would be supporting the candidate supported by their
party. We extracted a list of users who use "AKParti" (official abbreviation
of AKP), "CHP", "HDP", or "IYI" in their Twitter user or screen name.
We labeled the people who used "AKParti" as "pro-Erdogan", while the rest
as "anti-Erdogan". Though "MHP" officially supported Erdogan in the elec-
tion, we feared that the MHP supporters might not be universally supporting
Erdogan.
Further, the incumbent and front runner status of Erdogan caused his sup-
porters to use the hashtag #devam (meaning "'continue") and his oppo-
nents regardless of their political affiliation to use the hashtag #tamam
("enough"). Thus, we labeled users who had the hashtags #devam or #tamam
in their profile description as supporting or opposing Erdogan. Lastly, users
who had the hashtag #RTE (Recep Tayyip Erdogan) in their profile descrip-
tion were labeled as pro-Erdogan.
While providing a political party name as a part of twitter user profile is a
strong indication of supporting the respective party, we manually checked all
extracted names to ensure the correctness of labels. For instance, we found
that some users expressed that they are against a particular party in their
user name instead of supporting it. Therefore, whenever we suspected that
keywords we used for labeling were not indicative of their political view, we
manually investigated the accounts and removed their labels if their political
views were unclear. Table 3 shows the number of our manual labels.
– Label propagation. Label propagation automatically labels users based
on their retweet behavior [4]. The intuition behind this method is that users
that retweet the same tweets most likely share the same stances on the topics
of the tweets. Given that many of the tweets in our collection were actually
retweets or duplicates of other tweets, we labeled users who retweeted 10 or
more tweets that were authored or retweeted by the pro- or anti- groups and
no retweets from the other side as pro- or anti- respectively. We iteratively
performed such label propagation 11 times, which is when label propagation
stopped labeling new accounts. After the last iteration, we were able to label
652,729 users of which 279,181 were pro-Erdogan and authored 28,050,613
tweets and 373,548 were anti-Erdogan and authored 31,762,639 tweets. Fig-
ure 1 shows the histogram of the pro- and anti-Erdogan tweets for the period
of study. As the figure shows, interest in the election has steadily increased
on average as the election day approached. There was a large drop in tweet
activity around June 15, which corresponds to the end of Ramadan holiday
(Ramazan Bayramı) and is a public holiday. Also, the anti-Erdogan group
Devam vs. Tamam: 2018 Turkish Elections
5
produced a greater number of tweets on most days, with the gap widening
in the last few days of the campaign.
Supporters
pro-Erdogan
anti-Erdogan w/out party affiliation
pro-CHP
pro-IYI Party
pro-HDP
No. of Labeled Users
1,777
2,134
833
900
357
Table 3. Number of Manually Labeled Users (3,866 Unique Users).
Fig. 1. Histogram of pro- and anti-Erdogan tweets
4 Analysis
Next we analyzed the data to ascertain the differences in interests and focus
between both the pro- and anti-Erdogan groups as expressed by the hashtags
that they use and the accounts that they retweet. Doing so can provide valuable
insights into both groups [1,2] To compute a relative importance score that
accounts for the frequency of use by either group and the gap in use between
both camps, we used the following formula:
score = tp ∗ tpr ∗ (1 − f pr)
(1)
6
Kutlu et al.
where tp and f p are the number of times used by 1st and 2nd groups respectively,
tpr is the ratio within 1st group (tp/totalA), and f pr is the ratio within 2nd
group (f p/totalB). Thus, the greater the usage within a group and the disparity
between usages in both groups, the greater the score. This formula is a variation
on the Odds Ratio Numerator [3].
Tables 4 and 5 list the top 50 hashtags and top 50 retweeted accounts
for both groups organized by category. Table 8 summarizes both tables and
provides percentages for each category. As the Table 8 shows, more than 51%
of hashtags used by the pro-Erdogan group were in positive praise of Erdogan
and AKP, Erdogan's party, compared to 10.8% of the hashtags dedicated to
attacking other presidential candidates and their parties. This ratio is roughly
5 to 1. On the other side, roughly a third of the hashtags on the anti-Erdogan
camp praised the other presidential candidates and their parties and roughly a
fifth of the hashtags were attacking Erdogan and AKP. This ratio 1.7 to 1. The
large difference in ratio could be explained by the front runner status of Erdogan,
where his proponents did not need to attack his opponents and instead needed
to maintain a positive message. Though both groups discussed different social
issues such as retirement, compulsory military service, and animal rights, the
Palestinian issue featured prominently for the pro-Erdogan group. We proceeded
to compare both groups based on the Palestinian issue by considering the union
of the top 20 hashtags that mention Jerusalem (Turkish: Kudus, English: Quds),
Palestine (Turkish: Filistin, English: Palestine), or Nakba (meaning: catastrophe
in Arabic) for both groups. As the comparison in Table 10 shows, though both
groups tweeted about the issue, the pro-Erdogan group were more than 6 times
more likely to mention the Palestinian issue. Further, though some hashtags were
common to both groups, some were dominated by one group. For future work,
we plan to see if this discrepancy between both groups are an artifact of the
climate surrounding the election or the difference more systematic.
One of the things that caught our eye is the appearance of the names TV
series in the top 50 hashtags. Thus, we were curious if other TV series that
users from both group refer to. We obtained a list of 320 Turkish TV series that
aired since 2014 to the present from Wikipedia4. Table 11 lists the series that
were mentioned as hashtags with their full names at least 500 times and the
percentage and count of mentions for both pro- and anti-Erdogan groups. Two
observations are quite apparent:
– TV series preferences follow directly from political positions and show a
very high level of polarization. For example, the top 3 series in the table are
mentioned more than 99% of the times by anti-Erdogan users.
– Anti-Erdogan users refer to TV series much more often than pro-Erdogan
users suggesting that they are larger consumers of TV series.
We also examined the top retweeted accounts for anti- and pro-Erdogan ac-
counts. We manually checked the accounts to identify their identity and political
4 https://en.wikipedia.org/wiki/List_of_Turkish_television_series
Devam vs. Tamam: 2018 Turkish Elections
7
view. In order to identify political view of users, we checked their profile descrip-
tions, most recent tweets and also profile pictures. For instance, users who use
a picture of Ataturk for their profile or background image are assumed to be
"Kemalist/Ataturkist".
Concerning the top retweeted accounts (Tables 6, 7, and 9), there are a
few interesting patterns, namely:
– Official party accounts and ranking party member accounts accounted from
the majority of retweets for the anti-Erdogan group (51.8% – 3.04 M tweets),
while such accounts constituted roughly a third of retweeted accounts for the
pro-Erdogan group (33.5% – 1.52 M tweets).
– The most retweeted journalist by pro-Erdogan accounts are either freelance
journalists or work for online news portals. Only two journalist work at reg-
ular newspapers (Gunes and Posta). On the other hand, all top retweeted
journalists by anti-Erdogan accounts work (or have worked before) at pop-
ular TV channels or newspapers.
– Both groups retweet tweets from regular people who seems popular on social
media. However, we often observed strong ideological or political positions
in these accounts. For example, 4 (out of 9) of the top retweeted accounts by
anti-Erdogan group use pictures of Ataturk in their profile suggesting that
they are Kemalists. Conversely, 2 (out of 6) of the top retweeted accounts by
pro-Erdogan group use the picture of Erdogan in their profile. None of the
regular accounts retweeted by pro-Erdogan group is identified as Kemalist.
– Both groups retweeted accounts that don't have a clear owner such as RTE-
Canli (Erdogan Live), which is dedicated to spreading positive news about
Erdogan, and siyasifenomen (political phenomena), which is a dedicated anti-
AKP account. However, the percentage of such retweets for the pro-Erdogan
group was 24% compared to 10.7% for anti-Erdogan group.
– Pro-Erdogan accounts were far more likely to retweet state media, while anti-
Erdogan group rarely do so. For example, TRTHaber was retweeted 70,711
and 1,289 times by the pro-Erdogan and anti-Erdogan groups respectively.
Also, AnadoluAjansi was retweeted 61,623 and 1,232 times for both groups
respectively. This is not surprising given that we observed the hashtag #ka-
patgitsin (Turn off (state media)) being used by the anti-Erdogan group.
On the other hand, the anti-Erdogan group was far more likely to retweet
foreign news sources. For example, sputnik TR was retweeted 64,767 and
4,907 times by the anti- and pro-Erdogan groups, respectively. Similarly,
the retweet counts for BBC Turkce were 47,314 and 2,376 for both groups,
respectively.
– While Erdogan uses anti-FETO/PKK rhetoric in his political campaigns
very frequently, only 2.7% of retweets belong to accounts dedicated to the
opposition of these groups.
5 Conclusion
This paper presents an analysis of pro- and anti-Erdogan Twitter users using
more than 108 million tweets related to the Turkish election that were collected
8
Kutlu et al.
from the period between April 29 and June 23, 2018. We semi-automatically
labeled a few thousands users based on their stance towards Erdogan and then
we used label-propagation to tag more than 652 thousand users. We examined
the most distinguishing hashtags and retweeted accounts for both groups. Our
results show strong polarization that go beyond political preferences and extend
to which channels people watch and which television series people follow.
References
1. Darwish, K., Magdy, W., Rahimi, A., Baldwin, T., Abokhodair, N.: Predicting on-
line islamophopic behavior after# parisattacks. The Journal of Web Science 3(1)
(2017)
2. Darwish, K., Magdy, W., Zanouda, T.: Trump vs. hillary: What went viral during
the 2016 us presidential election. In: International Conference on Social Informatics.
pp. 143–161. Springer (2017)
3. Forman, G.: An extensive empirical study of feature selection metrics for text clas-
sification. Journal of machine learning research 3(Mar), 1289–1305 (2003)
4. Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., Baldwin, T.: # isisisnotislam
or# deportallmuslims?: Predicting unspoken views. In: Proceedings of the 8th ACM
Conference on Web Science. pp. 95–106. ACM (2016)
Devam vs. Tamam: 2018 Turkish Elections
9
Category
pro-Erdogan/
Establishment VakitTurkiyeVakti
Hashtag
devam
Freq. Description
286,463 "continue"
270,134 AKP slogan "It is Turkey time"
65,519 AKP
52,875 "Turkey is developing (AKP)
46,201 "We are Erdogan"
45,625 Erdogan
39,573 "Erdogan means"
AKParti
TurkiyeS¸ahlanıyor
WeAreErdogan
Erdogan
ErdoganDemek
MilletinAdamı-MilletinAdayı 27,812 "the man of the nation, the candidate of the nation"
IftiharVakti
VakitAnkaraVakti
DurmakYokYolaDevam
AKKadınlarSahada
26,522 "time to be proud"
25,439 "It is Ankara's time" (AKP)
24,269 "no stopping"
23,911 "women of AK Party are on the field", tweets reporting
VakitErzurumVakti
SendeDestekOl
ZumruduAnka
OyumAKPartiye
HazırızTurkiye
BuyukLider-Istanbulda
VakitIstanbulVakti
VakitAdanaVakti
IVoteBtsbbmas
premiosmtvmiaw
MTVLakpopbts
Survivor2018
MTVBrkpopbts
TV shows
Election related 24Haziran
Historical
Events
Anti-Opposition KimlerKimlerleBeraber
27Mayıs
ba¸saramayacaksınız
Issues
Positions
CHP
GelBakalımMuharrem
hatırla
YıkımIttifakı
Pro Palestine
WeStandForQuds
Nakba70
Kudus
KudusI¸cinYeniKapıdayız
Socio-economic
UzmanC¸ avu¸slarKimsesizMi
UzmanC¸ avu¸slarHakBekliyor
4clilerKagıt Uzerinde4bli
gthb5bin
Pro Huda-par
dogrusuHudapar
HudaparDiyorKi
Pro MHP
MHP
Anti FET O
26NisanFetoKumpası
their activities for elections
22,959 "It is Erzurum's time" (AKP)
22,611 "you too support" pro-erdogan
22,543 "emrald mythical bird" (Erdogan poem)
22,117 "my vote to AKP"
21,715 "Turkey, we are ready"
21,656 "Great leader is in Istanbul"
20,257 "It is Istanbul's time" (AKP)
20,245 "It is Adana's time" (AKP)
225,714 Music Awards
81,629 Music Awards
71,465 Music Awards
23,838 TV show
21,003 Music Awards
93,854 The election day
36,851 "27 May", reminding the coup happened on 27 May, 1960.
48,524 "who is with who" (anti CHP and HDP)
43,458 "you will not win" pro-erdogan slogan against anti-
erdogan slogan "we will win"
36,691 CHP
24,457 "Come here Muharrem" (anti-Ince)
22,437 "remember (how turkey has developed)"
22,175 "destruction agreement" (anti-opposition)
38,203 "We stand with Jerusalem"
31,340 70 years anniversary "Nakba" (Palestinian catastrophe)
26,483 "Jerusalem"
23,339 "We are at Yenikapi for Jerusalem", calling for a rally in
Yenikapi neighborhood of Istanbul
33,530 "are sergeants alone" demanding better pay
21,626 "Sergeants are waiting for their rights"
22,903 Government officers are demanding better pay
25,745 Demanding positions for agriculture engineers
23,278 "Huda-par is the right one"
20,467 "Huda-par is saying that"
33,876 MHP
20,607 anti FETO
Table 4. Top 50 pro-Erdogan hashtags
10
Kutlu et al.
Category
Issues
Hashtag
BedelliAskerlik
EmeklilikteYa¸saTakılanlar
EYT
HayvanaS¸iddetSu¸ctur
Dolar
Euro
Anti-Erdogan/ Tamam
Establishment Erdogan
Pro-party
slogans/
candidates
TV shows
Freq. Description
202,877 military service – pay not to go
146,780 demand for early retirement
75,858 demand for early retirement
15,652 "violence for animals is a crime" pro animal rights
47,010 currency devaluation
24,978 currency devaluation
232,829 enough (anti-Erdogan)
57,018 Erdogan
17,515 "Turn off" (anti state media)
17,146 "we are bored" (tamam – enough)
27,287 AKP
29,060 CHP
28,823 "what did Kilicdaroglu say" Quotes from the party leader
26,485 CHP candidate on CNN Turk
23,473 CHP candidate on NTV at 9:00 pm
21,565 "the star of this election is Ince" CHP candidate
19,230 "Coming for the nation" (CHP)
15,663 "muharrem ince because" CHP candidate
81,140 CHP candidate
77,139 "We will achieve(CHP)
53,640 "President for All" (CHP)
KapatGitsin
Sıkıldık
AKP
CHP
MuharremInce
Ba¸saracagız
Hepimizin-Cumhurba¸skanı
MuharremInce-HaberTurkde 36,009 CHP candidate on Haber Turk
CHP
Kılı¸cdarogluNeSoyledi
MuharremInce-CNNTurkde
MuharremInce-21deNTVde
BuSe¸ciminYıldızıInce
MilletI¸cinGeliyoruz
MuharremInceC¸ unku
HDP
demirta¸s
hdp
SenleDegi¸sir
IYI
YuzunuGune¸seDonTurkiye
Saadet Party
degi¸stir
Vatanim Sensin TV series
VatanımSensin
hileon
VatanımSensinVeda
MirayDaner
BoranKuzum
Survivor TV show
survivor2018
Hilmur
Siyah & Beyaz A¸sk
SiyahBeyazA¸sk
Asfer
71,986 HDP candidate
54,983 HDP
35,878 "it changes with you" (HDP)
49,742
39,894
39,452
15,690
15,314
29,514
20,561
59,731 "Turn your face to the sun" (IYI)
30,288 "change" (Saadet)
Election related AdaylaraSoruyorum
Historical
Events
News Media
24Haziran
se¸cim2018
19Mayıs1919
Gezi5Ya¸sında
GazeteSozcu
28,623
18,451
30,697 ask the candidates (TV)
17,456 election day
15,309 2018 elections
26,205 anniversary of Ataturk Youth and Sport Festivala
33,718 5 year anniversary of Gezi protests
26,744 Sozcu Newspaper, Secular Kemalist newspaper
Table 5. Top 50 anti-Erdogan hashtags
a the date assumed as Ataturk started the Independence War of Turkey
Devam vs. Tamam: 2018 Turkish Elections
11
Category
AKP
Account
RT Erdogan
Akparti
06melihgokcek
Freq. Description
Identity
Erdogan
AKParti
Ibrahim Melih
Gok¸cek
Savcı Sayan
Suleyman Soylu 70,429 minister of interior affairs
388,555 Official account
328,863 Official account
165,588 ex-governor of Ankara
SavciSayan
suleymansoylu
bayramsenocak Bayram ¸senocak 54,089 Head of Istanbul branch of AKP
drbetulsayan
75,689 Old CHP member but currently an AKP member
BurhanKuzu
mahirunal
Gov accounts tcbestepe
Journalists/
analysts
Accounts
with
nicknames
MHP
Regular
Twitter users
Anti-
FETO/PKK
accounts
Media
45,013 Erdogan's advisor and spokesman of Presidency
162,739 Journalist, analyst
88,083 Journalist, analyst
66,679 Freelance journalist
64,025 Journalist at Gunes Newspaper
43,711 co-founder of AKP
39,541 Spokesman of AKP
222,061 Official presidency account
Dr.
44,006 ex-minister
Dr. Betul Sayan
Kaya
Prof.
Burhan Kuzu
Mahir unal
Erdogan
Binali Yıldırım 101,918 Prime minister
Ibrahim Kalın
Fatih Tezcan
Omer Turan
Malik Ejder
Turgay Guler
Abdurrahman
Uzun
TC Basbakan
ikalin1
fatihtezcan
omerturantv
Malikejder47
turgayguler
HarunAlanoglu Harun Alanoglu 49,986 Analyst
AsliAyDincer
Aslı Ay Din¸cer
abdullahciftcib Abdullah C¸ ift¸ci
Uzun-
Abdurrahman
nedimsener2010 Nedim ¸sener
Murat Sarıca
drlsmzwriter
unknown
medyaadami
unknown
themarginale
unknown
RTECanli
HurAktivist
unknown
Malazgirt Ruhu unknown
unknown
maske3g
unknown
TheLaikYobaz
unknown
BestepeCB
Enes
Enesicoo
name)
last
(no
246,125 Freelance journalist
222,614 Pro-Erdogan
82,839 Pro-Erdogan
68,334 Pro-Erdogan
59,125 Pro-Erdogan
51,779 Pro-Erdogan
45,739 Pro-Erdogan
43,660 Pro-Erdogan fan page
37,815 Probably pro-Erdogan
47,638 Journalist
47,220 Political strategist
41,568 Journalist
40,734 Journalist at Posta Newspaper
36,683 Journalist
UstAkilOyunlari unknown
unknown
siyasetcanli
enveryan
unknown
118,883 Pro-Erdogan conspiracy theorist
36,867 Pro-Erdogan news media on twitter
72,158 Defines himself as Armenian (Turkish citizen)
academic though the identity is unclear
dbdevletbahceli Devlet Bah¸celi
MHP Bilgi
GkhnKhrman Gokhan Kahra-
MHP
212,735 MHP leader
94,213 official account
191,645 popular pro-Erdogan account
slmhktn
gelinNcikAKz
man
Selami Haktan
Cemile
Ta¸sdemir
Ugur Onal
uguronal
AK suHandan Handan Aksu
UmmetciSiyaset Aydın Binboga
GizliArsivTR
unknown
unknown
TRT
Yeni S¸afak
Star Gazete
FetoGercekleri
trthaber
yenisafak
stargazete
anadoluajansi Anadolu Ajansı
tvahaber
turkiyevakti
A Haber
Turkiye Vakti
67,536 popular pro-erdogan account
48,110 Pro-erdogan
43,149 Pro-erdogan
38,239 Pro-erdogan
46,608 Seems a pro-Palestine account
84,413 anti-FETO/PKK
37,261 anti-FETO
70,711 State media
69,829 Yeni Safak news paper
68,440 Star newspaper
61,623 State news agency
37,867 A Haber news channel
46,599 AKP media
Table 6. Top 50 retweeted accounts for pro-Erdogan group
12
Kutlu et al.
Category
CHP
Account
vekilince
erenerdemnet
tgmcelebi
barisyarkadas
ATuncayOzkan
kilicdarogluk
aykuterdogdu
herkesicinCHP
senerabdullatif
Identity
Muharrem Ince
Eren Erdem
Mehmet Ali C¸ elebi
Barı¸s Yarkada¸s
Tuncay Ozkan
Kemal Kılı¸cdaroglu
Aykut Erdogdu
CHP
Abdullatif S¸ener
Freq. Description
947,866 CHP candidate
204,782 ex-parliament member of CHP
156,808 Leading CHP member
78,639 Leading CHP member
75,491 CHP member
72,027 Party Leader
66,769 Leading CHP member
47,369 official party account of CHP
44,567 ex-AKP member but now in the parliament as a member
of CHP
HDP
IYI Party
hdpdemirtas
HDPgenelmerkezi
sahmetsahmet
barisatay
ayhanbilgen
meral aksener
iyiparti
AytunCiray
T Karamollaoglu
aliaktas7
kacsaatoldunet
siyasifenomen
politikaloji
azyazarozyazarr
Regular Twitter HasanGunaltay
accounts
Accounts with
nicknames
Saadet Party
esrapekdemir
F ISBASARAN1
335,182 IYI candidate
76,526 parliament member of HDP
47,871 parliament member of HDP
45,415 Leading HDP member
117,731 official account of HDP
Selahattin Demirta¸s 346,798 HDP candidate
HDP
Ahmet S¸ık
Barı¸s Atay
Ayhan Bilgen
Meral Ak¸sener
IYI
Aytun C¸ ıray
Temel Karamollaoglu 116,953 Saadet party candidate
Ali Akta¸s
unknown
unknown
unknown
unknown
Hasan Gunaltay
Esra Pekdemir
Feyzi I¸sba¸saran
72,829 official party account
57,962 Leading IYI member
382,711 popular anti-Erdogan account
138,302 anti-Erdogan
47,648 lawyer, supporter of Saadet party
54,339 political view is unclear
53,418 Probably a kemalist account
54,129 Kemalist
52,960 Kemalist
54,551 former politician (AKP) but it seems he does not support
Journalists
Liberal Demo-
cratic party
Media
caapulcukiz
AtillaTasNet
M Selanik3
SunaVarol
errdemglr
FidelOKAN
ismailsaymaz
SedefKabas
fatihportakal
ismaildukel
candundaradasi
ugurdundarsozcu
mustafahos
tokcem
t24comtr
halktvcomtr
sputnik TR
DikenComTr
solhaberportali
bbcturkce
odatv
gazetesozcu
cumhuriyetgzt
BirGun Gazetesi
Simge Ekici
Atilla Ta¸s
Mustafa Selanik
Suna Varol
Erdem
Fidel OKAN
Ismail Saymaz
Sedef Kaba¸s
Fatih Portakal
Ismail Dukel
Can Dundar
Ugur Dundar
Mustafa Ho¸s
Cem Toker
AKP anymore
49,901 activist, a "GEZI" protestor
72,623 celebrity, Anti-Erdogan
47,005 Anti-Erdogan
159,203 Kemalist
90,345 Kemalist
61,420 lawyer/writer
113,835 Journalist at Hurriyet newspaper
91,243 Academic/journalist
79,317 Journalist at Fox TV channel
75,873 Journalist at Halk TV channel
71,961 journalist, ex-director of Cumhuriyet newspaper
60,593 Journalist at Sozcu newspaper
46,368 Journalist, had worked at various news media
84,051 ex-leader of Liberal Democratic Party
T24
Halk TV
Sputnik Turkiye
Diken Gazete
Sol Haber
BBC Turkey
Oda TV
Sozcu Gazetesi
Cumhuriyet Gazete
BirGun Gazetesi
78,632 Online news media
77,770 Halk TV channel
64,767 Russian news media in Turkish
52,046 Online news media
48,796 Online leftist news media
47,314 BBC news media in Turkish
46,440 Online news media
254,741 Sozcu newspaper
237,657 Cumhuriyet newspaper
113,153 Birgun newspaper
Table 7. Top 50 retweeted accounts for anti-Erdogan group
Devam vs. Tamam: 2018 Turkish Elections
13
Category
pro-Erdogan and Establishment
TV shows
Issues
Anti-Opposition
Positions towards others
Election related
Historical Events
Pro-party slogans/mentions/candidate
Issues
Anti-Erdogan or Establishment
TV shows
Election related
Historical Events
News Media
Hashtag Count Percentage
Pro-Erdogan
1,108,446
423,649
223,169
197,742
98,228
93,854
36,851
Anti-Erdogan
665,093
513,155
351,795
257,241
63,462
59,923
26,744
50.8
19.4
10.2
9.1
4.5
4.3
1.7
34.3
26.5
18.2
13.3
3.3
3.1
1.4
Table 8. Summary of 50 top pro- and anti- Erdogan hashtags
Category
RT Count Percentage
Pro-Erdogan
– AKP
– MHP
Both parties
Government Accounts
Journalists/analysts
Media
Regular Twitter accounts
Accounts with nicknames
Anti-FETO/PKK accounts
1,210,471
306,948
1,517,419
368,992
645,355
355,069
435,287
1,085,938
121,674
26.7
6.8
33.5
8.1
14.2
7.8
9.6
24
2.7
Anti-Erdogan
– CHP party
– HDP Party
– IYI Party
– Saadet Party
– Liberal Democratic party
All parties
Journalists
Media
Regular Twitter accounts
Accounts with nicknames
1,694,318
634,341
465,973
164,601
84,051
3,043,284
539,190
1,021,316
642,137
628,770
28.8
10.8
7.9
2.8
1.4
51.8
9.2
17.4
10.9
10.7
Table 9. Summary of 50 top pro- and anti- Erdogan retweeted accounts
14
Kutlu et al.
pro
anti
Translation
Raise your voice for Jerusalem
SMS 4032 to financially support Palestine
hashtag
WeStandForQuds
Nakba70
Kudus
KudusI¸cinYenikapıdayız
Filistin
KudusI¸cinAyaktayız
KalbimizFilistinde
ZulmeLanetKuduseDestek Cure the oppression, support Jerusalem
KudusI¸cinSesVer
FilistinI¸cinYenikapıdayız We are in Yenikapi (rally area) for Palestine
FilistinYaz4032yeGonder
FreePalestine
StandWithQuds
Palestine
KudusIslamındır
KudusunMigferiRTE
BatmandaKudusMitingi
FilistinI¸cinBirlik
KuduseSelahaddinOl
FilistineUmutOl
KudusI¸cinKıyamVakti
FreeQuds
KuduseSahipC¸ ık
Nakba
QudsBelongsToIslam
SultanGaziKudusI¸cinAyakta Sultan Gazi stands for Jerusalem
QudsDay4Return
Sum
total
38,203 1,255 39,458
31,340 6,127 37,467
Jerusalem
26,483 4,872 31,355
We are in Yenikapi (rally area) for Jerusalem 23,339 1,670 25,009
14,778 3,721 18,499
Palestine
We stand for Jerusalem
13,437
231 13,668
7,551 3,313 10,864
Our hearts are in Palestine
7,047
5,716 1,331
6,785
5,315 1,470
6,752
5,568 1,184
6,146
2
6,144
1,475
778
2,253
2,066
77
1,989
1,895
445
1,450
1,732
30
1,702
1,491
395 1,096
1,231
61
696
1,172
877
3
815
72
804
1
743
15
641
121
176
504
311
224
215
177
128
174
190,698 29,276 219,974
Jerusalem is Islamic
RTE (Erdogan) is the helmet of Jerusalem
Rally for Jerusalem in Batman (Turkish city)
Unity for Palestine
Be Salahaddin for Jerusalem
Be the hope for Palestine
Time to uprise for Jerusalem
1,170
476
874
743
803
728
520
328
87
38
46
Support Jerusalem
Table 10. The union of top 20 Palestine related hashtags for both pro- and anti-
groups
pro % pro count anti % anti count
Type
Drama, History, Romance
Action, Drama, Romance
Drama, Romance
Action, Drama, War
Series
Vatanım Sensin
Siyah Beyaz A¸sk
Adını Sen Koy
Soz
Fazilet Hanım ve Kızları Drama
Drama
Sen Anlat Karadeniz
Action, Crime, Thriller
C¸ ukur
Comedy, Drama
Erkenci Ku¸s
Dirili¸s Ertugrul
Action, Adventure, Drama, History
Action, Drama, Mystery
Ufak Tefek Cinayetler
Action, Drama, History
Payitaht Abdulhamid
Action, Drama, Romance
Cesur Yurek
Drama
Kadın
Comedy, Romance
Kiralık A¸sk
Crime, Drama
Avlu
Kara Para A¸sk
Action, Crime, Drama
Drama
Yeter
Anne
Drama
Table 11. Most mentioned TV series in the tweets. Types of series are mostly retrieved
from IMDB website.
sum
50,629 50,974
28,980 29,148
13,093 13,125
7,084 7,360
6,923 6,951
5,535 5,781
2,629 3,005
2,495 2,508
432 2,127
1,225 1,863
88 1,306
1,236 1,236
695 1,140
931
905
869
634
840
848
767
622
92
600
99.3
99.4
99.8
96.3
99.6
95.7
87.5
99.5
20.3
65.8
6.7
0 100.0
61.0
97.2
73.0
99.1
81.1
15.3
0.7
0.6
0.2
3.8
0.4
4.3
12.5
0.5
79.7
34.2
93.3
0.0
39.0
2.8
27.0
0.9
18.9
84.7
345
168
32
276
28
246
376
13
1,695
638
1,218
445
26
235
8
145
508
|
1506.05164 | 1 | 1506 | 2015-06-16T22:34:17 | Partial Network Alignment with Anchor Meta Path and Truncated Generic Stable Matching | [
"cs.SI"
] | To enjoy more social network services, users nowadays are usually involved in multiple online social networks simultaneously. The shared users between different networks are called anchor users, while the remaining unshared users are named as non-anchor users. Connections between accounts of anchor users in different networks are defined as anchor links and networks partially aligned by anchor links can be represented as partially aligned networks. In this paper, we want to predict anchor links between partially aligned social networks, which is formally defined as the partial network alignment problem. The partial network alignment problem is very difficult to solve because of the following two challenges: (1) the lack of general features for anchor links, and (2) the "one-to-one$_\le$" (one to at most one) constraint on anchor links. To address these two challenges, a new method PNA (Partial Network Aligner) is proposed in this paper. PNA (1) extracts a set of explicit anchor adjacency features and latent topological features for anchor links based on the anchor meta path concept and tensor decomposition techniques, and (2) utilizes the generic stable matching to identify the non-anchor users to prune the redundant anchor links attached to them. Extensive experiments conducted on two real-world partially aligned social networks demonstrate that PNA can solve the partial network alignment problem very well and outperform all the other comparison methods with significant advantages. | cs.SI | cs | Partial Network Alignment with Anchor Meta Path
and Truncated Generic Stable Matching
Jiawei Zhang(cid:63), Weixiang Shao(cid:63), Senzhang Wang†, Xiangnan Kong∗, Philip S. Yu(cid:63)‡
(cid:63) University of Illinois at Chicago, Chicago, IL, USA
∗ Worcester Polytechnic Institute, Worcester, MA, USA
† Beihang University, Beijing, China
‡ Institute for Data Science, Tsinghua University, Beijing, China
{jzhan9, wshao4}@uic.edu, [email protected], [email protected], [email protected]
5
1
0
2
n
u
J
6
1
]
I
S
.
s
c
[
1
v
4
6
1
5
0
.
6
0
5
1
:
v
i
X
r
a
Abstract -- To enjoy more social network services, users nowa-
days are usually involved in multiple online social networks
simultaneously. The shared users between different networks are
called anchor users, while the remaining unshared users are
named as non-anchor users. Connections between accounts of
anchor users in different networks are defined as anchor links and
networks partially aligned by anchor links can be represented
as partially aligned networks. In this paper, we want to predict
anchor links between partially aligned social networks, which
is formally defined as the partial network alignment problem.
The partial network alignment problem is very difficult to solve
because of the following two challenges: (1) the lack of general
features for anchor links, and (2) the "one − to − one≤" (one
to at most one) constraint on anchor links. To address these
two challenges, a new method PNA (Partial Network Aligner) is
proposed in this paper. PNA (1) extracts a set of explicit anchor
adjacency features and latent topological features for anchor links
based on the anchor meta path concept and tensor decomposition
techniques, and (2) utilizes the generic stable matching to identify
the non-anchor users to prune the redundant anchor links
attached to them. Extensive experiments conducted on two real-
world partially aligned social networks demonstrate that PNA
can solve the partial network alignment problem very well and
outperform all the other comparison methods with significant
advantages.
Index Terms -- Partial Network Alignment; Multiple Heteroge-
neous Social Networks; Data Mining
I. INTRODUCTION
In recent years, online social networks providing various
featured services have become an essential part in our lives.
To enjoy more social network services, users nowadays are
usually involved in multiple online social networks simultane-
ously [14], [36], [37], [42] and there can be significant overlaps
of users shared by different networks. As pointed out in [6], by
the end of 2013, 42% of online adults are using multiple social
sites at the same time. For example, 93% of Instagram users
are involved in Facebook concurrently and 53% Twitter users
are using Instagram as well [19]. Formally, the common users
involved in different networks simultaneously are named as the
"anchor users" [14], while the remaining unshared users are
called the "non-anchor users" [42]. The connections between
accounts of anchor users in different networks are defined
as the "anchor links" [14] and networks partially aligned
by anchor links can be represented as "partially aligned
networks" [37].
Problem Studied: In this paper, we want to predict the anchor
links across partially aligned networks, which is formally
defined as the "partial network alignment" problem.
Partial network alignment problem is very important for
social networks and can be the prerequisite for many real-
world social applications, e.g., link prediction and recom-
mendations [36], [37], [42], [40], community detection [12],
[39], [41] and information diffusion [35]. Identifying accounts
of anchor users across networks provides the opportunity to
compose a more complete social graph with users' information
in all the networks they are involved in. Information in the
complete social graph is helpful for a better understanding
of users' social behavior in online social networks [14],
[41], [35]. In addition, via the predicted anchor links, cross-
platform information exchange enables new social networks
to start
their services based on the rich data available in
other developed networks. The information transferred from
developed networks can help emerging networks [37], [39] to
overcome the information shortage problem promisingly [36],
[37], [39].
What's more, the partial network alignment problem is
a novel problem and different from existing link prediction
works, like (1) traditional intra-network link prediction prob-
lems [26], [27], which mainly focus on predicting links in one
single social network, (2) inter-network link transfer problems
links in one single network with
[37], which can predict
information from multiple aligned networks, and (3) inferring
anchor links across fully aligned networks [14], which aims
at predicting anchor links across fully aligned networks.
The inferring anchor links across fully aligned networks
problem [14] also studies the anchor link prediction problem.
However, both the problem setting and method proposed to
address the "network alignment" problem between two fully
aligned networks in [14] are very ad hoc and have many
disadvantages. First of all, the full alignment assumption of
social networks proposed in [14] is too strong as fully aligned
networks can hardly exist in the real world [42]. Secondly, the
features extracted for anchor links in [14] are proposed for
Foursquare and Twitter specifically, which can be hard to get
generalized to other networks. Thirdly, the classification based
link prediction algorithm used in [14] can suffer from the
class imbalance problem [16], [20]. The problem will be more
serious when dealing with partially aligned networks. Finally,
the matching algorithm proposed in [14] is designed specially
for fully aligned networks and maps all users (including both
anchor and non-anchor users) from one network to another
network via the predicted anchor links, which will introduce
a large number of non-existing anchor links when applied in
the partial network alignment problem.
Totally different from the "inferring anchor links across
fully aligned networks" problem [14], we study a more general
network alignment problem in this paper. Firstly, networks
studied in this paper are partially aligned [42], which contain
large number of anchor and non-anchor users [42] at the
same time. Secondly, networks studied are not confined to
Foursquare and Twitter social networks. A minor revision
of the "partial network alignment" problem can be mapped
to many other existing tough problems, e.g., large biology
network alignment [1], entity resolution in database inte-
gration [2], ontology matching [7], and various types of
entity matching in online social networks [22]. Thirdly, the
class imbalance problem will be addressed via link sampling
the constraint on anchor
effectively in the paper. Finally,
links is "one − to − one≤" (i.e., each user in one network
can be mapped to at most one user in another network).
Across partially aligned networks, only anchor users can be
connected by anchor links. Identifying the non-anchor users
from networks and pruning all the predicted potential anchor
links connected to them is a novel yet challenging problem.
The "one − to − one≤" constraint on anchor links can dis-
tinguish the "partial network alignment" problem from most
existing link prediction problems. For example, in traditional
link prediction and link transfer problems [26], [27], [37], the
constraint on links is "many-to-many", while in the "anchor
link inference" problem [14] across fully aligned networks, the
constraint on anchor links is strict "one-to-one".
To solve the "partial network alignment" problem, a new
method, PNA (Partial Network Aligner), is proposed in this
paper. PNA exploits the concept of anchor meta paths [42],
[26] and utilizes the tensor decomposition [21], [13] tech-
nique to obtain a set of explicit anchor adjacency features
and latent topological features. In addition, PNA generalizes
the traditional stable matching to support partially aligned
network through self-matching and partial stable matching
and introduces the a novel matching method, generic stable
matching, in this paper.
The rest of this paper is organized as follows. In Section II,
we will give the definition of some important concepts and for-
mulate the partial network alignment problem. PNA method
will be introduces in Sections III-IV. Section V is about
the experiments. Related works will be given in Section VI.
Finally, we conclude the paper in Section VII.
II. PROBLEM FORMULATION
Before introducing the method PNA, we will first define
some important concepts and formulate the partial network
alignment problem in this section.
V = (cid:83)
while E =(cid:83)
A. Terminology Definition
Definition 1 (Heterogeneous Social Networks): A heteroge-
neous social network can be represented as G = (V,E), where
i Vi contains the sets about various kinds of nodes,
j Ej is the set of different types of links among
nodes in V.
Definition 2 (Aligned Heterogeneous Social Networks): Social
networks that share common users are defined as the aligned
heterogeneous social networks, which can be represented as
G = (Gset, Aset), where Gset = (G(1), G(2),··· , G(n))
is the set of n different heterogeneous social networks and
Aset = (A(1,2),A(1,3),··· ,A((n−1),n)) is the sets of undi-
rected anchor links between networks in Gset.
Definition 3 (Anchor Link): Given two social networks G(i)
and G(j), link (u(i), v(j)) is an anchor link between G(i) and
G(j) iff (u(i) ∈ U (i)) ∧ (v(j) ∈ U (j)) ∧ (u(i) and v(j) are
accounts of the same user), where U (i) and U (j) are the user
sets of G(i) and G(j) respectively.
Definition 4 (Anchor Users and Non-anchor Users): Users
who are involved in two social networks, e.g., G(i) and G(j),
simultaneously are defined as the anchor users between G(i)
and G(j). Anchor users in G(i) between G(i) and G(j) can be
represented as U (i)
A(i,j) = {u(i)u(i) ∈ U (i),∃v(j) ∈ U (j), and
(u(i), v(j)) ∈ A(i,j)}. Meanwhile, the non-anchor user in G(i)
between G(i) and G(j) are those who are involved in G(i) only
and can be represented as U (i)
A(i,j). Similarly,
the anchor users and non-anchor users in G(j) between G(j)
and G(i) can be defined as U (j)
−A(i,j) respectively.
Definition 5 (Full Alignment, Partial Alignment and Isolated):
Given two social networks G(i) and G(j), if users in both
G(i) and G(j) are all anchor users, i.e., U (i) = U (i)
A(i,j) and
U (j) = U (j)
A(i,j), then G(i) and G(j) are fully aligned; if users
in both of these two networks are all non-anchor users, i.e.,
U (i) = U (i)
−A(i,j) and U (j) = U (j)
−A(i,j), then these two networks
are isolated; otherwise, they are partially aligned.
Definition 6 (Bridge Nodes): Besides users, many other kinds
of nodes can be shared between different networks, which are
defined as the bridge nodes in this paper. The bridge nodes
shared between G(i) and G(j) can be represented as B(i,j) =
{v(v ∈ (V (i) − U (i))) ∧ (v ∈ (V (j) − U (j)))}.
−A(i,j) = U (i)−U (i)
A(i,j) and U (j)
The social networks studied in this paper can be any
partially aligned social networks and we use Foursquare,
Twitter as a example to illustrate the studied problem and the
proposed method. Users in both Foursquare and Twitter can
make friends with other users, write posts, which can contain
words, timestamps, and location checkins. In addition, users
in Foursquare can also create lists of locations that they have
visited/want to visit in the future. As a result, Foursquare and
Twitter can be represented as heterogeneous social network
G = (V,E). In Twitter V = U ∪ P ∪ W ∪ T ∪ L and in
Foursquare V = U ∪ P ∪ W ∪ T ∪ I ∪ L, where U, P, W,
T , I and L are the nodes of users, posts, words, timestamps,
lists and locations. While in Twitter, the heterogeneous link
set E = Eu,u ∪ Eu,p ∪ Ep,w ∪ Ep,t ∪ Ep,l and in Foursquare
E = Eu,u∪Eu,p∪Ep,w∪Ep,t∪Ep,l∪Eu,i∪Ei,l. The bridge nodes
shared between Foursquare and Twitter include the common
locations, common words and common timestamps.
B. Problem Statement
Definition 7 (Partial Network Alignment): For any two given
partially aligned heterogeneous social networks, e.g., G =
((G(i), G(j)), (A(i,j))), part of the known anchor links be-
tween G(i) and G(j) are represented as A(i,j). Let U (i), U (j) be
the user sets of G(i) and G(j) respectively, the set of other po-
tential anchor links between G(i) and G(j) can be represented
as L(i,j) = {(u(i), v(j))(u(i) ∈ U (i))∧ (v(j) ∈ U (j)}−A(i,j).
We solve the partial network alignment problem as a link
classification problem, where existing and non-existing anchor
links are labeled as "+1" and "-1" respectively. In this paper,
we aim at building a model M with the existing anchor links
A(i,j), which will be applied to predict potential anchor links
in L(i,j). In model M, we want to determine both labels and
existence probabilities of anchor links in L(i,j).
III. FEATURE EXTRACTION AND ANCHOR LINK
PREDICTION
Supervised link prediction method has been widely used
in research due to its excellent performance and the pro-
found supervised learning theoretical basis. In supervised link
prediction,
links are labeled differently according to their
physical meanings, e.g., existing vs non-existent [42], friends
vs enemies [31], trust vs distrust [32], positive attitude vs
negative attitude [33]. With information in the networks, a
set of heterogeneous features can be extracted for links in the
training set, which together with the labels are used to build
the link prediction model M.
In this section, we will introduce different categories of
general features extracted for anchor links across partially
aligned networks, which include a set of explicit anchor
adjacency features based on anchor meta paths and the "latent
topological feature vector" extracted via anchor adjacency
tensor decomposition.
A. Traditional Intra-Network Meta Path
Traditional meta paths are mainly defined based on the
social network schema of one single network [26], [28].
Definition 8 (Social Network Schema): For a given network
G, its schema is defined as SG = (TG,RG), where TG and
RG are the sets of node types and link types in G respectively.
Definition 9 (Meta Path): Based on the schema of network G,
i.e., SG = (TG,RG), the traditional intra-network meta path in
R2−−→ ··· Rk−1−−−→ Tk, where Ti ∈
G is defined as Φ = T1
TG, i ∈ {1, 2,··· , k} and Rj ∈ RG, j ∈ {1, 2,··· , k − 1}
[26], [28].
R1−−→ T2
For example, according to the networks introduced in Sec-
tion II, we can define the network schema of Twitter as SG =
({U ser, P ost, W ord, T imestamp, List, Location},{F ollow,
W rite, Create, Contain, At, Checkin}). Based
the
schema, "User - Location - User" is a meta path of length 2
connecting user nodes in the network via location node and
path "Alice - San Jose - Bob" is an instance of such meta
on
Fig. 1. Schema of aligned heterogeneous network.
path in the network, where Alice, Bob and San Jose are the
users and location in the network.
B. Inter-Network Anchor Meta Path
Traditional Intra-network meta paths defined based on one
single network cannot be applied to address the inter-network
partial network alignment problem directly. To overcome such
a problem, in this subsection, we will define the concept of
anchor meta paths and introduce a set of inter-network anchor
meta paths [42] across partially aligned networks.
Definition 10 (Aligned Social Network Schema): Given the
partially aligned networks: G = (Gset, Aset), let SG(i) =
(TG(i) ,RG(i) ) be the schema of network G(i) ∈ Gset, the
schema of partially aligned networks G can be defined as
i RG(i)) ∪ {Anchor}), where {Anchor}
i TG(i) , ((cid:83)
SG = ((cid:83)
is the anchor link type.
An example of the schema about two partially aligned
social networks, e.g., G(i) (e.g., Foursquare) and G(j) (e.g.,
Twitter), is shown in Figure 1, where the schema of these two
aligned networks are connected by the anchor link type and
the green dashed circles are the shared bridge nodes between
G(i) and G(j).
Definition 11 (AMP: Anchor Meta Path): Based on the aligned
social network schema, anchor meta paths connecting users
across G is defined to be Ψ = T1
R2−−→ ··· Rk−1−−−→ Tk,
where T1 and Tk are the "User" node type in two par-
tially aligned social networks respectively. To differentiate
the anchor link type from other link types in the anchor
meta path, the direction of Ri in Ψ will be bidirectional if
Ri = Anchor, i ∈ {1, 2,··· , k − 1}, i.e., Ti
Ri←→ Tj.
R1−−→ T2
Via the instances of anchor meta paths, users across aligned
social networks can be extensively connected to each other.
In the two partially aligned social networks (e.g., G =
((G(i), G(j)), (A(i,j)))) studied in this paper, various anchor
meta paths from G(i) (i.e., Foursquare) and G(j) (i.e., Twitter)
can be defined as follows:
• Common Out Neighbor Anchor Meta Path (Ψ1): U ser(i)
f ollow←−−−− U ser(j) or
f ollow−−−−→ U ser(i) Anchor←−−−−→ U ser(j)
"U (i) → U (i) ↔ U (j) ← U (j)" for short.
PostUserWordTimestampLocationwritewrite-1checkin atcheckin at-1containcontain-1atat-1follow/follow-1Schema of Network(i)PostUserWordTimestampLocationwritewrite-1checkin atcheckin at-1containcontain-1atat-1follow/follow-1Schema of Network(j)anchorListcreatecreate-1contain-1containbridge node typesanchor link type• Common In Neighbor Anchor Meta Path (Ψ2): U ser(i)
f ollow−−−−→ U ser(j) or
f ollow←−−−− U ser(i) Anchor←−−−−→ U ser(j)
"U (i) ← U (i) ↔ U (j) → U (j)" .
• Common Out In Neighbor Anchor Meta Path (Ψ3):
f ollow−−−−→
Anchor←−−−−→ U ser(j)
f ollow−−−−→ U ser(i)
U ser(i)
U ser(j) or "U (i) → U (i) ↔ U (j) → U (j)".
• Common In Out Neighbor Anchor Meta Path (Ψ4):
f ollow←−−−−
Anchor←−−−−→ U ser(j)
f ollow←−−−− U ser(i)
U ser(i)
U ser(j) or "U (i) ← U (i) ↔ U (j) ← U (j)".
These above anchor meta paths are all defined based
the "User" node type only across partially aligned social
networks. Furthermore, there can exist many other anchor
meta paths consisting of user node type and other bridge node
types from Foursquare to Twitter, e.g., Location, Word and
Timestamp.
contain
• Common Location Checkin Anchor Meta Path 1 (Ψ5):
−−−−−−−→ Location checkin at
←−−−−−−−
U ser(i) write−−−→ P ost(i) checkin at
P ost(j) write←−−− U ser(j) or "U (i) → P (i) → L ← P (j) ←
U (j)".
create−−−−→ List(i)
• Common Location Checkin Anchor Meta Path 2 (Ψ6):
−−−−−→ Location checkin at
←−−−−−−−
U ser(i)
P ost(j) write←−−− U ser(j) or "U (i) → I (i) → L ← P (j) ←
U (j)".
• Common Timestamps Anchor Meta Path (Ψ7): U ser(i)
write−−−→ P ost(i) at−→ T ime at←− P ost(j) write←−−− U ser(j) or
"U (i) → P (i) → T ← P (j) ← U (j)".
write−−−→ P ost(i) contain
U ser(j) or "U (i) → P (i) → W ← P (j) ← U (j)".
• Common Word Usage Anchor Meta Path (Ψ8): U ser(i)
−−−−−→ W ord contain←−−−−− P ost(j) write←−−−
C. Explicit Anchor Adjacency Features
Based on the above defined anchor meta paths, different
kinds of anchor meta path based adjacency relationship can
be extracted from the network. In this paper, we define the
new concepts of anchor adjacency score, anchor adjacency
tensor and explicit anchor adjacency features to describe
such relationships among users across partially aligned social
networks.
Definition 12 (Anchor Meta Path Instance): Based on anchor
R2−−→ ··· Rk−1−−−→ Tk, path ψ =
meta path Ψ = T1
n1 − n2 − ··· − nk−1 − nk is an instance of Ψ iff ni is an
instance of node type Ti, i ∈ {1, 2,··· , k} and (ni, ni+1) is
an instance of link type Ri, ∀i ∈ {1, 2,··· , k − 1}.
Definition 13 (AAS: Anchor Adjacency Score): The anchor
adjacency score is quantified as the number of anchor meta
path instances of various anchor meta paths connecting users
across networks. The anchor adjacency score between u(i) ∈
U (i) and v(j) ∈ U (j) based on meta path Ψ is defined as:
R1−−→ T2
(cid:12)(cid:12)(cid:12){ψ(ψ ∈ Ψ) ∧ (u(i) ∈ T1) ∧ (v(j) ∈ Tk)}(cid:12)(cid:12)(cid:12) ,
AASΨ(u(i), v(j)) =
where path ψ starts and ends with node types T1 and Tk
respectively and ψ ∈ Ψ denotes that ψ is a path instance
of meta path Ψ.
where ap ◦ bq denotes the vector outer product of ap and bq.
topological
feature vector of users in U (i) and U (j) respectively [21].
Each row of A and B represents a latent
, u(j)
m ), u(i)
The anchor adjacency scores among all users across par-
tially aligned networks can be stored in the anchor adjacency
matrix as follows.
Definition 14 (AAM: Anchor Adjacency Matrix): Given a
certain anchor meta path, Ψ, the anchor adjacency matrix
between Gi and Gj can be defined as AΨ ∈ NU (i)×U (j)
and A(l, m) = AASΨ(u(i)
l
l ∈ U (i), u(j)
m ∈ U (j).
Multiple anchor adjacency matrix can be grouped together
to form a high-order tensor. A tensor is a multidimensional
array and an N-order tensor is an element of the tensor product
of N vector spaces, each of which can have its own coordinate
system. As a result, an 1-order tensor is a vector, a 2-order
tensor is a matrix and tensors of three or higher order are
called the higher-order tensor [13], [21].
Definition 15 (AAT: Anchor Adjacency Tensor): Based on
meta paths in {Ψ1, Ψ2,··· , Ψ8}, we can obtain a set of anchor
adjacency matrices between users in two partially aligned
networks to be {AΨ1 , AΨ2 ,··· , AΨ8}. With {AΨ1 , AΨ2,
··· , AΨ8}, we can construct a 3-order anchor adjacency
tensor X ∈ RU (i)×U (j)×8, where the ith layer of X is the
anchor adjacency matrix based on anchor meta path Ψi, i.e.,
X (:, :, i) = AΨi, i ∈ {1, 2,··· , 8}.
Based on the anchor adjacency tensor, a set of explicit
anchor adjacency features can be extracted for anchor links
across partially aligned social networks.
Definition 16 (EAAF: Explicit Anchor Adjacency Features):
For a certain anchor link (u(i)
m ), the explicit anchor adja-
cency feature vectors extracted based on the anchor adjacency
tensor X can be represented as x = [x1, x2,··· , x8] (i.e., the
anchor adjacency scores between u(i)
m based on 8
different anchor meta paths), where xk = X (l, m, k), k ∈
{1, 2,··· , 8}.
D. Latent Topological Feature Vectors Extraction
and u(j)
, u(j)
l
l
Explicit anchor adjacency features can express manifest
properties of the connections across partially aligned networks
and are the explicit topological features. Besides explicit topo-
logical connections, there can also exist some hidden common
connection patterns [33] across partially aligned networks. In
this paper, we also propose to extract the latent topological
feature vectors from the anchor adjacency tensor.
As proposed in [13], [21], a higher-order tensor can be
decomposed into a core tensor, e.g., G, multiplied by a matrix
along each mode, e.g., A, B,··· , Z, with various tensor
decomposition methods, e.g., Tucker decomposition [13]. For
the 3-order anchor adjacency tensor X can be
example,
decomposed into three matrices A ∈ RU (i)×P , B ∈ RU (j)×Q
and C ∈ R8×R and a core tensor G ∈ RP×Q×R, where
P, Q, R are the number of columns of matrices A, B, C [13]:
gpqrap ◦ bq ◦ cr = [G; A, B, C],
P(cid:88)
Q(cid:88)
R(cid:88)
p=1
q=1
r=1
X =
over sampling with "synthetic" instances [4]: the minority
class is over sampled by introducing new "synthetic" examples
along the line segment joining m of the k nearest minority
class neighbors for each minority class instances. Parameter k
is usually set as 5, while the value of m can be determined
according to the ratio to over sample the minority class. For
example, if the minority class need to be over sampled 200%,
then m = 2. The instance to be created between a certain
example x and one of its nearest neighbor y can be denoted
as x + θT (x − y), where x and y are the feature vectors of
two instances and θT is the transpose of a coefficient vector
containing random numbers in range [0, 1].
IV. ANCHOR LINK PRUNING WITH GENERIC STABLE
MATCHING
In this section, we will introduce the anchor link pruning
methods in details, which include (1) candidate pre-pruning,
(2) brief introduction to the traditional stable matching, and
(3) the generic stable matching method proposed in this paper,
which generalizes the concept of traditional stable matching
through both self matching and partial stable matching.
A. Candidate Pre-Pruning
Across two partially aligned social networks, users in a
certain network can have a large number of potential anchor
link candidates in the other network, which can lead to
great time and space costs in predicting the anchor links.
The problem can be even worse when the networks are of
large scales, e.g., containing million even billion users, which
can make the partial network alignment problem unsolvable.
To shrink size of the candidate set, we propose to conduct
candidate pre-pruning of links in the test set with users' profile
information (e.g., names and hometown).
As shown in Figure 3, in the given input test set, users
are extensively connected with all their potential partners in
other networks via anchor links. For each users, we propose
to prune their potential candidates according to the following
heuristics:
• profile pre-pruning: users' profile information shared
across partially aligned social networks, e.g., Foursquare
and Twitter, can include username and hometown [34].
m ) ∈ L, if the username
, u(j)
Given an anchor link (u(i)
and hometown of u(i)
and u(j)
m are totally different, e.g.,
cosine similarity scores are 0, then link (u(i)
m ) will
be pruned from test set L.
• EAAF pruning: based on the explicit anchor adjacency
tensor X extracted in Section III, for a given link
m ) ∈ L, if its extracted explicit anchor adjacency
(u(i)
features are all 0, i.e., X (l, m, x) = 0, x ∈ {1, 2,··· , 8},
then link (u(i)
m ) will be pruned from test set L.
, u(j)
, u(j)
l
l
l
l
, u(j)
l
B. Traditional Stable Matching
Meanwhile, as proposed in [14], the one-to-one constraint of
anchor links across fully aligned social networks can be met by
pruning extra potential anchor link candidates with traditional
Fig. 2.
Instance distribution in feature space.
Method HOSVD introduced in [13] is applied to achieve these
decomposed matrices in this paper.
E. Class Imbalance Link Prediction
Based on the extracted features, various supervised link
prediction models [14], [37], [42] can be applied to infer the
potential anchor links across networks. As proposed in [20],
[16], conventional supervised link prediction methods [29],
can suffer from the class imbalance problem a lot. To address
the problem, two effective methods (down sampling [15] and
over sampling [4]) are applied.
Down sampling methods aim at deleting the unreliable
negative instances from the training set. In Figure 2, we show
the distributions of training links in the feature space, where
negative links can be divided into 4 different categories [15]:
(1) noisy links: links mixed in the positive links; (2) borderline
links: links close to the decision boundary; (3) redundant links:
links which are too far away from the decision boundary in
the negative region; and (4) safe links: links which are helpful
for determining the classification boundary.
Different heuristics have been proposed to remove the noisy
instances and borderline instances, which are detrimental for
the learning algorithms. In this paper, we will use the method
called Tomek links proposed in [30], [15]. For any two given
instances x1 and x2 of different labels, pair (x1, x2) is called
a tomek link if there exists no other instances, e.g., z, such
that d(x1, z) < d(x1, x2) and d(x2, z) < d(x1, x2). Examples
that participate in Tomek links are either borderline or noisy
instances [30], [15]. As to the redundant instances, they will
not harm correct classifications as their existence will not
change the classification boundary but they can lead to extra
classification costs. To remove the redundant instances, we
propose to create a consistent subset C of the training set, e.g.,
S [15]. Subset C is consistent with S if classifiers built with
C can correctly classify instances in S. Initially, C consists
of all positive instances and one randomly selected negative
instances. A classifier, e.g., kN N, built with C is applied to
S, where instances that are misclassified are added into C. The
final set C contains the safe links.
Another method to overcome the class imbalance problem is
to over sample the minority class. Many over sampling meth-
ods have been proposed, e.g., over sampling with replacement,
+++++++noisy negative linksborderline negative linksredundant negative linkssafe negative linkspositive linksdecision boundaryC. Generic Stable Matching
Stable matching based method proposed in [14] can only
work well in fully aligned social networks. However, in the real
world, few social networks are fully aligned and lots of users
in social networks are involved in one network only, i.e., non-
anchor users, and they should not be connected by any anchor
links. However, traditional stable matching method cannot
identify these non-anchor users and remove the predicted
potential anchor links connected with them. To overcome such
a problem, we will introduce the generic stable matching to
identify the non-anchor users and prune the anchor link results
to meet the one − to − one≤ constraint.
In PNA, we introduce a novel concept, self matching, which
allows users to be mapped to themselves if they are discovered
to be non-anchor users. In other words, we will identify the
non-anchor users as those who are mapped to themselves in
the final matching results.
Definition 20 (Self Matching): For the given two partially
aligned networks G(1) and G(2), user ui ∈ U (1), can have his
ui over users in U (2) ∪{ui} and ui preferring ui
preference P (1)
himself denotes that ui is an non-anchor user and prefers to
stay unconnected, which is formally defined as self matching.
Users in one social network will be matched with either
partners in other social networks or themselves according to
their preference lists (i.e., from high preference scores to
low preference scores). Only partners that users prefer over
themselves will be accepted finally, otherwise users will be
matched with themselves instead.
Definition 21 (Acceptable Partner): For a given matching µ :
U (1) ∪ U (2) → U (1) ∪ U (2), the mapped partner of users ui ∈
U (1), i.e., µ(ui), is acceptable to ui iff µ(ui)P (1)
ui ui.
To cut off the partners with very low preference scores, we
propose the partial matching strategy to obtain the promising
partners, who will participate in the matching finally.
Definition 22 (Partial Matching Strategy): The partial match-
ing strategy of user ui ∈ U (1), i.e., Q(1)
ui , consists of the first
K the acceptable partners in ui's preference list P (1)
ui , which
are in the same order as those in P (1)
ui , and ui in the (K +1)th
entry of Q(1)
ui . Parameter K is called the partial matching rate
in this paper.
An example is given in Figure 4, where to get the top 2
promising partners for the user, we place the user himself at
the 3rd cell in the preference list. All the remaining potential
partners will be cut off and only the top 3 users will participate
in the final matching.
Based on the concepts of self matching and partial matching
strategy, we define the concepts of partial stable matching and
generic stable matching as follow.
Definition 23 (Partial Stable Matching): For a given match-
ui ui,∀ui ∈ U (1) and
ing µ, µ is (1) rational
vj vj,∀vj ∈ U (2), (2) pairwise stable if there exist
µ(vj)Q(2)
no blocking pairs in the matching results, and (3) stable if it
is both rational and pairwise stable.
Definition 24 (Generic Stable Matching): For a given match-
ing µ, µ is a generic stable matching iff µ is a self matching
if µ(ui)Q(1)
Fig. 3. Partial network alignment with pruning.
Fig. 4. Example of partial matching strategy(K=2).
ui
stable matching. In this subsection, we will introduce the
concept of traditional stable matching briefly.
Given the user sets U (1) and U (2) of two partially aligned
social networks G(1) and G(2), each user in U (1)(or U (2)) has
his preference over users in U (2)(or U (1)). Term vjP (1)
ui vk is
used to denote that ui ∈ U (1) prefers vj to vk for simplicity,
where vj, vk ∈ U (2) and P (1)
is the preference operator of
ui ∈ U (1). Similarly, we can use term uiP (2)
vj uk to denote that
vj ∈ U (2) prefers ui to uk in U (1) as well.
Definition 17 (Matching): Mapping µ : U (1) ∪ U (2) → U (1) ∪
U (2) is defined to be a matching iff (1) µ(ui) = 1,∀ui ∈ U (1)
and µ(ui) ∈ U (2); (2) µ(vj) = 1,∀vj ∈ U (2) and µ(vj) ∈
U (1); (3) µ(ui) = vj iff µ(vj) = ui.
Definition 18 (Blocking Pair): A pair (ui, vj) is a a blocking
pair of matching µ if ui and vj prefers each other to their
i.e., (µ(ui) (cid:54)= vj) ∧ (µ(vj) (cid:54)= ui) and
mapped partner,
(vjP (1)
Definition 19 (Stable Matching): Given a matching µ, µ is
stable if there is no blocking pair in the matching results [5].
As introduced in [14], the stable matching can be obtained
ui µ(ui)) ∧ (uiP (2)
vj µ(vj)).
with the Gale-Shapley algorithm proposed in [9].
WilliamNew JerseyWmNJRebeccaIllinoisBeckyILJonathanCaliforniaJonCAInput Test SetPre-PruningWilliamNew JerseyRebeccaIllinoisJonathanCaliforniaWmNJBeckyILJonCATraditional Stable MatchingWilliamNew JerseyRebeccaIllinoisJonathanCaliforniaWmNJBeckyILJonCA0.90.80.70.70.60.5Generic Stable Matching (K = 1)WilliamNew JerseyRebeccaIllinoisJonathanCaliforniaWmNJBeckyILJonCA0.90.80.70.70.5…Preference ListPartial Matching Strategy(K+1)th entryPROPERTIES OF THE HETEROGENEOUS NETWORKS
TABLE I
property
user
tweet/tip
location
friend/follow
write
locate
# node
# link
network
Twitter
5,223
9,490,707
297,182
164,920
9,490,707
615,515
Foursquare
5,392
48,756
38,921
76,972
48,756
48,756
or µ is a partial stable matching.
As example of generic stable matching is shown in the
bottom two plots of Figure 3. Traditional stable matching can
prune most non-existing anchor links and make sure the results
can meet one-to-one constraint. However,
it preserves the
anchor links (Rebecca, Becky) and (Jonathan, Jon), which are
connecting non-anchor users. In generic stable matching with
parameter K = 1, users will be either connected with their
most preferred partner or stay unconnected. Users "William"
and "Wm" are matched as link (William, Wm) has the highest
score. "Rebecca" and "Jonathan" will prefer to stay uncon-
nected as their most preferred partner "Wm" is connected with
"William" already. Furthermore, "Becky" and "Jon" will stay
unconnected as their most preferred partner "Rebecca" and
"Jonathan" prefer to stay unconnected. In this way, generic
stable matching can further prune the non-existing anchor links
(Rebecca, Becky) and (Jonathan, Jon).
The truncated generic stable matching results can be
achieved with the Generic Gale-Shapley algorithm as given
in Algorithm 1.
V. EXPERIMENTS
To demonstrate the effectiveness of PNA in predicting an-
chor links for partially aligned heterogeneous social networks,
we conduct extensive experiments on two real-world hetero-
geneous social networks: Foursquare and Twitter. This section
includes three parts: (1) dataset description, (2) experiment
settings, and (3) experiment results.
A. Dataset Description
The datasets used in this paper include: Foursquare and
Twitter, which were crawled during November 2012 [14], [36],
[37], [42]. More detailed information about these two datasets
is shown in Table I and in [14], [36], [37], [42]. The number
of anchor links crawled between Foursquare and Twitter is
3, 388 and 62.83% Foursquare users are anchor users.
B. Experiment Settings
In this part, we will talk about the experiment settings in de-
tails, which includes: (1) comparison methods, (2) evaluation
methods, and (3) experiment setups.
Algorithm 1 Generic Gale-Shapley Algorithm
Input: user sets of aligned networks: U (1) and U (2).
classification results of potential anchor links in L
known anchor links in A(1,2)
truncation rate K
Output: a set of inferred anchor links L(cid:48)
1: Initialize the preference lists of users in U (1) and U (2) with
predicted existence probabilities of links in L and known
anchor links in A(1,2), whose existence probabilities are
1.0
2: construct the truncated strategies from the preference lists
3: Initialize all users in U (1) and U (2) as free
4: L(cid:48) = ∅
5: while ∃ free u(1)
in U (1) and u(1)
's truncated strategy is
i
non-empty do
i
from u(1)
i
's trun-
Remove the top-ranked account u(2)
cated strategy
if u(2)
then
j ==u(1)
L(cid:48) = L(cid:48) ∪ {(u(1)
Set u(1)
as stay unconnected
, u(1)
)}
j
i
i
i
i
else
if u(2)
i
j
is free then
L(cid:48) = L(cid:48) ∪ {(u(1)
Set u(1)
and u(2)
∃u(1)
if u(2)
that u(2)
p
j
j
i
else
j )}
, u(2)
as occupied
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
is occupied with.
then
j
prefers u(1)
L(cid:48) = (L(cid:48) − {(u(1)
Set u(1)
p
to u(1)
p
p , u(2)
as free and u(1)
j )}) ∪ {(u(1)
as occupied
i
i
i
j )}
, u(2)
end if
18:
19:
20:
21:
22: end while
end if
end if
1) Comparison Methods: The comparison methods used in
the experiments can be divided into the following 4 categories:
Methods with Generic Stable Matching:
• PNAOMG: PNAOMG (PNA with Over sampling &
Generic stable Matching) is the method proposed in this
paper, which consists of two steps: (1) class imbalance
link prediction with over sampling, and (2) candidate
pruning with generic stable matching.
• PNADMG: PNADMG (PNA with Down sampling &
Generic stable Matching) is another method proposed
in this paper, which consists of two steps: (1) class
imbalance link prediction with down sampling, and (2)
candidate pruning with generic stable matching.
Methods with Traditional Stable Matching
• PNAOM: PNAOM (PNA with Over sampling & tradi-
tional stable Matching) is identical to PNAOMG except
that in the second step, PNAOM applies the traditional
stable matching [9], [14].
(a) AUC: alignment rate
(b) AUC: negative positive rate
Fig. 5. AUC of different class imbalance link prediction methods.
• PNADM: PNADM (PNA with Down sampling & tradi-
tional stable Matching) is identical to PNADMG except
that in the second step, PNADM applies the traditional
stable matching [9], [14].
Class Imbalance Anchor Link Prediction:
• PNAO: PNAO (PNA with Over sampling) is the link
prediction method with over sampling to overcome the
class imbalance problem and has no matching step.
• PNAD: PNAD (PNA with Down sampling) is the link
prediction method with down sampling to overcome the
class imbalance problem and has no matching step.
Existing Network Anchoring Methods
• MNA: MNA (Multi-Network Anchoring) is a two-phase
method proposed in [14] which includes: (1) supervised
link prediction without addressing class imbalance prob-
lem; (2) traditional stable matching [9], [14].
• MNA no: MNA no (MNA without one-to-one constraint)
is the first step of MNA proposed in [14] which can pre-
dict anchor links without addressing the class imbalance
problem and has no matching step.
2) Evaluation Metrics: The output of different link pre-
diction methods can be either predicted labels or confidence
scores, which are evaluated by Accuracy, AUC, F1 in the
experiments.
3) Experiment Setups: In the experiment, initially, a fully
aligned network containing 3000 users in both Twitter and
Foursquare is sampled from the datasets. All
the existing
anchor links are grouped into the positive link set and all the
possible non-existing anchor links are used as the potential
link set. Certain number of links are randomly sampled
from the potential link set as the negative link set, which
is controlled by parameter θ. Parameter θ represents the
#negative
#positive rate, where θ = 1 denotes the class balance case,
i.e., #positive equals to #negative; θ = 50 represents that
case that negative instance set is 50 times as large as that of the
positive instance set, i.e., #negative = 50×#positive. In the
experiment, θ is chosen from {1, 2, 3, 4, 5, 10, 20, 30, 40, 50}.
Links in the positive and negative link sets are partitioned
into two parts with 10-fold cross validation, where 9 folds
are used as the training set and 1 fold is used as the test set.
To simulate the partial alignment networks, certain positive
links are randomly sampled from the positive training set as
the final positive training set under the control of parameter η.
η is chosen from {0.1, 0.2,··· , 1.0}, where η = 0.1 denotes
that the networks are 10% aligned and η = 1.0 shows that the
networks are fully aligned. With links in the positive training
set, anchor adjacency tensor based features and the latent
feature vectors are extracted from the network to build link
prediction model M. In building model M, over sampling and
under sampling techniques are applied and the sampling rate is
determined by parameter σ ∈ {0.0, 0.1, 0.2,··· , 1.0}, where
σ = 0.3 denotes that 0.3×(#negative−#positive) negative
links are randomly removed from the negative link set in under
sampling; or 0.3×(#negative−#positive) positive links are
generated and added to the positive link set in over sampling.
Before applying model M to the test set, pre-pruning process
is conducted on the test set in advance. Based on the prediction
results of model M on the test set, post-pruning with generic
stable matching is applied to further prune the non-existent
candidates to ensure that the final prediction results across
the partially aligned networks can meet the one − to − one≤
constraint controlled by the partial matching parameter K.
C. Experiment Results
In this part, we will give the experiment results of all
these comparison methods in addressing the partial network
alignment problem. This part includes (1) analysis of sampling
methods in class imbalance link prediction; (2) performance
comparison of different
link prediction methods; and (3)
parameter analysis.
1) Analysis of Sampling Methods: To examine whether
sampling methods can improve the prediction performance on
the imbalanced classification problem or not, we also compare
PNAO, PNAD with MNA no and the results are given in
Figure 5, where we fix θ as 10 but change η with values in
{0.1, 0.2,··· , 1.0} and compare the AUC achieved by PNAO,
PNAD and MNA no. We can observe that the AUC values of
0.10.20.30.40.50.60.70.80.91.0η0.600.650.700.750.800.850.900.95AUCPNAOPNADMNA_no01020304050θ0.600.650.700.750.800.850.900.95AUCPNAOPNADMNA_no(a) Acc.@θ = 5, η = 0.4
(b) F1@θ = 5, η = 0.4
(c) Acc.@θ = 50, η = 0.9
(d) F1@θ = 50, η = 0.9
Fig. 6. F1, Accuracy of PNAOMG and PNADMG with different partial matching rates.
all these three methods increases with the increase of η but
PNAO and PNAD perform consistently better than MNA no.
In Figure 5(b), we fix η as 0.6 but change θ with values in
{1, 2, 3, 4, 5, 10, 20, 30, 40, 50} and compare the AUC of
PNAO, PNAD and MNA no. As shown in Figure 5(b), the
performance of PNAO, PNAD and MNA no can all varies
slightly with θ changing from 1 to 50 and PNAO, PNAD can
achieve better performance than MNA no consistently.
2) Comparison of Different Link Prediction Methods:
Meanwhile, as generic stable matching based post pruning
can only output the labels of potential anchor links in the test
set, we also evaluate all these methods by comparing their
Accuracy and F1 score Tables II-III. In Table II, we fix θ as
10, K as 5 but change η with values in {0.1, 0.2,··· , 1.0}.
Table II has two parts. The upper part of Table II shows the
Accuracy achieved by all the methods with various η, and the
lower part shows the F1 score. Generally, the performance of
all comparison methods rises as η increases. In the upper part,
methods PNAOMG and PNADMG can consistently perform
better than all other comparison methods for different η. For
example, when η = 0.5, the Accuracy achieved by PNAOMG
is higher than PNAOM by 3.45%, higher than MNA by 6.0%,
higher than PNAO by 7.51% and higher than MNA no by
7.75%; meanwhile, the Accuracy achieved by PNADMG is
higher than PNADM, MNA, PNAD and MNA no as well. The
advantages of PNAOMG and PNADMG over other comparison
methods are more obvious under the evaluation of F1 as in
class imbalance settings, Accuracy is no longer an appropriate
evaluation metric [3]. For example, when η = 0.5, the F1
achieved by PNAOMG is about 13.25% higher than PNAOM,
24% higher than MNA, 101.6% higher than PNAO and 165%
higher than MNA no; so is the case for method PNADMG.
The experiment results show that PNAOMG and PNADMG can
work well with datasets containing different ratio of anchor
links across the networks. Similar results can be obtained
from Table III, where we fix η = 0.6, K as 5 but change
θ with values in {1, 2, 3, 4, 5, 10, 20, 30, 40, 50}. It shows that
PNAOMG and PNADMG can effectively address the class
imbalance problem.
that
The fact
(1) PNAOMG can outperform PNAOM
(PNADMG outperforms PNADM) shows that generic stable
matching can work well in dealing with partially aligned
social networks; (2) PNAOM can beat PNAO (and PNADM
beats PNAD) means that stable matching can achieve very
good post-pruning results; (3) PNAOM and PNADM can
perform better than MNA (or PNAO and PNAD can achieve
better results than MNA no) means that sampling methods can
overcome the class imbalance problem very well.
3) Analysis of Partial Matching Rate: In the generic sta-
ble matching, only top K anchor link candidates will be
preserved. In this part, we will analyze the effects of pa-
rameter K on the performance of PNAOMG and PNADMG.
Figure 6 gives the results (both Accuracy and F1) of
PNAOMG and PNADMG by setting parameter K with values
01020304050K0.920.930.940.950.960.970.980.991.001.01AccuracyPNAOMGPNADMG01020304050K0.550.600.650.700.75F1PNAOMGPNADMG01020304050K0.9840.9860.9880.9900.9920.9940.996AccuracyPNAOMGPNADMG01020304050K0.740.760.780.800.820.840.860.88F1PNAOMGPNADMGPERFORMANCE COMPARISON OF DIFFERENT METHODS FOR PARTIAL NETWORK ALIGNMENT WITH DIFFERENT NETWORK ALIGNMENT RATES.
TABLE II
ACC
F1
Methods
PNAOMG
PNADMG
PNAOM
PNADM
MNA
PNAO
PNAD
MNA no
PNAOMG
PNADMG
PNAOM
PNADM
MNA
PNAO
PNAD
MNA no
0.1
0.964
0.960
0.942
0.940
0.917
0.905
0.905
0.895
0.280
0.283
0.230
0.239
0.211
0.014
0.010
0.004
0.2
0.966
0.974
0.938
0.951
0.918
0.907
0.908
0.899
0.375
0.374
0.318
0.324
0.267
0.054
0.048
0.021
0.3
0.973
0.961
0.948
0.949
0.922
0.915
0.911
0.901
0.442
0.412
0.384
0.369
0.375
0.211
0.131
0.042
anchor link sampling rate η
0.7
0.4
0.981
0.967
0.976
0.982
0.970
0.945
0.969
0.929
0.940
0.922
0.926
0.915
0.912
0.923
0.922
0.907
0.776
0.496
0.783
0.481
0.723
0.452
0.424
0.716
0.705
0.420
0.413
0.210
0.365
0.165
0.067
0.339
0.6
0.989
0.975
0.960
0.947
0.937
0.927
0.926
0.921
0.717
0.658
0.638
0.593
0.578
0.402
0.380
0.322
0.5
0.987
0.983
0.954
0.949
0.931
0.918
0.915
0.916
0.615
0.589
0.543
0.526
0.496
0.305
0.257
0.232
0.8
0.988
0.989
0.968
0.966
0.943
0.925
0.925
0.924
0.843
0.848
0.824
0.812
0.782
0.385
0.367
0.346
0.9
0.989
0.986
0.983
0.983
0.949
0.929
0.929
0.919
0.941
0.925
0.916
0.919
0.899
0.428
0.405
0.360
1.0
0.990
0.990
0.981
0.981
0.971
0.921
0.923
0.922
0.965
0.972
0.963
0.963
0.943
0.438
0.438
0.380
PERFORMANCE COMPARISON OF DIFFERENT METHODS FOR PARTIAL NETWORK ALIGNMENT WITH DIFFERENT NEGATIVE POSITIVE RATES.
TABLE III
Measure
ACC
F1
Methods
PNAOMG
PNADMG
PNAOM
PNADM
MNA
PNAO
PNAD
MNA no
PNAOMG
PNADMG
PNAOM
PNADM
MNA
PNAO
PNAD
MNA no
1
0.941
0.920
0.934
0.916
0.914
0.706
0.752
0.714
0.943
0.926
0.936
0.923
0.887
0.600
0.687
0.575
2
0.900
0.917
0.898
0.914
0.863
0.795
0.812
0.781
0.870
0.890
0.867
0.887
0.800
0.609
0.633
0.542
3
0.903
0.903
0.899
0.892
0.884
0.834
0.836
0.825
0.835
0.834
0.832
0.822
0.790
0.553
0.569
0.526
negative positive rate θ
4
0.904
0.913
0.882
0.910
0.886
0.849
0.865
0.839
0.805
0.821
0.772
0.819
0.760
0.515
0.528
0.483
5
0.905
0.893
0.898
0.887
0.878
0.880
0.875
0.873
0.776
0.754
0.769
0.747
0.694
0.492
0.455
0.447
10
0.989
0.975
0.960
0.947
0.937
0.927
0.926
0.921
0.717
0.658
0.638
0.593
0.578
0.402
0.380
0.322
20
0.995
0.994
0.975
0.977
0.966
0.958
0.955
0.953
0.608
0.602
0.550
0.563
0.508
0.294
0.230
0.204
30
0.995
0.998
0.981
0.981
0.970
0.970
0.968
0.968
0.552
0.577
0.470
0.468
0.397
0.251
0.131
0.105
40
0.998
0.997
0.992
0.990
0.978
0.976
0.976
0.975
0.565
0.548
0.438
0.419
0.346
0.131
0.093
0.075
50
0.997
0.997
0.995
0.990
0.986
0.980
0.980
0.980
0.524
0.533
0.366
0.405
0.329
0.051
0.067
0.041
in {1, 2, 3, 4, 5, 10, 20, 30, 40, 50}.
In Figures 6(a)-6(b), parameters θ and η are fixed as 5
and 0.4 respectively. From the results, we observe that both
PNAOMG and PNADMG can perform very well when K is
small and the best is obtained at K = 1. It shows that the
anchor link candidates with the highest confidence predicted
by PNAO and PNAD are the optimal network alignment
results when θ and η are low. In Figures 6(c)-6(d), we set
η as 0.9 and θ as 50 (i.e., the networks contain more anchor
links and the training/test sets become more imbalance), we
find that the performance of both PNAOMG and PNADMG
increases first and then decreases and finally stay stable as K
increases, which shows that the optimal anchor link candidates
are those within the top K candidate set rather than the one
with the highest confidence as the training/test sets become
more imbalance.
In addition, the partial matching strategy can shrink the
preference lists of users a lot, which can lead to lower time
cost as shown in Figure 7 especially for the smaller K values
which lead to better accuracy as shown in Figure 6.
Results in all these figures show that generic stable match-
ing can effectively prune the redundant candidate links and
significantly improve the prediction results.
VI. RELATED WORKS
Aligned social network studies have become a hot research
topic in recent years. Kong et al. [14] are the first to propose
the anchor link prediction problem in fully aligned social
networks. Zhang et al. [36], [37], [42], [40] propose to
small core in nash equilibrium in college admission problems.
Flor´een et al. [8] propose to study the almost stable matching
by truncating the Gale-Shapley algorithm.
VII. CONCLUSION
In this paper, we study the partial network alignment
problem across partially aligned social networks. To address
the challenges of the studied problem, a new method PNA is
proposed in this paper. PNA can extract features for anchor
links based on a set of anchor meta paths and overcome
the class imbalance problem with over sampling and down
sampling. PNA can effectively prune the non-existing anchor
links with generic stable matching to ensure the results can
meet the one − to − one≤ constraint. Extensive experiments
done on two real-world partially aligned networks show
the superior performance of PNA in addressing the partial
network alignment problem.
VIII. ACKNOWLEDGEMENT
This work is supported in part by NSF through grants
CNS-1115234, Google Research Award, the Pinnacle Lab at
Singapore Management University, and Huawei grants.
REFERENCES
[1] M. Bayati, M. Gerritsen, D. Gleich, A. Saberi, and Y. Wang. Algorithms
for large, sparse network alignment problems. In ICDM, 2009.
[2] I. Bhattacharya and L. Getoor. Collective entity resolution in relational
data. TKDD, 1(1), 2007.
[3] N. Chawla. Data mining for imbalanced datasets: An overview. In Data
Mining and Knowledge Discovery Handbook. 2005.
[4] N. Chawla, K. Bowyer, L. Hall, and P. Kegelmeyer. Smote: Synthetic
minority over-sampling technique. J. Artif. Int. Res., 2002.
[5] L. Dubins and D. Freedman. Machiavelli and the gale-shapley algorithm.
The American Mathematical Monthly, 1981.
[6] M. Duggan and A. Smith.
Report
at
social-media-update-2013/.
available
Social media update 2013.
2013.
http://www.pewinternet.org/2013/12/30/
[7] J. Euzenat and P. Shvaiko. Ontology Matching. Springer-Verlag New
York, Inc., Secaucus, NJ, USA, 2007.
[8] P. Flor´een, P. Kaski, V. Polishchuk, and J. Suomela. Almost stable
matchings by truncating the gale-shapley algorithm. Algorithmica, 2010.
[9] D. Gale and L. Shapley. College admissions and the stability of marriage.
The American Mathematical Monthly, 1962.
[10] D. Gusfield and R. Irving. The Stable Marriage Problem: Structure and
[14] X. Kong, J. Zhang, and P. Yu. Inferring anchor links across heteroge-
neous social networks. In CIKM, 2013.
[15] M. Kubat and S. Matwin. Addressing the curse of imbalanced training
sets: One-sided selection. In ICML, 1997.
[16] R. Lichtenwalter, J. Lussier, and N. Chawla. New perspectives and
methods in link prediction. In KDD, 2010.
[17] X. Liu, S. Ji, W. Glanzel, and B. De Moor. Multiview partitioning via
tensor methods. TKDE, 2013.
[18] J. Ma. Stable matchings and the small core in nash equilibrium in the
college admissions problem. Technical report, 1998.
[19] MarketingCharts. Majority of
twitter users also use instagram.
2014. Report available at http://www.marketingcharts.com/wp/online/
majority-of-twitter-users-also-use-instagram-38941/.
[20] A. Menon and C. Elkan. Link prediction via matrix factorization. In
ECML/PKDD, 2011.
Algorithms. 1989.
[11] N. Japkowicz and S. Stephen.
The class imbalance problem: A
systematic study. Intelligent Data Analysis, 2002.
[12] S. Jin, J. Zhang, P. Yu, S. Yang, and A. Li. Synergistic partitioning in
multiple large scale social networks. In IEEE BigData, 2014.
[13] T. Kolda and B. Bader. Tensor decompositions and applications. SIAM
REVIEW, 2009.
Fig. 7. Time cost of PNAOMG and PNADMG with different partial matching
rates.
predict links for new users and new networks by transferring
heterogeneous information across aligned social networks. A
comprehensive survey about link prediction problems across
multiple social networks is available in [38]. In addition to
link prediction problems, Jin and Zhang et al. [12], [39], [41]
introduce the community detection problems across aligned
networks and Zhan et al. [35] study the information diffusion
across aligned social networks.
Meta path first proposed by Sun et al. [26] has become a
powerful tool, which can be applied in either in link prediction
problems [26], [27] or clustering problems [28], [25]. Sun et al.
[26] propose to predict co-author relationship in heterogeneous
bibliographic networks based on meta path. Sun et al. extend
the link prediction model to relationship prediction model
based on meta path in [27]. Sun et al. [28] propose to calculate
the similarity scores among users based on meta path in
bibliographical network. Sun et al. [25] also apply meta path
in clustering problem of heterogeneous information networks
with incomplete attributes.
Tensor has been widely used in social networks studies.
Moghaddam et al. [21] propose to apply extended tensor
factorization model for personalized prediction of review
helpfulness. Liu et al. [17] present a tensor-based framework
for integrating heterogeneous multi-view data in the context
of spectral clustering. A more detailed tutorial about tensor
decomposition and applications is available in [13].
Class imbalance problems in classification can be very
common in real-world applications. Chawla et al. [4] propose a
technique for over-sampling the minority class with generated
new synthetic minority instances. Kubat et al. [15] propose to
address the class imbalance problems with under sampling of
the majority cases in the training set. A systematic study of
the class imbalance problem is available in [11].
College admission problem [23] and stable marriage prob-
lem [10] have been studied for many years and lots of works
have been done in the last century. In recent years, some new
papers have come out in these areas. Sotomayor et al. [24]
propose to analyze the stability of the equilibrium outcomes
in the admission games induced by stable matching rules.
Ma [18] analyzes the truncation in stable matching and the
0102030405060K280285290295300305310315secondPNAOMGPNADMGPNAOMPNADM[21] S. Moghaddam, M. Jamali, and M. Ester. Etf: Extended tensor fac-
torization model for personalizing prediction of review helpfulness. In
WSDM, 2012.
[22] O. Peled, M. Fire, L. Rokach, and Y. Elovici. Entity matching in online
social networks. In SOCIALCOM, 2013.
[23] A. Roth. The college admissions problem is not equivalent to the
marriage problem. Journal of Economic Theory, 1985.
[24] M. Sotomayor.
admission games induced by stable matching rules.
Journal of Game Theory, 2008.
The stability of the equilibrium outcomes in the
International
[25] Y. Sun, C. Aggarwal, and J. Han. Relation strength-aware clustering of
heterogeneous information networks with incomplete attributes. VLDB,
2012.
[26] Y. Sun, R. Barber, M. Gupta, C. Aggarwal, and J. Han. Co-author
In
relationship prediction in heterogeneous bibliographic networks.
ASONAM, 2011.
[27] Y. Sun, J. Han, C. Aggarwal, and N. Chawla. When will it happen?:
In
Relationship prediction in heterogeneous information networks.
WSDM, 2012.
[28] Y. Sun, J. Han, X. Yan, P. Yu, and T. Wu. Pathsim: Meta path-based top-
k similarity search in heterogeneous information networks. In VLDB,
2011.
[29] J. Tang, H. Gao, X. Hu, and H. Liu. Exploiting homophily effect for
[30] I. Tomek. Two Modifications of CNN. IEEE Transactions on Systems,
trust prediction. In WSDM, 2013.
Man and Cybernetics, 1976.
[31] K. Wilcox and A. T. Stephen. Are close friends the enemy? online social
networks, self-esteem, and self-control. Journal of Consumer Research,
2012.
[32] Y. Yao, H. Tong, X. Yan, F. Xu, and J. Lu. Matri: a multi-aspect and
transitive trust inference model. In WWW, 2013.
[33] J. Ye, H. Cheng, Z. Zhu, and M. Chen. Predicting positive and negative
links in signed social networks by transfer learning. In WWW, 2013.
[34] R. Zafarani and H. Liu. Connecting users across social media sites: A
behavioral-modeling approach. In KDD, 2013.
[35] Q. Zhan, S. Wang J. Zhang, P. Yu, and J. Xie. Influence maximization
across partially aligned heterogenous social networks. In PAKDD, 2015.
[36] J. Zhang, X. Kong, and P. Yu. Predicting social links for new users
across aligned heterogeneous social networks. In ICDM, 2013.
[37] J. Zhang, X. Kong, and P. Yu. Transferring heterogeneous links across
location-based social networks. In WSDM, 2014.
[38] J. Zhang and P. Yu.
Link prediction across heterogeneous social
networks: A survey. Technical report, 2014.
[39] J. Zhang and P. Yu. Community detection for emerging networks. In
SDM, 2015.
[40] J. Zhang and P. Yu. Integrated anchor and social link predictions across
partially aligned social networks. In IJCAI, 2015.
[41] J. Zhang and P. Yu. Mcd: Mutual clustering across multiple heteroge-
neous networks. In IEEE BigData Congress, 2015.
[42] J. Zhang, P. Yu, and Z. Zhou. Meta-path based multi-network collective
link prediction. In KDD, 2014.
|
1804.11242 | 4 | 1804 | 2019-12-17T07:22:53 | Mapper on Graphs for Network Visualization | [
"cs.SI",
"stat.ML"
] | Networks are an exceedingly popular type of data for representing relationships between individuals, businesses, proteins, brain regions, telecommunication endpoints, etc. Network or graph visualization provides an intuitive way to explore the node-link structures of network data for instant sense-making. However, naive node-link diagrams can fail to convey insights regarding network structures, even for moderately sized data of a few hundred nodes. We propose to apply the mapper construction--a popular tool in topological data analysis--to graph visualization, which provides a strong theoretical basis for summarizing network data while preserving their core structures. We develop a variation of the mapper construction targeting weighted, undirected graphs, called mapper on graphs, which generates property-preserving summaries of graphs. We provide a software tool that enables interactive explorations of such summaries and demonstrates the effectiveness of our method for synthetic and real-world data. The mapper on graphs approach we propose represents a new class of techniques that leverages tools from topological data analysis in addressing challenges in graph visualization. | cs.SI | cs | Mapper on Graphs for Network Visualization
Mustafa Hajij∗, Paul Rosen†, Bei Wang‡
9
1
0
2
c
e
D
7
1
]
I
S
.
s
c
[
4
v
2
4
2
1
1
.
4
0
8
1
:
v
i
X
r
a
Abstract
Networks are an exceedingly popular type of data for representing relationships between
individuals, businesses, proteins, brain regions, telecommunication endpoints, etc. Network or
graph visualization provides an intuitive way to explore the node-link structures of network
data for instant sense-making. However, naive node-link diagrams can fail to convey insights
regarding network structures, even for moderately sized data of a few hundred nodes. We pro-
pose to apply the mapper construction -- a popular tool in topological data analysis -- to graph
visualization, which provides a strong theoretical basis for summarizing network data while
preserving their core structures. We develop a variation of the mapper construction target-
ing weighted, undirected graphs, called mapper on graphs, which generates property-preserving
summaries of graphs. We provide a software tool that enables interactive explorations of such
summaries and demonstrates the effectiveness of our method for synthetic and real-world data.
The mapper on graphs approach we propose represents a new class of techniques that leverages
tools from topological data analysis in addressing challenges in graph visualization.
1
Introduction
Networks are often used to model social, biological, and technological systems. In recent years,
our ability to collect and archive such data has far outpaced our ability to understand them. For
instance, the Blue Brain Project -- the worlds largest-scale simulations of neural circuits -- generates
instances of the micro-connectome containing 10 million neurons and 88 billion synaptic connections
for the rodent brain. The challenges for graph visualization (sometimes called network visualization)
are two-fold: how to effectively extract features from such complex data; and how to design effective
visualizations to communicate these features to the users.
We propose to address these challenges by leveraging the mapper construction [88], a tool
in topological data analysis (TDA), to develop visualizations for large network data. Given a
topological space X equipped with a function f on X, the classic mapper construction from the
seminal work of Singh et al. [88] provides a topological summary of the data for efficient computation,
manipulation, and exploration.
It has enjoyed tremendous success in data science, from cancer
research [72] to sports analytics [1], among others [17, 64, 65, 91]; it is also a cornerstone of several
data analytics companies, e.g., Ayasdi and Alpine Data Labs.
In this paper, we develop a variation of the mapper construction targeting weighted undirected
graphs, called mapper on graphs. For the rest of the paper, we use networks to refer to the data and
graphs as an abstraction to the data. The mapper construction connects naturally with visualization
by providing a strong theoretical basis for simplifying large complex data while preserving their
core structures. Specifically:
∗KLA corporation. E-mail: [email protected]
†University of South Florida. E-mail: [email protected]
‡University of Utah. E-mail: [email protected]. Corresponding author.
1
• We propose a set of summarization techniques to transform large graphs into hierarchical
representations and provide interactive visualizations for their exploration.
• We demonstrate the effectiveness of our method on synthetic and real-world data using three
different topological lenses that capture various properties of the graphs.
• We provide open-sourced implementation together with our experimental datasets via GitHub
(see the supplement material).
2 Related Work
Graph visualization. We limit our review to node-link diagrams, which are utilized by many visu-
alization software tools, including Gephi [7], GraphViz [34], and NodeXL [44]. For a comprehensive
overview of graph visualization techniques, see [93].
One of the biggest challenges with node-link diagrams is visual clutter, which has been exten-
improved node
It is mainly addressed in three ways:
sively studied in graph visualization [33].
layouts, edges bundling, and alternative visual representations.
Tutte [92] provided the earliest graph layout method for node-link diagrams, followed by meth-
ods driven by linear programming [40], force-directed embeddings [37, 47], embeddings of the graph
metric [39], and connectivity structures [13, 50, 52, 53]. TopoLayout [2] creates a hybrid layout by
decomposing a graph into subgraphs based on their topological features, including trees, complete
graphs, bi-connected components, and clusters, which are subsequently grouped and laid out as
meta-nodes. One of many differences between TopoLayout and our work is that we use functions
defined on the graph to automatically and interactively guide decomposition and feature extraction
among subgraphs.
Edge bundling, which bundles adjacent edges together, is commonly used to reduce visual clutter
on dense graphs [45]. For massive graphs, hierarchical edge bundling scales to millions of edges [38],
while divided edge bundling [85] tends to produce higher-quality visual results. Nevertheless, these
approaches only deal with edge clutter, not node clutter, and they only support limited types of
analytic tasks [4, 67].
Finally, alternative visual representations have been used to remove clutter, ranging from varia-
tions on node-link diagrams, such as replacing nodes with modules [31] and motifs [30], to abstract
representations, such as matrix diagrams [28] and graph statistics [49].
Node clustering. The objective in node clustering (or graph clustering) is to group the nodes of
the graph by taking into consideration its edge structure [84]. Common techniques include spectral
methods [26, 36, 54, 94], similarity-based aggregation [90], community detection [69, 70], random
walks [48, 80], and hierarchical clustering [12, 16]. Edge clustering has also been studied [23,
35]. Broadly speaking, our approach is a type of graph clustering that simultaneously preserves
relationships between clusters.
TDA in graph analysis and visualization. Persistent homology (the study of topological features
across multi-scales) and mapper construction are two of the most widely used tools in TDA. A
number of works use persistent homology to analyze graphs [29, 32, 46, 76, 77], and it has been
applied to the study of collaboration networks [5, 20] and brain networks [21, 24, 56, 57, 58, 59, 79].
In terms of graph visualization, persistent homology has been used in capturing changes in time-
varying graphs [43], as well as supporting interactive force-directed layouts [89].
The mapper construction [88] has been widely utilized in TDA for a number of applications [17,
64, 65, 73, 91]. Recently, it has witnessed major theoretical developments (e.g., [19, 25, 68]) that
2
Figure 1: An illustration of the mapper on graphs construction: (a) A weighted graph G = (V, E)
has (b) a topological lens f : V → R applied. (c) A cover U of the range space is given by intervals
U1, U2, U3, and U4 as cover elements. (d-e) The connected subgraphs induced by f−1(Ui) form
a cover of G, denoted as f∗(U). (f) The 1-dimensional skeleton of the nerve (1-nerve) of f∗(U) is
the resulting mapper on a graph whose nodes represent the connected subgraphs (in orange), and
edges represent the non-empty intersections between the subgraphs (in purple).
further adjudicate its use in data analysis. To the best of our knowledge, this is the first time the
mapper construction is utilized explicitly in graph visualization.
nonempty intersection of sets in U is contractible.
indexing set A such that (cid:83)
f (V ) of f , such that f (V ) ⊆(cid:83) Uα. Let f∗(U) denote the cover of G obtained by considering the
the nerve of the cover U, that is, N (U) =(cid:8)σ ⊆ A (cid:84)
α∈σ Uα (cid:54)= ∅(cid:9). We compute the nerve of f∗(U),
3 Methods: Mapper on Graphs Construction
Suppose the data is a weighted graph G = (V, E) equipped with a positive edge weight w : E → R
and a real-valued function defined on its nodes f : V → R. Our mapper on graphs method -- a
variation of the classic mapper construction -- provides a general framework to analyze, simplify,
and visualize G, as well as functions on G.
An open cover of a topological space X is a collection U = {Uα}α∈A of open sets for some
α∈A Uα = X. A finite open cover U is a good cover if every finite
The mapper on graphs construction starts with a finite good cover U = {Uα}α∈A of the image
connected components (i.e., maximal connected subgraphs) induced by nodes in f−1(Uα) for each
α.
Given a cover U = {Uα}α∈A of X, let N (U) denote the simplicial complex that corresponds to
denoted as N (f∗(U)), and refer to its 1-dimensional skeleton as the mapper on a graph, denoted
as M; see Figure 1 for an illustrative example.
Parameters. Mapper on graphs is inherently multi-scale; its construction relies on two sets of
parameters: the first defines the function/lens f , and the other specifies the cover U. For simplicity,
we normalize the range space f (V ) to be within [0, 1].
1. Topological Lens: The function f plays the role of a topological
lens through which we
look at the properties of the data, and different lenses provide different insights [9, 88].
3
Mapper on graphs currently considers three graph-theoretic lenses, average geodesic distance
(AGD), density estimation, and eigenfunctions of the graph Laplacian (see Figure 2), although
our framework can be easily extended to include other lenses (see Section 6).
2. Cover: The range of f , f (V ) ⊆ [0, 1], is covered by U, which consists of a finite number of
open intervals as cover elements U = {Uα}α∈A. A common strategy is to use uniformly sized
overlapping intervals. Let n be the number of intervals, and describes the amount of overlap
between adjacent intervals (see Section 3.2 for details). Adjusting these parameters increases
or decreases the amount of aggregation mapper on graphs provides.
Figure 2: Examples of topological lenses for graphs: (a) average geodesic distance AGD (orange);
(b) density estimation Dδ with δ = 2 (green); and (c) eigenvectors of the Fiedler vector of the
graph Laplacian, l2 (purple). Darker colors mean lower function values.
3.1 Topological Lens
An interesting open problem for the classic mapper construction is how to formulate topological
lenses beyond the best practice or a rule of thumb [9, 10]. In practice, height functions, distances
from the barycenter of the space, surface curvature, integral geodesic distances, and geodesic dis-
tances from a source point in the space have all been proposed as reasonable choices [9]. In the
graph setting, we focus on graph-theoretic lenses defined on the nodes of a graph, as illustrated
in Figure 2. Each lens is chosen to reflect a specific property of interest that is intrinsic to the
structure of a graph. In particular, we use as lenses average geodesic distance (AGD) [51] that
detects symmetries in the graph while being invariant to reflection, rotation, and scaling; density
estimation [87] that differentiates dense regions from sparse regions and outliers; and eigenfunctions
of the graph Laplacian [55] that capture geometric properties of the graph.
Average geodesic distance. Suppose a weighted graph G = (V, E) is equipped with a geodesic
distance metric d. That is, d(u, v) measures the geodesic/graph distance between two nodes u, v ∈
V . d can be computed by utilizing Dijkstra's shortest path algorithm. The average geodesic
distance, AGD : V → R, is given by
AGD(v) =
1
V
d(v, u).
(cid:88)
u∈V
This definition implies that the nodes near the center of the graph will likely have low function
values, while points on the periphery will have high values. The AGD function has been used
4
(a)(b)(c)extensively in shape analysis due to its desirable proprieties in detecting and reflecting symme-
try [51] based on how the function values are distributed. Therefore, the AGD as a topological
lens captures the symmetric properties of a graph, which are described by all or parts of the graph
that are invariant to transformations such as reflection, rotation, and scaling.
The mathematical notion of automorphism, in some
sense, captures the symmetry of the space as it is a
structural-preserving way of mapping a space to itself.
More precisely, consider a graph G as a metric space
equipped with the geodesic distance, (G, d). A bijec-
tion T : V → V is called an automorphism on (G, d) if
d(u, v) = d(T (u), T (v)) for every u, v ∈ V . Let Aut(G)
denote the group of automorphisms on G. A function
f : V → R is isometry invariant over Aut(G) if for
every T ∈ Aut(G): f ◦ T = f . AGD is, therefore,
let T
an isometry invariant scalar function.
be an automorphism on G, then for every v ∈ V , we
can verify that AGD(T (v)) = 1V
u∈V d(T (u)), and
T (v) = 1V
u∈V d(u, v) = AGD(v). See Figure 2(a)
and Figure 3(a) for examples of AGD on graphs.
(cid:80)
(cid:80)
Indeed,
Density estimation. The density estimation func-
tion [87] is given by
(cid:88)
u∈V
Dδ(v) =
−d(u, v)2
δ
),
exp(
is shown on the left;
Figure 3: The effect of a lens. The orig-
inal graph, colored by one of the three
lenses,
its corre-
sponding mapper on a graph M, along
with a chosen cover,
is shown on the
right.
(b) Dδ with δ = 1.
(c) l2.
(a) AGD.
where d(u, v) is the geodesic distance between two nodes
in the graph and δ > 0.
Since Dδ is completely defined in terms of the dis-
tance d, it is not hard to see that Dδ is also isometry in-
variant. Dδ correlates negatively with AGD as it tends
to take larger values on nodes that are close to the center, see Figure 2(b) and Figure 3(b) for
examples.
Eigenfunctions of the graph Laplacian. Let C(G) be the vector space of all functions f : V −→ R.
The unnormalized Laplacian of the graph G is the linear operator L : C(G) → C(G) defined by
mapping f ∈ C(G) to Lf , where (Lf )(v) =(cid:80)
u∈N (v) wu,v(f (v) − f (u)).
The eigenvectors of L form a rich family of scalar functions defined on G with many geometric
properties [55]. First, the gradient of the eigenfunctions of L tends to follow the overall shape of
the data [63]; and these functions have been used in applications, such as graph understanding [86],
segmentation [82], spectral clustering [71], and min-cut problems [66]. Sorting the eigenvectors of
L by increasing eigenvalues, we use eigenvectors of the second and third smallest eigenvalues of L
as the lens, denoted as l2 and l3.
These vectors usually contain low-frequency information about the graph, and they help to
retain the shape of complex graphs. In particular, l2, commonly referred to as the Fiedler vector [63],
has desirable geometric properties [27]. For instance, the maximum and the minimum of the Fielder
vector tend to occur at nodes with maximum geodesic distances [22], see Figure 2(c) and Figure 3(c)
for examples.
5
(a)(b)(c)Furthermore, there is a connection between mapper on graphs, spectral clustering, and graph
min-cut. For instance, the Fielder's vector l2 can be used to bi-partition the graph G (i.e.,
based on l2(v) > 0 or l2(v) ≤ 0); such a partition could also be approximated by computing
mapper on a graph M with l2 as the lens and setting n = 2 and ≈ 0. M not only provides a
generalization of spectral clustering but also preserves the connections (which form the min-cut)
between the clusters (for appropriately chosen > 0).
3.2 Cover
Given a graph G equipped with a lens function f : V →
R, suppose the range of the function f (V ) is normalized
to be within [0, 1], and A = {1,··· , n} for a finite good
cover U = {Uα}α∈A of the interval [0, 1]. We represent
this cover U visually by drawing long, colored rectangu-
lar boxes, as indicated in 4.
The mapper on graphs construction relies on the
choice of a cover for the interval [0, 1]; such a choice
is rather flexible but also essential to achieve effective
graph visualization. To obtain an initial cover, we start
by splitting [0, 1] into n (the resolution parameter) inter-
vals [c1, c2],··· , [cn−1, cn] with equal length, such that
c1 = 0 and cn = 1. The overlap parameter is then used
to obtain the initial cover U consisting of cover elements
(ci − , ci+1 + ) for 1 ≤ i ≤ n − 1.
Choosing n and has a significant impact on the
mapper on graphs output, as illustrated in Figure 4.
Broadly speaking, smaller n leads to a smaller topo-
logical summary of the graph; and smaller captures
fewer connections between clusters of nodes. In the ex-
amples shown in the paper, we find a smaller typically
give a more effective visualization for large and highly
connected graphs, e.g., ∈ [0.01, 0.1], while ∈ [0.1, 0.3]
appears to be sufficient for small graphs.
4 Visual Design and Interaction
Varying and n in a
Figure 4:
cover.
(a) G with a AGD lens. Vari-
ous mapper on graphs constructions: (b-
d) n = 2, 3, and 4, respectively; =
0.1. (e-f) n = 3, = 0.2 and 0.3, respec-
tively.
We provide a linked-view interface to enable exploration of the structure of a graph. It connects
the original graph G to its (multi-scale) summary in the form of a mapper on a graph M, through
interactive cover manipulation that supports customization of M.
4.1 Cover Visualization and Interaction
The mapper on graphs construction relies on the choice of two sets of parameters: a lens and a cover.
Therefore, the cover visualization consists of two components: a histogram of the lens, showing the
distribution of function values, and an interactive cover designer. Via interactive visualization, we
treat the exploration and manipulation of these parameters as a vehicle to study and summarize
the intrinsic structure of an input graph.
6
(a)(b)(c)(d)(e)(f)Histogram of a lens. Understanding the distribution of the values of a lens f can be helpful in
the mapper on graphs construction. Figure 5(left) shows an example of a histogram for the AGD
lens in gray. The histogram is split into a fixed number of bins within the range [0, 1]. We will
illustrate later how the visual information encoded in the histogram can be utilized to optimize the
choice of the cover. In addition, the histogram of a lens can be used to inform the choices for n
and -- generally speaking, a uniformly distributed lens function requires smaller .
Cover visualization and interactive manipulation. The
cover is visualized using a series of boxes, one per cover
element, displayed next to the histogram of the lens.
Each box is placed based upon the start and end val-
ues of its interval and colored based upon the midpoint.
Figure 5 shows the cover as red and orange boxes.
While an initial, uniform cover is sufficient for most
graph visualizations, we provide interactive manipula-
tion of individual cover elements that can be used to
obtain more desirable mapper on graphs output in some
cases. Given an interval Ui ∈ U, the user can manipu-
late its endpoints dynamically via an interactive interface such that Ui can be shrunk, expanded, or
shifted, as illustrated in Figure 6. As a user manipulates the interval Ui, the connected components
within f−1(Ui) split, merge, appear, or disappear. The histogram of a lens can be used to inform
the cover manipulation; for instance, the length of an interval could be inversely proportional to
the density of the histogram.
Figure 5: The histogram of a lens. U
consists of open intervals U1, U2, and U3.
Figure 6: (a) The case when an interval Ui ∈ U shrinks, from left to right, or equivalently when
it expands, from right to left, are shown. (b) The effect of interval shrinking (expanding) on the
mapper on graphs nodes is shown. (c) The case when the interval Ui shifts to a new position is
shown. (d) Changes to the mapper on graphs nodes that occur due to the interval shift are shown.
4.2 Graph Drawing
For both G and its summary M, we apply a Fruchterman-Reingold force-directed layout [37]
with the Barnes-Hut approximation for repulsive forces [6]. Our approach is ultimately agnostic
of the graph layout algorithm, and different layouts (e.g., layered approaches) may improve the
presentation of certain graphs.
For a given lens, f : V → R, a node in G is colored by a saturated colormap (red for AGD,
green for Dδ, and purple for l2 or l3) based on its function value. A node u in M (associated with
7
(a)(b)(c)(d)a connected component Cu ⊆ G) is colored similarly by taking the average of the function values
of nodes in Cu. The size of u is proportional to Cu.
For both graphs, edge thickness is drawn proportional to edge weight. For M, an edge [u, v]
represents the nonempty intersection between Cu and Cv. Therefore, its edge weight, and thus
thickness, is drawn proportional to the size of the intersection, Cu ∩ Cv.
For readability, only the largest component of the mapper on a graph is included in the visu-
alization. Furthermore, mapper on a graph nodes are removed from the output if the size of their
connected component Cu is less than a user-selected value.
Interactive Structural Correspondences
4.3
We provide three mechanisms for exploring structural correspondences between G and M: cover
element selection, node selection, and edge selection.
Figure 7: (a-c) Selecting a cover element (in blue) triggers the selection of its corresponding nodes
in M (top) and G (bottom). (d-e) Selecting a node u of M (top right in blue) triggers the selection
of its corresponding cover element that generates u (left) and nodes in G (bottom).
Cover element selection. When a cover element U is se-
lected, the action triggers the selection of nodes f−1(U )
in G, as well as nodes that represent connected compo-
nents of f−1(U ) in M. As illustrated in Figure 7(a-c),
after the selection of a cover element (top left in (a-c),
highlighted in blue), our system selects the correspond-
ing nodes in M (top) and in G (bottom). As previously
noted, if the nodes of M captured by a particular cover
element need fine-tuning, the box may be dragged, ex-
panded, or contracted. M will update correspondingly.
Node Selection. Each node u in M corresponds to
a connected component Cu from the original graph G.
With the selection of a node u, our interface recovers
and highlights Cu from G, as well as the cover element that generates the node u, see Figure 7(d-e).
Edge Selection. Each edge uv in M is determined by two connected components Cu and Cv in G.
With the selection of an edge uv, our interface highlights the clusters Cu and Cv in G associated with
its endpoints. Specifically, the sets Cu−(Cu∩Cv), Cv−(Cu∩Cv), and Cu∩Cv are colored differently
Figure 8: Selecting an edge (blue) in M
highlights the clusters of nodes in G as-
sociated with its endpoints and their in-
tersection.
8
(a)(b)(c)(d)(e)(b)(c)(a)to highlight node memberships and the relationship between the clusters. Figure 8 illustrates this
process. Nodes that are unique to each endpoint are in purple and sky blue, respectively; nodes
that correspond to the intersection are in blue (see Figure 8(a)). For comparison, clusters of nodes
attached to individual endpoints are also highlighted in blue in Figure 8(b).
5 Results
To demonstrate our approach, we have implemented our approach using Java and Processing1. We
evaluate our approach by examining mapper on graphs on synthetic and real datasets. Our code
and datasets are available on GitHub2.
Synthetic datasets. We apply mapper on graphs to 20
synthetic datasets, all of which are generated using Net-
workX [42]. Figure 9 shows 16 synthetic graphs G and their
corresponding mapper on graphs outputs M. For each ex-
ample, certain structures are emphasized depending on the
choice of the lens and cover, such as symmetry (e.g., (b),
(c), (k)) and the overall shape of the data (e.g., (a), (f),
(l)). The original graphs for (a) and (f) have a circular
shape, so we choose the Fiedler's vector l2 as the lens as
it has variability across the graph. M for (f) is partic-
ularly interesting as the original graph G comes from a
torus mesh, and M appears similar to its corresponding
Reeb graph. M also captures the dual structures of some
graphs in the cases of Grid graph (j) and the Dorogovtsev-
Goltsev-Mendes graph (c).
USAIR 97. The previous example illustrates a natural in-
terpretation of the nodes in M as clusters in G. In Fig-
ure 10, we provide a natural interpretation of the edges in
M as connections between clusters. The USAIR 97 graph
consists of 332 nodes and 2126 edges [8]. The nodes rep-
resent airports and the edges routes between airports. We
use l3 as the lens and explore the USAIR 97 dataset by
utilizing interactive edge selection as described in Section 4.
Figure 10: Edge selection within M
for the USAIR 97 graph: selecting
edge (1, 2) in (a) vs. edge (2, 3) in (b).
First in Figure 10(a), selecting edge (1, 2) in M allows us to inspect their corresponding clusters
C1 (light and dark blue nodes) and C2 (dark blue and purple nodes) in G. C1 and C2 have Bethel
and Anchorage International as major airports, respectively. Edge (1, 2) corresponds to airports
in C1 ∩ C2 (blue nodes), including the Aniak and the St Mary's. M clearly captures the fact that
these airports are the hubs between Bethel and Anchorage international in G.
Second, selecting edge (2, 3) in M enables the exploration of C2 and C3 in G, respectively. C2,
as shown in Figure 10(b), has Aniak and St Mary's; while C3 contains the Juneau International
Airport. Edge (2, 3) in M is mainly represented by Anchorage International. M captures the fact
that Anchorage International serves as a hub -- in order to go from any airport in C3 to airports in
C2 one must travel through Anchorage.
Finally, via node selection, node 6 in M corresponds to a peripheral cluster C6 on the outskirt
1https://processing.org/
2https://github.com/USFDataVisualization/MapperOnGraphs
9
Anchorage IntJuneau IntSt Mary'sAniakSt Mary'sAniakBethelAnchorage IntGuam Int.Honolulu Int.Guam Int.Honolulu Int.(a)(b)123123456456Figure 9: Mapper on graphs applied to the visualization of synthetic datasets. In all examples, M
is shown on the top with its cover and the original graph G is shown on the bottom. (a) Connected
caveman graph (n = 5, = 0.1); (b) Lobster graph (n = 5, = 0.1); (c) Dorogovtsev-Goltsev-
Mendes graph (n = 3, = 0.2, δ = 7); (d) Large bipartite graph (n = 9, = 0.15); (e) Community
graph (n = 5, = 0.25); (f) Torus graph (n = 3, = 0.3); (g) Dorogovtsev-Goltsev-Mendes graph
(n = 3, = 0.3); (h) Lollipop graph (n = 3, = 0.1, δ = 7); (i) Small bipartite graph (n = 3,
= 0.4); (j) Grid graph (n = 3, = 0.1); (k) Tree (n = 3, = 0.1); (l) Ladder graph (n = 4,
= 0.1).
10
(a)(b)(c)(d)(e)(f)(g)(h)(i)(j)(k)(l)of G (see Figure 10(a)). C6 is represented mainly by the Guam international airport. In order
to pass from any airport in C6 to airports in C5, one must pass from the Honolulu International,
which is contained in edge (5, 6) in M.
(a) Map of science graph G where nodes are colored by 13 scientific disciplines.
Figure 11:
(b) Mapper on a graph M (top, n = 10, = 0.1) with l3 as the lens, in comparison with the
(c) Applying interactive cover manipulation on M achieves better
original graph G (bottom).
clustering quality and shape summary.
Map of science. The map of science graph [11] (see Figure 11(a)) consists of 554 nodes and
2276 edges. Nodes represent and are colored by specialties within 13 major scientific disciplines,
and edges represent co-authorship of publications between those specialties. Since G does not
exhibit obvious symmetry, we choose the 3rd smallest eigenfunctions of the graph Laplacian, l3,
as the lens to help to retain the shape of G. As illustrated in Figure 11(b), both M and G are
laid out by way of correspondence where M is shown to preserve the overall structure of G. The
highlighted nodes in M also capture certain clusters in G.
We could utilize interactive cover manipulation to obtain an even better representation of the
data in Figure 11(c) where nodes in M are circled to highlight the majority scientific discipline
from the underlying cluster. For instance, node 1 in M represents the humanities-labeled nodes in
G; nodes 8 and 6 represent chemistry and biology, respectively. Node 8 and 6 merge at node 5 in
M, which represents medical science and infectious diseases.
6 Scalable Computation
The running time of mapper on graphs algorithm relies heavily on the choice of a lens. While the
lenses we discussed earlier (Section 3) are effective in capturing various structures of an underlying
graph, they are expensive to compute for very large graphs. To address the scalability issue, we
need a lens that can be computed efficiently for very large graphs while still carrying structural
information. We, therefore, consider PageRank [14] as an additional, scalable lens. We consider
a version of the PageRank algorithm applicable to undirected graphs [41]. A PageRank vector
R : V → R is defined for every node v ∈ V ,
(cid:88)
u∈N (v)
R(u)
N (u) ,
R(v) =
(1 − d)
V + d
11
121110976845321HumanitiesSocialMSciencesHealthMProfessionalsChemistryEarthMSciencesMathMdMPhysicsBrainMResearchInfectiousMDiseasesMedicalMSpecialtiesBiotechnologyBiologyChemical(MMechMdMCivilMEngineeringEbMEngineeringMdMCSga,124356789101112gc,gb,where N (v) is the set of neighbors of v; 0 < d < 1 is the damping factor, which is typically
set at 0.85. Using the formation of R(v), PageRank yields an iterative algorithm that can be
computed efficiently in practice [14, 74]. The existence of the PageRank vector R is guaranteed by
the PerronFrobenius theorem [78]. A high PageRank score at v typically means that v is connected
to many nodes, which also have high PageRank scores. The PageRank has been shown to be
a continuous function in [0, 1] [81]. For example, Figure 12(a) bottom illustrates the continuous
variation of R on V for a random geometric graph. For the lens, we utilized f (v) = log(R(v)), as
it provided a good distribution of function values.
We utilize the PageRank implementation in NetworkX [42] and ran mapper on graphs on two
synthetic graphs generated using NetworkX [42] and five real-world large graphs obtained from
Stanford Large Network Dataset Collection [62] with up to 3 million edges using a MacBook Pro
with 2.3 GHz Quad-Core Intel Core i5 with 8 GB memory. We report the average computational
time in terms of PageRank (R) and mapper on graphs (M) in Table 1.
Table 1: Average computational time for mapper on graphs with PageRank on five large real-world
graphs. Time is reported in seconds.
Graph
Amazon0302 [60]
Figure -- V --
12(g)
262, 111
-- E -- n
5
1, 234, 877
ca-CondMat [61]
12(e)
23, 133
93, 497
com-amazon.ungraph [95]
12(c)
334, 863
925, 872
com-youtube.ungraph [95]
12(d)
1, 134, 890
2, 987, 624
soc-Epinions1 [83]
12(f)
75, 879
508, 837
5
5
6
6
0.15
0.15
0.15
R (s) M (s)
2.88
31.63
4.18
46.90
0.15
4.15
0.15
240.33
14.44
0.15
16.74
1.02
Finally, we would like to demonstrate that not only our approach is scalable using the PageR-
ank lens, it also produces meaningful visualization results. Figure 12 gives examples of applying
mapper on graphs to seven large graphs using the PageRank lens. Figure 12(a-b) are both synthetic
graphs: (a) is a random geometric graph [75] with a radius 0.2 (n = 10, = 0.15), while (b) contains
a balanced tree G with branching factor 5 and height 9 (n = 3, = 0.15). Mapper on graphs M
for both graphs are shown to capture the global organizational principle of the original graph.
Figure 12(c) contains a co-purchasing graph based on the CWBTIAB feature (Customers Who
Bought This Item Also Bought) on Amazon website: if a product i is frequently purchased together
with product j, then the original graph G contains an edge (i, j). While the node-link diagram of G
cannot be improved beyond a hairball, M provides a very compact summary containing information
regarding popular products serving as "hubs". Similarly, Figure 12(d-g) show the mapper on graphs
M for (d) YouTube social network, (e) Condense Matter collaboration network, (f) Epinions social
network, and (g) a 2nd Amazon product co-purchasing network on March 2nd, 2003. The original
graphs for these figures are not shown because they, too, are essentially hairballs.
7 Discussion
In this paper, we present a TDA approach for graph visualization using a variant of the mapper
construction called mapper on graphs. Our approach is effective at detecting clusters in a graph and
preserving the relations among these clusters. It is also flexible in capturing the structure of a graph
across multiple scales based on different topological or geometric lenses. Mapper on graphs could
potentially be applied to other visualization tasks, for instance, as a skeleton representation for the
12
Figure 12: Mapper on graphs using the PageRank lens. In examples (a-c), mapper on a graph M
is shown on the top with its cover, and the original graph G is shown on the bottom. For examples
(d-g), the original graphs G are not shown because it renders essentially as a hairball, similar to
V = 1, 000, E = 53, 741. (b) A
the graph G shown in (c). (a) A random geometric graph:
V = 66, 430, E = 66, 429. (c) Amazon product co-purchasing network:
(9, 5) balanced tree:
V = 1, 134, 890, E = 2987624.
V = 334, 863, E = 925, 872. (d) YouTube social network:
(e) Condense Matter collaboration network:
(f) Epinions social
V = 75, 879, E = 508, 837. (g) A 2nd Amazon product co-purchasing network on
network:
March 2nd, 2003: V = 262, 111, E = 1, 234, 877.
V = 23, 133, E = 93, 497.
underlying graph in determining an initial layout in graph drawing. Traditionally, the PageRank
vector is employed on the web graph, which could be considered as a temporal network -- the
PageRank vector at a previous instance of the web graph is used as an initial vector to obtain a
fast PageRank solution for the current instance of the web graph. Therefore, Mapper on graphs in
conjugation with the PageRank lens could be utilized for the study of temporal networks.
Our focus in this paper is applying mapper on graphs to graph visualization. We are also
interested in the theoretical properties of mapper on graphs. For example, how do we measure the
distance between a mapper on graphs M and its underlying graph G? What is an appropriate
metric under which M converges to the Reeb graph of G as the granularity of the cover goes
to zero? What is the structural stability of mapper on graphs with respect to perturbations of
the lens f , graph G, and cover U? Recent theoretical advances on the stability [15, 19] and
convergence [3, 15, 18, 19, 25, 68] of mapper construction could address these questions, at least
partially. However, questions remain that are unique to mapper on graphs: e.g., what is the relation
between the shape of M and the geometric and topological properties of the lens f ?
Acknowledgments
This work was supported in part by the National Science Foundation NSF IIS-1513616 and NSF
DBI-1661375.
13
(a)(b)(c)(d)(e)(g)(f)References
[1] Muthu Alagappan. From 5 to 13: Redefining the positions in basketball. MIT Sloan Sports
Analytics Conference, 2012.
[2] Daniel Archambault, Tamara Munzner, and David Auber. Topolayout: Multilevel graph layout
by topological features. IEEE transactions on visualization and computer graphics, 13(2), 2007.
[3] Aravindakshan Babu. Zigzag Coarsenings, Mapper Stability and Gene-network Analyses. PhD
thesis, Stanford University, 2013.
[4] Benjamin Bach, Nathalie Henry Riche, Christophe Hurter, Kim Marriott, and Tim Dwyer. To-
wards unambiguous edge bundling: Investigating confluent drawings for network visualization.
IEEE transactions on visualization and computer graphics, 23(1):541 -- 550, 2017.
[5] Maria Bampasidou and Thanos Gentimis. Modeling collaborations with persistent homology.
CoRR, abs/1403.5346, 2014.
[6] Josh Barnes and Piet Hut. A hierarchical o(n log N ) force-calculation algorithm. Nature,
324(6096):446, 1986.
[7] Mathieu Bastian, Sebastien Heymann, and Mathieu Jacomy. Gephi: an open source software
for exploring and manipulating networks. In ICWSM, pages 361 -- 362, 2009.
[8] Vladimir Batagelj and Andrej Mrvar. Pajek datasets. http://vlado.fmf.uni-lj.si/pub/
networks/data/, 2006.
[9] S. Biasotti, D. Giorgi, M. Spagnuolo, and B. Falcidieno. Reeb graphs for shape analysis and
applications. Theoretical Computer Science, 392:5 -- 22, 2008.
[10] S. Biasotti, S. Marini, M. Mortara, and G. Patane. An overview on properties and efficacy of
topological skeletons in shape modelling. Shape Modeling International, 2003.
[11] Katy Borner, Richard Klavans, Michael Patek, Angela M Zoss, Joseph R Biberstine, Robert P
Light, Vincent Larivi`ere, and Kevin W Boyack. Design and update of a classification system:
The UCSD map of science. PloS one, 7(7):e39464, 2012.
[12] Ulrik Brandes, Marco Gaertler, and Dorothea Wagner. Experiments on graph clustering algo-
rithms. In European Symposium on Algorithms, pages 568 -- 579, 2003.
[13] Ulrik Brandes and Christian Pich. Eigensolver methods for progressive multidimensional scal-
ing of large data. In Graph Drawing, pages 42 -- 53. Springer, 2007.
[14] Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual web search engine.
Computer networks and ISDN systems, 30(1-7):107 -- 117, 1998.
[15] Adam Brown, Omer Bobrowski, Elizabeth Munch, and Bei Wang. Probabilistic convergence
and stability of random mapper graphs. arXiv preprint arXiv:1909.03488, 2019.
[16] Thang Nguyen Bui, Soma Chaudhuri, Frank Thomson Leighton, and Michael Sipser. Graph
bisection algorithms with good average case behavior. Combinatorica, 7(2):171 -- 191, 1987.
[17] Gunnar Carlsson. Topological pattern recognition for point cloud data. Acta Numerica, 23:289 --
368, 2014.
14
[18] Mathieu Carri´ere, Bertrand Michel, and Steve Oudot. Statistical analysis and parameter
selection for mapper. Journal of Machine Learning Research, 19:1 -- 39, 2018.
[19] Mathieu Carri´ere and Steve Oudot. Structure and stability of the one-dimensional mapper.
Foundations of Computational Mathematics, 18(6):1333 -- 1396, 2018.
[20] C. J. Carstens and K. J. Horadam. Persistent homology of collaboration networks. Mathe-
matical Problems in Engineering, 2013, 2013.
[21] Ben Cassidy, Caroline Rae, and Victor Solo. Brain activity: Conditional dissimilarity and
IEEE 12th International Symposium on Biomedical Imaging (ISBI),
persistent homology.
pages 1356 -- 1359, 2015.
[22] Moo K Chung, Seongho Seo, Nagesh Adluru, and Houri K Vorperian. Hot spots conjecture
and its application to modeling tubular structures. In International Workshop on Machine
Learning in Medical Imaging, pages 225 -- 232, 2011.
[23] Weiwei Cui, Hong Zhou, Huamin Qu, Pak Chung Wong, and Xiaoming Li. Geometry-based
edge clustering for graph visualization. IEEE Transactions on Visualization and Computer
Graphics, 14(6):1277 -- 1284, 2008.
[24] Y. Dabaghian, F. M´emoli, L. Frank, and G. Carlsson. A topological paradigm for hippocampal
spatial map formation using persistent homology. PLoS Computational Biology, 8(8):e1002581,
2012.
[25] Tamal K Dey, Facundo Memoli, and Yusu Wang. Topological analysis of nerves, reeb spaces,
mappers, and multiscale mappers. arXiv preprint arXiv:1703.07387, 2017.
[26] Inderjit S Dhillon. Co-clustering documents and words using bipartite spectral graph par-
In Proceedings of the 7th ACM SIGKDD international conference on Knowledge
titioning.
discovery and data mining, pages 269 -- 274, 2001.
[27] Chris H. Q. Ding, Xiaofeng He, Hongyuan Zha, Ming Gu, and Horst D. Simon. A min-max
cut algorithm for graph partitioning and data clustering. IEEE International Conference on
Data Mining, pages 107 -- 114, 2001.
[28] Kasper Dinkla, Michel A Westenberg, and Jarke J van Wijk. Compressed adjacency matrices:
IEEE Transactions on Visualization and Computer
untangling gene regulatory networks.
Graphics, 18(12):2457 -- 2466, 2012.
[29] Irene Donato, Giovanni Petri, Martina Scolamiero, Lamberto Rondoni, and Francesco Vac-
carino. Decimation of fast states and weak nodes: topological variation via persistent homol-
ogy. Proceedings of the European Conference on Complex Systems, pages 295 -- 301, 2012.
[30] Cody Dunne and Ben Shneiderman. Motif simplification. Proceedings of the SIGCHI Confer-
ence on Human Factors in Computing Systems, 2013.
[31] Tim Dwyer, Nathalie Henry Riche, Kim Marriott, and Christopher Mears. Edge compression
techniques for visualization of dense directed graphs. IEEE Transactions on Visualization and
Computer Graphics, 19(12):2596 -- 2605, 2013.
[32] Weinan E, Jianfeng Lu, and Yuan Yao. The landscape of complex networks. CoRR,
abs/1204.6376, 2012.
15
[33] Geoffrey Ellis and Alan Dix. A taxonomy of clutter reduction for information visualisation.
IEEE Transactions on Visualization and Computer Graphics, 13(6):1216 -- 1223, 2007.
[34] John Ellson, Emden Gansner, Lefteris Koutsofios, Stephen C North, and Gordon Woodhull.
Graphviz -- open source graph drawing tools. Graph Drawing, pages 483 -- 484, 2002.
[35] Ozan Ersoy, Christophe Hurter, Fernando Paulovich, Gabriel Cantareiro, and Alex Telea.
IEEE Transactions on Visualization
Skeleton-based edge bundling for graph visualization.
and Computer Graphics, 17(12):2364 -- 2373, 2011.
[36] Miroslav Fiedler. Algebraic connectivity of graphs. Czechoslovak mathematical journal,
23(2):298 -- 305, 1973.
[37] Thomas M. J. Fruchterman and Edward M. Reingold. Graph drawing by force-directed place-
ment. Software: Practice and experience, 21(11):1129 -- 1164, 1991.
[38] Emden R Gansner, Yifan Hu, Stephen North, and Carlos Scheidegger. Multilevel agglomerative
edge bundling for visualizing large graphs. In IEEE Pacific Visualization Symposium, pages
187 -- 194, 2011.
[39] Emden R Gansner, Yehuda Koren, and Stephen North. Graph drawing by stress majorization.
In Graph Drawing, pages 239 -- 250. Springer, 2005.
[40] Emden R. Gansner, Eleftherios Koutsofios, Stephen C. North, and Kiem-Phong Vo. A tech-
nique for drawing directed graphs. IEEE Transactions on Software Engineering, 19(3):214 -- 230,
1993.
[41] Vince Grolmusz. A note on the pagerank of undirected graphs. arXiv preprint arXiv:1205.1960,
2012.
[42] Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. Exploring network structure, dy-
namics, and function using NetworkX. Proceedings of the 7th Python in Science Conference,
2008.
[43] Mustafa Hajij, Bei Wang, Carlos Scheidegger, and Paul Rosen. Visual detection of struc-
tural changes in time-varying graphs using persistent homology. IEEE Pacific Visualization
Symposium (PacificVis), 2018.
[44] Derek Hansen, Ben Shneiderman, and Marc A Smith. Analyzing social media networks with
NodeXL: Insights from a connected world. Morgan Kaufmann, 2010.
[45] Danny Holten and Jarke J Van Wijk. Force-directed edge bundling for graph visualization.
Computer Graphics Forum, 28(3):983 -- 990, 2009.
[46] Danijela Horak, Slobodan Maleti´c, and Milan Rajkovi´c. Persistent homology of complex net-
works. Journal of Statistical Mechanics: Theory and Experiment, page P03034, 2009.
[47] Yifan Hu. Efficient, high-quality force-directed graph drawing. Mathematica Journal, 10(1):37 --
71, 2005.
[48] Glen Jeh and Jennifer Widom. SimRank: a measure of structural-context similarity.
In
Proceedings of the 8th ACM SIGKDD international conference on Knowledge discovery and
data mining, pages 538 -- 543, 2002.
16
[49] Sanjay Kairam, Diana MacLean, Manolis Savva, and Jeffrey Heer. Graphprism: Compact
visualization of network structure. In Advanced Visual Interfaces, 2012.
[50] Marc Khoury, Yifan Hu, Shankar Krishnan, and Carlos Scheidegger. Drawing large graphs by
low-rank stress majorization. Computer Graphics Forum, 31:975 -- 984, 2012.
[51] Vladimir G Kim, Yaron Lipman, Xiaobai Chen, and Thomas Funkhouser. Mobius transfor-
mations for global intrinsic symmetry analysis. Computer Graphics Forum, 29(5):1689 -- 1700,
2010.
[52] Yehuda Koren. On spectral graph drawing. In Computing and Combinatorics, pages 496 -- 508.
Springer, 2003.
[53] Yehuda Koren, Liran Carmel, and David Harel. Ace: A fast multiscale eigenvectors computa-
tion for drawing huge graphs. IEEE Symposium on Information Visualization, pages 137 -- 144,
2002.
[54] Brian Kulis, Sugato Basu, Inderjit Dhillon, and Raymond Mooney. Semi-supervised graph
clustering: a kernel approach. Machine learning, 74(1):1 -- 22, 2009.
[55] Stephane Lafon and Ann B Lee. Diffusion maps and coarse-graining: A unified framework for
dimensionality reduction, graph partitioning, and data set parameterization. IEEE transac-
tions on pattern analysis and machine intelligence, 28(9):1393 -- 1403, 2006.
[56] Hyekyoung Lee, Moo K. Chung, Hyejin Kang, Boong-Nyun Kim, and Dong Soo Lee. Com-
puting the shape of brain networks using graph filtration and gromov-hausdorff metric. Inter-
national Conference on Medical Image Computing and Computer Assisted Intervention, pages
302 -- 309, 2011.
[57] Hyekyoung Lee, Moo K. Chung, Hyejin Kang, Bung-Nyun Kim, and Dong Soo Lee. Discrim-
inative persistent homology of brain networks. IEEE International Symposium on Biomedical
Imaging: From Nano to Macro, pages 841 -- 844, 2011.
[58] Hyekyoung Lee, Hyejin Kang, Moo K. Chung, Bung-Nyun Kim, and Dong Soo Lee. Persistent
brain network homology from the perspective of dendrogram. IEEE Transactions on Medical
Imaging, 31(12):2267 -- 2277, 2012.
[59] Hyekyoung Lee, Hyejin Kang, Moo K. Chung, Bung-Nyun Kim, and Dong Soo Lee. Weighted
functional brain network modeling via network filtration. NIPS Workshop on Algebraic Topol-
ogy and Machine Learning, 2012.
[60] Jure Leskovec, Lada A Adamic, and Bernardo A Huberman. The dynamics of viral marketing.
ACM Transactions on the Web (TWEB), 1(1), 2007.
[61] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graph evolution: Densification and
shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1):2,
2007.
[62] Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network dataset collection.
http://snap.stanford.edu/data, June 2014.
[63] Bruno L´evy. Laplace-beltrami eigenfunctions towards an algorithm that understands geometry.
In IEEE International Conference on Shape Modeling and Applications, page 13, 2006.
17
[64] Shusen Liu, Dan Maljovec, Bei Wang, Peer-Timo Bremer, and Valerio Pascucci. Visualizing
high-dimensional data: Advances in the past decade. IEEE Transactions on Visualization and
Computer Graphics, 23(3):1249 -- 1268, 2017.
[65] P. Y. Lum, G. Singh, A. Lehman, T. Ishkanov, M. Vejdemo-Johansson, M. Alagappan, J. Carls-
son, and G. Carlsson. Extracting insights from the shape of complex data using topology.
Scientific Reports, 3, 2013.
[66] Ulrike Von Luxburg. A tutorial on spectral clustering. Statistics and computing, 17(4):395 -- 416,
2007.
[67] Fintan McGee and John Dingliana. An empirical study on the impact of edge bundling on
In Proceedings of the International Working Conference on
user comprehension of graphs.
Advanced Visual Interfaces, pages 620 -- 627. ACM, 2012.
[68] Elizabeth Munch and Bei Wang. Convergence between categorical representations of Reeb
space and mapper. In S´andor Fekete and Anna Lubiw, editors, Proceedings of the 32nd Inter-
national Symposium on Computational Geometry, volume 51 of Leibniz International Proceed-
ings in Informatics (LIPIcs), pages 53:1 -- 53:16, Dagstuhl, Germany, 2016. Schloss Dagstuhl --
Leibniz-Zentrum fuer Informatik.
[69] Mark E. J. Newman. Fast algorithm for detecting community structure in networks. Physical
review E, 69(6):066133, 2004.
[70] Mark EJ Newman. Properties of highly clustered networks. Physical Review E, 68(2):026121,
2003.
[71] Andrew Y Ng, Michael I Jordan, and Yair Weiss. On spectral clustering: Analysis and an
algorithm. In Advances in neural information processing systems, pages 849 -- 856, 2002.
[72] Monica Nicolau, Arnold J. Levine, and Gunnar Carlsson. Topology based data analysis iden-
tifies a subgroup of breast cancers with a unique mutational profile and excellent survival.
Proceedings of the National Academy of Sciences, 108(17):7265 -- 7270, 2011.
[73] Monica Nicolaua, Arnold J. Levine, and Gunnar Carlsson. Topology based data analysis
identifies a subgroup of breast cancers with a unique mutational profile and excellent survival.
Proceedings National Academy of Sciences of the United States of America, 108(17):7265 -- 7270,
2011.
[74] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The pagerank citation
ranking: Bringing order to the web. Technical report, Stanford InfoLab, 1999.
[75] Mathew Penrose. Random geometric graphs. Oxford University Press, 2003.
[76] Giovanni Petri, Martina Scolamiero, Irene Donato, and Francesco Vaccarino. Networks and cy-
cles: A persistent homology approach to complex networks. Proceedings European Conference
on Complex Systems 2012, Springer Proceedings in Complexity, pages 93 -- 99, 2013.
[77] Giovanni Petri, Martina Scolamiero, Irene Donato, and Francesco Vaccarino. Topological
strata of weighted complex networks. PLoS ONE, 8(6):e66506, 2013.
[78] S. Unnikrishna Pillai, Torsten Suel, and Seunghun Cha. The Perron-Frobenius theorem: some
of its applications. IEEE Signal Processing Magazine, 22(2):62 -- 75, 2005.
18
[79] Virginia Pirino, Eva Riccomagno, Sergio Martinoia, and Paolo Massobrio. A topological study
of repetitive co-activation networks in in vitro cortical assemblies. Physical Biology, 12(1),
2015.
[80] Pascal Pons and Matthieu Latapy. Computing communities in large networks using random
In International symposium on computer and information sciences, pages 284 -- 293,
walks.
2005.
[81] Luca Pretto. Analysis of web link analysis algorithms: The mathematics of ranking.
In
Maristella Agosti, editor, Information Access through Search Engines and Digital Libraries,
pages 97 -- 111. Springer, 2008.
[82] Martin Reuter, Silvia Biasotti, Daniela Giorgi, Giuseppe Patan´e, and Michela Spagnuolo. Dis-
crete laplace -- beltrami operators for shape analysis and segmentation. Computers & Graphics,
33(3):381 -- 390, 2009.
[83] Matthew Richardson, Rakesh Agrawal, and Pedro Domingos. Trust management for the se-
mantic web. In International semantic Web conference, pages 351 -- 368. Springer, 2003.
[84] Satu Elisa Schaeffer. Graph clustering. Computer science review, 1(1):27 -- 64, 2007.
[85] David Selassie, Brandon Heller, and Jeffrey Heer. Divided edge bundling for directional network
data. IEEE Transactions on Visualization and Computer Graphics, 17(12):2354 -- 2363, 2011.
[86] David I Shuman, Sunil K Narang, Pascal Frossard, Antonio Ortega, and Pierre Vandergheynst.
The emerging field of signal processing on graphs: Extending high-dimensional data analysis
to networks and other irregular domains. IEEE Signal Processing Magazine, 30(3):83 -- 98, 2013.
[87] Bernard W Silverman. Density estimation for statistics and data analysis, volume 26. CRC
press, 1986.
[88] Gurjeet Singh, Facundo M´emoli, and Gunnar Carlsson. Topological methods for the analysis of
high dimensional data sets and 3d object recognition. Eurographics Symposium on Point-Based
Graphics, 22, 2007.
[89] Ashley Suh, Mustafa Hajij, Bei Wang, Carlos Scheidegger, and Paul Rosen. Persistent ho-
mology guided force-directed graph layouts. Proceedings of IEEE Visualization Conference
(InfoVis), 2019.
[90] Yuanyuan Tian, Richard A Hankins, and Jignesh M Patel. Efficient aggregation for graph
summarization. In Proceedings of the ACM SIGMOD international conference on Management
of data, pages 567 -- 580, 2008.
[91] Brenda Y Torres, Jose Henrique M Oliveira, Ann Thomas Tate, Poonam Rath, Katherine
Cumnock, and David S Schneider. Tracking resilience to infections by mapping disease space.
PLoS biology, 14(4), 2016.
[92] W. T. Tutte. How to draw a graph. Proceedings of the London Mathematical Society, s3-
13(1):743 -- 767, Jan 1963. URL: http://dx.doi.org/10.1112/plms/s3-13.1.743, doi:10.
1112/plms/s3-13.1.743.
[93] Tatiana Von Landesberger, Arjan Kuijper, Tobias Schreck, Jorn Kohlhammer, Jarke J van
Wijk, J-D Fekete, and Dieter W Fellner. Visual analysis of large graphs: State-of-the-art and
future research challenges. Computer Graphics Forum, 30(6):1719 -- 1749, 2011.
19
[94] Scott White and Padhraic Smyth. A spectral clustering approach to finding communities in
graphs. In Proceedings of the SIAM international conference on data mining, pages 274 -- 285,
2005.
[95] Jaewon Yang and Jure Leskovec. Defining and evaluating network communities based on
ground-truth. Knowledge and Information Systems, 42(1):181 -- 213, 2015.
20
|
1607.02952 | 1 | 1607 | 2016-07-11T13:57:35 | Are human interactivity times lognormal? | [
"cs.SI",
"physics.soc-ph"
] | In this paper, we are analyzing the interactivity time, defined as the duration between two consecutive tasks such as sending emails, collecting friends and followers and writing comments in online social networks (OSNs). The distributions of these times are heavy tailed and often described by a power-law distribution. However, power-law distributions usually only fit the heavy tail of empirical data and ignore the information in the smaller value range. Here, we argue that the durations between writing emails or comments, adding friends and receiving followers are likely to follow a lognormal distribution.
We discuss the similarities between power-law and lognormal distributions, show that binning of data can deform a lognormal to a power-law distribution and propose an explanation for the appearance of lognormal interactivity times. The historical debate of similarities between lognormal and power-law distributions is reviewed by illustrating the resemblance of measurements in this paper with the historical problem of income and city size distributions. | cs.SI | cs |
Are human interactivity times lognormal?
Norbert Blenn∗and Piet Van Mieghem
Delft University of Technology
16 December 2015
Abstract
In this paper, we are analyzing the interactivity time, defined as
the duration between two consecutive tasks such as sending emails,
collecting friends and followers and writing comments in online social
networks (OSNs). The distributions of these times are heavy tailed
and often described by a power-law distribution. However, power-
law distributions usually only fit the heavy tail of empirical data and
ignore the information in the smaller value range. Here, we argue that
the durations between writing emails or comments, adding friends and
receiving followers are likely to follow a lognormal distribution.
We discuss the similarities between power-law and lognormal dis-
tributions, show that binning of data can deform a lognormal to a
power-law distribution and propose an explanation for the appearance
of lognormal interactivity times. The historical debate of similarities
between lognormal and power-law distributions is reviewed by illustrat-
ing the resemblance of measurements in this paper with the historical
problem of income and city size distributions.
1
Introduction
Massive data from online social media and online social networking (OSN)
enables accurate analysis of the human behavior and of the interaction times
between individuals through technology such as in word-of-mouth market-
ing, opportunistic networking and viral spreading. Empirical measurements
contradict the commonly assumed exponential distribution of Poissonian
inter-event times [1] in spreading processes or epidemic models. Multiple
publications [2, 3, 4, 5, 6, 7, 8] report that the interactivity time, defined as
∗Faculty of Electrical Engineering, Mathematics and Computer Science, P.O Box 5031,
2600 GA Delft, The Netherlands; email : N.Blenn@, [email protected]
1
the duration between two consecutive tasks like sending emails, accessing
web pages, instant messaging and phone calls, follow power-law distribu-
tions. These findings recently led to non-Markovian analyses, addressed in
the work of Cator et al. [9], Iribarren and Moro [10], Van Mieghem and van
de Bovenkamp [11] and Schweizer et al. [12]. Given that the inter-activity
distributions are heavy tailed, word-of-mouth spreading, viral infections or
dynamics of memes are expected to endure or survive longer, compared to
basic Markovian models [10, 13]. Barabasi [2] infers that heavy-tailed dis-
tributions may arise from a priority queue, where individuals execute tasks
of which the majority can be completed in short time, but some tasks wait
long due to a perceived priority. Barabasi's priority queue model fits the
distribution of durations between events quite well, leading to a power-law
distribution with an exponent γ around 1.
A power-law random variable X ≥ τ has the probability density function
fX (t) = ct−γ
t ≥ τ
(1)
where c = 1−γ
function (pdf) of a lognormal random variable X for t ≥ 0 is
τ 1−γ and τ > 0 is the lower bound for X. The probability density
(cid:104)− (log t−µ)2
2σ2
(cid:105)
exp
fX (t) =
√
σt
2π
(2)
where (µ, σ) are called the parameters of the lognormal pdf, that are the
mean and variance of log X as shown in Appendix A.
When we assume that inter-event durations are power-law distributed,
we encounter the following issues:
1. In many cases, only a part of the data (the tail larger than τ ) is
modeled by a power-law. The lower bound τ in (1) does not correspond
to the physical minimum of the random variable X, but τ is fitted from
the data by ignoring smaller values that do not obey the power-law.
Often, these smaller values may have a large probability to occur, so
that their neglect is difficult to justify. In other words, only a part of
the process (above τ ) is modeled by a power-law (1), while the other
part (below τ ) is not.
2. Most processes or measurements possess both a lower as well as an
upper bound. Apart from the lower bound τ , an upper bound κ is
often invoked, at which a cut-off is observed: the power-law behavior
is confined to the range τ ≤ X ≤ κ, although Xmin < τ and Xmax > κ.
2
However, it is often unclear whether the process in the deep tail still
obeys a power-law distribution or some other, much faster decreasing
distribution. The upper bound κ is usually empirically determined,
rather than based on the physical maximum of X. As long as
Pr[X > κ] = c
t−γdt =
(cid:90) ∞
κ
(cid:16) κ
(cid:17)1−γ
τ
is small (with respect to the measurement precision), the upper bound
κ is justified, else other validation arguments are needed.
3. We demonstrate here that the binning of data (either by the data-
provider or by the researcher) alters the shape of a lognormal distri-
bution into an apparent power-law.
Particularly in relation to human activities or behaviors, we question in
this paper the widely assumed power-law distribution.
We present measurements of inter-event durations from Digg.com and
Reddit.com, two online social news aggregators [14, 15, 16], and from the
Enron data set1, a collection of emails sent by employees of the company
Enron, and argue that a lognormal distribution is a valid candidate for the
distribution of human inter-event durations in Section 2. The problem of
fitting a lognormal is explained in Section 3, followed by previously reported
lognormally distributed data sets in Section 4. Existing theoretical models
are compared in Section 5, a plausible interpretation for lognormal human
behavior is proposed in Section 6 and Section 7 concludes. Mathematical
properties of the lognormal distribution are deferred to the Appendix A.
Appendix B presents results of likelihood tests for the observed distributions.
2 Observations and Measurements from OSN
All events in an OSN are based on users' activities, such as posts, friend-
requests and comments. A complete data set including all activities of users
from Digg.com for a duration of 4 years, described in Tang et al. [14] and
Doerr et al.
[15], allows us to analyze the time frame in which users of
Digg.com add their friends. Doerr et al. [19] found that reaction times in a
retweet network from Twitter and Digg are close to a lognormal distribution
with parameters µ = 10.1 and σ = 2.2. The process of adding friends
shows bursts of activity also observed and analyzed in email communication
1Enron
Data-set,
http://www.cs.cmu.edu/∼enron/
Email
Leslie
Kaelbling
and Melinda
Gervasio,
3
[2, 10, 23, 17, 18]. In these publications the question arises, whether the
observed distribution of inter-activity times is described by a power-law,
lognormal or a cascading Poisson process.
Malmgren et al.
[17, 18] describe that circadian and weekly activity
cycles in human behavior are the factors that lead to heavy tails. They pro-
posed a cascading Poisson process, consisting of a nonhomogeneous Poisson
process that reflects periodicity and a homogeneous Poisson process describ-
ing active intervals, which is shown to model the interactivity distributions
of e-mail communication.
Because the network of Digg.com is directed (like in Twitter.com or other
OSNs), a user can be followed by other users to become their "friend", while
a user cannot add followers. This means that the process of adding friends
is solely based on the user himself, whereas obtaining followers depends
on the activities of other users. The random variable Tf riend denotes the
time between the addition of two friends and, similarly, Tf ollower is the time
between receiving two followers.
Figure 1: Time difference (in seconds) between the addition of two consec-
utive friends.
Figures 1 and 2 depict the distribution of durations between adding
friends Tf riend and of receiving followers Tf ollower for 7.4 million friendship
relations in Digg. Fitting the data, i.e. all realizations of Tf riend, by the
state of the art technique by Clauset et al. [20] to a power-law (1) results
4
in an exponent γ = 1.53 for τ = 59s, whereas all realizations of Tf ollower are
fitted best by a lognormal (2) with parameters µ = 10.45 and σ = 2.75. For
Tf ollower an estimated p-value of 0.0 indicates that a power-law fit provides
not the best solution, whereas the p-value for Tf riend of 0.23 indicates a
reasonable fit for a power-law distribution.
Figure 2: Time differences (in seconds) between the receipt of two consecu-
tive followers.
The reason that the distribution of Tf ollower does not fit the lognormal
distribution over the whole range lies in the nature of Digg.com. Tang et al.
[14] showed that only a few users were active over a long period, while just
a fraction of them was actually submitting stories. Only 2% of all registered
users succeeded to have their submissions "promoted" to the frontpage [15].
Since the username of a submitter appears next to the story, these users
receive a lot of followers during the relatively small period that their story
was listed on the front page. Therefore, fTf ollower (x) is large for small x in
Fig. 2. In summary, even ignoring the small time values, the random vari-
able Tf riend and Tf ollower possess different distributions. The process that
generates Tf riend is more likely described by a variant of Barabasi's prior-
ity queue model, leading to power-law behavior. Since the random variable
Tf ollower is generated by the collective dynamics of different individuals (that
are likely weakly dependent), central limit law arguments may point towards
the lognormal distribution [1, p. 121-126].
5
Similar properties occur in sending and receiving emails. Obviously, a
user can only send an email when he is online, whereas emails arrive at a
user's inbox at his email server at all times. We analyzed the durations
between receiving and sending emails in the Enron data set, which contains
emails of all employees of Enron during roughly 6 years, starting in January
1998 until February 2004. Similar distributions arise as shown later in Figs. 9
and 10.
A third data set from Reddit.com2, an OSN in which users mainly sub-
mit, comment or vote on bookmarks. The pdf of the duration T between
consecutive comments and submissions in Reddit are shown in Fig. 3.
Figure 3: Time difference between commenting and bookmark submission
in Reddit.com
The tails of the distributions in Fig. 3 seem nicely fitted by a power-law
distribution with exponents γ ≈ 1. However, as mentioned in the introduc-
tion, the increasing regime in fT (t) for small values of t, the peak of fT (t)
nor the concave form of the pdf can be modeled by a power-law distribution.
2The
Reddit.com
data-set
is
hosted
at
Google
BigQuery
(bigquery.cloud.google.com/dataset/fh-bigquery).
6
3 Fitting a lognormal distribution
The two main approaches are based on the pdf and the EDF (empirical dis-
tribution function3), after a logarithmic transformation of the data. Figure 4
depicts the data fitted4 to the distribution function of a normal distribution
(4) and shows that the parameters of the EDF are about the same as those
in Fig. 2 (pdf approach).
Figure 4: Empirical distribution function (EDF) of the inter-follower dura-
tions Tf ollower (same data as in Fig. 2).
3.1 The effect of binning
3.1.1 Theory
We generate [1, p. 41] n realizations of a lognormal random variable X,
which we denote by the set {xk}1≤k≤n = {x1, x2, . . . , xn}. All n realiza-
tions lie in the interval [xmin, xmax], where the minimum value is xmin =
min1≤k≤n xk and the maximum value is xmax = max1≤k≤n xk. The bin-
ning operation [1, p. 580-581] divides the entire data interval [xmin, xmax]
3The empirical distribution function is sometimes also called empirical cdf : the cumu-
lative distribution function (cdf) based on an empirical measure.
4Fitting data to a EDF usually flattens interesting parts of a pdf, especially the tail of
a distribution. Still, the benefit lies in the fact that binning is not needed and "raw" data
can be directly fitted [1, p. 580-581].
7
into m sub-intervals of length ∆x = xmax−xmin
and the j-th subinterval
[xmin + (j − 1) ∆x, xmin + j∆x] for 1 ≤ j ≤ m is associated with a bin hj,
that contains the number of realizations of X or data points of set {xk}1≤k≤n
lying within the j-th subinterval,
m
(cid:90) xmin+j∆x
hj ≈ n
xmin+(j−1)∆x
fX (u) du
Clearly, for a given set {xk}1≤k≤n, increasing the binsize ∆x decreases the
number of bins m.
The effect of binning on the pdf fX (t) is depicted in Fig. 5, where n = 106
realizations from a lognormal random variable with parameters µ = 10 and
σ = 2 are drawn. As demonstrated in Appendix A, the scaled random
variable Y = bX has parameter µY = µX + ln b, but σY = σX , implying
that "binning" only changes the parameter µ, but leaves the parameter
σ invariant! By binning (scaling) the distribution with different binsizes,
the "up-going regime", where fX (t) increases with t, disappears and the
observable part of the distribution "evolves" towards a straight line on a
log-log plot. Binning the data with larger binsizes decreases the parameter
If µ − σ2 decreases,
µ, even to the extent that µ may become negative.
the maximum of the lognormal at eµ−σ2 tends to zero (infinitely far to the
left on a log-log scale). Therefore, just the decreasing part of the quadratic
shape of (2) will be visible in a log-log plot.
3.1.2 Data analysis
Binning the data in different time units, say per minute instead of per second,
scales the distribution by a factor of 60 (since 60 seconds equals 1 minute),
which will shift the parameter µmin of the CDF towards the left to µmin =
µsec − ln(60) ≈ µsec − 4.1. However, a remarkable property of the lognormal
distribution is that the parameter σ will not change after linear scaling as
shown in the Appendix A.
An important consequence of a binning operation is illustrated in the
pdfs in Fig. 6 and Fig. 7, that show the pdf of Tf ollower binned per minute
and per hour, respectively. Conforming to the theory, the parameter µ
decreases by a factor of about ln 60 ≈ 4.1, while the parameter σ keeps its
value, but the shape of the distribution changes. The distribution, binned
per hour, is shown in Fig. 7, where the distribution can be confounded
with a power-law distribution (with exponential cut-off). Moreover, this
misinterpretation may be justified, because the exponent γ = 1.57 of a
power-law fitted to the hourly binned data is close to the exponent γ = 1.53
8
Figure 5: The effect of different binsizes on a lognormal random variable
found for the Tf riend distribution in Fig. 1. Fig. 8 shows the complementary
cumulative distribution function of Tf ollower binned per hour, fitted using
the method of Clauset et al. [20]. The resulting power-law exponent in Fig.
8 is γ = 1.81. The visualization in Fig. 8 is misleading because the original
distribution is, as shown earlier, a lognormal distribution.
For completeness we like to refer to Table 3 in Appendix B, where we list
fitted parameters, p values and the result of log-likelihood tests, conducted
using the method of Virkar and Clauset [51]. As shown in the table, the
larger the used binsizes, the higher the p values indicating that a power-law
fits the data. For small binsizes (low p values) the results are not conclusive
or rather in favor of a lognormal distribution.
To further demonstrate the effect, Figs. 6, 7 and 8 depict distributions
in which the data was artificially binned by minutes and hours. In reality,
such binning operation might occur if the data provider (the OSN or web
service) returns values per hour or even larger scales. In other words, data
measured in larger time steps over a certain total time range thus erases the
possibility to distinguish between a lognormal and power-law distribution.
The sending time of an email in the Enron data set until May 2001
was stored per minute, whereas afterwards (June 2001 - February 2004)
the sending time is stored with an accuracy of a second. The resulting
pdf of time differences between sent emails is plotted in Fig. 9, where the
9
Figure 6: The probability density function (pdf) of the inter follower times
Tf ollower binned per minute.
Figure 7: The probability density function (pdf) of the inter follower times
Tf ollower binned per hour.
10
Figure 8: The ccdf of the inter-follower time TF ollower where data is binned
per hour.
black and red dots represent the measurements per second and per minute,
respectively. The parameters of the fitted lognormal (µ = 9.5, σ = 3.24) and
power-law distribution (γ ≈ 1) correspond to those of Digg.com in Fig. 2
and Fig. 1.
The pdf of inter-arrival times of received emails, split in observations
per minute (red) and per second (black) in Fig. 10, can be compared to the
durations of added followers, where the parameters are again in the same
range as shown before. We found that the EDF of the data (not shown)
agrees with the pdfs in Fig. 9 and Fig. 10, underlining the likeliness that a
lognormal random variable models the data better than a power-law.
4 Reported parameters of power-law and lognor-
mal distributions
Table 1 lists inter-arrival times and the fitted exponents found in publica-
tions in which the aspect of binning was ignored. Rather small power-law
exponents γ between 0.7 and 1.8 are found in multiple data sets of human
activity.
Lognormal distributions were reported for similar human activity as
shown in Table 2, which extends the collection of Limpert et al. [21]. The
11
Figure 9: Time difference between consecutively sent emails per person in
the Enron data set.
oldest analysis was conducted by Boag [22] in 1949. Based on the scal-
ing invariance of σ as demonstrated in Appendix A, the parameter σ can
be compared over different measurements, whereas the parameter µ cannot,
since µ depends on the units in which the lognormal random variable is mea-
sured. Interestingly, all σ's in Table 2 lie within an amazingly small range
of 0.35 ≤ σ ≤ 3.2, which shows that the parameter σ only varies over about
If σ is rather
one order of magnitude in different measured phenomena.
small as in our measurements where 2.73 ≤ σ ≤ 3.24, the first term in (10)
dominates and a quadratic function appears in a log-log plot. Consequently,
these rather small values of σ and those in Table 2 contradict the common
deductions made from (10) in Appendix A, namely that only for large values
of σ power-law and lognormal distributions are indistinguishable. Equations
(8) and (9) in Appendix A explain why the lognormal distribution may seem
linear in a certain regime.
5 The Historical Debate of the Power-law versus
Lognormal Distribution
Mitchell [40] discusses the fascinating and abundant appearance of power-
law distributions and mentions processes such as self-criticality, that are
12
Figure 10: Time difference between consecutively received emails per person
in the Enron data set.
related to phase transitions, as the main producers of power-laws, but she
remarks that the precise nature as well as the deviations from a power-law
are still open to debate. Table 2 illustrates that the research on lognormal
distributions has a long history. Unfortunately, also the processes that pro-
duce (almost) lognormal behavior are not well understood. Mitzenmacher
[41] overviews processes leading to power-law and lognormal distributions,
emphasizing that minor changes in the process will lead to either a power-
law or a lognormal distribution. Mitzenmacher mentions the work of Gabaix
[42], who analyzed the size distribution of cities in the United States. In-
terestingly, Gabaix [42] found that the city size distribution follows a Zipf
distribution, which is a power-law distribution (1) with an exponent γ = 1.
Gabaix argues that cities cannot become infinitely small, a fact that imposes
a lower bound to their size. When modeling the size of cities as a Markov
chain with a fixed number of cities, which grow stochastically as proposed
by Gibrat [43], then the steady state of the Markov chain will follow Zipf's
distribution with an exponent γ = 1. If there is no lower bound on the city
size, so that cities can be arbitrarily small, then the distribution degenerates
to a lognormal distribution.
Gibrat [43], whose work is often associated with the law of proportionate
effect [39], argues in his model that transition probabilities or the variance
13
Data-set
Time between sending Emails
Time between sending Emails
Time between clicks in website usage
Time between similar actions in web data
Time between messages in instant-messaging
Time between phone calls
Time between phone calls
Time between sending Emails
Time between sending short messages
Exponent (γ) Reference
1
1.2
1, 1.25
1.1, 1.2, 1.8
1.53
0.9
0.7
1
0.7
Barabasi (2005) [2]
Eckmann et al. (2004) [3]
Gon¸calves and Ramasco (2008) [4]
Radicchi (2008) [5]
Leskovec and Horvitz (2008) [6]
Candia et al. (2008) [7]
Karsai et al. (2012) [8]
Karsai et al. (2012) [8]
Karsai et al. (2012) [8]
Table 1: Power-law exponents found for durations between technology re-
lated human dynamics
of transition probabilities in a growth process are independent from the size.
Gibrat, who estimated the distribution of city sizes, concluded that the law
of proportionate growth leads to a distribution that is lognormal. However,
Simon [44] showed that Gibrat's law of the proportionate effect may lead to
other heavy-tailed distributions as well.
Champernowne [45] and Cordoba [46] analyzed the income distribution
of England and Wales with Markov theory. Again, their crucial assumption
is that incomes have a lower bound.
Eeckhout [47] analyzed the distribution of city sizes by using accurate
data from the US census in 2000 and found that the heavy tail obeys Zipf's
law. But, the entire distribution is better described by a lognormal than
a Pareto distribution. By comparing the census data from 1990 and 2000,
Eeckhout shows that the growth of a city is independent of its size. The
parameters of the lognormal distribution found by Eeckhout are µ = 7.28
and σ = 1.75.
The difference with the above mentioned Markov chain approach lies in
the fact that Eeckhout [47] modeled the process by a multiplicative process,
which leads to a lognormal distribution. This multiplicative process, pro-
posed by Kapteyn [48] in 1903 for the first time and later coined the "Law of
Proportionate Effect" by Gibrat [43], is based on the central limit theorem
applied to a multiplicative process, which leads to lognormal distributed
sizes [1]. Gibrat's growth process is defined as
St = at × St−1
(3)
where the size St of an item at state t depends upon the previous size St−1
times a positive, random factor at. By taking the logarithm of both sides in
14
Table 2: Literature of lognormal distributions (excerpt)
σ
2.126
≈ 2
process
email forwarding
email forwarding
µ
5.547
≈ 8
µ1 = 1 hour
µ2 = 2 days
2.47
2.47
14 days
100 days
2.3 hours
2.4 days
12.6 days
21.4 days
9.6 months
15.9 monts
17.2 months
14.5 months
60 years
4 days
3 to 5
0.5
0.43
3.5
7.439
3.29
3.3
µ1 = 1.31
µ2 = 2.26
1 to 2
µ1 = 3.7
µ2 = 5.6
5.29
0.38
0.36
1.14
1.24
1.48
1.47
1.50
2.11
2.5
2.8
3.21
3.02
1.16
≈ 2
1.4
1.634
0.70
0.846
0.890
0.89
σ1 = 0.32
σ2 = 0.56
0.35 − 0.45
1.095
σ1 = 0.8
σ2 = 3.1
0.42
email forwarding
infection times
latency periods of diseases
latency periods of diseases
latency periods of diseases
latency periods of diseases
latency periods of diseases
latency periods of diseases
latency periods of diseases
survival times after cancer diagnosis
survival times after cancer diagnosis
survival times after cancer diagnosis
survival times after cancer diagnosis
age of onset of Alzheimer
incubation periods (viral infections)
task completion
strike duration
time of individual activities
call duration
message holding time
transmission holding time
channel holding time
channel holding time
call holding time
citations
citations
citations
citations
reference
Iribarren and Moro [10]
Stouffer et al. [23]
Stouffer et al. [24]
Nishiura [25]
Limpert [21]
Sartwell [26]
Sartwell [26]
Sartwell [26]
Sartwell [26]
Sartwell [26]
Sartwell [26]
Boag [22]
Feinleib and Macmahon [27]
Feinleib and Macmahon [27]
Boag [22]
Horner [28]
Lessler et al. [29]
Linden [30]
Lawrence [31]
Mohana et al. [32]
Spedalieri et al. [33]
Barcelo and Jord´an [34]
Barcelo and Jord´an [34]
Barcelo and Jord´an [34]
Barcelo and Jord´an [34]
Bolotin [35]
Eom and Fortunato [36]
Redner [37]
Stringer et al.[38]
Radicchi et al.[55]
retweeting behavior
distribution of votes on pages of Digg.com Van Mieghem et al. [39]
Doerr et al.[19]
15
(3) and denoting ξt ≡ ln at, we obtain, after iteration,
ln St = ln S0,i + ξ1 + ξ2 + . . . + ξt
(cid:80)t
k=1 ξk−tµ
σ
(cid:90) y−tµ
√
t
√
σ
t
d→ N (0, 1), we arrive at, for
e−u2/2 du
By the Central Limit Theorem [1],
large t,
Pr[ln St ≤ y] → 1√
2π
−∞
from which approximately
∼= tµ +
ln St
√
tσN (0, 1)
where µ denotes the mean and σ2 the variance of the sequence {ξk}1≤k≤t.
For large t, a power-law distribution (1) tends to zero as O (t−γ), while a
(cid:16)
t−1 exp
(cid:104)− log2 t
(cid:105)(cid:17)
lognormal distribution (2) tends considerably faster as O
to zero, illustrating that the deep tails are significantly different. Malevergne
[49] addressed this fact by the concept of a slowly varying function, in par-
ticular, for x → ∞ and t > 0, the power-law distribution (1) features
2σ2
fX (t · x)
fX (x)
lim
x→∞
= t−γ
The lognormal distribution (2) on the other hand is not slowly varying. In
the limit x → ∞, a lognormal distribution will, for t > 1, always tend to
zero:
fX (t · x)
fX (x)
lim
x→∞
= lim
x→∞
− (ln(t))2
e
2σ2 e
1
t
− ln(t)· ln(x)−µ
σ2 = 0
This different tail behavior questions whether exponential bin sizes should
be used in a log-log plot, because these may hide the rapid decrease in the
tail.
6 An explanation of lognormal human interactiv-
ity times
Perhaps, a plausible explanation of the appearance of lognormal human in-
teractivity times is that the logarithm log T of a human interactivity time
T is Gaussian or normally distributed (see Appendix A), most likely as a
consequence of the Central Limit Theorem. Roughly speaking, the Cen-
tral Limit Theorem applies for a large number of weakly dependent random
16
variables, where none of them is dominant. Thus, rather than concentrat-
ing on the time T , it seems more natural to focus on the random variable
log T as the decisive quantity. The logarithm of a human related measure
often occurs: for example, in our hearing system, the intensity of sound is
logarithmically experienced. But more importantly, the large variability in
human performance also seems logarithmically distributed [50, 30] and the
measured interactivity times are strongly related to the large differences in
human performance and/or behavior.
On the other hand, if Y is an exponential random variable with mean
1
γ−1 for Y ≥ log τ (else Y = 0) and X = eY , then
Pr [X ≤ t] = Pr [Y ≤ log t] = 1 − e−(γ−1)(log t−log τ ) = 1 −
(cid:19)1−γ
(cid:18) t
τ
dt Pr [X ≤ t] = γ−1
τ 1−γ t−γ is a perfect power-law probability density
so that d
function as in (1). However, if log T ≥ log τ were exponentially distributed
with mean 1
γ−1 , the memoryless property of the exponential distribution [1,
p. 43] would indicate that
Pr [log T ≥ t + u log T > u] = Pr [log T ≥ t]
In other words, given that the logarithm of a human interactivity time is
larger than u time units, the probability that log T exceeds t+u time units is
equal to the probability that log T exceeds t time units, for any u and t larger
than log τ , precisely as if the log-interactivity time u never has been spent
or waited, which is quite counterintuitive for a duration between consecutive
activities. Alternatively, with u = log s and s > τ , the memoryless property
of log T implies "scale-freeness in T ":
(cid:20)
(cid:21)
Pr
log
T
s
≥ t log
T
s
> 0
= Pr [log T ≥ t]
which shows, ignoring the condition log T
s > 0, the independence on the
"scale s". But, we have shown in Section 3.1 that rescaling the human
interactivity time (by different bin sizes) definitely alters the distribution.
From these arguments, we can infer that a power-law time T is less
defendable than a lognormally distributed T .
7 Conclusion
In this paper, the interactivity durations of individuals, between creating
friendship relations, writing emails, commenting and voting on online con-
tent are analyzed. We found that the distribution of durations to add friends
17
follows a power-law with an exponent of γ (cid:39) 1.8, whereas the durations
to acquire followers are well described by a lognormal with µ ≈ 10.5 and
σ ≈ 2.8. Due to the small probability of executing two tasks in a small time
interval (typically ignored in fitting a power law), we claim that a lognor-
mal distribution covers the entire activity time range better than a power
distribution.
In addition, we show that binning of lognormally distributed data can
seriously affect the perception: the parameter µ shifts towards smaller val-
ues, but the parameter σ of a lognormal distribution does not change after
a binning or scaling operation. In the extreme case, only the heavy tail of
the lognormal distribution (2) remains, which follows a power-law distribu-
tion (1) with an exponent of γ close to 1. As explained in the Appendix,
there exists an interval in which the lognormal distribution is indistinguish-
able from a power-law distributions with power-law exponent γ ≈ 1 + ε, for
small ε > 0.
Similar observations and concerns, discussed for a long time in the litera-
ture of city size and income distributions and reviewed in Section 5, supports
that a lognormal distribution is modeling the whole data range better than
power-laws. Finally, Section 6 argues that the logarithm of a quantity as-
sociated with human activities rather than the quantity itself is the better
descriptor, because human performance seems to fit a lognormal.
References
[1] P. Van Mieghem. Performance Analysis of Communications Systems
and Networks. Cambridge University Press, 2014.
[2] A.-L. Barab´asi. The origin of bursts and heavy tails in human dynamics.
Nature, 435:207–211, May 2005.
[3] J.-P. Eckmann, E. Moses, and D. Sergi. Entropy of dialogues creates co-
herent structures in e-mail traffic. Proceedings of the National Academy
of Sciences of the United States of America, 101(40):14333–14337, 2004.
[4] B. Gon¸calves and J. J. Ramasco. Human dynamics revealed through
Web analytics. Physical Review E, 78.2026123, 2008.
[5] F. Radicchi. Human activity in the web. Physical Review E, 80.026118,
Aug 2009.
18
[6] J. Leskovec and E. Horvitz. Planetary-scale views on a large instant-
messaging network. In Proceeding of the 17th international conference
on World Wide Web, pages 915–924. ACM, 2008.
[7] J. Candia, M. C. Gonz´alez, P. Wang, T. Schoenharl, G. Madey, and
A.-L. Barab´asi. Uncovering individual and collective human dynamics
from mobile phone records. Journal of Physics A: Mathematical and
Theoretical, 41(22):224015, 2008.
[8] M. Karsai, K. Kaski, A.-L. Barab´asi, and J. Kert´esz. Universal features
of correlated bursty behaviour. Scientific Reports, 2:397, May 2012.
[9] E. Cator, R. van de Bovenkamp, and P. Van Mieghem. Susceptible-
infected-susceptible epidemics on networks with general infection and
cure times. Physical Review E, 87:062816, Jun 2013.
[10] J. L. Iribarren and E. Moro.
Impact of Human Activity Patterns
on the Dynamics of Information Diffusion. Physical Review Letters,
103(3):038702, Jul 2009.
[11] P. Van Mieghem and R. van de Bovenkamp. Non-Markovian Infection
Spread Dramatically Alters the Susceptible-Infected-Susceptible Epi-
demic Threshold in Networks. Physical Review Letters, 110:108701,
Mar 2013.
[12] I. Scholtes, N. Wider, R. Pfitzner, A. Garas, C. J. Tessone, and
F. Schweitzer. Causality-driven slow-down and speed-up of diffusion
in non-markovian temporal networks. Nature Communications, 5:5024,
September 2014.
[13] M. Karsai, M. Kivela, R. K. Pan, K. Kaski, J. Kert´esz, A. L. Barab´asi,
and J. Saramaki. Small but slow world: How network topology and
burstiness slow down spreading. Physical Review E, 83(2):025102, Feb.
2011.
[14] S. Tang, N. Blenn, C. Doerr, and P. Van Mieghem. Digging in the Digg
Social News Website. IEEE Transactions on Multimedia, 13(5):1163–
1175, 2011.
[15] C. Doerr, N. Blenn, S. Tang, and P. Van Mieghem. Are Friends Over-
rated? A Study for the Social News Aggregator Digg.com. In Computer
Communications, volume 35, pages 796–809, 2012.
19
[16] P. Van Mieghem. Human psychology of common appraisal: The reddit
score. IEEE Transactions on Multimedia, 13(6):1404–1406, 2011.
[17] R. D. Malmgren, D. B. Stouffer, A. E. Motter and L. A. N. Amaral A
Poissonian explanation for heavy tails in e-mail communication. Pro-
ceedings of the National Academy of Sciences, 105(47):18153, 2008.
[18] R. D. Malmgren, D. B. Stouffer, A. S. L. O. Campanharo and
L. A. N. Amaral On universality in human correspondence activity.
Science, 325(5948):1696–1700, 2009.
[19] C. Doerr, N. Blenn, and P. Van Mieghem. Lognormal Infection Times
of Online Information Spread. PLoS ONE, 8(5):e64349, 05 2013.
[20] A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-Law Distribu-
tions in Empirical Data. SIAM review, 51(4):661–703, Nov. 2009.
[21] E. Limpert, W. A. Stahel, and M. Abbt. Log-normal distributions
across the sciences: Keys and clues. BioScience, 51(5):341–352, 2001.
[22] J. W. Boag. Maximum Likelihood Estimates of the Proportion of Pa-
tients Cured by Cancer Therapy. Journal of the Royal Statistical Soci-
ety. Series B (Methodological), 11(1), 1949.
[23] D. B. Stouffer, R. D. Malmgren, and L. A. N. Amaral. Com-
ment on The origin of bursts and heavy tails in human dynamics.
arXiv:physics/0510216, 2005.
[24] D. B. Stouffer, R. D. Malmgren, and L. A. N. Amaral. Log-normal
arXiv:physics/0605027
statistics in e-mail communication patterns,
2006.
[25] H. Nishiura. Early efforts in modeling the incubation period of infec-
tious diseases with an acute course of illness. Emerging Themes in
Epidemiology, 2007.
[26] P. E. Sartwell. The distribution of incubation periods of infectious
disease. American Journal of Hygiene, 51:310–318, 1950.
[27] M. Feinleib and B. Macmahon. Variation in the duration of survival of
patients with the chronic leukemias. Blood, 15, 1960.
[28] R. D. Horner. Age at onset of Alzheimer's disease: clue to the relative
importance of etiologic factors? American journal of epidemiology,
126(3):409–14, 1987.
20
[29] J. Lessler, N. G. Reich, R. Brookmeyer, T. M. Perl, K. E. Nelson, and
D. A. Cummings. Incubation periods of acute respiratory viral infec-
tions: a systematic review. The Lancet infectious diseases, 9(5):291–
300, May 2009.
[30] W. J. van der Linden. A Lognormal Model for Response Times on Test
Items. Journal of Educational and Behavioral Statistics, 31(2), 2006.
[31] R. J. Lawrence. The Lognormal Distribution of the Duration of Strikes.
Journal of the Royal Statistical Society. Series A, 147(3), 1984.
[32] S. Mohan, M. Gopalakrishnan, H. Balasubramanian, and A. Chan-
drashekar. A lognormal approximation of activity duration in PERT
using two time estimates. Journal of the Operational Research Society,
58(6):827–831, 2006.
[33] A. Spedalieri, I. Mart´ın-Escalona, and F. Barcel´o. Simulation of tele-
impact of lognormal distributed
In Wireless Communications and Networking Confer-
traffic variables in UMTS networks:
call duration.
ence, pages 2381–2386. IEEE, 2005.
[34] F. Barcel´o and J. Jord´an. Channel Holding Time Distribution In Cel-
In Electronics Letters, Vol.34 No.2, pages 146–147,
lular Telephony.
1998.
[35] V. A. Bolotin. Modeling Call Holding Time Distributions for CCS
Network Design and Performance Analysis. IEEE Journal on Selected
Areas in Communications, 12:433–438, 1994.
[36] Y.-H. Eom and S. Fortunato. Characterizing and Modeling Citation
Dynamics. PLoS ONE, 6(9):e24926, Sept. 2011.
[37] S. Redner. Citation Statistics from 110 Years of Physical Review.
Physics Today, 58(6):49–54, 2005.
[38] M. Stringer, M. Sales-Pardo, and L. A. N. Amaral. Effectiveness of
journal ranking schemes as a tool for locating information. PLoS One,
3(2):e1683, 2008.
[39] P. Van Mieghem, N. Blenn, and C. Doerr.
Lognormal distribu-
tion in the digg online social network. The European Physical Jour-
nal B - Condensed Matter and Complex Systems, 83:251–261, 2011.
10.1140/epjb/e2011-20124-0.
21
[40] M. Mitchell, Complexity: A Guidede Tour, Oxford University Press,
2009.
[41] M. Mitzenmacher. A Brief History of Generative Models for Power Law
and Lognormal Distributions. Internet Mathematics, 1(2), 2003.
[42] X. Gabaix. Zipf's Law For Cities: An Explanation. Quarterly Journal
of Economics, 114:114–739, 1999.
[43] R. Gibrat. Les In´egalit´es ´economiques [The Economic Inequalities].
Librairie du Recueil Sirey, 1931, French.
[44] H. A. Simon. On a class of skew distribution functions. Biometrika,
42(3–4):425–440, 1955.
[45] D. G. Champernowne. A Model of Income Distribution. The Economic
Journal, 63(250):pp. 318–351, 1953.
[46] J. C. Cordoba. A Generalized Gibrat's Law. International Economic
Review, 49(4):1463–1468, 2008.
[47] J. Eeckhout. Gibrat's Law for (All) Cities. American Economic Review,
94(5):1429–1451, September 2004.
[48] J. C. Kapteyn. Skew Frequency curves in Biology and Statistics. Molec-
ular and General Genetics MGG, 19(3):205–206, 1918.
[49] Y. Malevergne, V. Pisarenko, and D. Sornette. Gibrats law for cities:
uniformly most powerful unbiased test of the Pareto against the log-
normal. Swiss Finance Institute Research Paper Series 09-40, Swiss
Finance Institute, 2009.
[50] W. Shockley, "On the statistics of individual variations of productivity
in research laboratories", Proceedings of the Institute of Radio Engi-
neers (IRE), Vol. 45, No. 3, pp. 279-290, 1957.
[51] Y. Virkar and A. Clauset. Power-law distributions in binned empirical
data. The Annals of Applied Statistics, 8(1):89–119, 03 2014.
[52] F. Black and M. S. Scholes. The Pricing of Options and Corporate
Liabilities. Journal of Political Economy, 81(3):637–54, May-June 1973.
[53] D. Garcia, P. Mavrodiev, and F. Schweitzer. Social resilience in online
In Proceedings of the first
communities: The autopsy of friendster.
ACM conference on Online social networks, ACM, February 2013.
22
[54] H. Kesten. Random Difference Equations and Renewal theory for prod-
uct of Random Matrices. Acta Mathematica, CXXXI:207–248, 1973.
[55] F. Radicchi, S. Fortunato, and C. Castellano. Universality of citation
distributions: Toward an objective measure of scientific impact. Pro-
ceedings of the National Academy of Sciences, 105(45), 2008.
A The lognormal random variable and distribu-
tion
N(cid:0)µ, σ2(cid:1) is a Gaussian or normal random variable. Hence, X ≥ 0. The
A lognormal random variable [1, p. 57] is defined as X = eY where Y =
distribution function FX (t) = Pr[X ≤ t] = Pr[Y ≤ log t] is
(cid:20)
(cid:90) log t
−∞
exp
− (u − µ)2
2σ2
du =
1
2
(cid:21)
(cid:18)
(cid:19)(cid:19)
(cid:18) t − µ
√
σ
2
FX (t) =
√
1
2π
σ
1 + erf
(4)
where erf(x) is the error function. The probability density function (pdf) of a
dt Pr[X ≤
lognormal random variable X follows from the definition fX (t) = d
t], for t ≥ 0, as (2), where (µ, σ) are called the parameters of the lognormal
pdf, while the mean and variance are [1, p. 57]
and
E [X] = eµe
Var [X] = e2µeσ2(cid:16)
σ2
2
eσ2 − 1
(cid:17)
The limit σ → 0 reduces to a Dirac delta function at t = eµ, thus limσ→0 fX (t) =
δ (t − eµ).
Given the mean and variance, the parameters of the lognormal are found
(cid:18)
(cid:19)
σ2 = log
1 +
Var [X]
(E [X])2
(5)
as
and
µ = log E [X] − σ2
2
(6)
Although E [X] ≥ 0, we remark that the parameter µ can be negative.
Moreover, (5) and (6) show that the scaled lognormal random variable Y =
bX, where b is a positive real number, has mean σY = σ and µY = µ +
log b. Hence, scaling by a factor b does not change the parameter σ, which
23
has interesting consequences for binning and measured data: the unit (e.g.
second versus hours) in which the random variable is measured does not
alter the parameter σ, only the parameter µ.
The change of the argument t → eu in fX (t) leads to
(cid:20)
− (u−(µ−σ2))2
2σ2
(cid:21)
exp
fX (eu) = e−µ+ σ2
√
2π
illustrating that the scaled lognormal pdf eµ− σ2
N(cid:0)µ(cid:48), σ2(cid:1) with mean µ(cid:48) = µ − σ2. The maximum of fX (t) occurs at t =
2 fX (eu) is a Gaussian pdf
(7)
σ
2
σ2
2
2π
σ
eµ−σ2 and equals maxt≥0 fX (t) = e−µe
√
, which follows directly from (7).
Moreover, we find easier from (7) than from (2) that limu→−∞ fX (eu) =
fX (0) = 0 and that f(cid:48)
X (0) = 0. This means that any lognormal starts at
t = 0 from zero, increases up to the maximum at t = eµ−σ2 > 0 after which
it decreases towards zero at t → ∞. Thus, the lognormal is bell-shaped, but,
in contrast to the Gaussian, the lognormal pdf is not symmetric around its
maximum at t = eµ−σ2 and can be seriously skewed.
The expression for the lognormal pdf in (2) can be rewritten [49] in a
"power-law"-like form as
fX (t) =
− µ2
√
e
2σ2
σ
2π
t−α(t)
(8)
(9)
where the exponent α (t) equals
α (t) = 1 +
log t − 2µ
2σ2
2σ2
(cid:12)(cid:12)(cid:12) log t−2µ
(cid:12)(cid:12)(cid:12) < ε. Thus, when t ∈ [e2µ−2σ2ε, e2µ+2σ2ε]
which illustrates that a lognormal random variable behaves as a power-law
random variable, provided the last fraction in (9) is negligibly small, say ε.
The latter happens when
or in terms of the lower bound τ = e2µ−2σ2ε and upper bound κ = e2µ+2σ2ε
defined in Section 1, the pdf (2) of a lognormal random variable is almost
indistinguishable from the pdf (1) of a power-law random variable with
power exponent γ ≈ 1 + ε. The t-interval [e2µ−2σ2ε, e2µ+2σ2ε] exceeds the
maximum eµ−σ2 of the lognormal pdf and is clearly longer when σ is larger
(as well as the tolerated accuracy ε increases). Malvergne et al. [49] mention
that, if σ = 3.4, then the exponent α (t) in (9) varies less than 0.3 units over
a range of three orders of magnitude.
24
Taking the logarithm on both sides of (2) results in
√
σ2 − 1) ln(t) − ln(
ln(fX (t)) = − 1
2πσ) − µ2
2σ2
2σ2 ln(t)2 + (
µ
(10)
σ2 − 1) ln(t) in (10) dominates, which
If σ is large, then the second term ( µ
leads to a straight line with in a log-log plot resembling a power-law with
exponent γ = 1. On the other hand, if σ is small or µ = σ2, the first,
quadratic term in (10) dominates.
B Distinguishing power-law from lognormals by
likelihood testing
We apply the method of Clauset et al.
[20] and Virkar and Clauset [51]
to our data to distinguish between power-law and lognormal distributions.
Clauset et al. [20] approached the problem of estimating the exponent γ in
(1) by testing different distributions. In their data, lognormals and power-
laws were not clearly distinguishable either:
for some tested data-sets, a
lognormal distribution actually achieved a higher p-values (goodness of fit)
than power-laws, but log ratio tests suggested that other tested distributions
are closer to power-laws. By using the technique in [20] to fit the distribution
of Tf riend, a power-law with exponent γ = 1.53 was found with a reasonable
p-value of 0.23. The distribution of Tf ollower is most likely not a power-
law because the p-value of 0.0. Table 3 lists the parameters for all used
datasets using Clauset and Virkar's fitting technique [51] with the according
log-likelihood (Log-lh) and p values. A positive log-likelihood ratio indicates
that the power-law is favored over the lognormal.
Distribution
(binned in)
Exponent (γ)
power-law
p
xmin
lognormal
µ
adding friends Tf riend (seconds)
adding follower Tf ollower (seconds)
adding follower Tf ollower (hours)
sending emails (seconds)
sending emails (minutes)
receiving emails (seconds)
receiving emails (minutes)
commenting on Reddit.com (seconds)
commenting on Reddit.com (hours)
1.53
2.03
1.81
2.33
2.03
2.01
2.21
1.08
1.91
0.23
0.0
0.37
0.0
0.21
0.0
0.05
0.0
0.01
59
12
116
86
1
1
182
112
64
0.54
10.45
6.43
9.53
6.9
10.31
6.23
10.2
0.88
σ
2.26
2.75
3.1
3.24
3.32
2.73
3.54
3.13
2.41
Log-lh
p
0.0015
0
0
0
0
0
0
0
0
LR
418.67
-1327.5
-297.66
-373.7441
-391.13
-958.67
-136.31
-0.0024
-20.73
# of data-points
7,156,722
6,734,405
41,184
68,346,901
62,031,701
69,528,701
15,365,001
180,156,539
50,044
Table 3: Estimated parameters using the method of Clauset et al. [20]
25
|
1012.4050 | 1 | 1012 | 2010-12-18T03:00:21 | Motif Analysis in the Amazon Product Co-Purchasing Network | [
"cs.SI",
"physics.soc-ph"
] | Online stores like Amazon and Ebay are growing by the day. Fewer people go to departmental stores as opposed to the convenience of purchasing from stores online. These stores may employ a number of techniques to advertise and recommend the appropriate product to the appropriate buyer profile. This article evaluates various 3-node and 4-node motifs occurring in such networks. Community structures are evaluated too.These results may provide interesting insights into user behavior and a better understanding of marketing techniques. | cs.SI | cs | COMS6998 - Network Theory - HW3
Motif Analysis in the Amazon Product Co-Purchasing Network
Computer Science Department, Columbia University∗
Abhishek Srivastava
(Dated: May 18, 2014)
Online stores like Amazon and Ebay are growing by the day. Fewer people go to departmental
stores as opposed to the convenience of purchasing from stores online. These stores may employ
a number of techniques to advertise and recommend the appropriate product to the appropriate
buyer profile. This article evaluates various 3-node and 4-node motifs occurring in such networks.
Community structures are evaluated too.These results may provide interesting insights into user
behavior and a better understanding of marketing techniques.
0
1
0
2
c
e
D
8
1
]
I
S
.
s
c
[
1
v
0
5
0
4
.
2
1
0
1
:
v
i
X
r
a
I.
INTRODUCTION
According to a recent study, the number of people
choosing to shop at a physical departmental store is on
a decline. More and more people today are using the
convenience of online shopping [4]. The growth of sites
like Amazon and Ebay is evidence of this emerging trend.
Stores also tend to encourage buyers with discounts and
e-coupons for shopping online since it means that they
do not have to stock up goods at their brick and mor-
tar stores but may ship them as and when required from
the warehouse directly to the buyer. This is now a well
proven business model for lowering operational costs and
maximizing profits.
As a result of this trend, stores online are able to pro-
file buyers based on their preferences. Stores may use
such information to recommend products to other buy-
ers showing a similar profile or may cleverly advertise
the products that a buyer is more likely to buy. In ei-
ther case, the advertising engine would need to analyze
large datasets of information containing past records of
buyers, the products they bought and the timing of their
purchase. Leskovec et all [1] used such a dataset from
a large online retailer to study the effectiveness of vi-
ral marketing techniques. They researched the effective-
ness of personal recommendations between buyers and
modeled these based on a simple stochastic model. Vi-
ral marketing is a proven technique as demonstrated by
the growth of email services like Yahoo and Hotmail who
based their marketing on this technique. Each email sent
out from their email services contained a footer advertis-
ing the service. Simple, and very effective.
Referral marketing is surely the future of web adver-
tising. Free services online tend to lose their value if they
are easily available to even those who don’t need them.
Google used a referral technique to launch their GMail
mail service by allowing users only by invitation. This
requires some effort from the potential user of the free
service tool to actively seek out users to try and get a
referral. It also gives current users a value perception of
the free product they are using because it is not widely
available to everybody.
∗ [email protected]
This article will aim to look at the Amazon product co-
purchasing network, on both a micro as well as a macro
scale. Understanding the interactions at a localized and
micro scale may help in isolating the noise and point to
interesting trends that can be extrapolated to the larger
scale. Motifs have been used extensively to study inter-
actions in biological networks, especially in bacteria like
the E-Coli. The article shows how motifs can be used in a
product co-purchasing network to gain insights into rela-
tions between products. Both 3-node and 4-node motifs
have been analyzed.
Community structures have long been used in network
analysis and the article by Leskovec [1] identified com-
munities and the products that these communities pre-
ferred. In this article, we suggest using community de-
tection methods to make the motif-based analysis more
accurate and pertain to a select list of products.
Section II describes the source and the structure of
the dataset we will use for analysis. Section III concen-
trates on the motifs discovered in the dataset, their sig-
nificance and their frequency of occurrence. Section IV
discusses algorithms for detecting community structures
in the dataset for identifying trends between products
frequently co-purchased together.
II. NATURE AND DESCRIPTION OF THE
DATASET
The dataset for this article was obtained from the pub-
licly available Stanford Network Analysis Platform [2].
The description reads as follows : “Network was collected
by crawling Amazon website. It is based on Customers
Who Bought This Item Also Bought feature of the Ama-
zon website.
If a product i is frequently co-purchased
with product j, the graph contains a directed edge from
i to j.” Along with the edge-list representation of co-
purchased products, there is also metadata present for
each product summarized in Table I.
This article’s experiments were carried out on a sub-
set of the original dataset to restrict the computational
resources required to carry them out. The portion of
the dataset which will be used for analysis in this article
was collected on March 02 2003. Some statistics of this
dataset are presented in Table II. As depicted by the
statistics, the network is quite dense with a clustering
2
TABLE I. Sample Amazon Product Metadata
B. Market Segmentation
Property
Id
ASIN
Title
Group
SalesRank
Similar Products
Categories
Reviews
Value
1
0827229534
Patterns of Preaching: A Sermon Sampler
Book
396585
5 0804215715 156101074X
0687023955 0687074231 082721619X
2 —Books[283155]—Subjects[1000]—
Religion & Spirituality[22]—
Christianity[12290] —Clergy[12360]—
sPreaching[12368]
Total: 2 downloaded: 2 avg rating: 5
2000-7-28 cutomer: A2JW67OY8U6HHK
rating: 5 votes: 10 helpful: 9
2003-12-14 cutomer: A2VE83MZF98ITY
rating: 5 votes: 6 helpful: 5
Buyers online, as anywhere else, are usually classi-
fied into profiles that are indicative of their past buy-
ing trends. Market segmentation is a marketing term
referring to the aggregating of prospective buyers into
groups (segments) that have common needs and will re-
spond similarly to a marketing action. Market segmen-
tation enables companies to target different categories of
consumers who perceive the full value of certain prod-
ucts and services differently from one another. Generally
three criteria can be used to identify different market
segments:
1) Homogeneity (common needs within segment)
2) Distinction (unique from other groups)
3) Reaction (similar response to market)
TABLE II. Dataset Statistics
Property
Nodes
Edges
Nodes in largest WCC
Edges in largest WCC
Nodes in largest SCC
Edges in largest SCC
Average clustering coefficient
Number of triangles
Fraction of closed triangles
Diameter (longest shortest path)
90-percentile effective diameter
Value
262111
1234877
262111 (1.000)
1234877 (1.000)
241761 (0.922)
1131217 (0.916)
0.4240
717719
0.2361
29
11
coefficient of about 0.42. The fraction of nodes belong-
ing to the largest strongly connected component is very
high - 0.922. This implies that the products sampled are
very closely related with each other.
III. MOTIFS : DESCRIPTION AND
SIGNIFICANCE
C. Analysis Functions for Motifs
In this section, we will define a product purchasability
function for a 3-node motif that will indicate the prob-
ability of product being purchased in the context of the
in at vertex i and Emotif,
3-node motif using in-degree V i
the total count of edges in the motif :
f (Pi) =
V i
in
Emotif
(1)
The product purchasability function is not defined for
a vertex in the motif with in-degree zero. For all other
vertices, this function will return the fraction of edges
coming into the product as opposed to the total num-
ber of edges. To rate each motif, we will then declare
a Motif Rank function that will indicate the fraction of
nodes that have a finite, positive product purchasability
function. Contrary to what the name of this function im-
plies, it does not identify the importance or significance
of a motif.
Instead, this function looks at the fraction
of nodes (products) whose purchasability may be defined
and thus provide a larger actionable product-set.
A.
Introduction to Motifs
Motif Rank =
Number of Nodes with Positive f (Pi)
Total Nodes in Motif
Motifs can be described as recurring, significant pat-
terns of interconnections present in a network. These
motifs have been found to occur more frequently than
in random graphs; a number of biological networks are
composed solely of a large number of such motifs.Each
type of network seems to display its own set of charac-
teristic motifs (ecological networks have different motifs
than gene regulation networks, etc). Milo et all analyzed
such network motifs in their famous article [3] where they
showed that motifs formed the basic building blocks of a
number of biological networks and they also formulated
methods to detect the commonly occurring motifs in a
network.
(2)
It must be noted that the Product Purchasability and
the Motif Rank functions are comparable only within the
particular class of k-node motifs (where k is usually 3 or
4) for which the functions were defined. We will now look
at some of the most commonly occurring motifs discov-
ered in the product co-purchasing network in the next
sections.
D. Analysis of 3-Node Motifs in Network
The statistics of 3-node motifs present in the network
studied in this article have been summarized in Table
TABLE III.
MotifId Nodes Edges Count
131613
78578
104071
217566
16090
20400
32962
3685
2
135904
21579
28397
19319
1
2
3
4
5
6
7
8
9
10
11
12
13
3
3
3
3
3
3
3
3
3
3
3
3
3
2
2
3
2
3
4
4
4
3
3
4
5
6
III. As seen in biological networks, the probability of
occurrence of some motifs is much higher (by an order of
magnitude) than others. This is indicative of a structural
similarity present in the network. Figure 1 shows a 3-
node motif with a frequency count of 131613 and MotifID
1. Motif IDs were assigned to the commonly occurring
3-node and 4-node motifs by the original article on motifs
by Milo et all [3].
MotifID 1 shown in Figure 1 is a representation of the
case where when a customer bought a product, he / she
went ahead and bought either or both of the other 2
products. The f (Pi) of nodes in this motif is 0.5 for the
nodes at the bottom and undefined for the node at the
top. We assume that the time instant at which the prod-
uct represented by the top node is the present instant.
The customer may then purchase both the other prod-
ucts, either of the 2 products or none of them. The motif
rank can then be computed as 0.66.
FIG. 1. Motif ID : 1
MotifID 3 shown in Figure 2 is a interesting motif with
a relatively high frequency of occurrence. There is a re-
ciprocating relation between 2 of the nodes. This is a
strongly connected component indicating the closeness
similarity between the nodes. The f (Pi) of the nodes in
this motif are all 0.33. The Motif Rank function for this
motif is found to be 1.
FIG. 2. Motif ID : 3
MotifID 4 shown in Figure 3 has the highest frequency
3
of occurrence among all the 3-node motifs. The next
highest frequency of occurrence is about 40% lower than
the frequency of this motif. This a converging motif -
consumers who bought largely unrelated products (the 2
nodes at the top) also bought the product represented
by the node at the bottom. The unrelated nature of
the 2 product nodes at the top stands out in this motif.
The high frequency of this motif also points to the fact
that there is a converging factor in the network implying
that a large number of customers end up purchasing a
small subset of products. Identifying this small subset of
products can be used by the online store for improving
services and reducing operational costs by smartly stock-
ing this identified subset of products. The Motif Rank
of this motif is 0.33 due to the presence of just one node
with a positive f (Pi) function.
FIG. 3. Motif ID : 4
MotifID 10 shown in Figure 4 contains a strongly con-
nected component showing a close correlation between
the products. The f (Pi) of the node at the top is unde-
fined. The node in the centre has a f (Pi) of 0.66 and the
node at the bottom has one of 0.33. Customers buying
the product represented by the node at the top may buy
the one in the middle too. The argument can be extended
to the product at the bottom too. With increasing edge
separation between product nodes, the probability that
the customer will buy the product falls exponentially.
This is due to the fact that most customers place bud-
gets and prioritize the items to purchase depending on
the ones they need the most.
FIG. 4. Motif ID : 10
E. Analysis of 4-Node Motifs in Network
In this section, we used a motif searching algorithm
to detect all 4-node motifs in the network and obtained
their frequency of occurrences. Motif IDs range from 1
to 200, encompassing all the possible permutations of 4-
node motifs. Figure 5 shows the frequency distribution
of the 4-node motifs. The three tallest bars belong to
Motif ID 59, 26 and 5.
FIG. 5. 4-Node Motif Frequency Distribution
FIG. 6. Motif ID : 5
4
this node to be purchased.
Its interesting to observe that the Motif ID 25 shown in
Figure 7 appears in second place, statistically. This can
be identified as a converging motif with all nodes tracing
a path to the bottom node. Again, the f (Pi) function
of the bottom node is the highest among the nodes in
the motif. This motif may also represent a similarity in
tastes from customers belonging to different schools of
thought or having different backgrounds.
FIG. 7. Motif ID : 25
Motif ID 59 is truly indicative of the convergence trend
mentioned previously. It is also statistically the most sig-
nificant 4-node motif, just like its similar looking coun-
terpart among the 3-node motifs.
FIG. 8. Motif ID : 59
F. Extrapolating the Micro to the Macro
Figures 6, 7 and 8 show the 3 most frequently occurring
4-node motifs in the product co-purchasing network.The
Motif IDs 25 and 59 share a characteristic similar to that
observed in the most frequently occurring 3-node motif
with MotifID 4. They are both converging motifs in-
dicating the high probability of a customer buying the
product to which the edges in the motif converge. The
interesting resemblance to the analysis done for 3-node
motifs is that the 4-node motif with Motif ID in Figure
8 also has the highest frequency of occurrence among all
4-node motifs.
Figure 6 is the third most frequently occurring 4-node
motif in the network. The f (Pi) of the 2 nodes at the
bottom are 0.66 and 0.33. This motif is neither converg-
ing nor diverging. But there is a trend in the motif to
move toward the bottom node with a higher f (Pi), indi-
cating a higher probability of the product represented by
Motifs, by themselves do not describe the large scale
structure of the network. To infer the properties of the
larger picture, we will have to aggregate the perspective
provided by the individual motif analysis. The suggested
method to obtain the most mileage would be to break
the original network into a number of communities using
the Girvan-Newman algorithm [5] or the faster Clauset,
Neuman, Moore algorithm [6]. Once this is done, each of
these communities represents a singular class of objects
(nodes). If our network is large and varied, we can con-
tinue this process till we reach our required coarseness
of sub-categorization. These resulting networks can then
be subjected to motif analysis as as carried out in the
previous sections.
In case of the product co-purchasing network used in
this article, such granularity will enable us in study-
ing the dynamics of particular products more accurately.
Since buyer profiles are built with progressive purchases
which may not belong to the same community of prod-
ucts, we cannot extrapolate the findings obtained from
these community-centric entities to build customer pro-
files. What we may use them for is building product
purchasing trends. We can monitor the motif statistics
over time to gather useful information about trends. For
example, if the frequency of occurrence of converging mo-
tifs increases, we deduce that a larger set of customers
are looking to buy a fewer, smaller subset of products.
Having adjusted the coarseness of the community sub-
categorization, we can make a good guess as to what
these products are and whether, as online retailers, we
need to make any operational changes to match the de-
mand.
IV. COMMUNITY DECTECTION FOR MOTIF
ANALYSIS
Social networks are a product of the contexts that
bring people together. The context can be a shared inter-
est in a particular topic or kind of a book. Some- times
there are circumstances, such as a specific job or religious
affiliation, that make people more likely to be interested
in the same type of book or DVD.
Community discovery algorithms presented in [5] and
[6] provide mechanisms for community detection in com-
plex systems. The Girvan-Neuman algorithm [5] focuses
on identifying edges that are the weakest in the network,
the ones that are the least central . These would in-
advertently be edges that are connecting communities.
Then communities are detected by progressively remov-
ing such edges from the original graph. The modu-
larity maximization method [6] detects communities by
searching over possible divisions of a network for one or
more that have particularly high modularity. Since ex-
haustive search over all possible divisions is usually in-
tractable, practical algorithms are based on approximate
optimization methods such as greedy algorithms, sim-
ulated annealing, or spectral optimization, with differ-
ent approaches offering different balances between speed
and accuracy.The usefulness of modularity optimization
is however questionable: on the one hand, it has been
shown that modularity optimization often fails to detect
5
clusters smaller than some scale, depending on the size
of the network (resolution limit); on the other hand the
landscape of modularity values is characterized by a huge
degeneracy of partitions with high modularity, close to
the absolute maximum, which may be very different from
each other.The choice of algorithms to use for community
detection may be made at the behest of the investigator
who knows the nature of the network being studied.
V. CONCLUSIONS AND FUTURE WORK
The article defined some functions for analyzing the
occurrence and nature of motifs present in a network.
Motifs, by themselves are not very much helpful in fea-
ture extraction,as observed, and we must combine such
analysis with other methods like community detection.
Nevertheless, we have shown that motifs can be used to
visualize trends, extract interesting large scale features
and on the whole, be useful in predicting user behavior
in a network such as a product co-purchasing network.
With reference to a co-purchasing network, we were
able to show that the following traits may be extracted
using motifs :
(1) Prediction of product demand
(2) Purchasing Trends in product categories
(3) Relations between different products
The extraction of these trends is vital from the perspec-
tive of online retailers hoping to cash in on the growing
number of customers choosing to shop online. The one
striking trend that this article found was that there is a
large presence of converging motifs, indicating that most
customers tend to buy a select few products. This is not
a contradiction to the “long tail” phenomenon. On the
contrary, it can be shown that the presence of the long
tail is a large scale phenomenon and would not make it-
self visible at a micro sampling of the network. As [1]
has shown, the long tail is the future of online retailing;
selling less of more is more pronounced in online retailing
than in physical retailing.
In the future, one can look more deeply into the inter-
actions between motifs and into the cascading effects of
these motifs in the context of the network neighborhood.
Various trends may be identified and used effectively for
improving marketing and advertising of products by the
management of a retailing organization.
[1] Leskovec, Adamic, Huberman The Dynamics of Viral
Marketing ACM Transactions on the Web, Vol. 1, No.
1, Article 5, May 2007
[2] SNAP
Stanford
Network
Analysis
Platform
http://snap.stanford.edu
[3] Milo,Shen-Orr,Itzkovitz,Kashtan,Chklovskii,Alon
Net-
work Motifs: Simple Building Blocks of Complex Networks
Nature, Vol 298, 25 October 2002
[4] Robust
Sales
for
Holiday
Weekend
http://www.nytimes.com/2010/11/29/business/economy/29shop.html
New York Times, 28 November 2010
[5] Girvan-Newman algorithm (Girvan M. and Newman M. E.
J., Community structure in social and biological networks
Proc. Natl. Acad. Sci. USA 99, 7821¡96¿7826 (2002))
[6] A. Clauset, M.E.J. Newman, C. Moore Finding Large
community in networks 2004
|
1912.08921 | 1 | 1912 | 2019-12-08T18:35:23 | Network-Based Delineation of Health Service Areas: A Comparative Analysis of Community Detection Algorithms | [
"cs.SI",
"cs.LG",
"stat.ML"
] | A Health Service Area (HSA) is a group of geographic regions served by similar health care facilities. The delineation of HSAs plays a pivotal role in the characterization of health care services available in an area, enabling a better planning and regulation of health care services. Though Dartmouth HSAs have been the standard delineation for decades, previous work has recently shown an improved HSA delineation using a network-based approach, in which HSAs are the communities extracted by the Louvain algorithm in hospital-patient discharge networks. Given the existent heterogeneity of communities extracted by different community detection algorithms, a comparative analysis of community detection algorithms for optimal HSA delineation is lacking. In this work, we compared HSA delineations produced by community detection algorithms using a large-scale dataset containing different types of hospital-patient discharges spanning a 7-year period in US. Our results replicated the heterogeneity among community detection algorithms found in previous works, the improved HSA delineation obtained by a network-based, and suggested that Infomap may be a more suitable community detection for HSA delineation since it finds a high number of HSAs with high localization index and a low network conductance. | cs.SI | cs |
Network-Based Delineation of Health Service
Areas: A Comparative Analysis of Community
Detection Algorithms
Diego Pinheiro1[0000−0001−9300−7196], Ryan Hartman3[0000−0001−8044−5461],
Erick Romero1[0000−0001−5456−3093], Ronaldo Menezes2[0000−0002−6479−6429],
and Martin Cadeiras1[0000−0003−4545−2871]
1 Department of Internal Medicine, University of California, Davis, USA
2 Department of Computer Science, University of Exeter, UK
3 Independent Researcher
Abstract. A Health Service Area (HSA) is a group of geographic regions
served by similar health care facilities. The delineation of HSAs plays a
pivotal role in the characterization of health care services available in
an area, enabling a better planning and regulation of health care ser-
vices. Though Dartmouth HSAs have been the standard delineation for
decades, previous work has recently shown an improved HSA delineation
using a network-based approach, in which HSAs are the communities ex-
tracted by the Louvain algorithm in hospital-patient discharge networks.
Given the existent heterogeneity of communities extracted by different
community detection algorithms, a comparative analysis of community
detection algorithms for optimal HSA delineation is lacking. In this work,
we compared HSA delineations produced by community detection algo-
rithms using a large-scale dataset containing different types of hospital-
patient discharges spanning a 7-year period in US. Our results replicated
the heterogeneity among community detection algorithms found in pre-
vious works, the improved HSA delineation obtained by a network-based,
and suggested that Infomap may be a more suitable community detec-
tion for HSA delineation since it finds a high number of HSAs with high
localization index and a low network conductance.
Keywords: Hospital-Patient Discharge Networks · Community Detec-
tion Algorithms · Health Service Area · Comparative Analysis
1
Introduction
A Health Service Area (HSA) is as a group of geographic regions in which residing
patients most often receive healthcare services from similar health care facilities.
It was first introduced in 1973 by Wennberg and Gittelsohn as a more meaningful
unit of analysis for healthcare data than administrative geographic divisions
such as counties [13]. By examining variations in expenditures among HSAs
delineated in Vermont, the authors showed, for instance, that the expenditure
per capita among HSAs varied from $54 to $162 and such variation, however,
had no correlation with age-adjusted mortality.
2
Pinheiro et al.
In 1996, Wenneberg then proposed the Dartmouth Atlas of Health Care in
the United States [12] which is the current standard HSA delineation in the
US. Effectively, Each Dartmouth-HSAs are delineated in three steps. First, each
health care facility is assigned to its respective city/town. Then, each ZIP Code is
assigned to the city/town of the health care facility from which residing patients
receive most of their healthcare services. As a result, each Dartmouth-HSA is
the group of ZIP Codes associated to the same city/town. Finally, enclave ZIP
Codes, if any, are assigned the city/town of its adjacent ZIP Codes to unsure
geographic contiguity.
Recently, Hu et al. [7] has proposed a network-based approach to HSA de-
lineation in which a Hospital-Patient Discharge Network (HPDN) was built and
the community detection algorithm Louvain was subsequently applied to find
communities (i.e., HSAs) with the highest network modularity. In their HPDN,
nodes represent distinct ZIP Codes and links represent the total number of dis-
charges between the ZIP Codes of health care facilities and patient residencies.
Using claims-based hospital discharges in Florida, the authors demonstrated
that Louvain-HSAs presented, for instance, a higher localization index than
Dartmouth-HSAs, which is measure of internal validity that quantifies the pro-
portion of patients receiving services from health care facilities located at the
same HSA in which they reside.
Yet, a comparative analysis of community detection algorithms, is still lack-
ing for optimal network-based HSA delineation. Such comparative analysis is
needed given the heterogeneity of communities extracted by different commu-
nity detection algorithms [6]. Though such comparative analysis was previously
provided for grouping hospitals [3], the underlying networks differ from HPDNs
in two fundamental aspects: nodes were hospitals instead of geographical regions,
and links were patients sharing between hospitals instead of the total number of
hospital discharges.
In this paper, a comparative analysis of was conducted for HSAs delineated by
four commonly used community detection algorithms, namely, Block Model [8],
Infomap [10] , Louvain [1], and Speaker-Listener Label Propagation Algorithm
(SLPA) [14], were compared. A claims-based patient-hospital discharge data
was used; it containing a total of 124, 970, 471 discharges over a 7-year period in
California, US. Our results replicated the existent heterogeneity of communities
extracted by different algorithms of community detection and reinforced the use
of a network-based approach to HSA delineation. The results demonstrated, for
instance, that Infomap was the most suitable algorithm because it was capable
of delineating a high number of HSAs, and Infomap-HSAs still presented a high
localization index and a low network conductance. To shift the standard HSA
delineation methodology from Dartmouth to a network-based approach, further
studies on the reliability, validity, and generality of a network-based approach
are required.
Network-Based HSA Delineation: A Comparative Analysis
3
2 Methodology
A network-based delineation of Health Service Areas (Fig. 1) consists of (A)
modeling claims-based patient-hospital discharge data as networks of ZIP Code
Tabulation Areas (ZCTAs), (B) applying a diverse set of community detection
algorithms, and (C) performing a comparative analysis of the extracted com-
munities (i.e., HSAs) according to multiple quality metrics of HSA delineation.
Overall, 28 Hospital-Patient Discharge Network (HPDN) were built, one for
each combination of 4 discharge types and 7 years. For each HPDN, each of
the 4 community detection algorithms was applied, and a total of 112 HSA
delineations were obtained. Though only a subset of HPDNs and HSA de-
lineations are presented, all of the code, datasets, networks, and analysis are
available on the Open Science Framework (OSF) repository of this project at
https://doi.org/10.17605/OSF.IO/GW73Y.
Fig. 1. Network-based delineation of Health Service Areas (HSAs). (A) Hospital dis-
charge data is used to build Hospital-Patient Discharge Networks (HPDN) in which
nodes represent ZIP Code Tabulation Areas (ZCTAs), and links represent the total
number of discharges between the ZCTA locations of health care facilities and patient
residencies. (B) Community detection algorithms are applied over HDPNs to delineate
HSAs. (C) Delineated HSAs are evaluated according to multiple quality metrics of
HSA delineation.
2.1 Hospital-Patient Discharge Networks
Hospital-Patient Discharge Networks (HPDNs) were built using claims-based
hospital discharge data obtained from the California Health and Human Ser-
vices Agency (CHHS) [2]. This dataset is publicly available and contains a total
Hospital-Patient Discharge Network Patient ResidencyHealth Care Facility Hospital Discharge ZCTA 04ZCTA 01ZCTA 03ZCTA 02ZCTA 05ZCTA 07ZCTA 08ZCTA 06ACEvaluation of Health Service Areas (HSAs) Delineation HSA 1ZCTA 04ZCTA 01ZCTA 03ZCTA 02ZCTA 05ZCTA 07ZCTA 08ZCTA 06HSA 2BCommunityDetection AlgorithmsAlgorithm 1Algorithm 2Algorithm m…M1=<latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit><latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit><latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit><latexit sha1_base64="SDSR8D+p7f3YRt2u3iYwp0kFvbY=">AAACPHicbVC7SgNBFJ31GeMrUTubwSBYhV0RtBGCNjZCBPOAJIS7k0kyZHZnmbkbDUv+xFY/w/+wtxNba2eTFCbxwMDhnHu5Z44fSWHQdT+cldW19Y3NzFZ2e2d3bz+XP6gaFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3Cb+rUh10ao8BFHEW8F0AtFVzBAK7VzuWYA2Gcgk/tx26PXtJ0ruEV3ArpMvBkpkBnK7bxz1OwoFgc8RCbBmIbnRthKQKNgko+zzdjwCNgAerxhaQgBN61kEn1MT63SoV2l7QuRTtS/GwkExowC306mQc2il4r/eY0Yu1etRIRRjDxk00PdWFJUNO2BdoTmDOXIEmBa2KyU9UEDQ9tWdu6Mr9QAwTdzX0msEkvQz/NqEEsUWj2NbY/eYmvLpHpe9Nyi93BRKN3MGs2QY3JCzohHLkmJ3JEyqRBGhuSFvJI35935dL6c7+noijPbOSRzcH5+AWqUrgY=</latexit>+<latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit>+<latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit>+<latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit><latexit sha1_base64="4JoPLZ4/tJwg9U6DmikWDwAYSQY=">AAACK3icbVDLSgNBEJyNrxhfiXrzMhgEQQi7Iugx6MVjAuYByRJmJ5NkyMzOMtOrhiVf4FU/w6/xpHj1P5wke3ATCxqKqm66u4JIcAOu++nk1tY3Nrfy24Wd3b39g2LpsGlUrClrUCWUbgfEMMFD1gAOgrUjzYgMBGsF47uZ33pk2nAVPsAkYr4kw5APOCVgpfpFr1h2K+4ceJV4KSmjFLVeyTnu9hWNJQuBCmJMx3Mj8BOigVPBpoVubFhE6JgMWcfSkEhm/GR+6RSfWaWPB0rbCgHP1b8TCZHGTGRgOyWBkVn2ZuJ/XieGwY2f8DCKgYV0sWgQCwwKz97Gfa4ZBTGxhFDN7a2YjogmFGw4hcyaQKkxkMBkXkmsEguin7OqjAVwrZ6mNkdvObVV0ryseG7Fq1+Vq7dponl0gk7ROfLQNaqie1RDDUQRQy/oFb05786H8+V8L1pzTjpzhDJwfn4BBIun4g==</latexit>M2=<latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit><latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit><latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit><latexit sha1_base64="ir/JNOWsn7vg0CfcKEJsS5BRXMg=">AAACPHicbVC7SgNBFJ2NrxhfidrZDAbBKuwGQRshaGMjRDAPSEK4O5kkQ2Z3lpm70bDkT2z1M/wPezuxtXbyKEzigYHDOfdyzxw/ksKg6344qbX1jc2t9HZmZ3dv/yCbO6waFWvGK0xJpes+GC5FyCsoUPJ6pDkEvuQ1f3A78WtDro1Q4SOOIt4KoBeKrmCAVmpns80AsM9AJvfjdpFe03Y27xbcKegq8eYkT+Yot3POcbOjWBzwEJkEYxqeG2ErAY2CST7ONGPDI2AD6PGGpSEE3LSSafQxPbNKh3aVti9EOlX/biQQGDMKfDs5CWqWvYn4n9eIsXvVSkQYxchDNjvUjSVFRSc90I7QnKEcWQJMC5uVsj5oYGjbyiyc8ZUaIPhm4SuJVWIJ+nlRDWKJQqunse3RW25tlVSLBc8teA8X+dLNvNE0OSGn5Jx45JKUyB0pkwphZEheyCt5c96dT+fL+Z6Nppz5zhFZgPPzC2xergc=</latexit>Mn=<latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit><latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit><latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit><latexit sha1_base64="gTeqQQJ/UazFZOCYTozTQDLpHbs=">AAACPHicbVDLSgMxFM34rPU1PnZugkVwVWZE0I0gunEjVLAqtKXcSdM2NJMMyZ1qGeZP3Opn+B/u3Ylb12ZqF1Y9EDiccy/35ESJFBaD4NWbmZ2bX1gsLZWXV1bX1v2NzRurU8N4nWmpzV0ElkuheB0FSn6XGA5xJPltNDgv/NshN1ZodY2jhLdi6CnRFQzQSW3fb8aAfQYyu8zbip7Qtl8JqsEY9C8JJ6RCJqi1N7ztZkezNOYKmQRrG2GQYCsDg4JJnpebqeUJsAH0eMNRBTG3rWwcPad7TunQrjbuKaRj9edGBrG1ozhyk0VQ+9srxP+8Rord41YmVJIiV+z7UDeVFDUteqAdYThDOXIEmBEuK2V9MMDQtVWeOhNpPUCI7NRXMqekEszDtBqnEoXR97nrMfzd2l9yc1ANg2p4dVg5PZs0WiI7ZJfsk5AckVNyQWqkThgZkkfyRJ69F+/Ne/c+vkdnvMnOFpmC9/kF17auQw==</latexit>…Metrics4
Pinheiro et al.
of 124, 970, 471 hospital-patient discharges of different types spanning a 7-year
period from 2012 through 2018. The four discharge types are Inpatient from
Emergency Department (ED), Inpatient, Ambulatory Surgery, and ED Only.
Each data point contains the type of discharge, the year, the name of the
facility (e.g., Alameda Hospital, University of California Davis Medical Center).
Also, it contains the 5-digit ZIP Codes (e.g., 94501, 95831) of both facility loca-
tion and patient residency as well as the respective number of discharges between
them. Hospital discharges to patient residency ZIP Codes other than those with
5-digits were excluded (2.6%); these were mainly discharges of patients from
states other than California (e.g., ARIZONA, NEVADA (state), Other U.S.),
from locations outside the US (e.g., OUTSIDE U.S.), from unknown locations
(e.g., UNKNOWN), and from homeless population (e.g., HOMELESS).
ZIP Codes are a collection of delivery routes maintained U.S. Postal Service
and ZIP Code Tabulation Area (ZCTAs) are actual generalized areal represen-
tations maintained by the U.S. Census Bureau. Therefore, for each ZIP Code
of both health care facility and patient residency, the corresponding ZCTA was
obtained using the ZIP Code to ZCTA Crosswalk provided from the Uniform
Data System Mapper [11].
A separate weighted and undirected HPDN network was built for each type
of hospital discharge and for each year according to the methodology proposed
by Hu et al. [7]. In each network, nodes are ZCTAs, links are the total number of
discharges between the ZCTAs of health care facilities and patient residencies.
The HPDN is an undirected network because a link wij encodes the total number
of discharges between ZCTAs i and j without arbitrarily distinguishing whether
the direction is due to a health care facility at i discharging patients residing at
j or patients residing at i going to a facility at j for health care services.
2.2 Community Detection
In a network-based HSA delineation, each HSA correspond to a distinct com-
munity extracted by a community detection algorithm from a hospital-patient
discharge network (HPDN) [7]. While the existence of communities in real-world
networks is agreed upon, there is no generally accepted definition of what a com-
munity is, or what the most appropriate way to find them is [5]. Some algorithms
take a stronger approach to community detection by looking for cliques, which
are a group of nodes for which there is a link between every pair of nodes [4];
other approaches just look for more densely connected subgraphs within the
network such that a community is a subset of nodes within a network that are
densely connected to each other when compared to the rest of the network.
The lack of a general definition of what a community should be is also mir-
rored in the existent heterogeneity of communities extracted by different commu-
nity detection algorithms [6] and as such requires a comparison among commu-
nity detection algorithms. Four commonly used algorithms were selected: Lou-
vain Modularity, Infomap, Stochastic Block Model, and Speaker-listener Label
Propagation. These algorithms were selected as they provide four very distinct
Network-Based HSA Delineation: A Comparative Analysis
5
approaches to community detection and have their implementations easily pro-
vided by their authors.
The Louvain algorithm [1] finds communities that maximizes the network
modularity. This quantifies the extent to which the density of links within the
found communities excessively surpasses that of what would be expected if links
were placed at random. Trying all possible partitions is not computationally
feasible, and Louvain modularity takes a heuristic approach by maximizing the
local modularity of smaller communities that are only subsequently joined if such
aggregation leads to an increased modularity. These smaller communities start
as individual nodes and are iteratively joined together into greater communities
until the a single community containing the whole network is reached.
The Stochastic Block Model [8] uses a maximum likelihood estimator to in-
fer the block structure of the network. This algorithm attempts to recover the
hierarchical block structure of the network where each block represents a com-
munity. The block model used in this study is the degree-corrected variant given
the weighted aspect of HPDNs and that previous work has shown that the such
variant tends to perform better on empirical networks [9].
The Infomap algorithm [10] finds communities that maximizes the map equa-
tion instead of modularity. The map equation quantifies the length of the coding
scheme necessary to communicate the sequence of movements of random walkers
within the network. In essence, if a community structure exists, random walk-
ers will become trapped within these communities because movements within-
communities are more likely than between-communities. Therefore, the coding
scheme necessary to communicate the sequence of movements can be reduced
by taking into account the community structure as every time a walker enters
into a community, the community is identified, and a smaller community-specific
coding scheme is used to quantify within-community movements.
The Speaker-Listener Label Propagation Algorithm (SLPA) [14] is a localized
community detection algorithm based on the concept of label propagation. SLPA
finds communities by initially assigning each node to a unique label. Nodes then
iteratively changes their label to the label most often used by its neighbors.
Initially, this label exchange rule promotes the formation of smaller consensus
groups which will subsequently compete with one another for node members
depending on the balance between their within-group and between-group in-
teractions. In contrast to the other algorithm's, SLPA does not require prior
information about the network, nor does it attempt to maximize any metric
as a proxy for well-defined communities. Instead, it only relies on the network
structure to identify the communities. While SLPA is able to find overlapping
communities, the post processing threshold was set to r = 0.5 to ensure the ex-
traction of non-overlapping communities and thus provide a better comparison
to the other non overlapping algorithms used.
2.3 Evaluation of Health Service Areas (HSA) Delineation
The quality of a HSA delineation can be evaluated according to multiple and
often conflicting metrics [7,3]. The following four delineation metrics of a HSA c
6
Pinheiro et al.
were used: the number of communities (NC), the localization index (LIc),network
conductance (Cc), and the total number of discharges (Dc).
In a network-based HSA delineation, the total number of delineated HSAs
NC is determined by the specific community detection algorithm used as it is
the number of communities extracted. The NC is an important metric since
it determines the number of distinct meaningful units of analysis ultimately
uncovered and, as in any community detection problem, trivial solutions such as
1 (one) and n, the total number of nodes, are generally undesired [6].
The localization index LIc of a community c quantifies the proportion of
patients seeking and receiving health care services from hospitals within the
HSA in which they reside. A high value of LIc is desired since it describes HSA
c uncovered a geographic region in which residing patients receive comparable
health care services. Formally, the localization index LIc of community c can be
defined as
LIc =
ND(c,c)
ND(c)
,
(1)
community j, and ND(c) =(cid:80)NC
in which ND(i,j) is the total number of discharges from patients residing at
ZCTAs within community i that are discharged from hospitals at ZCTAs within
j ND(c,j) is the total number of discharges from
patients living within community c.
The network conductance Cc of a community c is a network-based measure
which quantifies the extent to c is well-formed. It is calculated using the total
links running within its community i relative to links running from i to other
communities. Conductance is based on the degree-based definition of a commu-
nity [5]. Formally, the conductance C(c) of a community c can be calculated
as
Cc =
wext
C
wC
,
(2)
nodes i and j, wC =(cid:80)
community c, and wext
C =(cid:80)
in which, for a weighted network, Wij is the strength of the link connecting
i∈C,j Wij is the total strength of links originating within
i∈C,j /∈C Wij is the external strength.
Aside from the aforementioned metrics, the total number of discharges ND(c)
from patients living in one of the ZCTAs found within community c is also cal-
culated. Ideally, a community detection algorithm would maximize the number
of HSAs where each has a high localization index and a low conductance. Yet,
as the total number of communities increases from one to n, the typical value
of localization index decreases from 1 to 0 and the typical value of network
conductance increases from 0 to 1.
To provide a reliable estimate for each metric, B = 1, 000 bootstrap samples
with replacement draw from the distribution of each metric were used to calculate
a mean value for the localization index (cid:104)li(cid:105), network conductance (cid:104)c(cid:105), and total
number of discharges (cid:104)d(cid:105). The standard deviation was also provided for each of
the aforementioned estimators.
Network-Based HSA Delineation: A Comparative Analysis
7
3 Results and Discussion
The network statistics of each individual HPDN varied among discharge types
and over the years (Table 1). Considering the year of 2012, for instance, Inpatient
from ED and ED Only HPDNs had comparable total number of nodes n. Their
number of links m were 49, 000 and 127, 000, respectively, suggesting that a ED
Only HPDN has a higher number of distinct ZCTA pairs for which hospital dis-
charges occurred between hospital locations and patient residencies. Also, their
the total network link strength w were 1.6 million and 9.2 million, respectively,
and their network density ρ were 0.0345 and 0.0883, respectively,suggesting that
the healthcare service underlying a ED Only HPDN has a higher demand and
is more dense. Over the years, the average shortest path length l and clustering
coefficient c of HPDNs slightly decreased.
Table 1. Statistics of Hospital-Patient Discharge Networks (HPDNs). For each type of
discharge and for each year, the following network measures were quantified: the total
number of nodes (n), the total number of links (m), the total weight (w), the network
density (ρ), the average shortest path length (l), as well as the clustering coefficient
(c). Other types of discharges and network metrics are available on the Open Science
Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/
GW73Y.
n
m
w
ρ
l
c
Type
of
Discharge
Year
Inpatient
from ED
ED Only
2012 1.69E+03 4.92E+04 1.63E+06 3.45E-02 2.81 1.19E-03
2013 1.69E+03 4.97E+04 1.63E+06 3.49E-02 2.72 1.12E-03
2014 1.69E+03 5.05E+04 1.64E+06 3.56E-02 2.71 1.02E-03
2015 1.68E+03 5.25E+04 1.72E+06 3.70E-02 2.89 9.74E-04
2016 1.75E+03 5.37E+04 1.74E+06 3.50E-02 2.70 9.53E-04
2017 1.75E+03 5.38E+04 1.75E+06 3.52E-02 2.67 9.84E-04
2018 1.75E+03 5.41E+04 1.75E+06 3.54E-02 2.62 9.31E-04
2012 1.69E+03 1.27E+05 9.25E+06 8.83E-02 2.15 2.14E-04
2013 1.69E+03 1.28E+05 9.65E+06 8.95E-02 2.18 2.07E-04
2014 1.69E+03 1.33E+05 1.03E+07 9.25E-02 2.20 1.90E-04
2015 1.69E+03 1.39E+05 1.12E+07 9.66E-02 2.16 1.78E-04
2016 1.76E+03 1.42E+05 1.15E+07 9.15E-02 2.15 1.81E-04
2017 1.76E+03 1.43E+05 1.17E+07 9.25E-02 2.15 1.88E-04
2018 1.76E+03 1.42E+05 1.14E+07 9.17E-02 2.16 1.96E-04
Overall, HSA delineation results (Fig. 2 and Table 2) have reinforced the su-
periority of network-based HSA delineation as well as confirmed the heterogene-
ity among communities extracted by different community detection algorithms
even in the same dataset. Such results are not only consistent with community
8
Pinheiro et al.
detection comparisons from previous works [6], but also advocate for a further
comparison among community detection algorithms.
Table 2. Comparison of HSAs delineated using the community detection algorithms
Block Model, Infomap, Louvain, and SLPA in terms of in terms of the number of
communities (nc) as well as the typical values of the localization index (cid:104)li(cid:105), network
conductance (cid:104)c(cid:105), and total number of discharges (cid:104)d(cid:105). The discharge types presented are
Inpatient from ED and ED Only for the years of 2012 and 2018. The other discharge
types and years are available on the Open Science Framework (OSF) repository of this
project at https://doi.org/10.17605/OSF.IO/GW73Y.
Type of Discharge Year Community Detection
Inpatient from ED
ED Only
2012
2018
2012
2018
BLOCK MODEL
INFOMAP
LOUVAIN
SLPA
BLOCK MODEL
INFOMAP
LOUVAIN
SLPA
BLOCK MODEL
INFOMAP
LOUVAIN
SLPA
BLOCK MODEL
INFOMAP
LOUVAIN
SLPA
nc
(cid:104)li(cid:105)
(cid:104)c(cid:105)
(cid:104)d(cid:105)
35
70
20
110
35
62
15
111
33
90
24
139
34
76
24
126
0.47
0.77
0.86
0.69
0.47
0.80
0.87
0.65
0.45
0.77
0.92
0.70
0.45
0.84
0.90
0.73
0.82
0.18
0.13
0.25
0.74
0.15
0.13
0.28
0.84
0.22
0.09
0.28
0.83
0.15
0.09
0.25
51, 450
25, 539
89, 235
16, 392
54, 090
30, 397
125, 833
16, 830
311, 009
114, 117
430, 396
74, 049
359, 908
160, 869
512, 044
97, 810
The comparison of HSA delineations (Fig. 2) involves the evaluation of con-
flicting metrics such as higher number of communities and localization index.
Considering the discharge type ED Only and year 2018 (Table 2), for instance,
the difference between the number Louvain-HSAs and SLPA-HSAs was 4-fold,
with 24 Louvain-HSAs and 126 SLPA-HSAs. This fewer number of Louvain-
HSAs using hospitals discharge in California is also consistent with the fewer
number of Louvain-HSAs in the previous work from Hu et al. [7] using hospi-
tal discharges in Florida. Though the localization index of Louvain-HSAs (.90)
was 7% higher than that of Infomap-HSAs (.84), 52 more Infomap-HSAs were
delineated, representing a 2-fold increase.
By examining their geographical patterns (Fig. 3), the respective geograph-
ical areas of Louvain-HSAs correspond to a wider and more discontinuous ge-
ographical areas than those of Infomap-HSAs. Yet, Block Model-HSAs appear
to be the poorest HSAs delineated not only because they are the fewest num-
ber of HSAs delineated, which corresponds to a wider and more discontinuous
Network-Based HSA Delineation: A Comparative Analysis
9
area, but also as their localization index is lower than .5 which raises concerns
about the internal validity of the HSAs delineated. Lastly, Block Model-HSAs
presented the highest variability regarding their localization index, conductance,
and total number of discharges. Using the nested version of Block Model has not
changed this results. Conversely, SLPA-HSAs are the highest number of HSAs
but their localization index is typically less than .7, which is higher than that
of Block Model-HSAs but still raises concerns regarding the internal validity of
SLPA-HSAs.
The hospital discharge data and the Hospital-Patient Discharge Networks
(HPDNs) inherently represent a flow between hospitals and patients and the
apparent superior results achieved by Infomap may be related to the fact that,
instead of modularity, the Infomap optimizes the map equation and thus takes
into account the local flows emerging from the movements of random walkers
trapped within the HPDN communities. Interestingly, Infomap-HSAs presented
improved localization index and conductance over time.
4 Conclusions
Health Service Areas (HSAs) are meaningful units of analysis for improving the
scientific basis of both clinical practice and policy decision making in the delivery
of health care. The optimal delineation of HSAs is necessary to create not only
more meaningful units of analysis, but also characterizing medical practices with
greater accountability regarding their respective community needs and shared
care practices.
As HSAs shift from the Dartmouth approach towards a network-based ap-
proach, further work will be needed to establish a comprehensive methodology
for network-based HSA delineation, which should include (i) a broader set of
community detection algorithms, (ii) hospital discharge data from states other
than California, and integration with other healthcare datasets of expenditures.
Further work is still needed to establish a comprehensive methodology for this
type of approach.
References
1. Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb-
vre. Fast unfolding of communities in large networks. Journal of Statistical
Mechanics-Theory and Experiment, 2008(10), October 2008.
2. CHHS. California health and human services agency. https://data.chhs.ca.gov.
Accessed: 2019-11-15.
3. Jordan Everson, John M Hollingsworth, and Julia Adler-Milstein. Comparing
methods of grouping hospitals. Health Services Research, 24(4):333 -- 9, June 2019.
4. Santo Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75 --
174, February 2010.
5. Santo Fortunato and Darko Hric. Community detection in networks: A user guide.
Physics Reports, 659:1 -- 44, November 2016.
10
Pinheiro et al.
6. Ryan Hartman, Josemar Faustino, Diego Pinheiro, and Ronaldo Menezes. Assess-
ing the suitability of network community detection to available meta-data using
rank stability. WI, pages 162 -- 169, 2017.
7. Yujie Hu, Fahui Wang, and Imam M Xierali. Automated Delineation of Hospital
Service Areas and Hospital Referral Regions by Modularity Optimization. Health
Services Research, 53(1):236 -- 255, February 2018.
8. Tiago P. Peixoto. Hierarchical block structures and high-resolution model selection
in large networks. Physical Review X, 4(1), March 2014.
9. Tiago P. Peixoto. Model selection and hypothesis testing for large-scale network
models with overlapping groups. Physical Review X, 5(1), March 2015.
10. M. Rosvall and C. T. Bergstrom. Maps of random walks on complex networks
reveal community structure. Proceedings of the National Academy of Sciences,
105(4):1118 -- 1123, January 2008.
11. UDS. Uniform data system mapper. zip code to zcta crosswalk. https://www.
udsmapper.org/zcta-crosswalk.cfm. Accessed: 2019-11-15.
12. John Wennberg. The Dartmouth Atlas of Health Care. American Hospital Associ-
ation, Chicago, IL, 1996.
13. John Wennberg and Alan Gittelsohn. Small Area Variations in Health Care De-
livery: A population-based health information system can guide planning and reg-
ulatory decision-making. Science, 182(4117):1102 -- 1108, December 1973.
14. Jierui Xie, Boleslaw K. Szymanski, and Xiaoming Liu. SLPA: uncovering over-
lapping communities in social networks via A speaker-listener interaction dynamic
process. CoRR, abs/1109.5720, 2011.
N
e
t
w
o
r
k
-
B
a
s
e
d
H
S
A
D
e
l
i
n
e
a
t
i
o
n
:
A
C
o
m
p
a
r
a
t
i
v
e
A
n
a
l
y
s
i
s
1
1
Fig. 2. Comparison of HSAs delineated using Block Model, Infomap, Louvain, and SLPA community detection algorithms. The HSA
delineations were compared in terms of the number of communities (NC ), localization index (LI(c)), network conductance (C(c)), and
total number of discharges (ND(i, j)). The discharge types presented are Inpatient from ED (top) and ED Only (bottom). All results are
available on the Open Science Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/GW73Y.
Inpatient from EDED OnlyNumber of CommunitiesLocalization IndexNumber of DischargesNetwork ConductanceYears1
2
i
P
n
h
e
i
r
o
e
t
a
l
.
Fig. 3. Maps of HSA delineated using the community detection algorithms Block Model, Infomap, Louvain, and SLPA for discharge
types Inpatient from ED (top) ED Only (bottom) in 2018. Each HSA is displayed as a geographical boundary aggregating one or more
ZCTAs along with its respective Id. HSAs were then colored using a color blind palette with 9 distinct colors. All maps are available on
the Open Science Framework (OSF) repository of this project at https://doi.org/10.17605/OSF.IO/GW73Y
|
1610.07754 | 1 | 1610 | 2016-10-25T07:24:37 | Activity Maximization by Effective Information Diffusion in Social Networks | [
"cs.SI",
"cs.DB"
] | In a social network, even about the same information the excitements between different pairs of users are different. If you want to spread a piece of new information and maximize the expected total amount of excitements, which seed users should you choose? This problem indeed is substantially different from the renowned influence maximization problem and cannot be tackled using the existing approaches. In this paper, motivated by the demand in a few interesting applications, we model the novel problem of activity maximization. We tackle the problem systematically. We first analyze the complexity and the approximability of the problem. We develop an upper bound and a lower bound that are submodular so that the Sandwich framework can be applied. We then devise a polling-based randomized algorithm that guarantees a data dependent approximation factor. Our experiments on three real data sets clearly verify the effectiveness and scalability of our method, as well as the advantage of our method against the other heuristic methods. | cs.SI | cs | Activity Maximization by Effective Information Diffusion in
Social Networks
Zhefeng Wang†, Yu Yang‡, Jian Pei‡ and Enhong Chen†
†University of Science and Technology of China,Hefei, China
‡Simon Fraser University, Burnaby, Canada
[email protected], [email protected], [email protected], [email protected]
6
1
0
2
t
c
O
5
2
]
I
S
.
s
c
[
1
v
4
5
7
7
0
.
0
1
6
1
:
v
i
X
r
a
ABSTRACT
In a social network, even about the same information the
excitements between different pairs of users are different. If
you want to spread a piece of new information and maximize
the expected total amount of excitements, which seed users
should you choose? This problem indeed is substantially
different from the renowned influence maximization prob-
lem and cannot be tackled using the existing approaches.
In this paper, motivated by the demand in a few interest-
ing applications, we model the novel problem of activity
maximization. We tackle the problem systematically. We
first analyze the complexity and the approximability of the
problem. We develop an upper bound and a lower bound
that are submodular so that the Sandwich framework can
be applied. We then devise a polling-based randomized al-
gorithm that guarantees a data dependent approximation
factor. Our experiments on three real data sets clearly ver-
ify the effectiveness and scalability of our method, as well
as the advantage of our method against the other heuristic
methods.
1.
INTRODUCTION
Based on messages between users in an instant messaging
network, such as Whatsapp and WeChat, you can model
topics and strengths/frequencies of interaction activities be-
tween users. Now you want to raise the awareness of a con-
troversial social issue. Within a budget, you want to spread
the information in the network so that people in the network
discuss the issue as much as possible. Which users should
you choose to start spreading the words?
Isn't this an instance of the well known and well studied
influence maximization problem [17]? The answer is "no"
indeed. Influence maximization selects a seed set of nodes
within a given budget constraint such that the expected
number of nodes influenced by information diffusion is max-
imized. However, to satisfy the requirement that "people
in the network discuss the (target) issue as much as possi-
ble", we not only want to influence many users, but most
importantly also want to maximize the expectation of the
sum of strength of the interaction activities about the target
issue. This variation of the information diffusion problem,
called activity maximization, is very different from influence
maximization.
Can we adapt some existing influence maximization meth-
ods to solve the activity maximization problem? Unfortu-
nately, the answer is no due to the following major reasons.
First, the activity maximization problem focuses on the in-
teraction activities between the active users (i.e., the users
influenced) while the influence maximization problem aims
to simply maximize the expected number of the active users.
Since activity strength is different from edge to edge, more
active users do not necessarily lead to more interaction ac-
tivities. Second, at the technical level, the objective func-
tions in the influence maximization problem and the activity
maximization problem proposed here have different proper-
ties, as to be shown in Section 3. Many existing methods
for the influence maximization problem rely on some special
properties, such as submodurarity and supermodurarity, of
the objective function in influence maximization, which un-
fortunately do not hold for activity maximization. Third,
interaction activities happen between user pairs. The ex-
isting methods for influence maximization, however, do not
consider activity strengths on edges in their objective func-
tions.
Motivated by the interesting application scenarios and the
technical challenges associated, in this paper, we propose a
novel problem, activity maximization, which aims to maxi-
mize the expectation of the total activity among all active
users. A unique novel feature of our problem is that the
optimization objective captures interactions among active
users. We make several contributions.
First, we identify a novel research problem with interest-
ing applications. We propose the novel activity maximiza-
tion problem that aims to maximize the expectation of the
overall activities in a social network. To the best of our
knowledge, we are the first to explore the interactions among
active nodes in information propagation.
Second, we assess the challenges of the proposed activity
maximization problem. We show that the activity maxi-
mization problem is NP-hard under the two most popularly
used information diffusion models, namely the independent
cascade (IC) model and the linear threshold (LT) model. We
also prove that computing the activities with respect to a
given set of nodes is #P-hard under both the IC model and
the LT model. Moreover, we show that the objective func-
tion of the problem is neither submodular nor supermodular.
The theoretical results clearly show that the proposed ac-
tivity maximization problem cannot be easily solved using
1
Notation
G = (V, E, B)
Description
A social network, where each edge (u, v) ∈
E is associated with a diffusion model-
dependent parameter Bu,v
δL(·), δU (·)
n = V
Au,v
δA(S)
GS = (VS , ES ) The propagation subgraph induced by seed
set S, where VS is the set of all active nodes
and ES = {(u, v) u ∈ VS ∧ v ∈ VS}
The number of nodes in G
The interaction strength of edge (u, v)
The activity of a given seed set S
The lower bound and the upper bound re-
spectively
A "live-edge" graph instance of G
g is sampled from all possible instances of
G
The set of nodes reachable from node set
S in g
(u, v) ∈
The transpose graph of g:
g iff (v, u) ∈ gT
The reverse reachable (RR) set for node v
The hypergraph consist of hyperedges
The number of the hyperedges in H
The degree of the node set S in H
H
mH
D(S)
RgT (v)
gT
g
g ∼ G
Rg(S)
Table 1: Frequently used notations.
the existing methods for influence maximization. To under-
stand the feasibility of approximate solutions, We appraise
the approximability of the problem by constructing a reduc-
tion from the densest k-subgraph problem.
Third, to develop practical approximate solutions, we de-
velop a lower bound and an upper bound of activities. We
prove that maximizing the lower bound or upper bound is
still NP-hard under the IC model and the LT model. More-
over, computing the lower bound or upper bound is still
#P-hard under the IC model and the LT model. However,
we show the submodularity of the lower bound and the up-
per bound, which facilitates approximation.
Fourth, we develop a polling based randomized algorithm.
We design a sampling method to obtain an unbiased estima-
tion of activities. We also show how to efficiently implement
the greedy strategy on the estimate of activities. We extend
the sandwich approximation scheme to prove that the pro-
posed algorithm has a data dependent approximation factor.
Last, we verify our algorithm on three real world data
sets. The experimental results confirm the effectiveness and
the efficiency of the proposed algorithm.
The rest of the pager is organized as follows. We formu-
late the activity maximization problem in Section 2. In Sec-
tion 3, we observe several interesting and useful properties
of the proposed problem. We develop a lower bound and an
upper bound in Section 4. In Section 5, we devise the polling
based algorithm. We review the related work in Section 6.
We report the empirical evaluation results in Section 7, and
conclude the paper in Section 8. Table 1 summarizes the
frequently used symbols and their meanings.
2. PROBLEM FORMULATION
In this section, we first review two widely used information
diffusion models, and then give the formal statement of the
activity maximization problem.
2.1 Diffusion Models
The independent cascade (IC) model and the linear
threshold (LT) model [17] are the two most widely used
information diffusion models. Our discussion in this paper
is based on these two models. We briefly review them here.
Consider a social network G = (V, E, B), where V is a set
of vertices, E ⊆ V × V is a set of edges, and B is a diffusion
model-dependent parameter. Specifically, in the IC model,
Bu,v is the propagation probability of edge (u, v), which is
the probability that v is activated by u after u is activated.
In the LT model, Bu,v is the influence weight of edge (u, v),
which indicates the importance of u influencing v.
Both models assume a seed set S ⊆ V . Let St be the
nodes that are activated in step t (t = 0, 1, . . .) and S0 = S.
In the IC model, the information diffusion process unfolds
as follows. At step t + 1, each node v in St has only one
chance to activate each inactive neighbor u with the prob-
ability Bv,u. The process terminates when no more nodes
can be activated.
In the LT model, the information diffusion process un-
folds as follows.
Initially, each node v selects a threshold
θv in range [0, 1] uniformly at random. At step t > 0, an
inactive node v is activated if (cid:80)
w∈N (v)∩( ∪
The process stops at a step t when St = ∅.
Si) Bw,v ≥ θv.
i<t
Kempe et al. [17] also provided an alternative perspec-
tive of the information diffusion based on "live-edge" graphs.
Given a graph G, each edge is marked as "live" on certain
randomized rules, and the random subgraph obtained from
all live edges and all nodes in V is called the "live-edge"
graph [5]. Kempe et al. [17] proved that we can construct
equivalent "live-edge" graph models for both IC model and
LT model. For the IC model, a "live-edge" graph instance
can be obtained by marking each edge (u, v) as "live" with
probability Bu,v independently. For the LT model, the cor-
responding rule is: each node v marks at most one incoming
edge (u, v) as "live" with probability 1 −(cid:80)
u∈N (v) Bu,v.
2.2 Activity Maximization
The activity maximization problem also considers infor-
mation diffusion in a social network with an extra parame-
ter A. Each edge (u, v) ∈ E is associated with an activity
strength Au,v, which captures the interaction strength be-
tween u and v when they are both active.
Given a social network G, an information diffusion model
M, and a seed set S, the diffusion process forms a propa-
gation induced subgraph GS = (VS, ES), where VS is the
set of all active nodes and ES = {(u, v) u ∈ VS ∧ v ∈ VS}
is the set of all edges whose two endpoints are both in VS.
Then, we can define the activity of a given seed set S as
δA(S) = E
Au,v
(1)
(cid:35)
(cid:34) (cid:88)
(u,v)∈ES
where E[·] is the expectation operator. Since information
diffusion is a stochastic process, we take the expectation
with respect to all possible diffusion instances. The activity
measures the overall interaction strength among the active
nodes and thus can reflect the overall strength of the activity
caused by the information propagated in the social network.
Now, we can formally define the activity maximization
problem as follows. Given a social network G, an informa-
tion diffusion model M, and a budget k, find a seed set S∗
such that
∗
S
= arg max
S ⊆ V
S = k
δA(S)
(2)
2
From the definition, we can see the difference between
the proposed activity maximization problem and the tra-
ditional influence maximization problem. The traditional
influence maximization problem aims to maximize the ex-
pected number of the active nodes but does not maximize
the interactions among them. In contrast, the proposed ac-
tivity maximization problem focuses on the activity caused
by the information diffused and tries to maximize the inter-
action strength among the active nodes.
3. PROPERTIES OF ACTIVITY MAXI-
MIZATION
In this section, we first prove the hardness of the activity
maximization problem. Then we discuss the properties of
the objective function δA(·). Last, we show the approxima-
bility of the problem.
3.1 Hardness Results
We first assess the hardness of the activity maximization
problem.
Theorem 1. Activity maximization is NP-hard under the
IC model and the LT model.
Proof. We prove by reducing from the set cover prob-
lem [16], which is well known in NP-complete. Given a
ground set U = {u1, u2, . . . , un} and a collection of sets
{S1, S2, . . . , Sm} whose union equals the ground set, the set
cover problem is to decide if there exist k sets in S so that
the union equals U.
Given an instance of the set cover problem, we construct
a corresponding graph with 2n + m nodes as follows. We
create a node xi for each set Si, two nodes yj and y(cid:48)
j for
each element uj, and two edges (xi, yj) and (xi, y(cid:48)
j) with
propagation probability 1 for the IC model and with influ-
ence weight 1 for the LT model and activity 0 if uj ∈ Si.
We also create an edge between yj and y(cid:48)
j with propagation
probability 0 and activity 1 for each element uj. The in-
formation diffusion will be a deterministic process, since all
propagation probabilities are either 1 or 0. Therefore, the
set cover problem is equivalent to deciding if there is a set
S of k nodes such that δA(S) = n. The theorem follows
immediately.
Activity maximization is NP-hard. Then, what is the
hardness of computing the activity with respect to a given
seed set S?
Theorem 2. Given a seed set S, computing δA(S) is #P-
hard under the IC model and the LT model.
Proof. We prove by reducing from the influence spread
computation problem, which was proved #P-hard under the
IC model and the LT model [7, 8].
Given an instance of the influence spread computation
problem, we keep the same graph G and influence diffusion
parameters B. We set Au,v = 1 for any u, v ∈ V and com-
pute x1 = δA(S) in the graph G. Next, we add a new node
v(cid:48) for each node v in the graph G and an edge between v and
v(cid:48) with propagation probability 1 for the IC model and with
influence weight 1 for the LT model and activity 1. Now, we
obtain a new graph G(cid:48) and can compute x2 = δA(S) in the
graph G(cid:48). For any newly added node v(cid:48), the only way to be
activated is through its only neighbor v. Moreover, a newly
added node v(cid:48) will be activated if its neighbor v is active,
(a) Counter example 1
(b) Counter example 2
Figure 1: Counter examples
since the propagation probability of the newly added edges
is 1. Thus, x2 − x1 is exactly the influence spread in the
graph G. The theorem follows immediately.
In [17], Kempe et al. introduced the triggering model that
generalizes the IC model and the LT model. In the trigger-
ing model, each node v independently chooses a subset of
its neighbors as its "triggering set" according to some dis-
tribution. A node will be activated if at least one node of
its triggering set is active. We can see that the reduction
we construct in the proof of Theorem 2 still holds for the
triggering model. Thus, we have the following result.
Corollary 2.1. Given a seed set S, computing δA(S) is
#P-hard in any triggering model M if computing influence
spread is #P-hard in M.
3.2 Modularity of Objective Functions
The objective function of influence maximization is sub-
modular under the IC model and the LT model. Unfor-
tunately, the objective function in activity maximization is
no submodular. Moreover, we can show that δA(·) is not
supermodular as well.
Theorem 3. δA(·) is not submodular under the IC model
and the LT model.
Proof. We prove by a counter example. Consider
Fig. 1(a). The first number in the tuple on each edge repre-
sents the propagation probability for the IC model and the
influence weight for the LT model. The second number is the
activity of the edge. For example, in the counter example 1,
(1, 1) on edge (v1, v2) means Bv1,v2 = 1 and Av1,v2 = 1. In
this example, we have δA({v1}) = 1, δA({v1, v5}) = 5 and
δA({v5}) = 2. That is,
δA({v1}) − δA(∅) < δA({v1, v5}) − δA({v5})
Therefore, δA(·) is not submodular.
From counter example 1, we can see that the reason why
δA(·) is not submodular is the "combination effect" between
the newly added node and the existing seed nodes. For
example, If we add v1 into S when S = ∅, then there is only
one endpoint is active for edge (v2, v4) and (v2, v3), that is
v2. But if we add v1 to S when S = {v5}, then both the
two endpoints of edge (v2, v4) and (v2, v3) are active, since
v3 and v4 are activated by v5.
Theorem 4. δA(·) is not supermodular under the IC
model and the LT model.
3
v1v2v3v4v5(1,1)(0,1)(0,1)(1,1)(1,1)v1v2v3v4(1,1)(1,1)(1,1)(1,1)Proof. Again, we prove by a counter example. Consider
the counter example 2 in Fig 1(b), we have δA({v2}) = 3,
δA({v1, v2}) = 4 and δA({v1}) = 4. Thus,
δA({v2}) − δA(∅) > δA({v2, v1}) − δA({v1})
That is, δA(·) is not supermodular.
3.3 Approximability
Since δA(·) is neither submodular nor supermodular, we
cannot adopt the standard procedure for optimizing sub-
modular function or supermodular function to get an ap-
proximation solution. To explore the approximability of the
activity maximization problem, we explore the connection
between the activity maximization problem and the densest
k-subgraph extraction problem.
Theorem 5. If there exists a polynomial time algorithm
approximating the activity maximization problem within a
ratio of α, then there exists a polynomial time algorithm
that can approximate the densest k-subgraph problem within
a ratio of α.
Proof. We prove by constructing a reduction from the
densest k-subgraph problem to the activity maximization
problem. Given a graph and an integer k, the densest
k-subgraph problem is to find a subgraph of exactly k
vertices that has the maximum density. For a subgraph
GS = (VS, ES), the density is define as
ES
VS .
Given an instance of the densest k-subgraph problem, we
construct a corresponding instance of the activity maximiza-
tion problem. We keep the same graph and set Bu,v = 0
and Au,v = 1 for u, v ∈ V . Then, the activity maximiza-
tion problem is to find a set of k vertices and maximize the
number of edges whose both endpoints are in this set.
It
is equivalent to maximizing the density since the number of
vertices is constant.
Khot [18] showed that the densest k-subgraph problem
does not admit PTAS1 (Polynomial Time Approximation
), we im-
BP T IM E(2n
Scheme [31]) assuming N P (cid:42) (cid:84)
imization problem assuming N P (cid:42) (cid:84)
>0
mediately have the following result.
Corollary 5.1. There is no PTAS for the activity max-
BP T IM E(2n
).
>0
In fact, finding a good approximation to the densest k-
subgraph problem is challenging. The current best approxi-
mation ratio of n1/4+ for > 0 was achieved by Bhaskara et
al. [2]. It is still unknown if there exists a polynomial algo-
rithm that can approximate the densest k-subgraph problem
with a constant factor.
4. LOWER BOUND AND UPPER BOUND
In this section, we first give a lower bound and an upper
bound on activities. Then we discuss the properties of the
lower bound and the upper bound.
1A PTAS is an algorithm that returns a solution within a
factor 1 + of being optimal (or 1 - for maximization
problems) in polynomial time for any > 0.
4
4.1 The Bounds
Since the "combination effect" among seed nodes com-
prises the submodularity of the objective function δA(·), we
try to develop a lower bound of δA(·) that is submodular by
ignoring the "combination effect". The major idea is that
we only consider the edges whose two endpoints are acti-
vated by the same seed node. Accordingly, the lower bound
can be defined as
Au,v]
(3)
E{x}
δL(S) = E[
(cid:88)
(u,v)∈ (cid:83)
x∈S
where E{x} is the set of edges of the propagation subgraph
induced by seed set {x}. Recall that the propagation sub-
graph induced by a seed set consists of the nodes that can
be activated by the seed set. Here, the seed set consists of
only one node x. It is easy to see that δL(S) ≤ δA(S) for
any S ⊆ V , since we ignore the edges whose endpoints are
activated by different seed nodes.
A straightforward way to get an upper bound is to con-
sider all the edges that have at least one active endpoint. In
this way, the upper bound equals to the activity of edges that
have one active endpoint plus the activity of edges whose two
endpoints are both active. The latter is exactly the activ-
ity we want to compute. Here, we present a tighter upper
bound from the perspective of active nodes, which can be
defined as
δU (S) = E[
w(v)]
(4)
(cid:88)
(cid:88)
v∈VS
where
w(v) =
1
2
Au,v.
u∈N (v)
Given a seed set S, δU (S) equals to the half of the activity of
edges that have one active endpoint plus the activity of edges
whose two endpoints are both active. Thus, δU (S) is better
than the straightforward one. Also, we can see that the
upper bound is essentially a weighted version of the influence
spread, where the weight of node v is 1
u∈N (v) Au,v. For
2
the influence spread, w(v) = 1 for each node v.
4.2 Properties of the Bounds
(cid:80)
Using the lower bound and the upper bound, we can ap-
proximate the information activity problem by maximizing
the lower bound and the upper bound [21]. However, max-
imizing the lower bound and the upper bound is still NP-
hard.
Theorem 6. Maximizing the lower bound is NP-hard un-
der the IC model and the LT model.
Proof. We prove by reducing from the NP-complete set
cover problem [16]. We show the reduction constructed in
the proof of Theorem 1 still holds for the lower bound. The
lower bound only considers the edges whose two endpoints
can be activated by the same seed node.
In the previous
reduction, for all the edges whose activity is not equal to 0
(the edges between yj and y(cid:48)
j), their two endpoints can be
activated by the same node. Thus, the set cover problem
can be solved by deciding if there is a set S of k nodes such
that δL(S) = n.
Theorem 7. Maximizing the upper bound is NP-hard un-
der the IC model and the LT model.
Proof. We prove by reducing from the NP-hard influ-
ence maximization problem [17].
2
dmax
1, v(cid:48)
1), (v, v(cid:48)
2, . . . , v(cid:48)
2), . . . , (v, v(cid:48)
Given an instance of the influence maximization prob-
lem, let dmax be the highest degree of the nodes in the
graph G. Then, for each node v in G, we add Nd =
dmax − dv new nodes, v(cid:48)
Nd , and Nd new edges,
(v, v(cid:48)
Nd ). Now we obtain a new graph G(cid:48).
We set the propagation probability of the newly added edges
to 0 for the IC model, and set the influence weight of the
newly added edges to 0 for the LT model, and set the infor-
mation activity of all the edges in G(cid:48) to
Then, we have ∀v ∈ V , w(v) = 1, and ∀v(cid:48) ∈ V (cid:48) \ V ,
w(v(cid:48)) = 2
. Since the propagation probability of all
newly added edges is 0, the newly added nodes can never
be activated. Therefore, we have I G(S) = δG(cid:48)
U (S),∀S ⊆ V ,
where I(S) is the influence spread of a give seed set S in G
and δG(cid:48)
U (S) is the upper bound in G(cid:48).
U = arg max δG(cid:48)
Next, we prove that S∗
U , we can always replace it with a node in V \ S∗
U (S) does not contain
any newly added nodes. If there is any newly added node
in S∗
U and
increase the value of the objective function. Thus, if S∗
U is
the optimal solution of maximizing the upper bound in G(cid:48), it
must be the optimal solution of the influence maximization
in G.
dmax
.
Although maximizing the lower bound and the upper
bound is NP-hard, the objective functions of the lower
bound and the upper bound are submodular.
Theorem 8. δL(·) is submodular under the IC model and
the LT model.
Proof. Given a graph G and an influence diffusion
model, either the IC model or the LT model, we can con-
struct "live-edge" graphs for G using the methods proposed
in [17]. Let g be a "live-edge" graph instance. Denote by
P r(g) the probability that g is selected from all possible in-
stances. Let Eg(S) be the set of edges whose two endpoints
can be reachable from the same node in the seed set S. Then
we can rewrite δL(S) to
(cid:88)
(cid:88)
We only need to prove Q(S) = (cid:80)
δL(S) =
P r(g)
g∼G
(u,v)∈Eg (S)
Au,v
(u,v)∈Eg (S)
Au,v is submod-
ular for any "live-edge" graph instance g, since an non-
negative linear combination of submodular functions is also
submodular.
To prove, let M and N be two sets such that M ⊆ N ⊆ V .
For any v ∈ V \ N , consider the difference between Q(M ∪
{v}) and Q(M ).
It must be contributed from the edges
whose two endpoints can be reachable from v but cannot be
reachable from the nodes in M . These edges must be a super
set of the edges whose two endpoints can be reachable from v
but cannot be reachable from the nodes in N , since M ⊆ N .
It follows that Q(M ∪ {v}) − Q(M ) ≥ Q(N ∪ {v}) − Q(N ).
Therefore, Q(S) is submodular and the theorem follows.
Theorem 9. δU (·) is submodular under the IC model and
the LT model.
Proof. We can prove the theorem by the same "live-
edge" technique used in the proof of Theorem 8. Let Rg(S)
5
be the set of nodes reachable from S in g. Then, δU (S) can
be rewritten to
(cid:88)
(cid:88)
The way to prove that Q(cid:48)(S) = (cid:80)
δU (S) =
v∈Rg (S)
P r(g)
g∼G
w(v)
w(v) is submod-
v∈Rg (S)
ular is similar to the proof of Q(S) in Theorem 8. The
nodes that can be reachable from v but cannot be reach-
able from the nodes in M must be a super set of the nodes
that can be reachable from v but cannot be reachable from
It follows that Q(cid:48)(M ∪ {v}) − Q(cid:48)(M ) ≥
the nodes in N .
Q(cid:48)(N ∪ {v}) − Q(cid:48)(N ). Therefore, Q(cid:48)(S) is submodular and
the theorem follows.
Theorems 8 and 9 are good news. With the submodular-
ity we can adopt the standard procedure for optimizing sub-
modular functions to obtain an approximation solution [24].
One challenge remains. Applying the algorithm proposed
in [24] requires evaluating the lower bound and the upper
bound. However, computing the lower bound and the up-
per bound with respect to a given seed set is unfortunately
#P-hard.
Theorem 10. Given a seed set S, computing δL(S) is
#P-hard under the IC and the LT model.
Proof. We prove by reducing from the influence spread
computation problem. We show that the reduction we con-
struct in the proof of Theorem 2 still holds for the lower
bound case. Let y1 = δL(S) in the graph G and y2 = δL(S)
in the graph G(cid:48). Since the propagation probability of the
edge (v, v(cid:48)) is 1 for the IC model and the influence weight
of the edge (v, v(cid:48)) is 1 for the LT model, v and v(cid:48) can be
activated by the same seed node. It follows that y2 − y1 is
also the influence spread in the graph G.
Theorem 11. Given a seed set S, computing δU (S) is
#P-hard under the IC and the LT model.
Proof. We prove by reducing from the influence spread
computation problem. The reduction is the same as the one
in the proof of Theorem 7. We already showed I G(S) =
δG(cid:48)
U (S) for any seed set S ⊆ V . Therefore, the theorem
follows immediately.
Since computing the activity, the lower bound and the
upper bound is #P-hard, we will discuss how to estimate
them in the next section.
5. A POLLING BASED METHOD
Recently, a polling based algorithmic framework [3, 29]
was proposed for the influence maximization problem. The
framework includes two steps. In the first step, it estimates
the influence spread through sampling. In the second step,
it finds an approximation solution for maximizing the esti-
mate. If we can bound the estimation error, then the solu-
tion also enjoys an approximation guarantee for the influence
maximization problem. To solve the activity maximization
problem, we also design a polling based method.
5.1 Estimation
In a social network G, given an information diffusion
model, either the IC model or the LT model, and a seed
set S, let g be a "live-edge" graph instance of G and Rg(S)
be the set of nodes reachable from S in g. Denote by RgT (v)
the reverse reachable (RR) set [30] for node v in g, where gT
is the transpose graph [3] of g: (u, v) ∈ g iff (v, u) ∈ gT . We
write (u, v) ∼ E to indicate that we randomly pick (u, v)
from E as a sample according to a certain distribution. The
meaning of v ∼ V is similar.
To estimate the activity, we first have the following result.
Theorem 12. For any seed set S ⊆ V ,
P r
g∼G,(u,v)∼E
(u,v)∈E Au,v.
(cid:34)
(cid:35)
S ∩ RgT (u) (cid:54)= ∅ ∧ S ∩ RgT (v) (cid:54)= ∅
(cid:35)
Proof.
δA(S) = T ·
δA(S) = E
where T =(cid:80)
(cid:34) (cid:88)
(cid:88)
(cid:88)
(cid:88)
(u,v)∈E
(u,v)∈E
=
=
=
P r
(u,v)∈E
P r
g∼G
P r
g∼G
(u,v)∈ES
Au,v
(cid:34)
(cid:35)
Au,v
(cid:35)
(u, v) ∈ ES
u ∈ Rg(S) ∧ v ∈ Rg(S)
(cid:34)
(cid:34)
∃w1, w2 ∈ S, w1 ∈ RgT (u)∧
(cid:35)
Au,v
w2 ∈ RgT (v)
(cid:34)
= T · (cid:88)
Au,v
Au,v
P r
g∼G
∃w1, w2 ∈ S, w1 ∈ RgT (u)∧
(cid:35)
(u,v)∈E
w2 ∈ RgT (v)
(cid:104)∃w1, w2 ∈ S, w1 ∈ RgT (u)∧
(cid:105)
g∼G,(u,v)∼E
S ∩ RgT (u) (cid:54)= ∅ ∧ S ∩ RgT (v) (cid:54)= ∅(cid:105)
(cid:104)
w2 ∈ RgT (v)
P r
P r
T
(5)
g∼G,(u,v)∼E
= T ·
= T ·
Eq. 5 is the expected probability with respect to the ac-
tivity distribution of edges, where the probability for edge
(u, v) is Au,v
T .
Theorem 12 implies that we can estimate δA(S) by esti-
mating the probability of the event S ∩ RgT (u) (cid:54)= ∅ ∧ S ∩
RgT (v) (cid:54)= ∅. To achieve the estimation, we conduct a poll
as follows. We select an edge (u, v) with probability Au,v
T ,
and run Monte Carlo simulation of the "live-edge" process.
During the process, we record all the nodes that can reach
u and v through "live" edges. Algorithm 1 summarizes the
process.
One critical observation is that we do not need to conduct
the "live-edge" process on the entire graph. Instead, we can
simulate the process starting from u and v, respectively. We
only need to make sure that each edge is marked consistently
as the same status ("live" or "blocked") in these two sim-
ulations. We call the pair of two RR sets obtained from a
poll a hyperedge. All the generated hyperedges constitute a
hypergraph H.
,
Figure 2: Hyperedge for activities
model M
Input: Social network G = (V, E, B), A and diffusion
Output: A hyperedge E
1: Initialize E = (∅,∅)
2: Pick an edge (u, v) with probability Au,v
T .
3: Generate a "live-edge" graph instance g according to
the diffusion model M
4: Let N1 = RgT (u) and N2 = RgT (v)
5: Let E = (N1, N2)
6: return E
Algorithm 1: Generate Hyperedges
Denote by mH the number of the hyperedges in H. If a
node v appears in both RR sets of a hyperedge E, E said is to
be fully covered by v. If a node v only appears in one of the
two RR sets of a hyperedge E, E is said to be partially covered
by v. Denote by D(S) the degree of the set of nodes S, which
is the number of hyperedges in H that can be fully covered
by S. According to Theorem 12, T · D(S)
is an unbiased
estimator of δA(S) for any fixed mH . Please note that there
also exists "combination effect" between nodes in this case.
For example, in the left part of Figure 2, v1 only appears
in the first RR set of hyperedge E and v4 only appears in
the second RR set. v1 and v4, respectively, partially covers
E. But E is fully covered by the combination of v1 and v4.
Thus, similar to δA(·), D(·) is not submodular neither.
mH
Similarly, for the lower bound and the upper bound, we
have the following two results.
Theorem 13. For any seed set S ⊆ V ,
δL(S) = T ·
S ∩ (RgT (u) ∩ RgT (v)) (cid:54)= ∅(cid:105)
(cid:104)
P r
,
g∼G,(u,v)∼E
where T =(cid:80)
(u,v)∈E Au,v.
Proof. The lower bound only considers the edges whose
two endpoints can be activated by the same seed node.
Thus, to prove the theorem, we only need to let w1 = w2 in
the proof of Theorem 12, that is
δL(S) =T ·
=T ·
(cid:104)∃w ∈ S, w ∈ RgT (u) ∧ w ∈ RgT (v)
S ∩ (RgT (u) ∩ RgT (v)) (cid:54)= ∅(cid:105)
(cid:104)
g∼G,(u,v)∼E
(cid:105)
P r
P r
g∼G,(u,v)∼E
Using Theorem 13, we can estimate the lower bound using
essentially the same sampling process as the activity. The
only difference is that there is only one node set in the hy-
peredge for the lower bound, that is N1 ∩ N2. In this case, a
6
. . .. . .RR Set 1RR Set 2v1v2v3v4v5. . .Hyperedgeℰ. . .v1v2v3v4v5. . .Hyperedgeℰ. . .. . .Node Set 1(n1)Node Set 2(n2)Node Set 3(n3)Input: Social network G, Hypergraph H and budget k
Output: Seed set S
1: Initialize S = E1 = E2 = E3 = ∅
2: for v ∈ V do
3: M G(v) = v.e
4: end for
5: while S < k do
6:
7:
8:
9:
10:
11:
end for
12: end while
13: return S
Algorithm 2: Maximum Coverage on Hypergraph
v = arg maxu∈V \S M G(u)
S = S ∪ {v}
update E1, E2, and E3
for u ∈ V \ S do
update M G(u) according to Eq. 6
E2 and E3, in this data structure, where E1 and E2 are the
sets of hyperedges whose first and second RR sets have been
covered, respectively, and E3 is the set of hyperedges that
have been fully covered. Fig. 3 shows these two data struc-
tures. With these data structures, we have the following
fact.
Fact 1. Given a seed set S, for each vertex v ∈ V \ S,
the marginal gain D(S ∪ {v}) − D(S) is
M G(v) = v.e3 \ E3 + v.e1 ∩ E2 + v.e2 ∩ E1
(6)
Rationale. If we add a node v to the current seed set S, the
newly covered hyperedges can be divided into two groups.
The first group is the hyperedges that can be covered by v
alone but not covered by S, that is v.e3 \ E3. The second
group is the hyperedges that are partially covered by S and
are fully covered if v is added to S, that is v.e1 ∩ E2 and
v.e2 ∩ E1.
Fact 1 implies that we can pick the node with the largest
marginal gain in each iteration and then incrementally up-
date the marginal gains of the rest nodes. Algorithm 2 de-
scribes the details.
2, and E(cid:48)
Here, we briefly explain how to incrementally update the
marginal gain. Assuming E1, E2 and E3 are updated to
E(cid:48)
1, E(cid:48)
3, respectively, we update the marginal gains
as follows. For each hyperedge E ∈ E(cid:48)
1 \ E1, we increase
the marginal gains of the nodes in E.n2 by 1. For each
hyperedge E ∈ E(cid:48)
2 \ E2, we increase the marginal gains of
the nodes in E.n1 by 1. For each hyperedge E ∈ E(cid:48)
3 \ E3, we
first decrease the marginal gains of the nodes in E.n3 by 1.
Then, we decrease the marginal gains of the nodes in E.n2
by 1 if E ∈ E1, and decrease the marginal gains of the nodes
in E.n1 by 1 if E ∈ E2.
Now, the only remaining question is to decide how many
hyperedges we need to sample, which will be addressed next.
5.3 Sample Complexity
In this subsection, we discuss how to use a sample of
proper size to restrict the estimate error of the activity, the
lower bound and the upper bound. With the technique,
we show that the polling algorithm can provide an approxi-
mate solution to maximizing the lower bound and the upper
bound.
To bound the estimate error of the polling method, we
have the following lemma from [11].
Figure 3: Data Structures
hyperedge E is covered by node v if and only if v ∈ N1 ∩ N2.
Theorem 14. For any seed set S ⊆ V ,
(cid:104)
S ∩ RgT (v) (cid:54)= ∅(cid:105)
,
δU (S) = W ·
where W =(cid:80)
v∈V w(v).
P r
g∼G,v∼V
Proof. The upper bound is essentially a weighted vari-
ation of the influence spread. Thus, we can apply the proof
proposed in [25].
There is also only one node set in the hyperedge for the
upper bound. We can generate the hyperedge using the
sampling method proposed in [25].
Since we can estimate the objective function (δA(·), δL(·)
or δU (·)) by the degrees of the set of nodes, we can regard
H as encoding an approximation to the objective function.
With the estimate of the objective function, we go to the
second step of the polling based framework, that is, max-
imizing the estimate. To achieve this goal, we adopt the
simple but powerful greedy strategy, which picks the node
with the largest marginal gain (the increase of degree in H
for our case) iteratively. Next, we show how to efficiently
implement a greedy strategy on the hypergraph.
5.2 Efficient Implementation of the Greedy
Strategy
For the lower bound and the upper bound, there is only
one node set in each hyperedge. Thus, we can use the stan-
dard greedy algorithm for maximum coverage problem to
obtain an approximate solution [30]. However, there are
two node sets in the hyperedge for the activity maximiza-
tion problem. A hyperedge can be fully or partially covered
by a node or a node set. Thus, we cannot directly apply the
greedy strategy. To tackle this issue, here we discuss how to
efficiently implement the greedy strategy on the hypergraph.
First, we store the original hyperedges of two RR sets in
a more efficient manner. There are three sets, n1, n2 and
n3 for each hyperedge E, where n1 and n2 are the sets of
nodes that can only cover the first and second RR set of E,
respectively, and n3 is the set of nodes that can cover both
two RR sets of E. Fig. 2 illustrates the idea.
Then, we build an inverted index for each node. There are
three sets, e1, e2 and e3 for each node v, where e1 and e2 are
the sets of hyperedges whose first and second RR set can be
covered by v, respectively, and e3 is the set of hyperedges
that can be fully covered by v.
Third, we maintain a global data structure to record the
current covered hyperedges. There are also three sets, E1,
7
. . .. . .. . .ℰ1ℰ2ℰ3ℰ4. . .Node vEdge Set 1(e1)Edge Set 2(e2)Edge Set 3(e3). . .. . .. . .Covered HyperedgesEdge Set 1(E1)Edge Set 2(E2)Edge Set 3(E3)1: Compute Υ1 according to 1, 2, δ1, δ2
2: mH = Υ1
3: Generate mH hyperedges and add to H
4: S =maximum coverage on H
5: while D( S) < Υ1 do
6: Generate mH hyperedges and add to H
7: mH = 2mH
8:
9: end while
10: return S
S =maximum coverage on H
Algorithm 3: SSA Algorithm
i=0 ZN and µZ = S
Let S = (cid:80)N
Lemma 1. Let Z1, Z2, . . . be independently and identically
distributed according to Z in the interval [0, 1] with mean µZ .
N . Let Υ = 4(e − 2) ln(2/δ)
and Υ1 = 1 + (1 + )Υ.
If N is the number of samples
when S >= Υ1, then P r[µZ − µZ ≤ µZ ] > 1 − δ and
E[N ] ≤ Υ1/µZ .
Lemma 1 provides a stopping condition for the sampling pro-
cess. Given a seed set S, we can keep sampling hyperedges
until D(S) ≥ Υ1. Then, T · D(S)
is an (, δ) estimation [23]
of δA(S). The analysis is similar in the cases of the lower
bound and the upper bound.
mH
2
Nguyen et al. [26] analyzed the conditions that the polling
algorithmic framework must meet to obtain an approxima-
tion solution. Let S∗ be the optimal seed set and S be the
seed set returned by the greedy strategy on the estimate of
the objective function f (·) (δL(·) or δU (·)). Denote by f (·)
the estimate of the objective function f (·). The conditions
are
P r[ f ( S) ≤ (1 + 1)f ( S)] ≥ 1 − δ1
)] ≥ 1 − δ2
P r[ f (S
) ≥ (1 − 2)f (S
∗
∗
(8)
where δ1 + δ2 ≤ δ and 1 + (1 − 1/e)2 ≤ . Let N be
the number of samples such that both Eq. 7 and Eq. 8 are
guaranteed. Then we have the following lemma from [26].
Lemma 2. Given a social network G, if the number of
hyperedges mH ≥ N , then the polling algorithm returns S
satisfying P r[f ( S) ≥ (1 − 1/e − )f (S∗)] ≥ 1 − δ and S is
an (1 − 1/e − ) approximate solution.
Using Lemmas 1 and 2, to obtain an approximation solu-
tion to maximizing the lower bound or upper bound, we can
keep sampling hyperedges and checking if the conditions are
met. Algorithm 3 from [26] describes the process. Please
note that, in Lines 4 and 8 of Algorithm 3, we adopt the
standard greedy algorithm for the maximum coverage prob-
lem to get S.
Using Algorithm 3, we can provide a (1 − 1/e − ) ap-
proximation solution to maximizing the lower bound and
the upper bound with probability of at least 1 − δ. But
we must point out that the analysis does not hold for the
activity maximization problem. This is because a neces-
sary condition of the polling algorithmic framework is that
we can approximate the estimate using the greedy strategy.
The condition is not met in the case of the activity maxi-
mization problem, since the estimate of the activity is not
submodular. Thus, the polling algorithm cannot provide an
approximation solution to the activity maximization prob-
lem. But it is still a good heuristic for the activity maxi-
mization problem. Furthermore, by combining the approxi-
mation algorithm for the lower bound and the upper bound,
(7)
1: Let SU be a α approximation to the upper bound
2: Let SL be a β approximation to the lower bound
3: Let SA be a solution to the original problem
4: δA(·) is a multiplicative γ-error estimate of δA(·)
5: S = arg maxS0∈{SU ,SL,SA} δA(S0)
6: return S
Algorithm 4: Sandwich Approximation Framework
we can derive a data dependent approximation scheme for
the activity maximization problem.
5.4 Data Dependent Approximation
There is no general way to optimize or approximate a
non-submodular function. Lu et al. [21] proposed a sand-
wich approximation strategy, which approximates the objec-
tive function by approximating its lower bound and upper
bound. The sandwich approximation strategy works as fol-
lows. First, we find a solution to the original problem with
any strategy. Second, we find an approximate solution to
the lower bound and the upper bound, respectively. Last,
we return the solution that has the best result for the orig-
inal problem.
Here, we extend the strategy to the case in which the ob-
jective function is intractable and have the following result.
(cid:110) δA(SU )
(cid:111) 1 − γ
Theorem 15. Let S be the seed set returned by Algo-
rithm 4, then we have
δA(S) ≥ max
Proof. Let S∗
δL(S∗
L)
δA(S∗
A)
A be the optimal solutions to
maximizing the lower bound, the upper bound and the ac-
tivity, respectively. Then, we have
α,
U and S∗
L, S∗
δU (SU )
1 + γ
δA(S
∗
A)
(9)
β
δU (SU ) ≥ δA(SU )
δU (SU )
∗
A)
· α · δU (S
· α · δU (S
∗
U )
δA(SU ) =
δA(SU )
δU (SU )
≥ δA(SU )
δU (SU )
≥ δA(SU )
δU (SU )
· α · δA(S
∗
A)
δA(SL) ≥ δL(SL) ≥ β · δL(S
∗
L)
· β · δA(S
∗
A)
≥ δL(S∗
L)
δA(S∗
A)
Let Smax = arg maxS0∈{SU ,SL,SA} δA(S0), then
δA(Smax) ≥ max
(cid:110) δA(SU )
δU (SU )
(cid:111)
α,
δL(S∗
L)
δA(S∗
A)
β
δA(S
∗
A)
Since ∀S0 ∈ {SU , SL, SA},δA(S0) − δA(S0) ≤ γδA(S0), we
have (1 + γ)δA(S) ≥ (1 − γ)δA(Smax). It follows that
δA(S) ≥ (1 − γ)
(1 + γ)
δA(Smax)
Theorem 15 indicates that we can approximate the activ-
ity maximization problem within a factor that is dependent
on the data. Since it is #P-hard to compute δA(·) and δU (·),
and is NP-hard to find S∗
A, we cannot compute the
exact approximation factor. But we can estimate δA(SU )
δU (SU )
by computing its lower bound (1−γ)δA(SU )
. It follows that
(1+γ)δU (SU )
L and S∗
8
(1+γ)2 · α · δA(SU )
(1−γ)2
δU (SU )
proximation factor.
is a computable lower bound of the ap-
Now, we put all the pieces of the puzzle together. We first
adopt the polling algorithm to maximize the lower bound
and the upper bound. As discussed in Section 5.3, it pro-
vides (1− 1/e− ) approximate solutions to the lower bound
and the upper bound, respectively. Consequently, we have
α = β = (1 − 1
e − ) in Algorithm 4. Then, we also use
the polling algorithm to get a heuristic solution (SA) to the
activity maximization problem. Last, we get a (γ, δ) esti-
mation of δA(·) based on Lemma 1 to complete Line 5 of
Algorithm 4. According to Theorem 15, the sandwich algo-
rithm returns a seed set S such that
δA(S) ≥ max
(cid:110) δA(SU )
δU (SU )
(cid:111) 1 − γ
1 + γ
δL(S∗
L)
δA(S∗
A)
,
(1 − 1
e
− )δA(S
∗
A)
6. RELATED WORK
Domingos and Richardson [12] first exploited the influence
between users in social networks for viral marketing. Kempe
et al. [17] formulated the problem as a discrete optimization
problem, which is also well known as the influence maximiza-
tion problem. The influence maximization problem aims to
optimize the influence spread (the expected number of ac-
tivated nodes) in a given information diffusion model, such
as the IC model and the LT model. Due to its important
applications in viral marketing and some other areas, it has
drawn much attention from both academia and industry [19,
13, 10, 22, 33, 4].
Under the IC model and the LT model, Kempe et al. [17]
proved that influence maximization is NP-hard. Moreover,
Chen et al. [7, 8] proved that computing influence spread is
#P-hard. Thus, many heuristic algorithms were proposed
to solve the problem under these two models [7, 8, 15, 20,
9]. Recently, a polling based method [3] was proposed for
influence maximization. Unlike the previous heuristic algo-
rithms, this method can provide a solution with provable
approximation guarantee. Later, Tang et al. [30, 29] re-
duced the sample complexity and improved the efficiency.
Nguyen et al. [26] further sped up the algorithm with a dif-
ferent bounding technique [11].
In this paper, we extend
this algorithmic framework to solve our activity maximiza-
tion problem in a non-trivial way.
A series of extensions to the influence maximization prob-
lem have been studied. For example, Goyal et al. [14]
proposed a data based approach to influence maximization
based on a credit distribution model. Instead of maximizing
the influence spread under some propagation models with
respect to some learned parameters, they tried to find influ-
ential nodes from the action log data directly. Chen et al. [6]
considered the time-delay aspect of influence diffusion and
studied the influence maximization with time-critical con-
straint. Tang et al. [28] studied the problem of maximiz-
ing the influence spread and the diversity of the influenced
crowd simultaneously. Bhagat et al. [1] argued that prod-
uct adoption should be distinguished from influence spread
in viral marketing, as influence spread is essentially used as
"proxy" for product adoption. Wang et al. [32] distinguished
the information coverage and information propagation, and
proposed a new optimization objective that includes the val-
ues of the informed nodes. All these extensions were from
the perspective of nodes and tried to exploit the values of
nodes as separate individuals in different diffusion models
9
Network
HepPh
DBLP
LiveJournal
# Vertices
12,008
317,080
3,997,962
# Edges
118,521
1,049,866
34,681,189
Average degree
9.9
3.3
8.7
Table 2: The statistics of the data sets.
and different problem settings. They did not consider activ-
ity strengths on edges in their objectives. In contrast, our
problem captures the interactions among nodes and enables
different (often orthogonal) applications of information dif-
fusion.
7. EXPERIMENTS
In this section, we evaluate our algorithm via a series of
experiments on three real-world data sets.
7.1 Settings
1
We ran our experiments on three real-world data sets,
which are available at the SNAP website (http://snap.
stanford.edu). Tab. 2 shows the statistics of the data sets.
The propagation probability Bu,v for the IC model and
the influence weight for the LT model of an edge (u, v) is set
to
degree(v) , as widely used in literatures [5]. Since activity
maximization is a novel problem that has not been studied
in the past, nor the activity of each edge, we do not have any
real data for the purpose of experiments. Thus, we verify
our algorithm with two synthetic activity settings. In the
first case, we uniformly set Au,v to 1 for each edge (u, v).
In the second case, we set Au,v to the value of the diffusion
parameter Bu,v. The intuition is that there might be more
interactions between u and v if u is more likely to activate v.
For the approximation parameters, we set = 0.1, δ = 0.001
and γ = 0.05 for all data sets.
We compare the proposed algorithm, referred as Sand-
wich, with three heuristic algorithms: InfMax, Degree and
PageRank.
InfMax returns the nodes for influence maxi-
mization. We followed the implementation reported in [26].
Degree returns the nodes with high degrees. PageRank re-
turns the nodes with high PageRank [27] scores.
We implemented our algorithm and the baselines in Java.
All experiments were conducted on a PC computer with a
3.4GHZ Intel Core i7-3770 processor and 32 GB memory,
running Microsoft Windows 7.
7.2 Effectiveness
Fig. 4 shows the activity computed by each algorithm on
the three data sets, respectively. For better illustration, we
report the comparative gain ratio instead of the absolute
activity value. The comparative gain ratio of an algorithm
A is defined as δA(SA)−δA(S)
, where SA and S are the seed
sets returned by algorithm A and the Sandwich algorithm,
respectively.
δA(S)
Our algorithm Sandwich almost always has the best per-
formance. Only in very few cases, Sandwich is outperformed
marginally. In the uniform settings, algorithm Degree per-
forms well under the IC model but has a relatively bad per-
formance under the LT model. InfMax and PageRank often
have a bad performance under both the IC model and the LT
model in the uniform settings. In the diffusion settings, Inf-
Max algorithm is a good heuristic under both the IC model
and the LT model. Algorithm PageRank performs well on
the DBLP data set but has a bad performance on the other
(a) HepPh-IC-uniform
(b) HepPh-IC-diffusion
(c) HepPh-LT-uniform
(d) HepPh-LT-diffusion
(e) DBLP-IC-uniform
(f) DBLP-IC-diffusion
(g) DBLP-LT-uniform
(h) DBLP-LT-diffusion
(i) LiveJournal-IC-uniform
(j) LiveJournal-IC-diffusion
(k) LiveJournal-LT-uniform (l) LiveJournal-LT-diffusion
Figure 4: Information activity on three data sets
two data sets. Algorithm Degree often has a bad perfor-
mance under both the IC model and the LT model in the
diffusion settings. These baseline algorithms only use the
properties of the social network or the diffusion process but
totally ignore the activity strengths on edges. In contrast,
our algorithm utilizes the unbiased estimate of the activity
and its lower and upper bounds to solve the problem. This
is why our algorithm always has a good performance while
the baseline algorithms fail in many cases.
7.3 Approximation Quality
A major advantage of our algorithm is that it carries a
data dependent approximation ratio. Since the exact ap-
proximation is intractable to compute, we report the com-
putable lower bound of the approximation ratio, that is
(1+γ)2 · (1 − e − ) · δA(SU )
(1−γ)2
. Fig. 5 shows the results on
δU (SU )
the three data sets.
The ratio varies in different data sets. On the same data
set, the ratios under the IC model and the LT model also
differ. In general, the ratio under the LT model is greater
than the one under the IC model in the same activity set-
tings. The ratio does not change much with respect to the
size of the seed set k. Roughly the ratio increases when k
increases. A possible reason is that the gap between the ac-
tivity and the upper bound shrinks when k increases, since
there are more nodes activated with a larger value of k.
10
7.4 Scalability
Since the activity settings do not affect the running time,
we only report the running time in the uniform case. Fig. 6
shows the running time on the three data sets.
In most of the cases, the running time of our algorithm
decreases when the size of seed set k increases. This is be-
cause the time cost in Sandwich depends on the number of
sampled hyperedges. According to Lemma 1, the expected
number of samples is inversely proportional to µZ , which is
the probability of the event S∩RgT (u) (cid:54)= ∅∧S∩RgT (v) (cid:54)= ∅.
It increases when k increases. A similar analysis holds for
the lower bound and the upper bound. PageRank is faster
than our algorithm on the two smaller data sets but slower
on the largest data set. Degree and InfMax are more effi-
cient than our algorithm, but they are substantially weaker
than ours in effectiveness in many cases. It is worthy not-
ing that our algorithm is actually very efficient. The largest
running time is only about 600 seconds on the largest data
set, which has millions of nodes and tens of millions of edges.
7.5
Influence Spread versus Activity
To explore the relation between influence spread and ac-
tivity, we report their values in the uniform settings. We
choose the uniform settings for our experiments here be-
cause in such a situation, the activity is exactly the number
of edges between the active nodes. In the diffusion settings,
there is no such correspondence. We also calculate their ra-
K050100150200Comparative Gain Ratio-0.6-0.4-0.200.2SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.2-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.5-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.3-0.2-0.100.1SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.3-0.25-0.2-0.15-0.1-0.050SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.2-0.15-0.1-0.0500.05SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.5-0.4-0.3-0.2-0.10SandwichInfMaxDegreePageRankK050100150200Comparative Gain Ratio-0.1-0.08-0.06-0.04-0.0200.02SandwichInfMaxDegreePageRank(a) HepPh
(b) DBLP
(c) LiveJournal
Figure 5: Approximation ratio on three data sets
(a) HepPh-IC
(b) HepPh-LT
(a) k = 20
(b) k = 200
(c) DBLP-IC
(d) DBLP-LT
(e) LiveJournal-IC
(f) LiveJournal-LT
Figure 6: Running time on three data sets
tio, which is the influence spread against the information
activity. Tab. 3 shows the results on the three data sets.
The ratio differs under different models. In general, the
ratio under the LT model is greater than the one under the
IC model. Possibly active nodes are more closely connected
to each other under the LT model. Interestingly, the influ-
ence spread in the DBLP data set is greater than the one in
the HepPh data set while the activity in the DBLP data set
is smaller than the one in the HepPh data set. It is probably
because the average degree of HepPh is greater than that of
DBLP. As a result, there are more edges among the active
nodes in the HepPh data set. The results suggest that the
ratio is related to the average degree.
We also notice that the ratio is similar when k = 20 and
k = 200. This result suggests that the relation between the
Figure 7: Interaction ratio on three data sets
influence spread and the activity does not vary much with
respect to the size of seed set. The ratio can be viewed as
the average degree of the propagation induced subgraph.
The average degree of the propagation induced subgraph
is smaller than the average degree of the whole graph. This
is because only a small proportion of the nodes can be ac-
tivated. Thus, there are many edges between active nodes
and inactive nodes. The average degree of the propagation
induced subgraph only considers the edges between active
nodes. Thus, we report the interaction ratio of the active
nodes, which is the number of edges whose both endpoints
are active against the number of edges that have at least
one active endpoint. The results are shown in Fig. 7. The
interaction ratios are not high on all three data sets. This
indicates that only a small proportion of the neighbors are
activated and interact with the active nodes. This result
demonstrates an essential difference between activity maxi-
mization and influence maximization.
8. CONCLUSIONS
In this paper, to address the demand raised in several
interesting applications, we proposed and formulated a novel
problem, activity maximization. We proved the hardness of
the problem under both the IC model and the LT model. We
also developed a lower bound and an upper bound of the
objective function, and observed several useful properties
of the lower bound and the upper bound. We designed a
polling based algorithm to solve the problem that carries
a data dependent approximation ratio. Our experimental
results on three real data sets verified the effectiveness and
efficiency of our method. As future work we are interested
in learning the activity of user pairs from real-world data.
9. REFERENCES
11
K050100150200Approximiation Ratio0.10.150.20.250.30.35IC-ULT-UIC-DLT-DK050100150200Approximiation Ratio0.10.150.20.250.3IC-ULT-UIC-DLT-DK050100150200Approximiation Ratio0.060.080.10.120.140.160.18IC-ULT-UIC-DLT-DK050100150200Time (s)01020304050SandwichInfMaxDegreePageRankK050100150200Time (s)012345SandwichInfMaxDegreePageRankK050100150200Time (s)020406080SandwichInfMaxDegreePageRankK050100150200Time (s)0510152025SandwichInfMaxDegreePageRankK050100150200Time (s)0200400600800SandwichInfMaxDegreePageRankK050100150200Time (s)0100200300400SandwichInfMaxDegreePageRankData setHepPhDBLPLiveJournalInteraction ratio00.10.20.30.40.5IC modelLT modelData setHepPhDBLPLiveJournalInteraction ratio00.20.40.60.8IC modelLT modelIC model
LT model
Data
HepPh
DBLP
LiveJ
influence
932
2,291
66,615
k=20
activity
4,868
3,509
958,95
ratio
5.22
1.53
1.44
influence
3,217
13,764
186,726
k=200
activity
17,016
21,165
333,598
ratio
5.28
1.54
1.79
influence
1,988
2,834
89,559
k=20
activity
26,017
5,179
184,842
ratio
13.08
1.83
2.06
influence
5,467
17,445
297,014
k=200
activity
61,524
32,712
839,334
ratio
11.25
1.88
2.83
Table 3: Influence spread and information activity on three data sets
[1] S. Bhagat, A. Goyal, and L. V. Lakshmanan.
Maximizing product adoption in social networks. In
WSDM, pages 603–612. ACM, 2012.
[2] A. Bhaskara, M. Charikar, E. Chlamtac, U. Feige, and
A. Vijayaraghavan. Detecting high log-densities: an o
(n 1/4) approximation for densest k-subgraph. In
STOC, pages 201–210. ACM, 2010.
[3] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier.
Maximizing social influence in nearly optimal time. In
SODA, pages 946–957. Society for Industrial and
Applied Mathematics, 2014.
[4] S. Chen, J. Fan, G. Li, J. Feng, K.-l. Tan, and
J. Tang. Online topic-aware influence maximization.
VLDB, 8(6):666–677, 2015.
[5] W. Chen, L. V. Lakshmanan, and C. Castillo.
Information and influence propagation in social
networks. Synthesis Lectures on Data Management,
5(4):1–177, 2013.
[6] W. Chen, W. Lu, and N. Zhang. Time-critical
influence maximization in social networks with
time-delayed diffusion process. In AAAI, pages
592–598. AAAI Press, 2012.
[7] W. Chen, C. Wang, and Y. Wang. Scalable influence
maximization for prevalent viral marketing in
large-scale social networks. In SIGKDD, pages
1029–1038. ACM, 2010.
[8] W. Chen, Y. Yuan, and L. Zhang. Scalable influence
maximization in social networks under the linear
threshold model. In ICDM, pages 88–97. IEEE, 2010.
[9] S. Cheng, H. Shen, J. Huang, W. Chen, and
X. Cheng. Imrank: influence maximization via finding
self-consistent ranking. In SIGIR, pages 475–484.
ACM, 2014.
[10] E. Cohen, D. Delling, T. Pajor, and R. F. Werneck.
Sketch-based influence maximization and
computation: Scaling up with guarantees. In CIKM,
pages 629–638. ACM, 2014.
[11] P. Dagum, R. Karp, M. Luby, and S. Ross. An
optimal algorithm for monte carlo estimation. SIAM
Journal on computing, 29(5):1484–1496, 2000.
[12] P. Domingos and M. Richardson. Mining the network
value of customers. In SIGKDD, pages 57–66. ACM,
2001.
[13] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha.
Scalable influence estimation in continuous-time
diffusion networks. In NIPS, pages 3147–3155, 2013.
[14] A. Goyal, F. Bonchi, and L. V. Lakshmanan. A
data-based approach to social influence maximization.
VLDB, 5(1):73–84, 2011.
[15] A. Goyal, W. Lu, and L. V. Lakshmanan. Simpath:
An efficient algorithm for influence maximization
12
under the linear threshold model. In ICDM, pages
211–220. IEEE, 2011.
[16] R. M. Karp. Reducibility among combinatorial
problems. In Complexity of computer computations,
pages 85–103. Springer, 1972.
[17] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing
the spread of influence through a social network. In
KDD, pages 137–146. ACM, 2003.
[18] S. Khot. Ruling out ptas for graph min-bisection,
dense k-subgraph, and bipartite clique. SIAM Journal
on Computing, 36(4):1025–1071, 2006.
[19] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos,
J. VanBriesen, and N. Glance. Cost-effective outbreak
detection in networks. In SIGKDD, pages 420–429.
ACM, 2007.
[20] Q. Liu, B. Xiang, E. Chen, H. Xiong, F. Tang, and
J. X. Yu. Influence maximization over large-scale
social networks: A bounded linear approach. In
CIKM, pages 171–180. ACM, 2014.
[21] W. Lu, W. Chen, and L. V. Lakshmanan. From
competition to complementarity: comparative
influence diffusion and maximization. VLDB,
9(2):60–71, 2015.
[22] B. Lucier, J. Oren, and Y. Singer. Influence at scale:
Distributed computation of complex contagion in
networks. In SIGKDD, pages 735–744. ACM, 2015.
[23] M. Mitzenmacher and E. Upfal. Probability and
computing: Randomized algorithms and probabilistic
analysis. Cambridge University Press, 2005.
[24] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An
analysis of approximations for maximizing
submodular set functionsi. Mathematical
Programming, 14(1):265–294, 1978.
[25] H. T. Nguyen, T. N. Dinh, and M. T. Thai.
Cost-aware targeted viral marketing in billion-scale
networks. In INFOCOM. IEEE, 2016.
[26] H. T. Nguyen, M. T. Thai, and T. N. Dinh.
Stop-and-stare: Optimal sampling algorithms for viral
marketing in billion-scale networks. In SIGMOD.
ACM, 2016.
[27] L. Page, S. Brin, R. Motwani, and T. Winograd. The
pagerank citation ranking: bringing order to the web.
1999.
[28] F. Tang, Q. Liu, H. Zhu, E. Chen, and F. Zhu.
Diversified social influence maximization. In
ASONAM, pages 455–459. IEEE, 2014.
[29] Y. Tang, Y. Shi, and X. Xiao. Influence maximization
in near-linear time: A martingale approach. In
SIGMOD, pages 1539–1554. ACM, 2015.
[30] Y. Tang, X. Xiao, and Y. Shi. Influence maximization:
Near-optimal time complexity meets practical
efficiency. In SIGMOD, pages 75–86. ACM, 2014.
[31] V. V. Vazirani. Approximation algorithms. Springer
Science & Business Media, 2013.
[32] Z. Wang, E. Chen, Q. Liu, Y. Yang, Y. Ge, and
B. Chang. Maximizing the coverage of information
propagation in social networks. In IJCAI, pages
2104–2110. AAAI Press, 2015.
[33] Y. Yang, X. Mao, J. Pei, and X. He. Continuous
influence maximization: What discounts should we
offer to social network users? In SIGMOD. ACM,
2016.
13
|
1212.2893 | 1 | 1212 | 2012-12-12T17:22:33 | Communication Learning in Social Networks: Finite Population and the Rates | [
"cs.SI",
"physics.soc-ph"
] | Following the Bayesian communication learning paradigm, we propose a finite population learning concept to capture the level of information aggregation in any given network, where agents are allowed to communicate with neighbors repeatedly before making a single decision. This concept helps determine the occurrence of effective information aggregation in a finite network and reveals explicit interplays among parameters. It also enables meaningful comparative statics regarding the effectiveness of information aggregation in networks. Moreover, it offers a solid foundation to address, with a new perfect learning concept, long run dynamics of learning behavior and the associated learning rates as population diverges. Our conditions for the occurrence of finite population learning and perfect learning in communication networks are very tractable and transparent. | cs.SI | cs | Communication Learning in Social Networks:
Finite Population and the Rates∗
Jianqing Fan†
Xin Tong‡
Yao Zeng§
Princeton University
MIT
Harvard University
Abstract
Following the Bayesian communication learning paradigm, we propose a finite
population learning concept to capture the level of information aggregation in any
given network, where agents are allowed to communicate with neighbors repeatedly
before making a single decision. This concept helps determine the occurrence of
effective information aggregation in a finite network and reveals explicit interplays
among parameters.
It also enables meaningful comparative statics regarding the
effectiveness of information aggregation in networks. Moreover, it offers a solid
foundation to address, with a new perfect learning concept, long run dynamics of
learning behavior and the associated learning rates as population diverges. Our
conditions for the occurrence of finite population learning and perfect learning in
communication networks are very tractable and transparent.
2
1
0
2
c
e
D
2
1
]
I
S
.
s
c
[
1
v
3
9
8
2
.
2
1
2
1
:
v
i
X
r
a
Keywords: Social networks, Bayesian update, communication, finite population learning,
perfect learning, learning rates.
∗We thank Daron Acemoglu, S´ebastien Bubeck, John Campbell, Emmanuel Farhi, Drew Fudenberg,
Matthew Jackson, Gareth James, Philip Reny, Philippe Rigollet, Andrei Shleifer, Alp Simsek, and Yiqing
Xing for valuable comments and suggestions. All errors are ours.
†Department of Operations Research and Financial Engineering, Princeton University.
‡Department of Mathematics, Massachusetts Institute of Technology.
§Department of Economics, Harvard University.
1
1
Introduction
The effectiveness of information aggregation has been long and widely recognized as a
central theme for good decision making at both individual and aggregate levels. Boosted
by the Internet and particularly online social networks, this theme is especially impor-
tant in communication and decision making in the modern world. People communicate
with their friends, through extremely efficient, open and multi-dimensional approaches,
in social networks before making specific decisions.
In particular, these circumstances
of information exchange often involve strategic interactions among people, which call for
new modeling techniques beyond mainstream statistics and economics literature, such as
the convolution of game theory and graphical models.
Recently, Acemoglu et al. (2012a) provide a fascinating model to study communication
in social networks and the implications for information aggregation. They employ a game-
theoretic framework to model people's information aggregation in social networks. They
define an intuitive concept of asymptotic learning, which means as the population of a
network diverges, the probability that a large fraction of people take "correct" actions
converges to one or eventually exceeds a high threshold. Given agents communicate either
truthfully or strategically, they establish equilibrium conditions under which asymptotic
learning occurs. They also discuss the welfare implications of asymptotic learning, and
investigate the impacts of specific types of cost structures and social cliques.
Motivated by the asymptotic learning concept, we ask the following questions. Can
we define a good communication learning concept regarding a finite population network?
If so, does such learning occur in a given finite social network? What are necessary and
sufficient conditions to guarantee such learning? Can we write down clean and tractable
rates at which a society achieves long run asymptotic learning? These questions are
relevant and important, because it is common practice for people to assess the effectiveness
of information aggregation in given organizations, regions or nations. Such assessment
regarding finite population networks naturally offers a solid foundation for people to
2
understand the quality of social learning when the society evolves. As of now, current
researchers in social networks have not provided desirable answers to these questions,
and previous works called for fresh inputs (Goyal (2009); Acemoglu and Ozdaglar (2010);
Jackson (2010)).
Based on an information exchange game in social networks modified from
Acemoglu et al. (2012a), we propose a finite population learning concept, which captures
the level of aggregation of disperse information in any given communication network. In
the model, there is an underlying state. People in a social network do not know the
underlying state, but they have a common prior on the distribution of the state. After
receiving initial private signals related to the underlying state, they exchange information
simultaneously in the network, at times specified by a homogenous Poisson process, until
taking an irreversible action to exit the network. Upon each person's exit, she makes an
estimate of the underlying state. Her payoff depends on the waiting time before making
the decision and the expected mean-square error between her estimate and the underlying
state. The longer she waits, the more information she gathers and hence the better her
estimate is, but the more discounting incurs. Thus, she needs to take a prompt action
after obtaining sufficient amount of information in the network.
The newly defined finite population learning concept involves three parameters, ǫ, ¯ǫ,
and δ for a given social network Gn of population size n; rigorously, it is called (ǫ, ¯ǫ, δ)-
learning. The parameter ǫ is the precision under which an agent's decision is considered
"correct", 1 − ¯ǫ represents the fraction of agents in the network who make the approx-
imately correct decision, and 1 − δ represents the probability at which such a fraction
of agents make the approximately correct decision. We think of these three parameters
as tolerance parameters of finite population learning. To contrast with asymptotically
driven concepts, (ǫ, ¯ǫ, δ)-learning is simply referred to as finite population learning in
verbal discussions.
We derive necessary and sufficient conditions for the occurrence of finite population
learning under any given equilibrium. Intuitively, finite population learning is more likely
3
to occur when the number of signals an agent obtains under equilibrium is larger, or the
tolerances of learning are larger. Interestingly, the impact of the information precisions on
finite population learning is ambiguous, which parallels the well-known Hirshleifer effect
and subsequent work on the social value of information but stems from a new and different
mechanism. We also provide necessary and sufficient conditions for the occurrence of finite
population learning under any equilibrium, namely, without knowledge of a particular
equilibrium.
A straightforward advantage of our conditions is that these conditions lead to meaning-
ful comparative statics regarding the effectiveness of information aggregation in networks.
In these conditions, the underlying forces, such as tolerances, information precisions and
information-sensitiveness, that shape the effectiveness of information aggregation in a
given finite communication network are explicitly displayed in a single formula. Com-
pared to the asymptotic learning results in previous literature, our conditions for finite
population learning involve only one equilibrium outcome, which is the number of signals
an agent obtains when she exits under equilibrium. More importantly, different from
our finite population learning concept in which the total amount of information is fixed,
the existing asymptotic learning literature employs an implicit assumption that the total
amount of information grows linearly with the population size. Hence, the learning status
with respect to a sequence of networks with growing population reflects not only the ef-
fectiveness of information aggregation of certain network structures, but also an increased
endowment of total information. Our finite population learning concept overcomes this
defect and disentangles the effectiveness of information aggregation from the growth of
information endowment.
The finite population learning concept enables us to investigate the rate at which a
sequence of growing communication networks {Gn}∞n=1, which is referred to as a society,
reaches perfect learning. Perfect learning occurs if all communication networks in a society
achieve finite population learning under vanishing tolerances as population grows. For
example, we say δ-perfect learning occurs along society {Gn}∞n=1 if i). (ǫ, ¯ǫ, δn)-learning
4
occurs for each network Gn in the society, and ii). δn goes to zero as n goes to infinity.
The learning rate is characterized by the sequence {δn}∞n=1. Clearly, faster learning rate
implies perfect learning is reached at a higher quality. It is instructive to distinguish our
learning rate concept from the speed of convergence to a pre-defined consensus in existing
social learning literature, which mainly concerns about the time towards a consensus in
a circumstance where people make repeated decisions and learn from others' previous
decisions to help to make their own future decisions. In such a context, the observable
sequence of aggregate decisions naturally reveals the dynamics of information aggregation
along the time dimension. In our story of direct communication, however, although people
communicate with each other repeatedly, they only make a single decision, and different
people may go through varying communication rounds before their decisions. This makes
the time dynamics of information aggregation largely unobservable, and thus calls for
alternative dimensions to look into the information dynamics.
We have given conditions for societies to reach δ-perfect learning at a certain desired
rate {δn}∞n=1. Given a sequence of networks and the associated equilibria, we define
an equilibrium informed agent as one who obtains an unbounded number of signals as
the population size goes to infinity. The δ-perfect learning occurs if almost all agents
in the society are equilibrium informed. Moreover, without involving any equilibrium,
we define a socially informed agent (roughly) as one who has an unbounded number of
neighbors in a finite distance as the population goes to infinity. The δ-perfect learning
occurs if almost all agents are socially informed. We also explicitly explore the achievable
fastest learning rate for perfect learning in a given society. Under some circumstances,
achievable learning rate could be in the exponential order. This implies that a society
with growing population might achieve a desirable level of finite population learning very
quickly.
Relation to Literature. Our work lies in the category of Bayesian social learning
in social networks, in which decision makers in a social network update their information
5
according to the Bayes' rule. General Bayesian social learning is divided into two sub-
categories, namely Bayesian observational learning and Bayesian communication learning.
In Bayesian observational learning, agents observe past actions of their neighbors. From
these observed actions, agents update their beliefs and make inferences. Herd behavior
is a very typical consequence of observational learning.
In literature, Banerjee (1992),
Bikhchandani et al. (1992) and Smith and Sorensen (2000) are early attempts to model
herd effects through Bayesian observational learning. Banerjee and Fudenberg (2004)
and Smith and Sorensen (2008) relax the assumption of full observation network topol-
ogy and study Bayesian observational learning with sampling of past actions. Recently,
Acemoglu et al. (2011) and Muller-Frank (2012) investigate how detailed network struc-
tures could add new interesting insights.
Our work belongs to Bayesian communication learning, which means that agents can-
not directly observe actions of others but can communicate with each other before mak-
ing a decision. Consequently, agents update their beliefs and make inferences based
on the information given by others. New interesting considerations arise in Bayesian
communication learning; for example, agents may not want to truthfully reveal their
information to others through communication. Crawford and Sobel (1982) pioneers the
research in strategic communication, and Acemoglu et al. (2012a) is an interesting piece
that looks into how communication learning shapes information aggregation in social net-
works. Other works such as Galeotti et al. (2011) and Hagenbach and Koessler (2010)
also study strategic communication in social networks, but their focus is not on informa-
tion aggregation.
There is a branch of literature that applies various non-Bayesian updating methods
to investigate information aggregation and social learning. DeGroot (1974) develops a
tractable non-Bayesian learning model which is frequently employed in research of social
networks today. Essentially, the DeGroot model is pertaining to observational learning, in
which agents make today's decisions by taking the average of neighbors' beliefs revealed in
their decisions yesterday. DeGroot (2003) and Golub and Jackson (2010, 2012a,b,c) apply
6
the DeGroot model to financial networks and general social networks, respectively. By a
field experiment, Mobius et al. (2010) compares a non-Bayesian model of communication
with a model in which agents communicate their signals and update information based on
Bayes' rule. Their evidence is generally in favor of the Bayesian communication learning
approach.
Our paper is most related to Acemoglu et al. (2012a). Compared to their work, we
employ a simplified framework for network communication and exploit more undeveloped
mechanisms.
In particular, we mainly focus on the effect of social learning and infor-
mation aggregation in finite population communication networks. This allows for clear
comparative statics with respect to learning, and for discussion on the rates of learning
as the population increases. As of now, researchers have not provided desirable results in
finite population communication network as well as results regarding learning rates. To
the best of our knowledge, our work is the first attempt to address these questions with
clear answers.
Our work is also related to Golub and Jackson (2012a,b,c), in particular on the in-
vestigation of learning rate. Golub and Jackson (2012a,b,c) employ the DeGroot model
to analyze the impacts of homophily in social networks, which refers to the tendency of
agents to associate relatively more with those who are similar to them, on the learning
rate in the context of observational learning. Our results of learning rate are different from
theirs in two aspects. First, our focus is on Bayesian communication learning rather than
non-Bayesian observational learning. Second, as discussed before, our concept of learning
rate is based on perfect learning as the population in networks diverges, rather than the
time towards a consensus in their model. An appealing feature of Golub and Jackson
(2012a,b,c) is that their results of learning rate are based on certain statistics of networks
rather than the full network structures, which could lead to potentially more empirical
traction.
We would also like to relate this work to social network papers in existing statistics
literature. The larger part of those papers are based on graphical models, which are ideal
7
to describe structural formation. Rather than providing a list of state-of-the-art contribu-
tions, we refer interested readers to Newman (2010) and Kolacazyk (2009), which might
serve as a broad introduction to the field. Our work supplements structural modeling
with human behavior modeling through game theory. Such model enrichment is neces-
sary for some specific objectives; for example, we will see that strategic interaction and
contextual information that sit outside graphical models are crucial to determine the final
information aggregation status. Also, our theoretical results are in the same spirit of the
finite sample results in the statistical learning theory, such as the Vapnik-Chervonenkis
inequality. Such results with a clear characterization of strategic interactions may have
potential to expand the scope of the finite sample approach beyond statistical learning
theory.
The rest of the paper is organized as follows. Section 2 introduces the information
exchange game and characterizes its equilibrium. New finite population learning concept
is proposed in Section 3. Section 4 discusses dynamics of learning and addresses learning
rates explicitly. In the final section, we discuss possible directions for further research.
All proofs are in the supplementary materials.
2 The Model
In this section, we present our model of information exchange in social networks, which is
closely related to Acemoglu et al. (2012a), but has different focus. In this model, people,
formally called as agents, are organized in some network structure. Each agent has her
initial information. Agents are able to solicit information from their neighbors through
communication, restricted by the network structure and a communication clock. The
communication clock defines the times at which each agent is able to communicate with
others. At each round of communication, agents are obliged to transmit truthfully all
information they have to their neighbors in the network. By such communication, the
information set of an agent can become larger as time evolves. With the help of her initial
8
and acquired information, every agent is able to make a decision and exit. An exit strategy
is needed due to the time value of information content. After exit, an agent would not
have any incentive to further acquire information from neighbors, but she is still obliged
to transmit all her information to others in the next round of communication. Through
certain measure of agents' decisions, we are further able to characterize the quality of
learning and information aggregation.
We make the following assumptions to simplify the analysis and focus on a concept
of finite population learning, which will be rigorously defined in the next section. First,
we assume mandatory communication, which means that no agent holds her information
to herself. When communication times arrive, an agent has to send all her information
set to all of her direct neighbors. Second, we assume truthful communication, which
means whenever an agent sends information, she has to send unmanipulated information,
whether it is her own private information or obtained information originated from other
agents. We will first analyze communication and information aggregation in a given finite
population network, and then consider the limit as the population grows to infinity. In
this course, we assume that existing links are kept when a network grows.
Before formal definition of the game, we would like to illustrate how information flows
with an example. For simplicity, suppose there are four agents in the network below. At
time t = 0, each agent i has some private signal si, which captures her initial information.
So the total information endowment in the system is {s1, s2, s3, s4}. Communication
occurs at t = 1, 2. Due to the structure of the graph in our example, there is no need to
consider beyond the second communication round, since no additional information will
be communicated further.
I1 = {s1}
3
t = 0 :
1
2
4
We will study two cases, and focus on agent 1's information set I1. In the first case,
9
suppose no agent exits after time t = 0. So the information flow is as follows:
t = 1 :
1
s2
2
I1 = {s1, s2, s3}
s3
3 I3 = {s3, s4}
s4
4
I1 = {s1, s2, s3, s4}
s4
3 I3 = {s3, s4}
t = 2 :
1
2
4
After the first round of communication, i.e., t = 1, agent 1 has signals {s1, s2, s3}. Also
note that at this time agent 3 has {s3, s4}. At t = 2, agent 3 sends the newly grabbed
signal s4 to agent 1. So agent 1's information set enriches to {s1, s2, s3, s4}.
In the second case, suppose agent 3 exits after time t = 0, then she is still obliged to
send all her signals (in this case, only her private signal) she acquires to neighbors, but
she does not have any incentive to receive others' signal. Therefore, the information flow
is as follows.
t = 1 :
1
s2
2
I1 = {s1, s2, s3}
s3
I3 = {s3}
3
4
t = 2 :
1
2
4
I1 = {s1, s2, s3}
I3 = {s3}
3
Note that as agent 3 does not receive signal from agent 4 at t = 1, she does not have
any new information to send to agent 1 at the second communication round. Therefore,
agent 1's information set is still {s1, s2, s3} at t = 2. By contrasting the two cases in this
toy example, we see that agents' decisions affect the information flow in the network.
Now we formally introduce the information exchange game. Suppose we are interested
in a social network with agents N n = {1, 2, ..., n}. To model communication in the
network, we organize these agents in a directed graph Gn = (N n,E n), in which each node
i ∈ N n represents an agent. We allow directed graphs to have multi-edges, so that two
agents can communicate to each other. An ordered pair (j, i) ∈ E n means agent j can
send information to agent i directly. The goal of every agent is to estimate θ ∈ R, which
represents an underlying state of the world. Agents' knowledge of θ is captured by a
10
normally distributed common prior θ ∼ N(0, 1/ρ). At time t = 0, agent i is endowed
with her private signal si = θ + zi. All zi ∼ N(0, 1/¯ρ) are independent and they are also
independent of θ. The distributions of zi's are common knowledge and so is the network
architecture. Our results are not affected if the means of θ and zi are changed to non-zero
values.
In this network, agents exchange their information as follows. Suppose agents live
in a world with continuous time t ∈ [0,∞). Waiting induces a common exponential
discount of the payoff with rate r > 0. Instead of communicating at fixed times, all agents
communicate simultaneously at some points in time that follow a homogeneous Poisson
process with rate λ > 0, which is independent of θ and zi. This Poisson clock is also
common knowledge. After communication, agents update beliefs according to the Bayes'
rule. For example, the posterior distribution of θ on k distinct signals is Gaussian with
precision ρ + k ¯ρ. So more private information, i.e., a higher k, will increase the precision
and lead to a better estimate. Hence, there is a natural trade-off between waiting to get
more information and acting earlier to reduce the discount of information value, which
makes an optimal stopping problem for each agent i. We call the incentive to get more
information information effect, and the incentive to act earlier discount effect.
In this
course, at any given time t, each agent i either makes an estimate xi of the fundamental
state of the world θ, or "wait" for more information. Just as illustrated in the four agents'
example, we assume that after agents make estimate and exit, they do not receive new
information, but they continue to transmit information that they have already obtained
when new rounds of communication take place.
We introduce a few more notations to facilitate the discussion. Let I n
i,t denote the
information set of agent i at time t. We next specify the payoff structure and the opti-
mization problem faced by agents. Suppose agent i takes action xi at time t when the
realization of the underlying state is θ, then her instantaneous payoff of taking an action
xi is
un
i (xi) = ψ − (xi − θ)2 ,
11
where ψ is a real-valued constant that captures the information sensitiveness of the deci-
sion problem, which we will elaborate later. At time t with information set I n
i,t, agent i's
optimal expected instantaneous payoff of taking an action before discounting is
U n
i,t(I n
i,t) = max
xi
E(un
i (xi)I n
i,t) .
It is easy to see that agent i's optimal estimate is xn,∗i,t = E[θI n
time t. Thanks to the normality assumption of the fundamental θ and signals {si}n
the optimal expected instantaneous payoff of agent i taking an action after observing k
i,t] if she decides to act at
i=1,
distinct signals can be calculated explicitly:
E[ψ − (xn,∗i,t − θ)2I n
i,t] = ψ −
1
ρ + ¯ρk
.
(2.1)
At any time t with information set I n
i,t, before trying to make a best estimate and exit,
agent i has to make a decision about whether to exit. To facilitate the analysis, we first
assume that any agent can obtain non-negative payoff upon her exit. This assumption will
be formally characterized after we define the equilibrium. As a result, due to discount in
time, each agent should make an estimate and exit precisely at a finite time, and especially,
at a time instantaneously after communications take place. Moreover, each agent would
only get finite number of signals even if they waited forever, because there are in total
n signals {si}n
profiles in which every agent exits at a finite communication round, rather than at any
i=1 in the network. Therefore, we actually only need to consider strategy
arbitrary time. Denote by ln = (ln
1 , . . . , ln
n), where each ln
i
is agent i's communication
round before exit. Throughout the paper, we use ln
−i to denote ln without the component
ln
i . Let τk be the physical time until k rounds of communication. Agent i's payoff for
choosing action ln
i
is
U n
i (ln
i , ln
−i) = E(cid:26)e−rτln
i max
xi
E[ψ − (xi − θ)2I n
i (ln)](cid:27) ,
12
where I n
i (ln) is agent i's information set upon exit, which depends on other agents' exit
strategies ln
−i. By (2.1) and the exponential waiting time of the Poisson clock, we have
U n
i (ln
i , ln
−i) = ¯rln
i ψ −
1
i ! ,
ρ + ¯ρkn,ln
where ¯r = λ/(λ + r) and kn,ln
i
is the number of signals agent i get upon exit if every
agent acts according to ln in the network Gn. With this reduction, the following complete
information static game will be considered.
Definition 1 The information exchange game Γinfo(Gn) is a triple {N n,Ln,U n}, in
which
(a) N n is the set of agents, i.e., N n = {1, 2, ..., n};
(b) Ln is the collection of agents' strategy spaces. For any agent i ∈ N n, her strategy
space Ln
i ∈ Ln is a finite set
Ln
i = {0, 1, 2, ..., (Ln
i )max} ,
where (Ln
i )max = maxj∈Gn{length of shortest path from j to i} ;
(c) U n
i ∈ U n is the payoff function for agent i:
i ψ −
−i) = ¯rln
U n
i (ln
i , ln
1
i ! .
ρ + ¯ρkn,ln
(2.2)
We consider pure-strategy Nash equilibria of this game. As an agent's payoff gain
from waiting is weakly larger (i.e., no smaller than) when other agents also wait more
rounds, the information exchange game is a supermodular game. The following result is
a direct application of Topkis (1979), which guarantees the existence of a pure-strategy
Nash equilibrium in supermodular games.
Lemma 1 The information exchange game Γinfo(Gn) has at least one pure-strategy Nash
equilibrium.
13
We denote a pure-strategy Nash equilibrium of the game by σn,∗, and the set of all
pure-strategy Nash equilibria by Σn,∗. We further denote by ln,σ∗
i
the communication
steps after which agent i exits under equilibrium σn,∗, and denote by kn,σ∗
i
the number of
distinct signals agent i has obtained when she exits under equilibrium σn,∗. In order to
make sure that every agent i gets non-negative payoffs and exits ultimately in the initial
strategic circumstance of information exchange, we focus on information exchange games
and associated equilibria that satisfy the following assumption in the rest of this section.
Assumption 1 ψ[ρ + ¯ρ(kn,σ∗
i
)max] > 1 for all agent i, where (kn,σ∗
i
)max is the maximum
number of signals agent i can get if all other agents choose their exit steps according to
σn,∗.
The parameter ψ captures the information sensitiveness of the decision problem. In-
terestingly, the information sensitiveness of the decision problem is not monotone in ψ.
When ψ takes negative or very small positive value, agents would like to wait forever
to discount payoff to zero, in which case the decision problem is information irrelevant.
When ψ is large enough, information is relevant. Specifically, when ψ is moderate, in-
formation effect dominates, and thus the decision problem is more information sensitive;
while when ψ is large, the discount effect dominates, and thus the decision problem is less
information sensitive.
Now we provide an example of the network game and its equilibrium. On the four-
agent graph displayed previously, suppose λ = r, ψ = 1 and ρ = ¯ρ = 1
2. The decision
problem for agents 2 and 4 are simple. They should exit right away because they will not
get any new signals due to graph structure, but incur discounting penalty should they
not act promptly. The payoff matrix for agent 1 (row) and 3 (column) is as follows, in
which the first and the second value in each cell are respectively the payoffs of agent 1
and agent 3 [see (2.2)].
14
Agent 3
0 Step 1 Step
0 Step
0, 0
0, 1
6
Agent 1
1 Step
2 Step
1
4, 0
1
8, 0
1
3
6
4 , 1
20, 1
6
There is one equilibrium of the game. In this equilibrium, agents 2 and 4 exits immediately
after they receive their private signals, while agent 1 and agent 3 exit after the first
communication round.
Before proceeding to discuss information aggregation or learning status, we briefly dis-
cuss the equilibrium outcomes of the strategy game in Definition 1. This reduced game is
a complete information static game, which involves no uncertainty. However, the uncer-
tainties in the fundamental and in the communication clock were abstracted out through
taking expectations, which results in the deterministic payoff function (2.2). Therefore
the two equilibrium outcomes, ln,σ∗
i
and kn,σ∗
i
, both deterministic, characterize the strate-
gic interactions of information exchange among agents in the initial circumstance. This
enables us to characterize a learning status by focusing only on such equilibrium outcomes.
We can perform the following comparative statics of the number of signals agent i ob-
tains under equilibrium kn,σ∗
i
. Intuitively, kn,σ∗
i
is larger when the discount rate is smaller
or the Poisson clock is faster. It is also larger when the precision of public information
ρ is lower or the decision problem is more information sensitive. However, the precision
of private information ¯ρ has ambiguous impact on kn,σ∗
i
, because an increase in the pre-
cision of private information has two conflicting effects. It increases not only the relative
quality of the private signal at hand, which prompts an agent to exit earlier, but also
the relative information content of her neighbors' private signals, which in turn encour-
ages her to wait. The former effect is stronger when the precision of public information
is higher, while the latter is stronger when the precision of public information is lower.
The discussions in this paragraph can be formalized against mathematical rigor, but the
game-theoretic technicality involved is beyond the scope of this paper.
15
Finally, we also remark that the role of kn,σ∗
i
is our paper is similar to the influence
vector v in Acemoglu et al. (2012b). The quantity kn,σ∗
i
will play a central role in the
next sections.
3 Finite Population Learning
In this section, we measure the level of information aggregation in any given communica-
tion network. Related recent research on learning in social networks focuses on asymptotic
learning, which means that as the fraction of agents taking the correct action converging
to one as the population of the social network grows large (Acemoglu et al. (2011, 2012a)).
However, as discussed in Acemoglu and Ozdaglar (2010), people are also interested in the
information dynamics away from long run limit. In pursuing this goal, a new concept of
learning in social networks is introduced.
Definition 2 Given a social network Gn, the information exchange game Γinfo(Gn) and
an equilibrium profile σn,∗, for a triple (ε, ¯ε, δ), we say Gn achieves (ε, ¯ε, δ)-learning under
σn,∗ if
Pσn,∗ 1
n
n
Xi=1
(1 − M n,ε
i
) > ¯ε! 6 δ ,
where M n,ε
i = 1(xi − θ 6 ε), xi is agent i's optimal action upon exit, and Pσn,∗ denotes
the conditional probability given σn,∗ .
In this definition, the parameter ε sets the precision on what the approximately correct
decision is for individual agents, 1 − ¯ε controls the fraction of agents who make the
approximately correct decision, and 1 − δ represents the probability at which such a high
fraction of agents make the approximately correct decision. In particular, we highlight
the difference between ε and ¯ε, because these two parameters capture different tolerances.
Concretely, ε is at the individual level while ¯ε is at the aggregate level.
A natural question to ask is whether such finite population learning occurs in a given
communication network. If so, under what conditions? The following proposition provides
16
a necessary condition and a sufficient condition for (ε, ¯ε, δ)-learning in a given social
network under any equilibrium profile. When there is no confusion, we refer to the
information exchange game Γinfo(Gn) simply as Gn. Denote by erf(x) = 2√πR x
error function of the standard normal distribution.
0 e−t2dt the
Proposition 1 For a given social network Gn under any equilibrium σ∗(= σn,∗),
(a) (ε, ¯ε, δ)-learning does not occur if
1
n
n
Xi=1
erf
εsρ + ¯ρkn,σ∗
2
i
< (1 − ¯ε)(1 − δ) .
(b) (ε, ¯ε, δ)-learning occurs if
1
n
n
Xi=1
erf
εsρ + ¯ρkn,σ∗
2
i
> 1 − ¯εδ .
(3.1)
(3.2)
This proposition provides clear conditions for the occurrence of finite population learn-
ing. Our conditions are more operative and transparent than their asymptotic counter-
parts in previous literature. Specifically, our conditions only require one equilibrium
outcome kn,σ∗
i
, and the set {kn,σ∗
i
}n
i=1 is directly induced by an equilibrium σn,∗ in a com-
munication network Gn. Hence, conditions (3.1) and (3.2) not only allow us to investigate
the effect of learning in a given communication network, but also offer a more interpretable
link between the communication equilibrium and its corresponding information aggrega-
tion status.
Conditions (3.1) and (3.2) also allow us to untangle the interplay among parameters.
For example, we are able to answer the following question. Given the tolerances ε, ¯ε, δ
and the information precisions ρ and ¯ρ, how does the change of kn,σ∗
i
affect the occurrence
of finite population learning in a given social network Gn? When kn,σ∗
i
's are sufficiently
small to validate condition (3.1), finite population learning does not occur. Similarly, when
most of kn,σ∗
i
's are sufficiently large so that the condition (3.2) is satisfied, finite population
17
learning occurs. Similar marginal interpretations also apply to parameters ε, ¯ε, δ, ρ and ¯ρ.
Generally, finite population learning in a given social network Gn is more likely to occur
when the equilibrium induces larger numbers of signals obtained by agents. It is also more
likely to occur when the tolerances and the information precisions are higher. As interplays
among the parameters ε, ¯ε, δ, ρ, ¯ρ and kn,σ∗
i
are clear through (3.1) and (3.2), the two
conditions provide various comparative statics that help us better understand learning
in different social circumstances. Since the total amount of information is fixed in any
finite population network, these comparative statics indeed disentangle the effectiveness
of information aggregation from the endowment of information, so that the net effect of
information aggregation is transparent.
It is interesting to note that (1 − ¯ε)(1 − δ) < 1 − ¯εδ for any 0 < ¯ε, δ < 1. This gap
indicates that failure of condition (3.1) does not necessarily lead to condition (3.2), and
vice versa. Two perspectives help understand this gap. First, we use Markov's inequality
to get tractable forms of the necessary and the sufficient conditions. Sharper inequalities
may lead to weaker conditions and thus probably fill a part of the gap, but they are likely
to make these conditions intractable and less transparent. Secondly and more importantly,
as we discussed above, conditions (3.1) and (3.2) involve equilibrium outcomes in a clean
and simple formula. The cost for enjoying this clarity is that we did not fully utilize
{kn,σ∗
}n
i=1.
i
Also, a beauty of symmetry arises in our necessary and sufficient conditions for finite
population learning. The parameters ¯ε and δ are completely interchangeable in these con-
ditions, which was not expected as they captures tolerances in different categories. On the
other hand, in our two conditions, parameter ε stands in a position that is unchangeable
with ¯ε and δ, which hints that ε and ¯ε play different roles in finite population learning.
Conditions (3.1) and (3.2) have powerful implications. The next corollary establishes
a necessary condition and a sufficient condition without equilibirum outcomes. The proof
is straightforward, but the results are non-trivial.
18
Corollary 1 For any social network Gn and any equilibrium σn,∗,
(a) (ε, ¯ε, δ)-learning does not occur if
erf εr ρ + ¯ρn
2 ! < (1 − ¯ε)(1 − δ) .
(b) (ε, ¯ε, δ)-learning occurs if
erf εrρ + ¯ρ
2 ! > 1 − ¯εδ .
(3.3)
(3.4)
Corollary 1 follows from the fact that 1 ≤ kn,σ∗
≤ n. It is interesting because under
some circumstances, we can determine the occurrence of finite population learning without
i
knowing either the structure of the social network or the equilibrium. Intuitively, if any
one parameter of the tolerances, information precisions or population size is too low, such
that the condition (3.3) is satisfied, we may conclude that finite population learning does
not occur no matter how effective the communication network is organized. Conversely, if
any one of the tolerances or information precisions is sufficiently large such that condition
(3.4) holds, we know that finite population learning surely occurs even if all agents are
isolated.
Finally, as the information exchange game exhibits strategic complementarity, it is ex-
pected that multiple equilibria might emerge under some circumstances. An interesting
perspective in investigating finite population learning is to measure the effect of learning
against multiple equilibria. We provide the following generalized (conservative) version
of finite population learning to accommodate multiple equilibria without equilibrium se-
lection.
Definition 3 Denote by Σn,∗ = {σn,∗} the set of equilibria of Γinfo(Gn). The (ε, ¯ε, δ)-
learning occurs if
Pσn,∗ 1
n
sup
σn,∗∈Σn,∗
) > ¯ε! 6 δ .
n
Xi=1
(1 − M n,ε
i
19
This definition offers a conservative standard to evaluate finite population learning in
the sense that the least favorable equilibrium determines the learning status. When Σn,∗
is a singleton, the above definition reduces to Definition 2. The proof of Proposition 1
can be recycled to derive the next corollary.
Corollary 2 Given an information exchange game Γinfo(Gn),
(a) (ε, ¯ε, δ)-learning does not occur if
min
σn,∗∈Σn,∗
1
n
n
Xi=1
(b) (ε, ¯ε, δ)-learning occurs if
erf
εs ρ + ¯ρkn,σ∗
2
i
< (1 − ¯ε)(1 − δ) .
min
σn,∗∈Σn,∗
1
n
n
Xi=1
erf
εsρ + ¯ρkn,σ∗
2
i
> 1 − ¯εδ .
4 Perfect Learning and the Rates
Based on the analysis of finite population learning, we consider the effect of information
aggregation and learning as population in communication networks grows. Our approach
to address the limiting behavior of learning is different from asymptotic learning in existing
literature (Acemoglu et al. (2011, 2012a)). In particular, we highlight finite population
learning as the foundation of asymptotic learning. Consequently, we are able to check
learning status all along the path to the limit, and the probabilistic tolerance parameters
naturally induce learning rates. This concept of learning rate is different from what is
employed in Golub and Jackson (2012a,b,c) that focuses on the time dimension.
4.1 Perfect Learning
Recall that we have three tolerance parameters ε, ¯ε, and δ that define (ε, ¯ε, δ)-learning.
To inquire the limiting behavior in a society {Gn}∞n=1, where existing links are kept when
20
networks grow, we can focus on one parameter at a time, keeping the other two fixed.
The following definition introduces δ-perfect learning on a given society {Gn}∞n=1.
Definition 4 We say δ-perfect learning occurs in society {Gn}∞n=1 under equilibria
{σn,∗}∞n=1 if there exists a vanishing positive sequence {δn}∞n=1 such that (ε, ¯ε, δn)-learning
occurs in Gn under its associated σn,∗ for all n .
Compared to the perfect asymptotic learning concept in Acemoglu et al. (2012a), our
definition of perfect learning is both stronger and more general for the following reasons.
First, we require the networks in the society to achieve learning not only in the limit but
also all along the path towards the limit. Second, by focusing on different parameters ε,
¯ε and δ, we could address three different kinds of asymptotic learning. As discussed in
the previous section, these three parameters exhibit different impacts on finite popula-
tion learning, so that they can play different roles in perfect learning. Third and most
importantly, this definition allows us to investigate learning rates, which is the focus of
the next subsection.
In the following, we will derive two sufficient conditions for δ-perfect learning. The
first condition, stated as Proposition 2, relies on the equilibrium outcome kn,σ∗
i
. The
second condition, stated as Proposition 3, relies only on the formation of the society. To
deliver the first sufficient condition, we define an equilibrium informed agent in a society.
Definition 5 (Equilibrium Informed Agent) For agent i in a given society {Gn}∞n=1,
she is equilibrium informed with respect to {Gn}∞n=1 under equilibria {σn,∗}∞n=1 if
lim
n→∞
kn,σ∗
i
= ∞ .
An agent has equilibrium informed status means that she enjoys increasing information
advantage as population grows. The next proposition offers a sufficient condition for δ-
perfect learning. In a similar spirit, we have a more general sufficient condition, Lemma 3,
21
in the supplementary materials. The proof of Proposition 2 is omitted as it is a corollary
to Lemma 3.
Proposition 2 The δ-perfect learning occurs in a society {Gn}∞n=1 under equilibria
{σn,∗}∞n=1 if
1
nEIn,∗ = 1 ,
lim
n→∞
where EIn,∗ the set of equilibrium informed agents in the network Gn under equilibrium
σn,∗.
Proposition 2 states that perfect learning occurs when almost all agents are equilibrium
informed. This is consistent with the idea of social learning that successful learning
allows individuals to have sufficient information to make a good decision, and that such
individuals represent an overwhelming proportion of the society. We can have such a
transparent condition because our perfect learning concept is powered by finite population
learning, a sufficient condition of which only involves one set of equilibrium variables:
{kn,σ∗
}.
i
Next we consider the second sufficient condition that relies only on formation of the
society. To streamline the presentation in the main texts, we assume that each agent
enjoys a positive payoff even if she exits at the beginning. From (2.1), this is equivalent
to the following assumption.
Assumption 2 (ρ + ¯ρ)ψ > 1 .
We will hold this assumption for the rest of this section. In the supplementary mate-
rials, we relax this assumption and discuss all possible cases.
Before looking into the next sufficient condition for perfect learning, we first point out
an important observation which states that, although the number of signals an agent gets
in equilibrium may diverge to infinity with growth of the communication network, the
equilibrium communication steps will not increase unboundedly.
22
Lemma 2 Under Assumption 2, for any agent i, the communication rounds she optimally
experiences before taking an action in any social network Gn is bounded from above by a
constant independent of n. Mathematically,
ln,σ∗
i 6 ln
i < min(cid:26)(Ln
i )max, ln(cid:18)1 −
1
(ρ + ¯ρ)ψ(cid:19) / ln ¯r(cid:27) ,
(4.1)
in which ln
i stands for the optimal communication rounds for agent i given that other
agents wait until the maximum allowable step, and (Ln
i )max is the maximum length of all
paths ended with i in Gn.
A more general version (without Assumption 2) of Lemma 2 with its associated proof is
included in the supplementary materials as Lemma 4. A key idea behind Lemma 2 is that
after agent i gets sufficiently large number of signals within some finite communication
steps, even expecting infinite number of signals does not justify the discount of further
waiting. The intuition is that for well connected agents, they will get sufficient information
after a few communication rounds to make a decision, whereas for the not well connected
agents, waiting too long discounts their information value. From condition (4.1), we see
that the upper bound is exclusively determined by parameters of the information exchange
game.
Lemma 2 plays an important role in shaping our next sufficient condition that bypasses
equilibrium and directly links perfect learning to network formations. Recall Proposition
2 which states that almost all agents' kn,σ∗
i → ∞ is sufficient for perfect learning. On the
other hand, from Lemma 2 we know that no agent has an optimal unbounded commu-
nication step ln,σ∗
i
. By combining the two observations, we know the only possibility to
validate Proposition 2 is that almost all agents get unbounded number of signals within fi-
nite communication steps. This consideration leads to our following definition of a socially
informed agent.
Definition 6 (Socially Informed Agent) For each agent
i
i,l0 = ∞}, where Bn
{Gn}∞n=1, let Li = min{l0 ∈ N : limn→∞ Bn
23
in a given society
i,l is the set of agents
in Gn whose shortest path to i has length at most l. Agent i is socially informed with
respect to {Gn}∞n=1 if Li is finite, and if there exists N ∈ N such that for n > N, we have
ψ −
1
ρ + ¯ρBn
i,Li
> 0 ,
and
¯rLi ψ −
1
i,Li! > ¯rl ψ −
ρ + ¯ρBn
1
ρ + ¯ρBn
i,l! for all 0 ≤ l < Li .
(4.2)
(4.3)
Moreover, we denote by SIn the set of socially informed agents in the network Gn.
In Definition 6, condition (4.2) is automatically satisfied in view of Assumption 2.
Intuitively, a socially informed agent can be reached by a large number of neighbors after
some finite communication steps Li. Furthermore, condition (4.3) ensures that this agent
strictly prefers to wait at least until the arrival of such communication step Li, given other
agents never exit. Therefore, agent i is guaranteed to obtain a large number of signals
from finite communication steps, if other agents never exit. Note also that the definition
of a socially informed agent does not require knowledge of any specific equilibrium. It only
depends on the topological structure of the graph and on the parameters in the information
exchange game. With the help of socially informed agents, we bypass equilibrium and
state the following sufficient condition for perfect learning.
Proposition 3 The δ-perfect learning occurs in a society {Gn}∞n=1 under any equilibrium
{σn,∗}∞n=1 if
1
nSIn = 1 .
lim
n→∞
Proposition 3 is interesting because we can determine the occurrence of perfect learning
through knowledge on the formation of society alone. Given the tractable conditions for
socially informed agents, we can check whether a given society sufficiently supports perfect
learning under any equilibrium. Especially, given the difficulty of explicitly solving for
equilibria of the information exchange game in general cases, Proposition 3 is of more
value.
24
4.2 Learning Rates
In this subsection we define the learning rate for δ-perfect learning. It is natural to expect
similar concepts of learning rates for ε-perfect learning and ¯ε-perfect learning.
Definition 7 If δ-perfect learning occurs in {Gn}∞n=1 under equilibria {σn,∗}∞n=1, then we
call the corresponding sequence of tolerances {δn}∞n=1 the learning rate.
It is worth highlighting the difference between our learning rate concept and the speed
of convergence to a pre-defined consensus mainly employed in observational learning prob-
lems. The latter concerns about the time towards a consensus in a circumstance where
people make repeated decisions and learn from others' previous decisions to help make
their own future decisions (Golub and Jackson (2012a,b,c)).
In observational learning
problems with repeated decisions, the observable sequence of aggregate decisions natu-
rally reveals the time dynamics of information aggregation. However in direct commu-
nication setup, dynamics of information aggregation along the time dimension is largely
unobservable, which calls for alternative dimensions to look into the information dynam-
ics. Tolerance parameters {δn}∞i=1 offer a natural standpoint to look into the information
aggregation dynamics. This feature also distinguishes our work from existing literature
on learning rate of similar spirit. For example, Acemoglu et al. (2009) attempt to define
and investigate an asymptotic learning based rate in an observational learning context.
Although their concept also captures a sequence of diminishing probabilities, it does not
characterize the learning status in every social network along the society.
On the other hand, it is not trivial to construct concretely the smallest sequence
{δn}∞n=1 for perfect learning, while keeping other parameters fixed. Recall that the suffi-
cient condition part of Proposition 1 implies δ-perfect learning occurs with rates {δn}∞n=1
if
1
n
n
Xi=1
erf
εs ρ + ¯ρkn,σ∗
2
i
> 1 − δn ¯ε .
25
Theoretically, if we can directly solve the inequalities with respect to δn, the achievable
fastest learning rate {δn}∞n=1 is constructed. However, some technical problems prevent
us from directly doing so. First, we cannot read off a transparent rate out of the error
function. Second, without specific knowledge of network formations, the relation between
and n is hard to be pinned down generally. Moreover, as we will see in the binomial
kn,σ∗
i
tree example, kn,σ∗
i
could be drastically different even for a same graph. Hence, we will
first discuss learning rates on specific examples, and generalize to more general categories
when possible.
Example 1 (Isolated Agents) When all agents are isolated from each other in a com-
munication network Gn, we have kn,σ∗
i
= 1 for every agent i.
In Example 1, the negative condition (3.1) is reduced to
erf εrρ + ¯ρ
2 ! < (1 − ¯ε)(1 − δn) .
If parameters are such that erf(cid:16)εq ρ+¯ρ
2 (cid:17) < (1 − ¯ε), the above inequality holds for large
n for any vanishing sequence {δn}∞n=1. This tells us that in fairly general circumstances,
purely isolated society cannot achieve δ-perfect learning.
Example 2 (Complete Graph) When the communication network Gn is a complete
graph, and the benefit of getting n − 1 new signals justifies the discount of one communi-
cation step, kn,σ∗
= n for every agent i.
i
In Example 2, we have
erf εrρ + ¯ρn
2 ! > 1 − δn ¯ε ,
∀n ∈ N ,
as a sufficient condition for δ-perfect learning, which translates to
δn >
1
¯ε 1 − erf εrρ + ¯ρn
2 !! .
26
(4.4)
The sequence of the right hand sides of inequality (4.4) can serve as the learning rate. At
the cost of getting a conservative estimate, we approximate the error function in order to
get a more transparent learning rate. Note that the error function erf can be approximated
by
1 − erf(x) <
1
√2π
1
x
e−x2/2 .
Therefore a sufficient condition for δ-perfect learning is
δn >
1
√π ¯ε
1
ε√ρ + ¯ρn
exp(cid:18)−
ε2(ρ + ¯ρn)
4
(cid:19) .
Keep other parameters fixed, and focus on the relations between population size n and
δn. We see that δn could decrease in the order of exp (−¯ρε2n/5). This implies that
when population grows, the probability that at least ¯ε fraction of people make the wrong
decision decreases very quickly to zero.
Following the idea of error function approximations, we go beyond Example 2 to
consider a more general case in which kn,σ∗
i
> f (n) for every agent i where f (n) is a
deterministic sequence. A sufficient condition for δ-perfect learning is then
δn >
1
√π ¯ε
1
exp(cid:18)−
ε2(ρ + ¯ρf (n))
4
(cid:19) .
(4.5)
εpρ + ¯ρf (n)
If f (n) diverges to infinity as n goes to infinity, the right hand side of inequality (4.5)
converges to 0. Keeping other parameters fixed, this implies δn could decrease in the order
of exp(−¯ρε2f (n)/5). Formally, we summarize these discussions with the next proposition.
Proposition 4 Suppose there exists a diverging sequence f (n) such that kn,σ∗
i > f (n) for
any agent i in network Gn with associated equilibrium σn,∗, then δ-perfect learning could
occur with learning rate {δn}∞n=1, where each δn is in the order of exp(−¯ρε2f (n)/5).
The next example is a direct application of Proposition 4.
Example 3 Suppose f (n) = C · n where 0 < C < 1, then δ-perfect learning could occur
27
with learning rate {δn}∞n=1, where each δn is in the order of exp(−¯ρε2Cn/5).
An interpretation of this example is that, even if communication is sparse in the sense that
each of the agents can only get a small proportion of information in the entire population,
perfect learning can still be reached at a fast rate. This example represents a scenario in
which communication networks in a society consist of dispersed social groups while agents
within these social groups are very closely connected. This is related to interesting results
pertaining to social cliques or homophily as discussed in Golub and Jackson (2012a,b,c).
In most models, however, there is no universal bound for kn,σ∗
i
. Lemma 3 in the
supplementary materials renders Proposition 4 as a special case, but it still does not
cover cases when direct conservative estimate for kn,σ∗
i
is not feasible. Next we consider
such a case: the binomial tree, which is widely considered as an axiomatic representation
of various hierarchical structures in the human society Jackson (2010). In particular, as
the information flow within a binomial tree can be either from the root to the leafs or
from the leafs to the root, binomial trees can accommodate both the top-down and the
bottom-up cases of information transmission in various real-world scenarios. Hence, it is
instructive to analyze the binomial tree with a few different settings, where we generalize
our game by allowing the information sensitiveness ψ = ψn to vary along the society
{Gn}∞n=1.
Example 4 (Binomial Tree: Information Flow from Root to Leafs) The agents
in the communication network Gn form a binomial tree, where information can only
flow from root to leafs. For simplicity, consider only the number of agents n such that
n = 1 + 2 + 4 + ... + 2(mn−1), where mn is the number of layers in the binomial tree. The
following graph illustrates such a binomial tree with three layers.
28
1
2
3
4
5
6
7
We will study two scenarios of this binomial tree, in both of which λ = r so that ¯r = 1/2.
i) ψn = ρ = ¯ρ = 1. For agent 1 on the top layer, he should exit right after step
0 because he does not have any chance to receive others' private information. For
agent 2 and 3, who are on the second top layer, they decide between step 0 and 1. A
simple calculation on their pay off functions reveals that they should exit after step
0. Agents 4, 5, 6, 7 who are on the third layer potentially should decide between
0,1 and 2 steps. But since agents 2 and 3 cannot not pass through agent 1's info,
step 2 is eliminated before any calculation. So agents on the third layer actually
faces same decision problems as agents on the second layer. Continue with the same
argument till the mn'th layer, we learn that everyone in the communication network
exits right after she gets the private signal. Therefore, this scenario is the same as
isolated points in terms of information aggregation.
In general, as depicted in this subcase i), when the communication game is less information
sensitive, the precision of the prior is higher, or the precision of the private signal is lower,
it is less likely to achieve δ-perfect learning, even if the agents are well connected.
ii) ψn <
2
ρ+(mn−1)¯ρ − 1
ρ+mn ¯ρ and ε2 < − 4
¯ρ log(cid:16) 1
2q ρ+2¯ρ
ρ+¯ρ(cid:17). Same as subcase i), agent 1
does not have a choice. For agents on the second layer to choose exit at step 1, we
need ψn < 2
ρ+2¯ρ. For agents on the third layer to exit at step 2, we need
ρ+¯ρ − 1
ψn < min(cid:26) 2
ρ + ¯ρ −
1
ρ + 2¯ρ
,
2
ρ + 2¯ρ −
1
ρ + 3¯ρ(cid:27) =
2
ρ + 2¯ρ −
1
ρ + 3¯ρ
.
29
In general, an agent on layer j wait till the j − 1 step if
ψn < min{g(1), . . . , g(j − 1)} = g(j − 1) .
where g(x) = 2
ρ+(x+1)¯ρ . The last equality holds because g(x) is a decreasing
function, thanks to g′(x) < 0. Hence under equilibrium, agents on layer j have j
ρ+x¯ρ −
1
signals. In particular, agents in the last layer each has mn = log2(n + 1) signals.
Note that there are n+1
2
agents in this layer. Using (3.2), a similar derivation to
that in Example 2 leads to that the learning rate δn should be
δn >
1
nε¯ε√π
log2(n+1)
Xi=1
2j−1
1
√ρ + ¯ρj
exp(cid:18)−
ε2(ρ + ¯ρj)
4
(cid:19) .
To unravel right hand side of the above inequality, we let
h(x) = 2x−1
1
√ρ + ¯ρx
exp(cid:18)−
ε2(ρ + ¯ρx)
4
(cid:19) .
Then h(x) is monotone increasing, because h(x + 1)/h(x) > 1 under our condition.
Therefore, it is sufficient to have
δn >
1
nε¯ε√π
log2(n+1)·2log2(n+1)−1
(cid:19) .
Therefore δn could decay in the order of plog(n + 1) · (n + 1)−ε2 ¯ρ/4, which is a
pρ + ¯ρ log2(n + 1)
exp(cid:18)−
ε2(ρ + ¯ρ log2(n + 1))
polynomial rate.
1
4
Compared to the complete graph, the binomial tree aggregates information much
slower. The difference in learning rates arises not only from the physical network struc-
tures, but also from different strategic interactions among agents in the two environments.
Next, we consider a twin case of the binomial tree, in which information flows in the op-
posite direction.
30
Example 5 (Binomial Tree: Information Flow from Leafs to Root) Now let in-
formation flow from leafs to root, i.e., reverse all the directed edges in Example 4. The
following graph illustrates such a binomial tree with three layers.
1
2
3
4
5
6
7
We give the following results. The detailed analysis is similar to Example 4.
i) ψn = ρ = ¯ρ = 1. All agents exit after time 0.
ii) ψn <
2
ρ+2(mn−1) ¯ρ − 1
ρ+2mn ¯ρ. All agents get the maximum number of signals that they
could possibly get, then δn can be such that
δn >
1
nε¯ǫ√π
log2(n+1)
Xj=1
2j−1
1
pρ + 2(mn−j+1) ¯ρ
exp(cid:18)−
ε2(ρ + 2(mn−j+1) ¯ρ)
4
(cid:19) .
A conservative estimate on the summation on the right hand side would give δn ∼
n−3/4, a much faster rate than that in Example 4 when ε2 ¯ρ ≪ 3, which can be
considered as a typical case as we have in mind very small ε.
Note that different information flow directions matter for learning rates. When pa-
rameters are in comparable range, the bottom-up case exhibits a higher learning rate than
the top-down case does. In other words, the bottom-up organization of information flow
within a binomial tree is more efficient in terms of aggregating information. This result
is consistent with early economics and sociology literature; Hayek (1945) for example,
highlight the importance of dispersed information sources.
The four sub-cases under binomial tree setting demonstrate that beyond a directed
graphical model, contextual information is also very important for information aggre-
gation. These comparisons are made possible only with help of our concept of finite
31
population learning and δ-perfect learning. Properties or statistics of the graph alone
cannot determine the learning status. Rather, as we argued from the very beginning of
this work, the enriched game theory plus graphical modeling approach are both interesting
and necessary in helping understand the information aggregation in social networks.
5 Remarks and Further Research
We have proposed a finite population learning concept to capture the level of information
aggregation in any given communication network. In our framework, one equilibrium out-
come, i.e., the number of signals obtained by an agent when she makes a decision, plays
a key role. This equilibrium outcome is computable (Mckelvey and Mclennan (1996)),
which also allows us to numerically check the learning status. Different from existing
literature that mainly addresses the learning behavior at the limit, this new concept helps
reveal explicit interplays among time discount, frequency of communication, information
precision and information sensitiveness of the decision problem in any finite communica-
tion network. As the total amount of information is fixed in a given finite network, our
approach enables meaningful comparative statics regarding the effectiveness of informa-
tion aggregation in networks. We also provide conditions for learning under a particular
equilibrium, under any equilibrium, and under all equilibria, respectively. Thanks to its
tractability and transparency, the finite population learning concept offers a solid foun-
dation to investigate long run dynamics of learning behavior and the associated learning
rates as population diverges.
Our analysis is also subject to certain limitations, which suggest directions for future
research. In our model, complete information on the structure of a given communication
network is required in determining the number of signals obtained by an agent, and in
checking its corresponding learning status.
In some circumstances, researchers do not
want to assume such specific information; rather they want to get some understanding
of the learning status regarding a large class of networks. This goal calls for some new
32
criteria that can determine the learning status for given classes of networks with given
finite population; ideally, these criteria should be formulated in terms of some summary
statistics of these networks. Relaxing the knowledge on specific network structure may also
lead to more general results about the learning rates. However, this task is challenging
within the current finite population learning framework. Specifically, our established
conditions for finite population learning require all agents' exact numbers of signals upon
their exits. Only knowing some commonly used summary statistics of the associated
graphs can hardly help offer good estimates of these numbers of signals, mostly because
these numbers of signals are also affected by other parameters not directly related to
the network structure, such as the information precisions and the tolerances of learning.
Therefore, the learning status of a certain class of communication networks is largely
undetermined if we just consider properties of the graphs. To address this issue, we
would like to have novel statistical properties of communication networks that are more
friendly to the analysis of communication learning. Golub and Jackson (2012a,b,c) are
promising attempts towards this direction, but their results are limited to the context of
non-Bayesian observational learning.
Another line of generalization is to make our model more flexible and realistic. For
example, the current setting assumes that agents have private signals with the same
precision, which amounts to assuming that the total amount of information grows linearly
with the population size when we consider the perfect learning. It might be interesting
to allow the total information to increase in a nonlinear (e.g., log rate) fashion with the
population size, and allow non-uniform distribution of signal precisions among agents.
Also, even when we focus on certain classes of networks without specifying complete
network structure, it is still assumed that any agent in the communication network knows
the complete network structure. This assumption can be relaxed by limiting agents'
knowledge on the network to a certain local neighborhood, and infer other parts of the
network according to her local knowledge. Keeping the Bayesian learning paradigm,
other potential generalizations of our current work include considering the implications of
33
correlated private information among agents, and heterogeneous characteristics of agents.
34
References
Acemoglu, D., Bimpikis, K. and Ozdaglar, A. (2012a). Dynamics of information
exchange in endogenous social networks. Theoretical Economics.
Acemoglu, D., Carvalho, V., Ozdaglar, A. and Tahbaz-Salehi, A. (2012b).
The network origins of aggregate fluctuations. Econometrica.
Acemoglu, D., Dahleh, M., Lobel, I. and Ozdaglar, A. (2009). Rate of conver-
gence of learning in social networks. Proceedings of the American Control Conference.
Acemoglu, D., Dahleh, M., Lobel, I. and Ozdaglar, A. (2011). Bayesian learning
in social networks. Review of Economic Studies, 78 1201 -- 1236.
Acemoglu, D. and Ozdaglar, A. (2010). Opinion dynamics and learning in social
networks. Dynamic Games and Applications, 1 3 -- 49.
Banerjee, A. (1992). A simple model of herd behavior. Quarterly Journal of Economics,
107 797 -- 817.
Banerjee, A. and Fudenberg, D. (2004). Word-of-mouth learning. Games and Eco-
nomic Behavior, 46 1 -- 2.
Bikhchandani, S., Hirshleifer, D. and Welch, I. (1992). A theory of fads, fashion,
custom, and cultural change as informational cascades. Journal of Political Economy,
100 992 -- 1026.
Crawford, V. and Sobel, J. (1982). Strategic information transmission. Econometrica,
50 1431 -- 1451.
DeGroot, M. (1974). Reaching a consensus. Journal of the American Statistical Asso-
ciation, 69 118 -- 121.
DeGroot, M. (2003). Persuasion bias, social influence, and unidimensional opinions.
Quarterly Journal of Economics, 118 909 -- 968.
35
Galeotti, A., Ghiglino, C. and Squintani, F. (2011). Strategic information trans-
mission in networks. working paper.
Golub, B. and Jackson, M. (2010). Naive learning in social networks and the wisdom
of crowds. American Economic Journal: Microeconomics, 2 112 -- 149.
Golub, B. and Jackson, M. (2012a). Does homophily predict consensus times? testing
a model of network structure via a dynamic process. Review of Network Economics.
Golub, B. and Jackson, M. (2012b). How homophily affects the speed of learning and
best-response dynamics. Quarterly Journal of Economics.
Golub, B. and Jackson, M. (2012c). Network structure and the speed of learning:
Measuring homophily based on its consequences. Annals of Economics and Statistics.
Goyal, S. (2009). Connections: An Introduction to the Economics of Networks. Prince-
ton University Press.
Hagenbach, J. and Koessler, F. (2010). Strategic communication networks. Review
of Economic Studies, 77 1072 -- 1099.
Hayek, F. (1945). The use of knowledge in society. The American Economic Review,
35 519 -- 530.
Jackson, M. (2010). An Overview of Social Networks and Economic Applications. North
Holland.
Kolacazyk, E. (2009). Statistical Analysis of Network Data: Methods and Models.
Springer.
Mckelvey, R. and Mclennan, A. (1996). Computation of Equilibria in Finite Games.
Elsevier.
Mobius, M., Phan, T. and Szeidl, A. (2010). Treasure hunt. working paper.
36
Muller-Frank, M. (2012). A general framework for rational learning in social networks.
Theoretical Economics.
Newman, M. (2010). Networks: an Introduction. Oxford University Press.
Smith, L. and Sorensen, P. (2000). Pathological outcomes of observational learning.
Econometrica, 68 371 -- 398.
Smith, L. and Sorensen, P. (2008). Rational social learning with random sampling.
working paper.
Topkis, D. (1979). Equilibrium points in non-zero sum n-person submodular games.
SIAM Journal of Control and Optimization, 17 773 -- 787.
37
Supplementary Materials
The supplementary materials provide proofs and generalized results of corresponding parts
in the main text.
Proof of Proposition 1. To prevent (ε, ¯ε, δ)-learning, it is enough to show that a lower
bound of Pσn,∗(cid:0) 1
ity,
nPn
i=1 (1 − M n,ε
i
) > ¯ε(cid:1) is greater than δ. It follows from Markov inequal-
erf
εs ρ + ¯ρkn,σ∗
i = n−1(1−¯ε)−1
Eσn,∗ M n,ε
Xi=1
Xi=1
2
n
n
i
.
Pσn,∗ 1
n
n
Xi=1
M n,ε
i > 1 − ¯ε! 6 n−1(1−¯ε)−1
This implies that
Pσn,∗ 1
n
n
Xi=1
(1 − M n,ε
i
) > ¯ε! > 1 − n−1(1 − ¯ε)−1
n
Xi=1
Therefore, it is enough to take
erf
εsρ + ¯ρkn,σ∗
2
i
.
1 − n−1(1 − ¯ε)−1
n
Xi=1
erf
εs ρ + ¯ρkn,σ∗
2
i
> δ ,
which concludes that condition (3.1) is necessary for (ε, ¯ε, δ)-learning.
To ensure (ε, ¯ε, δ)-learning, note that
Pσn,∗ 1
n
n
Xi=1
(1 − M n,ε
i
) > ¯ε! 6
Eσn,∗ (Pn
i=1(1 − M n,ε
n¯ε
i
))
=
n −Pn
i=1 erf(cid:18)εq ρ+¯ρkn,σ∗
2 (cid:19)
i
.
n¯ε
Demanding the right hand side of the above inequality no larger than δ, is the same as
assuming condition (3.2). This completes the proof.
The following provides a more general sufficient condition for δ-perfect learning. Given
equilibria {σn,∗}∞n=1, let f1 > f2 > . . . > fJ , where each fj(n) is a monotone increasing
1
function (not necessarily strictly increasing) on n, and let {bj
n, j = 1, . . . , J} be such that
{i : kn,σ∗
n
i > f1(n)}
> b1
n ,
{i : f1(n) > kn,σ∗
i > f2(n)}
n
> b2
n ,
and up until
{i : fJ−1(n) > kn,σ∗
i > fJ (n)}
n
> bJ
n .
n 6 1. The rest agents i's are such that
Clearly, b1
fJ (n) > kn,σ∗
n ∈ (0, 1) and 0 6 b1
n, . . . , bJ
i > 1. Their fraction is at most 1 − (b1
n + . . . + bJ
n + . . . + bJ
n).
Lemma 3 δ-perfect learning occurs if
j=1 bj
n = 1,
(a) limn→∞PJ
(b) for each j ∈ {1 . . . , J}, limn→∞ bj
n(cid:18)1 − erf(cid:18)εq ρ+¯ρfj (n)
2 (cid:19)(cid:19) = 0 .
Proof of Lemma 3. Recall that a sufficient condition for (ε, ¯ε, δn)-learning is
1
n
n
Xi=1
erf
εs ρ + ¯ρkn,σ∗
2
i
> 1 − δnε .
Then by the definition of bj
n and fj, it is enough to have
erf εrρ + ¯ρfj(n)
2
! · bj
n + 1 −
J
Xj=1
J
Xj=1
This translates to
bj
n! erf εr ρ + ¯ρ
2 ! > 1 − δnε .
δn >
1
¯ε J
Xj=1
bj
n 1 − erf εrρ + ¯ρfj(n)
2
!! + 1 −
J
Xj=1
bj
n! 1 − erf εr ρ + ¯ρ
2 !!! .
To ensure the existence of {δn} such that limn→∞ δn = 0,
it is enough to have
2
j=1 bj
n = 1 and
limn→∞PJ
bj
n 1 − erf εrρ + ¯ρfj(n)
2
!! = 0,
for j ≤ J.
lim
n→∞
Note that if fj does not increase strictly for n > N∗, bj
n needs to decrease to 0. Also,
allowing more than one tolerances among ε, ¯ε, δ to vary with population size n leads
to interesting learning results.
In particular, from the proof of Lemma 3, a sufficient
condition for (ε, ¯εn, δn)- learning is
δn ¯εn >
J
Xj=1
bj
n 1 − erf εrρ + ¯ρfj(n)
2
!! + 1 −
J
Xj=1
bj
n! 1 − erf εrρ + ¯ρ
2 !! .
In this condition, the role of δn and that of ¯εn are completely interchangeable, which
implies that we can trade in some probabilistic confidence for some fraction of agents who
make wrong decisions.
The following provides a generalized version of Lemma 2 when Assumption 2 is relaxed.
Lemma 4 (Generalized Lemma 2) For any agent i, either the communication steps
she optimally experiences before taking an action in any social network Gn along a society
{Gn}∞n=1 is bounded from above by a constant independent of n, or she waits until the
maximum allowable step. Specifically,
(a) If (ρ + ¯ρ)ψ > 1, then for any agent i
ln,σ∗
i 6 ln
i < min(cid:26)(Ln
i )max, ln(cid:18)1 −
1
(ρ + ¯ρ)ψ(cid:19) / ln ¯r(cid:27) ,
where ln
i stands for agent i's optimal communication rounds given that other agents
wait till the maximum allowable step.
(b) If (ρ + ¯ρ)ψ 6 0 (equivalently, ψ ≤ 0), then for any agent i
ln,σ∗
i
= ln
i = (Ln
i )max .
3
(c) If 0 < (ρ + ¯ρ)ψ 6 1, then there are two subcases.
(c.1) For agent i with
lim
n→∞Bn
i <
1 − ρψ
¯ρψ
,
where Bn
i is the set of agents whose signals agent i can get if no one exits before
maximum allowable step, we have
ln,σ∗
i = ln
i = (Ln
i )max .
lim
n→∞Bn
i >
1 − ρψ
¯ρψ
,
ln,σ∗
i 6 ln
i 6 min(cid:16)(Ln
i )max, l{Gn}∞
i
n=1
(cid:17) ,
(c.2) For agent i with
we have either
or
ln,σ∗
i
= (Ln
i )max ,
is a constant that depends on the society and agent i's position
where l{Gn}∞
n=1
i
in the society, but does not change with n.
Proof of Lemma 4. We proceed case by case.
Case (a), (ρ + ¯ρ)ψ > 1.
In this case, agent i enjoys a positive payoff ψ − 1
ρ+¯ρ if she exists at t = 0 and does not
communicate with anyone else. Note that her expected payoff by taking ln
i communication
steps is strictly upper bounded by ¯rln
i ψ. Therefore, it is suboptimal for her to choose a ln
i
such that
which implies
¯rln
i ψ 6 ψ −
1
ρ + ¯ρ
,
ln
i < ln(cid:18)1 −
1
(ρ + ¯ρ)ψ(cid:19) / ln ¯r
4
is necessary for agent i's optimality. It is obvious that ln,σ∗
i
6 ln
i , since other agents do
not necessarily wait forever in an equilibrium, so that it may be optimal for agent i to exit
earlier too. We get the result by combining these with the upper bound ln
i 6 (Ln
i )max.
Case (b), (ρ + ¯ρ)ψ 6 0.
Now agent i always gets a negative payoff whenever she exits. Because waiting dis-
counts the negative payoff, she optimally chooses to wait as long as possible, no matter
i = ln
what other agents do. Therefore, ln,σ∗
i = (Ln
Case (c.1), 0 < (ρ + ¯ρ)ψ 6 1 and limn→∞ Bn
The maximum number of private signals agent i can get is Bn
i = (Ln
gets a negative payoff whenever she exists. Hence, ln,σ∗
i )max.
i < 1−ρψ
¯ρψ .
i . Again, agent i always
i )max .
i = ln
i > 1−ρψ
¯ρψ .
Case (c.2), 0 < (ρ + ¯ρ)ψ 6 1 and limn→∞ Bn
For any Gn with Bn
i > 1−ρψ
¯ρψ , we consider the communication step (Ln
i )max when
agent i obtains signals from all her sources Bn
i , provided others wait maximum steps.
Note that (Ln
and Bn
i )max is non-decreasing in n for any agent i (by the no deleting assumption),
i,l is strictly monotone increasing in l when l 6 (Ln
i )max.
Also for a given communication network Gn, there exists one communication step
ln′
i
such that after this step agent i gets positive payoff, given that other agents wait
maximum steps. Hence, it is suboptimal for her to wait longer than ln′
i
if
¯rψ 6 ψ −
which implies
1
ρ + ¯ρBn
i
i,ln′
,
Bn
i,ln
i <
λ + r − ρrψ
¯ρrψ
(5.1)
is necessary for agent ln
i 's optimality.
Now we consider two sub-cases. First is when limn→∞ Bn
i < ∞. Then we must have
limn→∞(Ln
i )max < ∞ , since (Ln
i )max 6 Bn
i . Hence,
ln
i 6 lim
n→∞
(Ln
i )max < ∞ ,
5
for all Gn satisfying Bn
l{Gn}∞
1i
n=1
i > 1−ρψ
¯ρψ and limn→∞ Bn
i < ∞. We denote limn→∞(Ln
i )max as
, which is a constant that depends on the society and agent i's position in the
society and does not change with respect to n.
Second, we discuss the case when limn→∞ Bn
i )max < ∞ or limn→∞(Ln
limn→∞(Ln
i )max = l{Gn}∞
limn→∞(Ln
n for any given i and Bn
Gn, there exists a largest GN with its associated (LN
n=1
1i
i = ∞. Now there should be either
i 6
i )max = ∞ . In the former scenario, we have ln
for all Gn. In the latter case, as (Ln
i )max is non-decreasing in
i,l is strictly monotone increasing in l when l 6 (Ln
i )max for any
i )max that satisfies condition (5.1).
Hence, by (5.1) we obtain
ln
i 6 (LN
i )max ,
for all Gn satisfying Bn
i )max as l{Gn}∞
such (LN
2i
n=1
¯ρψ , limn→∞ Bn
i > 1−ρψ
i )max = ∞ . We denote
, which is again a constant that depends on the society and agent
i = ∞ and limn→∞(Ln
i's position in the society and does not change with respect to n. To sum up, we denote
i
n=1
either l{Gn}∞
by l{Gn}∞
agent i in such Gn with Bn
or l{Gn}∞
i > 1−ρψ
n=1
1i
2i
n=1
in respective cases, and it follows ln
i 6 l{Gn}∞
i
n=1
for
¯ρψ , where l{Gn}∞
i
n=1
is independent of n.
As for ln,σ∗
i
, since other agents play equilibrium strategies, agent i gets weakly fewer
signals than that she can get when other agents wait maximum steps. There can be two
cases, either she gets positive payoff and takes an action weakly earlier, namely, ln,σ∗
i 6 ln
i ,
or she cannot get enough signals to ensure a positive payoff so that she optimally until
the maximum allowable step, i.e., ln,σ∗
i
= (Ln
i )max. This concludes the proof.
Proof of Proposition 3. By Lemma 3, it suffices to show that limn→∞ kn,σ∗
= ∞ under
any equilibria {σn,∗}∞n=1 for any socially informed agent i. In the following, we consider a
fixed socially informed agent i. Recall that in Definition 6, Li is defined as the smallest
positive integer such that limn→∞ Bn
signals can reach i in the first l rounds of communication under equilibrium σn,∗.
i,Li = ∞ . Denote by Bn,σ∗
the set of agents whose
i,l
i
The problem is simple when Li = 1. Clearly, Bn,σ∗
i,1 = Bn
i,1 under any equilibrium σn,∗.
6
As agent i is socially informed, we have for sufficiently large n
ψ −
1
ρ + ¯ρBn,σ∗
i,1
> 0 under any σn,∗
and
¯r ψ −
1
ρ + ¯ρBn,σ∗
i,1
! > ψ −
1
ρ + ¯ρ
under any σn,∗ .
The above display implies that agent i should at least wait for one communication
under any σn,∗ for sufficiently large n. As a consequence,
= limn→∞ Bn
> Bn,σ∗
i > limn→∞ Bn,σ∗
round. Hence, kn,σ∗
limn→∞ kn,σ∗
i,1 = ∞ under any {σn,∗}∞n=1.
i,1
i
i,1
The following discussion is on the cases when Li > 2. We proceed through three steps.
Step 1. We claim when Li > 2, for sufficiently large n, there exists at least one path
{jLi−1, jLi−2, ..., j1, i} from jLi−1 to i such that
lim
n→∞Bn
jLi−l,l = ∞ for all l ∈ {1, . . . , Li − 1} .
(5.2)
i,Li−1\Bn
i,j = ∞, Bn
Now we construct the path {jLi−1, jLi−2, ..., j1, i} that satisfies condition (5.2). Because Li
is the smallest integer j such that limn→∞ Bn
i,Li−2, the set of agents that
are of distance Li − 1 to i, must be finite in the limit, i.e., limn→∞ Bn
i,Li−2 < ∞.
Therefore, there is at least one agent j of distance Li−1 to i, such that limn→∞ Bn
j,1 = ∞.
We denote one of such agents j as jLi−1. If Li = 2, the desired path has been constructed.
When Li > 3, choose any path {jLi−1, jLi−2, ..., j1, i} from the chosen jLi−1 to i. Clearly,
jLi−l ∈ Bn
i,Li−l. Moreover, condition (5.2) is satisfied in view of limn→∞ Bn
jLi−1,1 = ∞.
i,Li−1 \ Bn
Step 2. We next argue that when Li > 2, agent jLi−l on the path {jLi−1, jLi−2, ..., j1, i}
will not exit before she experiences l communication steps under any equilibrium σn,∗
provided that n is sufficiently large. It is worth noting that agent jLi−l does not necessarily
get a positive payoff when she experiences l communication steps in equilibrium.
We will see this by induction from jLi−1 to j1 sequentially. We first show that agent
jLi−1 will not exit before she experiences her first communication step in any equilibrium
7
σn,∗ provided that n is sufficiently large. It requires that there exists N such that for all
social networks Gn ∈ {Gn}∞n=1 and its associated equilibrium σn,∗ with n > N,
¯r ψ −
1
jLi−1,1! > ψ −
ρ + ¯ρBn,σ∗
1
ρ + ¯ρ
.
(5.3)
To validate condition (5.3), recall condition (4.3) from Definition 6 for l = Li − 1,
which states that there exists N such that for all social networks Gn ∈ {Gn}∞n=1 with
n > N it holds
¯r ψ −
ρ + ¯ρBn
1
i,Li! > ψ −
1
ρ + ¯ρBn
i,Li−1
.
(5.4)
By the definition of Li, the construction of jLi−1 and the fact that Bn,σ∗
jLi −1,1 = Bn
jLi−1,1 under
any equilibrium σn,∗ with any n, we know that limn→∞ Bn,σ∗
jLi−1,1 = limn→∞ Bn
jLi−1,1 = ∞
under any σn,∗ and limn→∞ Bn
i,Li−1 < ∞. Also we have Bn
i,Li−1 > 1. Note that the right
hand side of condition (5.4) is greater than or equal to the right hand side of condition
(5.3), we obtain easily that (5.3) holds for sufficiently large n. Hence we get that agent
jLi−1 will not exit before she experiences her first communication step under any σn,∗
provided that n is sufficiently large.
We then show that agent jLi−2 (for Li ≥ 3) will not exit before she experiences her
second communication step under any equilibrium for sufficiently large n.
It requires
that there exists N such that for all social networks Gn ∈ {Gn}∞n=1 and its associated
equilibrium σn,∗ with n > N,
¯r2 ψ −
1
jLi−2,2! > ψ −
ρ + ¯ρBn,σ∗
1
ρ + ¯ρ
,
and
¯r2 ψ −
1
jLi−2,2! > ¯r ψ −
ρ + ¯ρBn,σ∗
1
jLi−2,1! .
ρ + ¯ρBn,σ∗
(5.5)
(5.6)
To validate (5.5) and (5.6), we use again the condition (4.3) from Definition 6 for
l = Li − 2 and l = Li − 1, which state that there exists N such that for all social networks
8
Gn ∈ {Gn}∞n=1 with n > N we have
¯r2 ψ −
1
i,Li! > ψ −
ρ + ¯ρBn
and
¯r2 ψ −
1
i,Li! > ¯r ψ −
ρ + ¯ρBn
1
ρ + ¯ρBn
i,Li−2
,
1
ρ + ¯ρBn
i,Li−1! .
(5.7)
(5.8)
jLi−2,2 = limn→∞ Bn
Similarly, by the definition of Li and the construction of jLi−1 and jLi−2, we know that
limn→∞ Bn
i,Li−2 < ∞,
and limn→∞ Bn,σ∗
jLi−2,1 < ∞ under any equilibrium σn,∗. Also we have
Bn
jLi−2,1)
for any n under any equilibrium σn,∗. Note that the right hand side of condition (5.7) is
i,Li−1 < ∞, limn→∞ Bn
i,Li = ∞, limn→∞ Bn
i,Li−2 > 1 and Bn,σ∗
jLi−2,1 ⊆ Bn
jLi−2,1 6 limn→∞ Bn
jLi−2,1 ⊆ Bn
i,Li−1 (and thus Bn
i,Li−1 > Bn
jLi−2,1 > Bn,σ∗
greater than or equal to the right hand side of condition (5.5), and the right hand side of
condition (5.8) is greater than or equal to the right hand side of condition (5.6). Then it
can be verified that the next two inequalities hold for sufficiently large n, the right hand
sides of which are the same as those in conditions (5.5) and (5.6):
¯r2 ψ −
1
ρ + ¯ρBn
jLi−2,2! > ψ −
1
ρ + ¯ρ
,
and
¯r2 ψ −
1
ρ + ¯ρBn
jLi−2,2! > ¯r ψ −
1
jLi−2,1! .
ρ + ¯ρBn,σ∗
(5.9)
(5.10)
Furthermore, recall that we have already shown that agent jLi−1 will not exit before
she experiences her first communication step under any equilibrium σn,∗ provided that n
jLi−1,1 ⊆ Bn,σ∗
is sufficiently large, which implies that Bn,σ∗
jLi−2,2 under any σn,∗ for sufficiently
jLi−2,2 > limn→∞ Bn,σ∗
large n, and thus limn→∞ Bn,σ∗
jLi−1,1 = ∞ under any equilibrium σn,∗.
Also we know that limn→∞ Bn,σ∗
jLi−2,1 < ∞. Together with conditions (5.9) and (5.10),
these facts validate conditions (5.5) and (5.6). Hence we get that agent jLi−2 will not
exit before she experiences her second communication step in any σn,∗ provided that n is
9
sufficiently large.
The arguments above for jLi−2 can be extended successively to j1. Hence, under any
equilibrium σn,∗, no jLi−l in the established path {jLi−1, jLi−2, ..., j1, i} will exit before
she experiences l communication steps under any equilibrium σn,∗ provided that n is
sufficiently large. A byproduct is that limn→∞ Bn,σ∗
jLi−l,l = ∞ under any σn,∗, for l ∈
{1, 2, ..., Li − 1}.
Step 3. Finally, we argue that the socially informed agent i will not exit before
she experiences Li communication steps under any equilibrium σn,∗ when n is sufficiently
large. It requires that there exists N ∈ N such that for all social networks Gn ∈ {Gn}∞n=1
with n > N, we have
ψ −
1
> 0 ,
ρ + ¯ρBn,σ∗
i,Li
i,Li ! > ¯rl ψ −
1
ρ + ¯ρBn,σ∗
1
ρ + ¯ρBn,σ∗
i,l
! ,
(5.11)
(5.12)
and
for all l < Li.
¯rLi ψ −
Recall that we have already shown that agent jLi−l
in the constructed path will
j2,Li−2 ⊆ ... ⊆ Bn,σ∗
i,Li > limn→∞ Bn,σ∗
j1,Li−1 ⊆ Bn,σ∗
j1,Li−1 > ... > limn→∞ Bn,σ∗
not exit before she experiences Li − l communication steps for l ∈ {1, 2, ..., Li − 1},
under any equilibrium σn,∗ provided that n is sufficiently large, which implies that
jLi−1,1 ⊆ Bn,σ∗
Bn,σ∗
limn→∞ Bn,σ∗
der any σn,∗. Also, we have Bn,σ∗
i,Li under any σn,∗ for sufficiently large n, and thus
jLi−1,1 = ∞ un-
i,l, under any σn,∗ for
l ∈ {1, 2, ..., Li− 1}, which implies the right hand sides of condition (4.3) are greater than
or equal to th right hand sides of condition (5.12), for l ∈ {1, 2, ..., Li − 1}. Moreover, we
know that limn→∞ Bn,σ∗
i,l < ∞ for l ∈ {1, 2, ..., Li − 1} by the definition
of Li. Together with conditions (4.2) and (4.3) in Definition 6, these facts validate con-
jLi−2,2 > limn→∞ Bn,σ∗
6 limn→∞ Bn
i,l
i,l ⊆ Bn
i,l and thus Bn,σ∗
i,l
6 Bn
ditions (5.11) and (5.12). Hence we get that the socially informed agent i will not exit
before she experiences Li communication steps and she can enjoy a positive payoff when
she experiences Li communication steps, under any σn,∗ provided that n is sufficiently
10
large. This further implies kn,σ∗
finally leads to limn→∞ kn,σ∗
when Li > 2. This concludes the proof.
i > Bn,σ∗
> limn→∞ Bn
i
i,Li under any σn,∗ with sufficiently large n, which
i,Li = ∞ under any σn,∗
i,Li = limn→∞ Bn
11
|
1803.08858 | 1 | 1803 | 2018-03-23T16:07:05 | Twitter and the Press: an Ego-Centred Analysis | [
"cs.SI"
] | Ego networks have proved to be a valuable tool for understanding the relationships that individuals establish with their peers, both in offline and online social networks. Particularly interesting are the cognitive constraints associated with the interactions between the ego and the members of their ego network, whereby individuals cannot maintain meaningful interactions with more than 150 people, on average. In this work, we focus on the ego networks of journalists on Twitter, and we investigate whether they feature the same characteristics observed for other relevant classes of Twitter users, like politicians and generic users. Our findings are that journalists are generally more active and interact with more people than generic users. Their ego network structure is very aligned with reference models derived from the social brain hypothesis and observed in general human ego networks. Remarkably, the similarity is even higher than the one of politicians and generic users ego networks. This may imply a greater cognitive involvement with Twitter than with other social interaction means. Moreover, the ego networks of journalists are much stabler than those of politicians and generic users, and the ego-alter ties are often information-driven. | cs.SI | cs |
Twitter and the Press: an Ego-Centred Analysis
Chiara Boldrini
IIT-CNR
Pisa, Italy
[email protected]
Marco Conti
IIT-CNR
Pisa, Italy
[email protected]
Mustafa Toprak
IIT-CNR
Pisa, Italy
[email protected]
[email protected]
Andrea Passarella
IIT-CNR
Pisa, Italy
as it is known that many traits of social behaviour (resource shar-
ing, collaboration, diffusion of information) are chiefly determined
by its structural properties [16]. In an ego network, the individual,
referred to as ego, is at the center of the graph, and the edges con-
nect her to the peers (called alters) with which she interacts. The
ego-alter tie strength is typically computed as a function of the
frequency of interactions between the ego and the alter. Grouping
these ties by their strength, a layered structure emerges in the ego
network (Figure 1), with the inner circles containing the socially
closest peers and the outer circles the more distant relationships.
According to the social brain hypothesis from evolutionary psycol-
ogy [6], the existence and sizes of the groups are determined by the
maximum cognitive capacity of the brain that humans can allocate
to meaningful social relationships, i.e., beyond the mere level of
acquaintances. In this model, five layers exist within the limit of
the Dunbar number, which is the maximum number of social rela-
tionships (around 150) that an individual, on average, can actively
maintain [10, 18]. Beyond the Dunbar number, relationships are
just acquaintances and their maintenance has a negligible effect on
the cognitive resources. Figure 1 illustrates the typical sizes of each
layer (1.5, 5, 15, 50, 150).
ABSTRACT
Ego networks have proved to be a valuable tool for understand-
ing the relationships that individuals establish with their peers,
both in offline and online social networks. Particularly interesting
are the cognitive constraints associated with the interactions be-
tween the ego and the members of their ego network, whereby
individuals cannot maintain meaningful interactions with more
than 150 people, on average. In this work, we focus on the ego net-
works of journalists on Twitter, and we investigate whether they
feature the same characteristics observed for other relevant classes
of Twitter users, like politicians and generic users. Our findings
are that journalists are generally more active and interact with
more people than generic users. Their ego network structure is
very aligned with reference models derived from the social brain
hypothesis and observed in general human ego networks. Remark-
ably, the similarity is even higher than the one of politicians and
generic users ego networks. This may imply a greater cognitive
involvement with Twitter than with other social interaction means.
Moreover, the ego networks of journalists are much stabler than
those of politicians and generic users, and the ego-alter ties are
often information-driven.
CCS CONCEPTS
• Networks → Online social networks; • Human-centered
computing → Social network analysis; • Mathematics of com-
puting → Graph theory;
KEYWORDS
online social networks, ego networks, Twitter, journalists
1 INTRODUCTION
Online Social Networks are one of the most prominent examples
of cyber-physical convergence: social relationships that previously
could exist only in the offline world are now transported into the
virtual, online dimension and new interactions are enabled that
were not possibile before. OSN are thus at the same time very
similar and very different from offline social networks, and for this
reason several researchers have tried to understand if and to which
extent they obey to the same common principles.
Ego networks are the graph-based abstraction that is typically
used to study the social relations between an individual and its
peers [8, 10, 12, 13]. The ego network is an important abstraction,
Figure 1: Layered structure of human ego networks
Quite interestingly, ego networks formed through many in-
teraction means, including face-to-face contacts, letters, phone
calls, emails, and, remarkably, also OSN, are well aligned with this
model [18]. Specifically, Dunbar et al. [7] have found very similar
properties also in Facebook and Twitter ego networks. In this sense,
OSN become one of the outlets that is taking up the brain capacity
of humans, and thus are subject to the same limitations that have
been measured for more traditional social interactions, but are not
capable of "breaking" the limits imposed by cognitive constraints
to our social capacity. Tie strengths and how they determine ego
network structures have been the subject of several additional work.
For example, in [9] authors provide one of the first evidences of the
existence of an ego network size comparable to the Dunbar's num-
ber in Twitter. The relationship between ego network structures
and the role of users in Twitter was analysed in [14]. In general, ego
network structures are also known to impact significantly on the
way information spreads in OSN, and the diversity of information
that can be acquired by users [1].
Thanks to its public API and its impressive number of users
(330 million active users as of October 20171), Twitter is one of the
most studied OSN in the related literature on social networking.
Generic users on Twitter have received a lot of attention, where the
aim was to characterise how they engage with the platform [11],
interact with each other, and how real life affects what we observe
on Twitter and vice versa [17]. However, users on Twitter are not
created equal: their behaviour on the platform is intertwined to
their social status and their job. For this reason, researchers have
recently focused their attention to special classes of Twitter users
that, for one reason or another, can be singled out. For example,
Arnaboldi et al. [3] have studied how politicians engage with other
people on Twitter, highlighting that, while the same ego network
structure appears, there is a significant difference with respect to
generic users in terms of ego network variability and amount of
information-driven relationships.
Another interesting category of Twitter users is that of journal-
ists. Previous research has highlighted how journalists use Twitter
as a platform for personal branding [4] and to promote content from
their news websites [15]. In this sense, journalists share with politi-
cians many of the same motivations for using Twitter. However,
no previous work has studied how journalists create and maintain
social relationships on Twitter, and whether this resembles what we
observe for similar categories of users or for generic users. Thus, in
this paper, exploiting the ego network abstraction described above,
we investigate the activity of journalists on Twitter in terms of how
they engage with other users.
We found that journalists are significantly more active than the
average generic users and that they have a marked preference for
social communications involving retweets. From the ego network's
standpoint, journalists feature a layered structure that is is very
similar to the general ego network model of Figure 1, sometimes
much more than what has been observed for other types of Twitter
users. Specifically, the size of the active network is much closer to
the theoretical value of 150, and very similar to the one observed in
offline ego networks before the diffusion of OSN. This is a surprising
result, that may indicate that journalists invest a large portion,
compared to other types of users, of their social capacity on Twitter.
The ego networks of journalists are also very stable over time, and
this is very different from the findings about politicians and generic
users on Twitter [3]. This may be due to the fact that journalists
use Twitter less as a leverage to win people over and more as a
social communication tool. Finally, we show that many ego-alter
relationships are information-driven: they are often activated by a
hashtag, their future interactions also involve hashtags, and this
holds true approximately for all the layers with the same intensity.
1Source: Wikipedia
2
2 THE DATASET
We downloaded the timeline for the journalists belonging to the
Italian journalists list at https://twitter.com/stampa_tweet/lists/
giornalisti. This list comprises 492 journalists that are the most
popular in Italy. Due to the Twitter API limitations, only the 3200
most recent tweets could be downloaded for each journalist. Of
these 492 members, we discard those with a protected timeline and
with zero tweets, ending up with 486 journalists. All of them are
long-time Twitter users, since their most recent registration dates
back to 2012. However, as we will discuss later on, not all of them
are equally engaged with the Twitter platform.
2.1 Observability
The 3200 tweets limitation imposed by the Twitter API affects
journalists' timelines non uniformly. Specifically, around 69% of
users (corresponding to 335 out of the 486 journalists) have posted
more tweets than what we are able to download. We refer to these
users as partially observed. This is a significant difference with
respect to the dataset analysed in [2], where, for 98% of users, 3200
tweets were enough to cover the whole Twitter activity. Please note
that being partially or fully observed is an indirect measure of the
user's tweeting frequency: the more the tweets posted, the quicker
the 3200 slots are saturated. Indeed, the average daily tweeting
frequency is 0.6 for the fully observed users and 6.0 for the partially
observed ones (which, anyway, is still a feasible value for truly
human Twitter activity).
We refer to the portion of timeline that we are able to observe
as observed timeline. When the 3200 tweets limitation does not
kick in, the observed timeline overlaps with the active timeline,
which we estimate as the Twitter activity since the user registration
on Twitter2. While the distinction between partially observed and
fully observed users is binary, the actual coverage of the observed
timeline with respect to the active timeline is more nuanced. Hence,
the percentage of active timeline observed typically changes on a
per user basis. The direct consequence of the uneven time coverage
of the observed timelines is that the number of tweeting journalists
in our dataset constantly increases over time starting from 2007,
because the most active users are present only in the most recent
intervals. Figure 2 shows how this impacts on the daily volume
of tweets generated over time. We plot in gray the time series of
total observed tweets per day, while in blue we plot the number
of users with active observed timeline (i.e., for which the coverage
of the 3200 tweets has already started). While the growth in the
the number of active users is approximately linear, the increase in
the observed tweets is exponential. This further highlights one of
the characteristics of this dataset: the most active users are only
observed for a short amount of time but they are the ones that
impact the most on the number of generated tweets.
2.2 Data cleaning and filtering
Not all the downloaded timelines are suitable for either a general
analysis of the behaviour of journalists on Twitter or for the ego
network analysis. In fact, some journalists may have left Twitter
long ago, others may use it only sporadically, others may feature
2The real active timeline would be the time between the first and last tweet. However,
in this case the time of the first tweet is unknown due to the API limitations.
Occasional users are not interesting for our analysis, since their
engagement with the platform is low and so is their cognitive in-
volvement. For this reason, in the following we will focus on regular
and active users only (corresponding to the green bar in Figure 3),
which amount to 387 journalists in total.
Figure 3: User classification
2.2.3
Stationarity. In our analysis, we are not only interested
in active and regular users, but we also need to make sure that
their Twitter activity has already stabilised. In fact, it is a frequent
finding in the related literature that users tend to be more active
during the initial interactions with the platform, reaching a steady
state later on, when the engagement is somewhat consolidated.
In order to verify whether this is the case also in our dataset, we
compute for each user the average number of tweets generated
each week. For this analysis, we align all observed timelines to
start at the same time (i.e., time 0 for each given user is the time
of the first observed tweet of the user). Then, we average these
values across all users. Please note that we restrict our analysis
to the first 84 weeks, since the number of active users abruptly
decreases afterwards. For the sake of a fair comparison between
users, we have rescaled the weekly frequencies of each user using
the mean normalization technique. This procedure yields values
in the range [−1, 1], with values around zero being close to the
average frequency. The results are shown in Figure 4, only for the
59 active and regular users that are fully observed3. It is clear that
there is not a significant variation in the activity between first and
last portion of the timelines. Hence, we do not discard a transient
period for the users in our dataset.
2.3 Dataset overview
The main properties of the dataset resulting from the filtering per-
formed in the previous section are summarised in Table 1. With an
average active life of about 8 years, all these journalists are long-
time Twitter users. However, the number of tweets that they have
generated during their entire life varies significantly between users.
Among the tweets that we observe, an average of 68% are social, i.e.,
3Please note that for partially observed users we are missing the initial portion of the
timeline, so this analysis cannot be replicated.
Figure 2: Tweeting volume VS active users over time
an unstable ego network (we will discuss what this means in a later
section). In the following, we discuss how to identify the Twitter
users that should be considered for our analysis.
2.2.1 Users that have left Twitter. First, we focus on identifying
users that are not actively engaged with the platform anymore.
The inactive life of a user, defined as the time period between the
last observed tweet and the time of downloading, is an indirect
measure of inactivity. In fact, long inactive periods are a telltale
sign of decreased engagement.
In previous works [2], a threshold-based approach mimicking
Twitter's 6-months inactivity criterion is employed: a user was con-
sidered to have abandoned Twitter if her inactive life was longer
than six months. However, here we argue that six months of inac-
tivity may be perfectly in line with the historic behaviour of a user,
without being suggestive of her having abandoned the platform.
Therefore, we use a new classifier based on the concept of intertweet
time, defined as the time interval between two consecutive tweets.
For each journalist i, we observe a certain characteristic distribution
of intertweet times (ITTi). If the inactive lifespan T inactive
of user i
is significantly larger than the maximum intertweet time previously
observed for the user, then it is likely that the user has indeed aban-
doned the platform. Specifically, we allow for a a six-months grace
period (in the spirit of the considerations in [2]) and we assume
< max{ITTi} + 6 months. Using
a user i is still active if T inactive
this classifier, 11 users are marked as having abandoned Twitter at
the time we downloaded the dataset.
i
i
2.2.2 Regular users. While the previous classifier was concen-
trating on the inactive life of a user, we now focus on the observed
life, and we investigate the level of regularity in Twitter activity.
Like in [3], we assume that a Twitter user is a regular user if she
posts at least one tweet every 3 days (as an average frequency
within each month) for at least 50% of the total number of months
of their activity. If she does not, the user is classified as sporadic.
In Figure 3 we combine the results of the abandonment classifier
and the regularity classifier. As expected, partially observed users
are generally more active and regular than fully observed ones. It
is interesting to note that there are two users marked as regulars
that have then stopped using Twitter. We manually checked these
two users to confirm the classification and we found out that in-
deed one of them had died and one had changed its Twitter handle.
3
06−12−2011Monti Reform15−02−2012Sanremo (major TV song contest)21−04−2013Boston bomber manhunt26−05−2014European elections15−11−2015Paris terrorist attacks10−11−2016Trump elected POTUS14−11−2017Italy out of World Cup010002000300001000200030002007−012007−072008−012008−072009−012009−072010−012010−072011−012011−072012−012012−072013−012013−072014−012014−072015−012015−072016−012016−072017−012017−072018−012018−07# tweets per dayUsers with active timelinesTweetsUsers15998213286fully observedpartially observedregular_abandonedregular_activesporadic_abandonedsporadic_activeregular_abandonedregular_activesporadic_abandonedsporadic_active0100200300# usersFigure 4: Stationarity analysis
following the definition in [2], involve forms of direct communica-
tions such as replies, mentions or retweets. Among these, retweets4
are by far the most popular mode for interaction, taking up half of
the social communication space. Retweets were popular also for the
politicians analysed in [3], but their percentage was around 40%,
with mentions being used, by and large, with roughly the same
frequency. The popularity of retweets is confirmed when looking
at the most popular communication mode per user (Figure 5, where
indirect means tweets that are neither mentions, nor replies, nor
retweets): retweets are the go-to mode for more than 50% of the
users. Figure 6 shows the breakdown across the three types of social
tweets, grouping users by their dominant type of tweet. It shows
that retweets rank always as first or second most popular social
mode, regardless of the predominant mode.
Figure 6: Tweets per top activity
Section 3. The average tweet frequency when excluding outliers
is 4.17 tweets per day, which is still much higher than the one
observed5 in politicians (between 2.6 and 3.2 depending on the
dataset [3]).
Figure 7: Histogram of tweet frequency
Figure 5: Most popular tweeting activity
Table 1 also reveals a great variability in the number of tweets
per day, whose distribution is shown in Figure 7. Figure 7 shows
that while most journalists post around 10-15 tweets per day, some
users are clear outliers, with daily tweets well above 30. These users
are marked as outliers when using standard clustering techniques
such as DBSCAN on the tweet frequency. These outliers could
have a significant impact on the ego network statistics, due to
their intense Twitter activity, and should be studied separately.
However, as shown in Figure 8, the observed timeline for these
very active users is too short to satisfy the stability requirement (at
least one year between the first and last observed tweets) for ego
networks that has been typically used in the related literature [2].
For this reason, these users will be excluded from the analysis in
4Please note that, for the purpose of this analysis, quote tweets are treated as simple
retweets.
Figure 8: Observed timeline length VS average tweet fre-
quency
5Please note that the comparison between our results about journalists and those
in [3] about politicians is a fair one. In fact, the filtering based on user regularity and
activity intensity described in Section 2.2 was also performed very similarly in [3].
More specifically, the filtering described in Section 2.2.2 is exactly the same as the one
used in [3]. Our filter described in Section 2.2.1 is slightly more conservative than the
one used in [3], hence it potentially retains more users that are less active. Despite
this, as discussed later in the paper, we find that journalists are generally more active
than politicians and generic users.
4
llllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll−1.0−0.50.00.51.0020406080Weeks since first tweetAverage normalised frequency0%10%20%30%40%50%INDIRECTMENTIONREPLYRETWEETMost popular tweet type% userstop_activity: REPLYtop_activity: RETWEETtop_activity: INDIRECTtop_activity: MENTION0%20%40%60%0%20%40%60%% of observed tweetsTweet typeMENTIONREPLYRETWEET02550751000255075100Tweets/day [observed]# usersOutlierslllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll0255075100050100Observed timeline [months]Average tweets/dayOutlier?llFALSETRUETable 1: Summary statistics
active life [years]
7.88
1.33
tot tweets
16,319
22,199
observed tweets
3061.34
435.06
mean
sd
3 EGO NETWORK ANALYSIS
We now focus our attention on the ego networks of the journalists
that have been selected according to the discussion in Section 2. For
each of these journalists, the strength of ego-alter ties are inferred
from the frequency of direct tweets (mentions, reply, or retweets)
between the ego and the alters, which is normally considered as a
proxy for their emotional closeness [2, 7]. Similarly to the related
literature, we define as active tie one for which the ego and the
alter exchange at least one message per year.
3.1 Static ego networks
The static view of an ego network is a single, aggregate snapshot
of the ego and its ties. By modelling the ego-alter ties through a
static ego network, we consider all the communications between
the ego and the alter. This analysis provides an essential starting
point for understanding the ego-alter interactions and for making
quantitative comparison with other datasets studied in the related
literature.
Figure 9 shows the distribution of the number of alters per ego,
i.e., the total number of social ties, including both active and in-
active ones. When compared with what was observed in [7] for
generic Twitter users, we notice that, for journalists, the number of
alters per ego is about twice as large as that of regular users. This
implies that journalists tend to contact significantly more alters.
This is in line with journalists being prominent users that stand out
among the Twitter crowd. However, as discussed before, only active
relationships consume cognitive resources and thus are affected by
the human cognitive constraints. For this reason, in Figure 10, we
consider the active network, i.e., the ego network encompassing
only relationships with contact frequency higher than one tweet per
year. While the size of the active network is substantially different
from that of the complete ego network, the proportional difference
is maintained when comparing what we observe for journalists
against the results shown in [7] for generic Twitter users6.
tweets/day % social % replies % retweets % mentions
23.62
20.03
22.33
18.35
68.26
21.11
5.33
9.27
54.06
22.02
Figure 10: Histogram of active networks size
Each of these active networks can be partitioned into a set of
layers (also called circles), grouping the tie strength between the
ego and its alters. Offline social networks typically feature four
layers [18], while five layers are a common finding for OSN [7]. The
optimal number of layers can be obtained through cluster analysis.
Specifically, here we use the Mean Shift algorithm [5]. As shown in
Figure 11, similarly to other OSN, the optimal number of circles for
the egos in our datasets is five.
When looking at the composition of circles (Figure 12), we obtain
average values that are very close to the sizes of social groups (1.5,
5, 15, 50, and 150) predicted by Dunbar for offline social networks.
While the layer sizes for OSN were found to be typically smaller
than those in offline social networks [7], the journalists group seems
instead to mimic very closely the offline dynamics. Specifically,
the sizes of the two layers are slightly larger than in the model.
Note, however, that this might depend on the specific clustering
algorithm used. Similar deviations across clustering techniques
have been observed also before [7]. On the other hand, the sizes of
the two outermost layers are significantly larger for journalists than
for generic users [7] and politicians [3]. Remarkably, the average
size of the entire ego network is very close to the first empirical
observation (∼ 130) that validated the social brain hypothesis and
provided evidence for the reference size of 150 alters [10].
Figure 13 shows the scaling ratios between adjacent circles, con-
firming the remarkable match with the characteristic value of 3
commonly found in the related literature.
Figure 9: Histogram of number of alters per ego
6While the initial filtering used in [7] is different from the one discussed in this paper
(Section 2.2), the comparison between the two sets of results is still meaningful. In fact,
the filtering in [7] (whereby only users with an average of more than 10 interactions
per month are kept) tends to retain only very active users, thus it might overestimate
the social interactions of generic users. However, our results indicate that journalists
tend to be even more engaged than this active subset of generic users.
5
Figure 11: Optimal number of circles per ego (red line: aver-
age, blue line: median)
0.00000.00050.00100.0015010002000# alters per egop(x)0.0000.0020.0040.0060200400# alters per ego (active)p(x)02550751001234567891011Optimal number of circles# egosFigures 14 and 15 show the values of these indices in each of
the five rings. They reveal very stable layers, in which the compo-
sition does not change much and in which jumps between rings
are very few. This is in stark contrast with the results obtained for
the politicians in [3]. In fact, politicians features low stability in all
rings (but especially in the inner most ones), and their jump index
is high. We conjecture that journalists may use Twitter less as a
leverage to win people over and more as a social communication
tool. Further analyses are required to substantiate this claim.
Figure 12: Distribution of circle sizes
Figure 14: Average Jaccard index per ring
Figure 15: Average jump index per ring
3.3 Social tweets and hashtags
It is reasonable to expect the social tweets generated by journalists
to be frequently topic-driven. In order to investigate whether this
is the case, in this section we study the relation between alters and
hashtags. In Figure 16, we show the histogram of the percentage
of relationships activated by hashtag per ego. A relationship is
considered activated by a hashtag if the first interaction between the
ego and the alter contains a hashtag. The average in the journalists
dataset is 36%, while for generic Twitter users is around 6% and for
politicians is around 15% [3]. Hence, the Twitter relationships of
journalists are very much information-driven.
Figure 17 shows how the activation by hashtag impacts on the
different rings. Ring R1 is the most affected, and this was also true
for the politicians dataset studied in [3]. However, while the impact
of activation-by-hashtag decreases progressively in the outer rings
of politicians, it remains stable for journalists. This is again a confir-
mation that journalists engage on Twitter in an information-driven
way, although, as shown by Figures 14 and 15, the set of alters with
which they communicate is very stable, contrarily to politicians
and generic users. Figure 18 shows that there is not a significant
difference in contact frequency between alters whose relationship
is activated by hashtags and those for which it is not. However,
relations that are activated by hashtags tend to use hashtags signif-
icantly more often also in future interactions (Figure 19).
Figure 13: Distribution of scaling ratios
3.2 Dynamic ego networks
The dynamic analysis of ego networks focuses on their evolution
over time. Specifically, snapshots of one year are considered 7, each
being shifted forward by one month with respect to the previous
one. For each snapshot we focus on the alters that are members
of each ring, where a ring is defined as the portion of circle that
excludes its inners circles.
The overlapping between the members of the same ring across
different snapshots is measured using the Jaccard index. The Jaccard
index is obtained dividing the cardinality of the intersection set
by the cardinality of the union set. The closer this index to 1, the
better the overlapping. The amount of movements between rings is
measured through the Jump index, which simply counts (and then
averages across all alters in the ring) the number of jumps between
rings.
7Hence, egos for which we observe less than two years of tweets are filtered out
6
2.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.892.8946.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.4246.427.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.247.24134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.48134.4818.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.3418.34C4C5C1C2C30501001502000200400051001020304003060900.000.010.020.030.040.000.030.060.090.120.0000.0010.0020.0030.0040.0050.00.10.20.0000.0050.0100.015# alters per circlep(x)2.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.792.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.642.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.62.63.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.063.06ratio_C4_C3ratio_C5_C4ratio_C2_C1ratio_C3_C22460369036924680.00.10.20.30.40.50.00.10.20.30.40.00.10.20.30.40.00.20.40.6ratiop(x)0.000.250.500.75R1R2R3R4R5Jaccard index0.00.10.20.30.4R1R2R3R4R5Jump indexFigure 16: Histogram of the percentage of relations activated
by hashtags (in red: mean, in blue: mean for generic Twitter
users)
Figure 19: Mean number of hashtags per alter in ring
and also with respect to politicians. This suggests that journalists'
engagement on Twitter is mostly information-driven.
ACKNOWLEDGMENTS
This work was funded by the SoBigData project. The SoBigData
project has received funding from the European Union's Horizon
2020 research and innovation programme under grant agreement No
654024.
Figure 17: Average percentage of relations activated by hash-
tags per ring with confidence intervals
Figure 18: Contact frequency per ring
4 CONCLUSIONS
In this work we have studied the properties of ego networks for
a set of the most popular Italian journalists. We have found that
the structural patterns of their ego networks mirror those of offline
social networks, even more closely than those of generic Twitter
users. In particular, both the circle sizes and the circle scaling ra-
tios are very close to the findings from the offline social network
literature. Differently from what has been observed for politicians
on Twitter, the composition of the circles is quite stable. Journal-
ists stand out in terms of relationships activated by hashtags and
number of hashtags per alter, both with respect to generic users
7
REFERENCES
[1] Sinan Aral and Marshall Van Alstyne. 2011. The diversity-bandwidth trade-off.
Amer. J. Sociology 117, 1 (2011), 90–171.
[2] Valerio Arnaboldi, Marco Conti, Andrea Passarella, and Robin Dunbar. 2013. Dy-
namics of personal social relationships in online social networks. In Proceedings
of the first ACM conference on Online social networks - COSN '13. ACM Press, New
York, New York, USA, 15–26.
[3] Valerio Arnaboldi, Andrea Passarella, Marco Conti, and Robin Dunbar. 2017.
Structure of Ego-Alter Relationships of Politicians in Twitter. Journal of Computer-
Mediated Communication 22, 5 (2017), 231–247.
[4] Lily Canter. 2015. Personalised Tweeting. Digital Journalism 3, 6 (2015), 888–907.
[5] Dorin Comaniciu and Peter Meer. 2002. Mean shift: A robust approach toward fea-
ture space analysis. IEEE Transactions on pattern analysis and machine intelligence
24, 5 (2002), 603–619.
[6] RI Dunbar. 1998. The social brain hypothesis. Evolutionary Anthropology 9, 10
(1998), 178–190.
[7] R.I.M. Dunbar, Valerio Arnaboldi, Marco Conti, and Andrea Passarella. 2015. The
structure of online social networks mirrors those in the offline world. Social
Networks 43 (2015), 39–47.
[8] Martin Everett and Stephen P Borgatti. 2005. Ego network betweenness. Social
networks 27, 1 (2005), 31–38.
[9] Bruno Gonçalves, Nicola Perra, and Alessandro Vespignani. 2011. Modeling
users' activity on twitter networks: Validation of dunbar's number. PloS one 6, 8
(2011), e22656.
[10] Russell A Hill and Robin IM Dunbar. 2003. Social network size in humans. Human
nature 14, 1 (2003), 53–72.
[11] Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. 2007. Why we twitter:
understanding microblogging usage and communities. In Proceedings of the 9th
WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network
analysis. ACM, 56–65.
[12] Nan Lin, Karen S Cook, and Ronald S Burt. 2001. Social capital: Theory and
[13] Christopher McCarty. 2002. Structure in personal networks. Journal of social
research. Transaction Publishers.
structure 3, 1 (2002), 20.
[14] Daniele Quercia, Licia Capra, and Jon Crowcroft. 2012. The Social World of
Twitter: Topics, Geography, and Emotions. ICWSM 12 (2012), 298–305.
[15] Frank Michael Russell, Marina A Hendricks, Heesook Choi, and Elizabeth Conner
Stephens. 2015. Who Sets the News Agenda on Twitter? Journalists' posts during
the 2013 US government shutdown. Digital Journalism 3, 6 (2015), 925–943.
[16] Alistair Sutcliffe, Robin Dunbar, Jens Binder, and Holly Arrow. 2012. Relationships
and the social brain: integrating psychological and evolutionary perspectives.
British journal of psychology 103, 2 (2012), 149–168.
[17] Andranik Tumasjan, Timm Oliver Sprenger, Philipp G Sandner, and Isabell M
Welpe. 2010. Predicting elections with twitter: What 140 characters reveal about
political sentiment. Icwsm 10, 1 (2010), 178–185.
36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%36%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%5.9%012340%25%50%75%% of relations activated by hashtagsp(x)0%10%20%30%40%12345Ring% of relations activated by #tags0204012345RingContact frequency [tweets/year]Activated by hashtag?FALSETRUE05010015012345RingMean # of hashtags per relationActivated by hashtag?FALSETRUE[18] W-X Zhou, D Sornette, R a Hill, and R I M Dunbar. 2005. Discrete hierarchical
organization of social group sizes. Proceedings. Biological sciences / The Royal
Society 272, 1561 (2005), 439–444.
8
|
1702.07752 | 1 | 1702 | 2017-02-24T20:45:02 | A supervised approach to time scale detection in dynamic networks | [
"cs.SI",
"cs.LG"
] | For any stream of time-stamped edges that form a dynamic network, an important choice is the aggregation granularity that an analyst uses to bin the data. Picking such a windowing of the data is often done by hand, or left up to the technology that is collecting the data. However, the choice can make a big difference in the properties of the dynamic network. This is the time scale detection problem. In previous work, this problem is often solved with a heuristic as an unsupervised task. As an unsupervised problem, it is difficult to measure how well a given algorithm performs. In addition, we show that the quality of the windowing is dependent on which task an analyst wants to perform on the network after windowing. Therefore the time scale detection problem should not be handled independently from the rest of the analysis of the network.
We introduce a framework that tackles both of these issues: By measuring the performance of the time scale detection algorithm based on how well a given task is accomplished on the resulting network, we are for the first time able to directly compare different time scale detection algorithms to each other. Using this framework, we introduce time scale detection algorithms that take a supervised approach: they leverage ground truth on training data to find a good windowing of the test data. We compare the supervised approach to previous approaches and several baselines on real data. | cs.SI | cs | A supervised approach to time scale detection in dynamic networks
Benjamin Fish∗
Rajmonda S. Caceres†
February 28, 2017
7
1
0
2
b
e
F
4
2
]
I
S
.
s
c
[
1
v
2
5
7
7
0
.
2
0
7
1
:
v
i
X
r
a
Abstract
For any stream of time-stamped edges that form a dynamic
network, an important choice is the aggregation granularity
that an analyst uses to bin the data. Picking such a win-
dowing of the data is often done by hand, or left up to the
technology that is collecting the data. However, the choice
can make a big difference in the properties of the dynamic
network. This is the time scale detection problem. In pre-
vious work, this problem is often solved with a heuristic as
an unsupervised task. As an unsupervised problem, it is dif-
ficult to measure how well a given algorithm performs. In
addition, we show that the quality of the windowing is de-
pendent on which task an analyst wants to perform on the
network after windowing. Therefore the time scale detection
problem should not be handled independently from the rest
of the analysis of the network.
We introduce a framework that tackles both of these is-
sues: By measuring the performance of the time scale de-
tection algorithm based on how well a given task is accom-
plished on the resulting network, we are for the first time
able to directly compare different time scale detection algo-
rithms to each other. Using this framework, we introduce
time scale detection algorithms that take a supervised ap-
proach: they leverage ground truth on training data to find
a good windowing of the test data. We compare the super-
vised approach to previous approaches and several baselines
on real data.
1 Introduction
Much big data mining on social and other types of networks
either requires information about dynamics or is improved
by such information.
Incorporating temporal information
can improve the efficacy and lead to more detailed analyses.
As data collection becomes cheaper and easier, the rate
at which the data is being collected is often orders of mag-
nitude more frequent than the underlying system. The rate
of the data collection process is typically a function of the
technology used and not necessarily related to the evolution
or dynamics of the network itself. Thus the data collection
∗University of Illinois at Chicago, Department of Mathematics,
†MIT Lincoln Laboratory, Lexington, Massachussetts
Statistics, and Computer Science, [email protected]
process makes a choice about the bin size - also called the
resolution, aggregation granularity, or time scale of the dy-
namic network - that may not be the correct choice. Binning
the data at courser resolutions may make it possible to dis-
tinguish between noisy local temporal orderings and critical
temporal orderings in the network. Indeed, the time scale of
the network strongly impacts what structures and dynamics
may be observed in the network [3, 12, 17]. Moreover, the
choice of time scale impacts the efficacy of data mining on
networks [8]. Thus for any data mining task over dynamic
networks, choosing the bin size is not only important, but
a necessary choice the data scientist must make, and leav-
ing it up to the data collection process is not ideal. This is
the problem we take up in this paper, variously called time
scale detection, generating graph snapshots, oversampling
correction, temporal scale inference, aggregation granularity
detection, or windowing detection. We will refer to it as win-
dowing to emphasize the fact that the bin sizes - or windows
- may not necessarily all be the same size.
This problem is marginally related to change point de-
tection, which is the problem of detecting when the network
changes drastically, inducing a segmentation of the sequence,
and is only a matter of degrees away from windowing detec-
tion, which also asks for a segmentation. Implicitly, however,
change point detection assumes the network is observed at
the right time scale.
Typically, the windowing problem is framed as an unsu-
pervised task. If the goal is data exploration and it is unclear
how we will use the data in the future, then unsupervised
windowing may be sufficient. On the other end of the spec-
trum, if sufficient knowledge of the data is at hand, the time
scale may be chosen manually to represent natural scales,
such as the diurnal or weekly scales natural for dynamics
among people. However, frequently, getting such domain-
knowledge through a data exploration phase or otherwise
may be prohibitively difficult or expensive. Moreover, we
will demonstrate that the best windowing often cannot be
defined independently of the analytical task.
In this paper, we show that the time scale for a dynamic
network depends on the task - the most appropriate choice of
scale for predicting new links appearing in the network may
be different than the appropriate choice for detecting change
points in the network, for example. The intuition is that the
information needed to predict new links is different than the
1
information needed to detect change points. This insight
may appear quite intuitive, but it runs contrary to many
approaches for problems typically framed as unsupervised.
This informs our approach towards windowing: we set up
the windowing problem as a supervised machine learning
task. For example, for detecting change points, we set aside
earlier training data from the network with labeled change
points. We then find the right time scale for this labeled
data, and apply the time scale to new data to find the change
points there. In other words, the windowing algorithm takes
as a parameter the desired task, such as change point detec-
tion, and finds the right time scale for that task on the input
data. Of course, the downside to this approach is that it re-
quires training data, such as labeled change points on past
data. However, we regard this as both a natural assumption
and a necessary assumption: Many popular prediction and
classification problems have some notion of ground truth. In
addition, since the best time scale depends on the task any-
way, we might as well tailor our time scale detection towards
a particular goal.
In this paper, we consider link prediction, attribute predic-
tion, and change point detection. We use these three tasks
as popular examples of tasks analysts perform on dynamic
networks that have some notion of ground truth.
Our contributions are as follows: In addition to giving evi-
dence that the best windowing of the data is task-dependent,
we, for the first time, describe a simple framework for di-
rectly comparing the performance of windowing algorithms
that leverages task-dependency. We also introduce window-
ing algorithms that takes a supervised-machine-learning ap-
proach. We compare our approach against several baselines
and previous work. We demonstrate that this supervised ap-
proach is often superior to other approaches, but that like all
supervised approaches in machine learning, its quality may
be dependent on the quality of the training data.
1.1 Previous Work
In numeric time series, this problem is often termed 'seg-
mentation,' and segmentation of numeric times series has a
long history which is outside the scope of this work; see [10]
for an overview.
For dynamic networks, there has been some work related
to our problem in the area of change point detection, which
seeks to find points in time where the dynamic network has
changed abruptly. Typical methods include using genera-
tive models of dynamic networks [16] or clustering similar
time slices [2]. This literature is marginally different from
the problem addressed in this paper because - while finding
change points do implicitly segment the dynamic network -
the goal of change point detection is not necessarily to find
a good representation of the network for the purpose of bin-
ning each segment but rather just to find the points when
the dynamic network undergoes significant change.
Also related is graph compression, which tries to find a
representation of the dynamic network that minimizes the
bits needed to store it while simultaneously retaining suffi-
cient information about the network, under the general head-
ing of graph summarization algorithms. See [14] for a survey
of graph summarization techniques. This approach has been
applied, more generally, to multi-layer networks, dynamic or
not [6]. This problem is also slightly different from ours
because we do not necessarily seek a small representation,
merely an accurate representation for the task at hand.
Meanwhile, previous work on our problem has focused
either on task-independent heuristics or methods that at-
tempt to optimize for a specific metric on graphs. Caceres
et al. maps the dynamic network to a time series using a
metric on graphs (such as the number of triangles in each
graph) and then determines time scale by finding the scale
at which the time series' compression ratio and variance is
balanced [21]. Soundarajan et al. determines a windowing of
the data with respect to some metric (such as the exponent
of the degree distribution) by measuring when that metric
has converged [20]. In our view, these approaches have the
downside that they require a specific metric. For a given data
set or task to accomplish on a data set, it is not necessarily
clear what metric to choose. Darst et al. use a parameter-
free approach that seeks to find an appropriate time scale by
measuring the similarity between graphs using the Jaccard
index [5]. Most closely related to the approach that we take
in this paper, Fish and Caceres use the quality of the per-
formance of link prediction algorithms to determine the best
time scale [8]. These are parameter-free methods or, relat-
edly, methods that assume that there is some 'ground-truth'
time scale via a generative model or the like, as in [3, 5, 8]. In
this paper, we do not take this tactic because as we demon-
strate, choice of time scale may be dependent on the task at
hand, which functions as a parameter for the problem.
1.2 Background
Consider a dynamic network over a fixed set of vertices
V , represented as a stream of time-stamped edges. The
goal of windowing is to segment this input stream of edges
into (possibly overlapping) intervals to form a sequence of
graphs H1, . . . , Hm, each graph representing all of the edges
that occurred within each interval. Representing the input
edge stream as a sequence of graphs G1,. . . ,GT , a window
of size k is a sequence Gi, Gi+1, . . . , Gi+k−1. A window-
ing is a sequence of windows {G1, . . . , Gk1},{Gk1 + 1, Gk1 +
2, . . . , Gk2}, . . . ,{Gkm−1 , . . . , GT}. In general, it is possible
to also consider windows that overlap, but in this paper we
focus on non-overlapping windows. The resulting sequence
is H1, . . . , Hm, where Hi = ∪ki
j=ki−1+1Gj. It is possible to
consider other functions mapping a window to the resulting
graph Hi, but we only consider the simple union in this pa-
per. As a slight abuse of notation, we will refer to both the
segmentation of the input graph sequence and the resulting
2
sequence H1, . . . , Hm as a windowing.
If all windows have the same size w (except possibly the
last window if the length of the sequence does not divide w),
we refer to this as a uniform windowing and w the bin size,
window size, or time scale. A window size of w = 1 repre-
sents the time scale of the collection process and a window
size of w = T , where T is the duration of the observed net-
work, means that all temporal information is ignored. The
goal of this paper is to describe and evaluate windowing al-
gorithms, i.e. algorithms for finding a windowing given an
input sequence of graphs. As pointed out in [8, 20, 21], too
small a window size may introduce noise and lack the struc-
ture necessary for analysis but too large a window size may
lose important temporal information.
Once we have found a windowing H1, . . . , Hm, it can now
be the input for any task that operates over a dynamic net-
work. We consider three popular tasks: link prediction, at-
tribute prediction, and change point detection.
In this paper, we consider a supervised approach: the best
windowing is the windowing that maximizes the performance
of the algorithm for a given task, which we will refer to as
the task algorithm. This gives us a way to compare differ-
ent windowing algorithms: we evaluate the performance of
the windowing algorithm by evaluating the performance of
the task algorithm on a test set. In general, we are given
the edges of a dynamic network up to some time t as a
training set, and performance is evaluated on the dynamic
network from time t + 1 onwards. The windowing algorithm
gets ground truth on the training set, e.g. the change points
that occurred, and the task algorithm uses only the win-
dowed graph sequence to conduct its analysis, say finding
the change points in the test set.
2 Tasks
Given a candidate windowing, we evaluate its quality by per-
forming a learning task algorithm on that windowing. We
then evaluate the windowing by the performance of the task
algorithm when using that windowing. We consider three
task algorithms:
link prediction, attribute prediction, and
change point detection. We treat link prediction as an online
task, and attribute prediction and change point detection as
offline tasks. We do this to demonstrate windowing algo-
rithms on both kinds of tasks. In what follows, we describe
the algorithms we use for each task and how we judge their
performances.
2.1 Link prediction
While there are many methods for link prediction (see [1]
for a survey), the method we use is a simple scoring function
that scores every pair of vertices by how likely an edge is to
appear between them. In this paper, we use the Katzβ score,
an efficient and well-performing score [13]. β is a damping
parameter that weights shorter paths exponentially higher
than longer paths in the most recent graph in the input
sequence. For our experiment results, we use β = 0.005,
which has been used before [8, 13].
The performance of the link prediction algorithm is eval-
uated using the AUC of the precision-recall curve, as recom-
mended by [23], averaged over all predictions made, one set
of predictions for each graph.
2.2 Attribute prediction
We use the Time Varying Relational Classifier (TVRC) algo-
rithm of Sharan and Neville [19] to determine the unknown
value of a binary vertex attribute. As in their work, we as-
sume attributes do not change over time. The goal is then to
infer the missing attribute values by taking advantage of not
only the known attribute values of the vertices but also by
using the temporal information in the data. Their method
is a Bayesian model that takes advantage of knowledge of
attributes in a vertex's neighborhood. This model uses the
time stamps to weight the influence each vertex has on its
neighbors. In our implementation, we use add-one smooth-
ing for categorical features and a Gaussian distribution for
continuous features. The goal is then to find a windowing
where TVRC builds the best performing model. TVRC re-
quires a kernel for weighting the importance of edges - as
they suggest, we use their exponential kernel (1 − θ)t−iθ,
where t is the total time, i the current time, and θ a hy-
perparameter controlling the rate of decay (for the sake of
simplicity, we set θ = 1/2 without also trying to optimize
this parameter).
We use a special form of leave-one-out testing to mea-
sure the performance of TVRC. In this setting, the target
attribute of one of the vertices is removed from both train-
ing and testing, a model is trained with the training set, and
gives a prediction for the value of the missing attribute using
the test set. To make the problem harder and more realistic,
instead of just removing one target attribute, we remove a
whole batch of them at once, and use the trained model to
predict the values of all of their target attributes. The vertex
set is partitioned into batches using a batch size parameter
b, and this is repeated for each batch. Once a prediction has
been made for all batches, we measure the performance or
TVRC as the standard AUC of the ROC curve.
In link prediction, the goal is to predict the edges that are
most likely to appear in the future. In the online setting,
at every time step, our goal is to predict the edges that will
appear in the next time step (the next step in the initial
input sequence before windowing).
2.3 Change point detection
We use Graphscope, from Sun et al. [22]. Graphscope detects
change points by estimating the times where segmenting the
graph sequence at those times maximizes compressibility.
3
Since our graphs are not bipartite, we make the necessary
modifications to Graphscope so that it may be used in the
non-bipartite case.
In order to evaluate a change point detection algorithm,
we need a single score summing up how good a set of change
points are, but to the best of our knowledge no such measure
has been proposed in the literature, contrary to classification
tasks, which frequently use AUC or other single values to
summarize quality. We will need a single score rather than,
say, a precision-recall curve, not only to evaluate, but also
because our supervised windowing algorithm will need a sin-
gle score to directly and automatically compare the quality
of different window sizes.
To rectify this, we propose the following measure: Let
t1, . . . , tk be the times of the ground-truth events, and
s1, . . . , s(cid:96) the times of the proposed events. Let n be the
length of the sequence and δ(x) the function that equals 1 if
x is true and 0 otherwise. Peel and Clauset [16] propose the
following notions of precision and recall:
(cid:88)
(cid:88)
1
(cid:96)
i
Precision(d) =
Recall(d) =
1
k
si − tj ≤ d)
δ(inf
j
si − tj ≤ d).
δ(inf
i
j
We will define the AUC of the precision-recall curve as the
normalized volume under the curve given by Precision(d)
and Recall(d) as d goes from 0 to n. Consider the set of
distances {si − tj : i, j} ∪ {0, n}, ordered from smallest to
largest as d1 < . . . < dm, so d1 = 0 and dm = n. Then
PR-AUC is defined as
(di+1 − di) · Precision(di) · Recall(di).
m−1(cid:88)
i=1
1
n
For the sake of completeness, if k = 0 or (cid:96) = 0, we define
the PR-AUC to be 0. Note this is a [0, 1]-valued measure.
3 Experimental Setup
We now describe how we test the performance of windowing
algorithms.
In the offline setting, we set aside a previous
interval of the dynamic network for training, and the next
interval for testing. The training interval includes ground-
truth information. For example for change point detection, it
includes any change points that occurred in that interval. A
windowing algorithm may use this information to decide on
a window size to use in the test set. A windowing algorithm,
uniform or otherwise, is also allowed to see the edges in the
test set to determine the windowing for the test set, but of
course no ground truth information about the task.
Once the test set is windowed, we perform our task on the
windowed data and measure its performance, as describe in
Section 2. The windowing algorithm's score is then just the
score that the task algorithm received. For each data set, we
4
split it up into six consecutive intervals, and then do train-
ing and testing on consecutive intervals, where the previous
test set becomes the next training set, so there are five total
tests1. We do this in order to promote generalizability of our
results. For change point detection, we merely average the
scores over each of the tests. For attribute prediction, we
use pooling: we take the AUC as described in Section 2 over
all vertices in all test sets, instead of averaging the individ-
ual AUC's of each test set, because the population, i.e. the
vertices, is the same in each test set.
In the online setting, a new graph from the initial input
sequence is given to the windowing algorithm, and the win-
dowing algorithm must make a decision as to how to in-
corporate the new graph into the windowing so far. After
windowing, a prediction is made, and then the process is
repeated. Since the link prediction algorithm we use only
ranks the likelihood of an edge appearing rather than de-
termining the number of new links, we only do this process
for those time steps where at least one new edge appears.
The score for the windowing algorithm is the average over
all scores received for each prediction. As in the offline set-
ting, we split each data set into six consecutive intervals and
then do training and testing on each pair of intervals, where
the testing phase is online.
4 Data sets
We use five data sets: Enron, MIT Reality Mining, Badge,
Hypertext09, and Haggle. We treat all of these as undirected
dynamic networks. For both convenience and uniformity,
we bin each of these data sets at a initial window size at a
'natural' size, i.e. a choice that a data analyst might make,
such as an hour or a day. This is so that a window size of
w = 1 represents a baseline representing how well a hand-
chosen windowing would perform. We only consider window
sizes at least as large as this baseline.
Each of these are suitable for link prediction. Of these,
Enron, Reality Mining, and Badge are equipped with vertex
attributes in order to test attribute prediction, and of these,
Enron and Reality Mining also have established change point
information.
4.1 Enron
This is an email network between employees of Enron Inc.
from January 1999 to July 2002, during the period of Enron's
market manipulation scandal and subsequent collapse [11].
We use the emails of 151 employees, where each edge is an
email sent from one of those employees to another. Each
vertex, representing an employee, have a binary attribute
indicating whether the employee was a manager or not, and
1For Reality Mining, on change point detection, we split it into five
instead of six intervals, in order to have every training set contain at
least one change point.
Table 1: The score in the ith row and jth column is the score for the jth task if the window size is chosen to maximize the
score for the ith task. The first three columns are for the Enron data set, the last three are for the Reality Mining data set.
Scores are averaged over the different intervals of the data.
Link prediction Attr. prediction CP detection
Link prediction Attr. prediction CP detection
Enron
Reality Mining
Link prediction
Attr. prediction
CP detection
0.188
0.163
0.141
0.599
0.649
0.609
0.572
0.540
0.935
0.277
0.220
0.258
0.961
0.983
0.961
0.778
0.340
0.945
Table 2: Spearman correlation coefficients and p-values for each pair of tasks.
Link prediction
Attribute prediction
CP detection
& Attribute prediction
& CP detection
& Link prediction
Enron
Reality Mining
(0.093, 0.005)
(-0.050, 0.493)
(0.233, 5.11e-13)
(-0.188, 0.010)
(-0.355, 4.19e-29)
(-0.071, 0.330)
fifty integer-valued attributes, which are the number of oc-
currences in each employee's outgoing emails of the top fifty
words used in all emails (a list of stop words were excluded
from the top fifty words). The attribute we test on for at-
tribute learning is whether the employee was a manager or
not, which we took from [4]. We use the change points
from [16], which represent times when the emails undergo
substantial shifts, such as the launch of Enron online and
changes in the CEO position. The initial bin size is one day.
4.2 Reality Mining
This is a proximity network of 90 MIT students and faculty
using data taken from cell phones from September 2004 to
May 2005 (we only use data up until the end of the academic
year) [7]. We use as edges both phone calls between partici-
pants and whenever two participants are close to each other,
detected using Bluetooth. Each of the participants filled out
a survey about their cell phone usage, such as how much
they use their cell phone, where they live etc., which we use
as the categorical attributes for each vertex. The attribute
we use for testing attribute prediction is whether they are
part of the business school or the MIT Media Lab. Change
points are taken from [16], which are the start and ends of
vacations, semesters, etc. The initial bin size is one day.
4.3 Badge
This is a proximity network of 23 employees at a data server
configuration firm for a month (the name of the data set
comes from the badges the employees wore to track their
location at the workplace) [15]. Each edge represents when
two employees are in close proximity to each other, repre-
senting an interaction. Each employee was assigned a certain
number of tasks, and data about these tasks was recorded,
e.g. average completion time, whether they took on a dif-
ficult task or not, etc. For attribute prediction, we predict
whether or not they made an error in one of their tasks. The
initial bin size is one hour.
4.4 Haggle Infocomm
This is a proximity network consisting of
interactions,
recorded using Bluetooth, among attendees at an IEEE In-
focomm conference over four days [18]. 41 attendees partic-
ipated in this network. The initial bin size is 10 minutes.
4.5 Hypertext09
This is another proximity network of attendees at the ACM
Hypertext 2009 conference, held over three days [9]. Each
vertex is one of the 113 attendees, and an edge represents
a interaction between two attendees that was active for at
least 20 seconds. The initial bin size is 10 minutes.
5 Task dependence
Ideally, it would be nice to have just one windowing algo-
rithm that performs well regardless of whether your goal is
link prediction, attribute prediction, change point detection,
or any other task. However, we demonstrate that this does
not appear to be feasible while still maximizing the perfor-
mance of the task algorithm.
To do this, we score each window size by the performance
of each of the three task algorithms when the data set is
windowed at that size, so we have a score representing the
quality of the window size for each of the three tasks. Ta-
ble 1 show the score for the ith task, if you chose the window
size with the highest score for the jth task. (Scores are com-
puted for each of the intervals as described in Section 3 and
5
the values in Table 1 are the average of the results for each
interval). For example, choose the best window size for link
prediction. The table shows that at that window size the
other two tasks do not achieve as high a score as if you had
chosen the best window size for those two tasks. This means
that the windowing algorithm should choose a different win-
dow size for each of the tasks in order to maximize score.
This effect is not limited to just the top-scoring window
size. More generally, the scores between two tasks do not
positively correlate with each other, so that a higher score
for a given window size on the first task does not necessarily
mean a higher score for that window size on the second task.
In order to demonstrate this, we use Spearman's correlation
coefficient, which tests the monotonicity between two vari-
ables. A negative score indicates anti-correlation, a score
of 0 indicates no correlation, and a positive score indicates
positive correlation. Table 2 show the correlation coefficients
and their associated p-values for each pair of tasks: most of
them are either negative or close to zero, indicating little
correlation between the tasks. This is further evidence that
the quality of window sizes depend on the task, and hence
that we should use the task as supervision for windowing.
6 Windowing algorithms and baselines
We now describe the windowing algorithms that we will com-
pare in both the offline and online settings. So that the su-
pervised algorithms we introduce remain useful for not just
the three tasks we consider, but any task, our algorithms do
not attempt to take advantage of the particular nature of the
task and corresponding algorithm at hand. In other words,
we treat the task algorithms as black boxes. However, as we
show in Section 7, the supervised approaches are still able
to perform well despite this self-imposed constraint.
6.1 Offline supervised algorithms
Our intuition is very simple: since we know what task we
want to accomplish on the test set, we use the same task
algorithm to learn the window size on the training set. In
the offline setting, in order to try to prevent overfitting and
to make the search space smaller, we only consider uniform
windowings. This allows the algorithm to be very simple:
For each window size, up to the length of the training set,
window the training set at that size and use that as input for
the task algorithm. Measure the performance of the task al-
gorithm (remember we assume we have ground truth for the
training set) and use that as the score for the window size.
Window the test set with the window size that received the
highest score. Of course, this means running the task algo-
rithm O(T ) times (where T is the length of the training set),
which is not particularly efficient. However, we make the as-
sumption that since this is an offline setting, this blowup in
running time in the training phase is not prohibitively large.
We will refer to this as the offline supervised method.
Among the three tasks, the attribute prediction algorithm
has an important difference, in so much as that it requires
training data to build a model. We therefore need to make
sure to decouple the training data for the model and the
training data used to find the best window size. To do this,
we split the training data into two, use the first half as the
data for the model, and the second half of the training data
to test out how well the model does when windowed at each
window size. We do this by taking the vertices that still have
the value of the target attribute and using the same process
we use to test the quality of the attribute prediction on the
test set: remove them in batches, build the model at each
window size, and then test which value TVRC predicts on
the second half of the training data. As described above, we
then use the AUC as the quality of that window size.
Algorithm 1 Online windowing for link prediction
Parameters: Integers M and B, Link predictor L
Initialize scoresw as the empty list
for each new graph Gi do
Let new window sizes include w for 1 ≤ w < i if
length(scoresw) < M
Let best window sizes include the top B window sizes
by average(scoresw)
for w in new window sizes, best window sizes do
w (cid:101) be the windowing of
Let Hw = H1, . . . , H(cid:100) i−1
G1, . . . , Gi−1 at window size w
predicted links = L(Hw)
Append AUC(new links in Gi, predicted links) to
scoresw
end for
w∗ = arg maxw average(scoresw)
Let Hw∗ = H1, . . . , H(cid:100) i
G1, . . . , Gi at window size w∗
return L(Hw∗ )
w∗ (cid:101) be the windowing of
end for
6.2 Online supervised algorithms
In the online setting, we could at each time step perform
a similar procedure as in the offline case, leading to O(i)
runs of the task algorithm at the ith step, for a total of
O(T 2) times, where T is the total length of the sequence.
This will often be prohibitively expensive. We introduce
an approximate online windowing algorithm to deal with
this issue. We illustrate with link prediction, as a natural
example of an online task.
Every time we receive a new graph Gi, representing the
edges that occurred in the next time step, we can test each
window size w by binning the sequence so far at size w and
then use the last graph in the windowed sequence to predict
the edges that will appear in Gi. We then compare the
6
Table 3: Performance of each of the algorithms on five data sets with respect to link prediction.
Enron Reality Mining Badge Hypertext Haggle
Random
Hand-picked
Weighted Algorithm 1
Algorithm 1
Training only
ADAGE
0.101
0.148
0.178
0.153
0.159
0.149
0.202
0.266
0.263
0.259
0.240
0.198
0.208
0.619
0.482
0.428
0.418
0.394
0.049
0.146
0.116
0.100
0.065
0.044
0.195
0.485
0.443
0.475
0.437
0.298
Table 4: Performance of each of the algorithms on three data
sets with respect to attribute prediction.
Table 5: Performance of each of the algorithms on two data
sets with respect to change point detection.
Enron Reality Mining Badge
Enron Reality Mining
Random
Hand-picked
Supervised
No time
Fourier
Jaccard
Entropy
ADAGE
0.566
0.560
0.587
0.584
0.567
0.576
0.555
0.564
0.966
0.960
0.974
0.971
0.967
0.973
0.970
0.973
0.583
0.646
0.656
0.568
0.568
0.571
0.562
0.572
Random
Hand-picked
Supervised
Fourier
Jaccard
Entropy
ADAGE
0.660
0.700
0.649
0.657
0.649
0.709
0.766
0.609
0.643
0.490
0.405
0.361
0.891
0.356
predicted edges to the actual edges in Gi, producing an AUC
score for that window size2. The window size w∗ chosen next
to bin the sequence seen so far including Gi is the window
size that maximizes the average of all scores for that window
size so far. However, this still means testing O(i) window
sizes at each time step, for a total of O(T 2) tests.
To decrease the number of tests, we instead use an approx-
imate version of this where only some of the window sizes are
tested, as described in Algorithm 1. This online algorithm is
described explicitly for link prediction, but it is worth noth-
ing that the same algorithm may in principle be used for
any online task. Given hyperparameters to the algorithm
M and B, we test a window size if it has either been tested
fewer than M times, or if the average score so far ranks it
amongst the top B window sizes. The intuition behind this
approach is that a window size that has been performing
badly will not suddenly become the best performing win-
dow size, and thus doesn't need to be tested. This requires
only O(M · B · T ) total runs of the link prediction algorithm
instead of O(T 2), where we think of as M and B as con-
stants. In our experiments, we set M = B = 10 (We also
demonstrate the effect of changing these hyperparameters in
Section 7). We also test a weighted variant of Algorithm 1
(Weighted Algorithm 1) by instead using a weighted average
of the scores for each window size, in order to privilege scores
2For the sake of computational efficiency, we only score pairs of
vertices with non-zero degree, since the Katz score will produce a
score of 0 for all other pairs.
closer to the present than the past. We use an exponential
weighting scheme, where the weight for the score tested on
the jth graph where t graphs have been seen already is αt−j.
For the purpose of our experiments, we use α = 1/2.
We also consider a version of this that stops generating
new scores after the training period is over, and sticks with
the best window size for the training data for all future time
steps (Training only).
6.3 Other windowing algorithms and baselines
We compare against ADAGE, the method of Soundarajan
et al. [20]. ADAGE needs a metric as a parameter, so we
use the exponent of the degree distribution, which is the
metric they use. We also compare against the Jaccard-index-
based method (Jaccard ) of Darst et al. [5] and the entropy-
based method (Entropy) of De Domenico et al. [6]. Since
this method allows for graphs with any types of layers, we
treat each time step as a layer and modify their method to
only allow adjacent time steps to be merged.
We also compare against several baselines: the first is al-
ways using a window size of w = 1, which as mentioned
above, represents a 'hand-chosen' value (which we will re-
fer to as the hand-chosen algorithm). This represents the
window size that an expert might have chosen. The second
baseline is the random algorithm (Random), which chooses a
random windowing of the test set. In addition, for attribute
prediction, we also consider the windowing that removes all
temporal information, i.e. the window size that is always
7
Figure 1: The effect of the hyperparameters B and M on quality for link prediction, where we fix B=10 and vary M , and fix
M = 10 and vary B. The figure on the left is the results on the Badge data set, while the right is the results on the Reality
Mining dataset.
the length of the test sequence (No time). The final base-
line we consider is slightly more sophisticated: Consider a
time series that assigns a real value to every graph in the
sequence. For any such time series, we may compute its
discrete Fourier transform (DFT). For frequency f , denote
by xf the amplitude of that frequency. The score we assign
w is the maximum magnitude xf of any frequency in the
transform such that f rounds to w. Only windows where
there is such a frequency are assigned scores, and we choose
the window size with the maximum score (Fourier ). In this
paper, we consider the DFT under the commonly-used Han-
ning window where the metric is the number of edges in each
graph. This serves as a proxy for the amount of activity at
any given time. The DFT of this particular time series for
dynamic networks has been used before, e.g. to study the
Reality Mining data set [7].
All of these algorithms can be used in the offline setting,
but only ADAGE, the hand-chosen baseline, and the random
baseline can be used in the online setting.
7 Results
Tables 3, 4, and 5 show our results. The supervised approach
does do well, but there are certainly caveats. In link predic-
tion, the 'hand-picked' window size is often the best per-
former, probably due to the fact that these are well-studied
data sets with natural periodicities dictated by human ac-
tivity, and those window sizes reflect that. However, in gen-
eral, we will want to have windowing algorithms that do not
rely on an analyst's knowledge of the data set: acquiring
domain-specific knowledge like this can be time-consuming,
expensive, or difficult. Outside of this approach, at least
one of the supervised methods does the best for all of the
data sets. The weighted version is the overall winner, with
a caveat: like any supervised technique, overfitting is always
going to be an issue. We surmise that this is why the un-
weighted version outperforms the weighted version on the
Haggle data set.
We also test the effect of the hyperparameters B and M ,
shown in Figure 1. As would be expected, by increasing B
or M (which increases the number of window sizes tested)
performance is generally improved. This effect, however, is
extremely weak on the Reality Mining data set. That and
our ability to perform relatively well even for small values of
B and M validates our choice to use small constant values
of B and M to use for Algorithm 1 and forego any attempt
to optimize their values in the course of the windowing al-
gorithm.
In attribute prediction, the supervised approach is the
best performing algorithm, although the absolute difference
over the others is sometimes rather small. On the other
hand, the supervised approach does not do well for change
point prediction. We believe this is due to a limitation of
supervised approaches: they depend on the quality of the
training data. Given the sparsity of change points, each
training set contains only a very small number of change
points, making it difficult to distinguish between different
window sizes. This issue separates change point detection
from our attribute prediction problem, which has a much
greater amount of training data to work with.
Our approach also reveals other differences between the
three tasks. Figure 2 shows the quality of every window
size on each of the first four intervals of Reality Mining (we
don't use the last interval because each interval needs a sub-
sequent interval for testing attribute prediction). The scores
for change point detection are extremely sensitive to window
size, with small differences in size making a large difference,
indicating Graphscope's sensitivity to window size. TVRC,
on the other hand, is much more stable under changes to
window size, with link prediction falling somewhere in the
middle. Such sensitivity makes it much more difficult to
speed up the process by only testing some of the windows
sizes instead of all of them, as we do here. We leave for future
work determining if there is a way to test a fewer number of
window sizes and if the choice of algorithm for a given task
impacts sensitivity to window size.
8
0204060801000.510.520.530.540.550.560.570.58QualityBM51015202530350.240.250.260.270.280.290.300.310.32QualityBMFigure 2: Results for each window size on each interval of the Reality Mining data. Each line corresponds with each of the
four intervals. The left figure shows the quality of each window size for link prediction, the middle for attribute prediction,
and the right for change point prediction.
Our supervised approach makes the basic assumption that
a window size that works well in the past is more likely to
work well in the future. To measure this, Figure 3 shows the
difference between the two scores a window size got on con-
secutive intervals, averaged over all windows and consecutive
intervals. Smaller differences mean that past data reflects fu-
ture data more precisely. Figure 3 shows the difference was
significantly larger for change point detection than the other
two tasks, indicating that this assumption (at least when
using Graphscope) is violated more under this task. This
serves as evidence for why the supervised approach does not
perform as well on change point detection.
8 Conclusion and future work
In this paper, we have given evidence that windowing is task-
dependent. Recognizing this, we have provided a simple and
easy-to-use framework for directly comparing the quality of
windowing algorithms and moreover, introduced supervised
windowing algorithms that leverage our ability to test a win-
dowing. Nonetheless, we leave for future work several chal-
lenges: Like any supervised machine learning, the quality of
the learner depends on the quantity and quality of training
data. Improving windowing algorithms in the face of envi-
ronments with little training data remains an issue. Even
with training data, this can be a computationally-expensive
procedure if the windowing algorithm has to repeatedly in-
voke an expensive task algorithm. We leave for future work
finding heuristics that approximate well how a windowing
will perform for a given task. We also leave for future work
if performance may be improved by considering other kinds
of windowings besides the non-overlapping windowings fo-
cused on in this paper.
Figure 3: For each task, the average difference between qual-
ity of the same window size on consecutive intervals of both
data sets.
References
[1] Mohammad Al Hasan and Mohammed J. Zaki. A sur-
vey of link prediction in social networks. In Social Net-
work Data Analytics, pages 243–275. Springer, 2011.
[2] Michele Berlingerio, Michele Coscia, Fosca Giannotti,
Anna Monreale, and Dino Pedreschi. As time goes
by: Discovering eras in evolving social networks.
In
Pacific-Asia Conference on Knowledge Discovery and
Data Mining, pages 81–90. Springer, 2010.
[3] Aaron Clauset and Nathan Eagle. Persistence and pe-
riodicity in a dynamic proximity network. DIMACS
Workshop on Computational Methods for Dynamic In-
teraction Networks, 2007.
[4] Germ´an Creamer, Ryan Rowe, Shlomo Hershkop, and
Salvatore J Stolfo. Segmentation and automated so-
9
010203040Window size0.120.140.160.180.200.220.240.260.280.30Quality010203040Window size0.900.920.940.960.981.00Quality010203040Window size0.00.20.40.60.81.0QualityLink predictionAttribute predictionChange point detection0.000.050.100.150.200.25Average difference in qualityEnronReality Miningcial hierarchy detection through email network analysis.
In Advances in Web Mining and Web Usage Analysis,
pages 40–58. Springer, 2009.
for automatically measuring organizational behavior.
IEEE Transactions on Systems, Man, and Cybernetics,
Part B (Cybernetics), 39(1):43–55, 2009.
[5] Richard K. Darst, Clara Granell, Alex Arenas, Sergio
G´omez, Jari Saramaki, and Santo Fortunato. Detec-
tion of timescales in evolving complex systems. arXiv
preprint arXiv:1604.00758, 2016.
[16] Leto Peel and Aaron Clauset. Detecting change points
in the large-scale structure of evolving networks.
In
Twenty-Ninth AAAI Conference on Artificial Intelli-
gence, 2015.
[6] Manlio De Domenico, Vincenzo Nicosia, Alexandre Are-
nas, and Vito Latora. Structural reducibility of multi-
layer networks. Nature Communications, 6, 2015.
[17] Bruno Ribeiro, Nicola Perra, and Andrea Baronchelli.
Quantifying the effect of temporal resolution on time-
varying networks. Scientific Reports, 3:3006, 2013.
[18] James Scott, Richard Gass, Jon Crowcroft, Pan Hui,
Christophe Diot, and Augustin Chaintreau. CRAW-
DAD dataset cambridge/haggle (v. 2009-05-29). Down-
loaded from http://crawdad.org/cambridge/haggle/
20090529, May 2009.
[19] Umang Sharan and Jennifer Neville.
Temporal-
relational classifiers for prediction in evolving domains.
In Eighth IEEE International Conference on Data Min-
ing, 2008. ICDM'08, pages 540–549. IEEE, 2008.
[20] Sucheta Soundarajan, Acar Tamersoy, Elias B. Khalil,
Tina Eliassi-Rad, Duen Horng Chau, Brian Gallagher,
and Kevin Roundy. Generating graph snapshots from
streaming edge data. In Proceedings of the 25th Inter-
national Conference Companion on World Wide Web,
pages 109–110. International World Wide Web Confer-
ences Steering Committee, 2016.
[21] Rajmonda Sulo, Tanya Berger-Wolf, and Robert Gross-
man. Meaningful selection of temporal resolution for
dynamic networks. In Proceedings of the Eighth Work-
shop on Mining and Learning with Graphs, pages 127–
136. ACM, 2010.
[22] Jimeng Sun, Christos Faloutsos, Spiros Papadimitriou,
and Philip S. Yu. Graphscope: parameter-free min-
ing of large time-evolving graphs.
In Proceedings of
the 13th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, pages 687–696.
ACM, 2007.
[23] Yang Yang, Ryan N. Lichtenwalter, and Nitesh V.
Chawla. Evaluating link prediction methods. Knowl-
edge and Information Systems, 45(3):751–782, 2015.
[7] Nathan Eagle and Alex Sandy Pentland. Reality min-
ing: sensing complex social systems. Personal and Ubiq-
uitous Computing, 10(4):255–268, 2006.
[8] Benjamin Fish and Rajmonda S. Caceres. Handling
oversampling in dynamic networks using link predic-
tion. In Joint European Conference on Machine Learn-
ing and Knowledge Discovery in Databases, pages 671–
686. Springer, 2015.
[9] Lorenzo Isella, Juliette Stehl´e, Alain Barrat, Ciro
Cattuto, Jean-Fran¸cois Pinton, and Wouter Van den
Broeck. What's in a crowd? analysis of face-to-face
behavioral networks. Journal of Theoretical Biology,
271(1):166–180, 2011.
[10] Eamonn Keogh, Selina Chu, David Hart, and Michael
Pazzani. Segmenting time series: A survey and novel
approach. Data mining in Time Series Databases, 57:1–
22, 2004.
[11] Bryan Klimt and Yiming Yang. The enron corpus: A
new dataset for email classification research. In Euro-
pean Conference on Machine Learning, pages 217–226.
Springer, 2004.
[12] Gautier Krings, M´arton Karsai, Sebastian Bernhards-
son, Vincent D Blondel, and Jari Saramaki. Effects of
time window size and placement on the structure of an
aggregated communication network. EPJ Data Science,
1(1):4, 2012.
[13] David Liben-Nowell and Jon Kleinberg. The link pre-
diction problem for social networks. In Proceedings of
the Twelfth International Conference on Information
and Knowledge Management, CIKM '03, pages 556–
559, New York, NY, USA, 2003. ACM.
[14] Yike Liu, Abhilash Dighe, Tara Safavi, and Danai
Koutra. A graph summarization: A survey. arXiv
preprint arXiv:1612.04883, 2016.
[15] Daniel Olgu´ın Olgu´ın, Benjamin N. Waber, Taemie
Kim, Akshay Mohan, Koji Ara, and Alex Pentland.
Sensible organizations: Technology and methodology
10
|
1807.05571 | 1 | 1807 | 2018-07-15T16:21:03 | Understanding the Twitter Usage of Humanities and Social Sciences Academic Journals | [
"cs.SI",
"cs.DL"
] | Scholarly communication has the scope to transcend the limitations of the physical world through social media extended coverage and shortened information paths. Accordingly, publishers have created profiles for their journals in Twitter to promote their publications and to initiate discussions with public. This paper investigates the Twitter presence of humanities and social sciences (HSS) journal titles obtained from mainstream citation indices, by analysing the interaction and communication patterns. This study utilizes webometric data collection, descriptive analysis, and social network analysis. Findings indicate that the presence of HSS journals in Twitter across disciplines is not yet substantial. Sharing of general websites appears to be the key activity performed by HSS journals in Twitter. Among them, web content from news portals and magazines are highly disseminated. Sharing of research articles and retweeting was not majorly observed. Inter-journal communication is apparent within the same citation index, but it is very minimal with journals from the other index. However, there seems to be an effort to broaden communication beyond the research community, reaching out to connect with the public. | cs.SI | cs | Understanding the Twitter Usage of Humanities and Social
Sciences Academic Journals
Aravind Sesagiri Raamkumar
Nanyang Technological University, Singapore.
[email protected]
Mojisola Erdt
Nanyang Technological University, Singapore.
[email protected]
Edie Rasmussen
University of British Columbia, Canada.
[email protected]
Yin-Leng Theng
Nanyang Technological University, Singapore.
[email protected]
Harsha Vijayakumar
Nanyang Technological University, Singapore.
[email protected]
ABSTRACT
Scholarly communication has the scope to transcend the limitations of the physical world through social media's extended
coverage and shortened information paths. Accordingly, publishers have created profiles for their journals in Twitter to promote
their publications and to initiate discussions with public. This paper investigates the Twitter presence of humanities and social
sciences (HSS) journal titles obtained from mainstream citation indices, by analysing the interaction and communication pat-
terns. This study utilizes webometric data collection, descriptive analysis, and social network analysis. Findings indicate that
the presence of HSS journals in Twitter across disciplines is not yet substantial. Sharing of general websites appears to be the
key activity performed by HSS journals in Twitter. Among them, web content from news portals and magazines are highly
disseminated. Sharing of research articles and retweeting was not majorly observed. Inter-journal communication is apparent
within the same citation index, but it is very minimal with journals from the other index. However, there seems to be an effort
to broaden communication beyond the research community, reaching out to connect with the public.
KEYWORDS
Social media, twitter, microblogs, journals, social network analysis, humanities, social sciences.
INTRODUCTION
Twitter can be considered as one of the contemporary and popular online social networks. As a micro-blogging system, it is
relevant in both private and public communication spheres. Twitter is used for purposes such as updating current status, initi-
ating conversations, endorsing tweet content, promoting products and even for spamming (Benevenuto, Magno, Rodrigues, &
Almeida, 2010). The success of a social media platform lies in its ability to attract people from different domains and geographic
locations Academicians and researchers from the scientific community are also interested in social media due to its various
benefits (Sugimoto, Work, Larivière, & Haustein, 2016). Scholars have cited information dissemination as a major benefit of
using Twitter (Letierce, Passant, Breslin, & Decker, 2010). It has been observed that tweets can help in predicting citations to
a certain extent (Eysenbach, 2011). However, other studies advise analysts to exercise caution when using simplistic metrics
such as the tweet count to evaluate research outputs (Robinson-Garcia, Costas, Isett, Melkers, & Hicks, 2017).
Social media has become a valuable marketing tool for publishers to promote research articles (Thelwall, Haustein, Larivière,
& Sugimoto, 2013). Publication venues such as journals and conferences use Twitter for connecting with researchers. Studies
have been conducted to investigate the usage of Twitter by researchers (Holmberg & Thelwall, 2014), conferences (Lee, Yoon,
Smith, Park, & Park, 2017; Parra et al., 2016) and also journals from specific disciplines (Cosco, 2015; Kelly et al., 2016;
Nason et al., 2015). It has been observed that journals with social media profiles (for e.g., Twitter) had higher academic metrics
(Wong, Piraquive, & Levi, 2018). However, there has been a distinct lack of studies focusing on the usage of Twitter by journals
from a broader outlook i.e., journals from different disciplines.
This study investigates the Twitter usage of humanities and social sciences (HSS) journals. In this study, we have concentrated
on the soft sciences with a plan to compare the findings with the traditional science and engineering disciplines in future studies.
The required data for this study was extracted from the Master Journal List (MJL) 1 and Twitter. Since the overall objective is
1 Master Journal List of Clarivate Analytics http://ip-science.thomsonreuters.com/mjl/
1
to understand the usage dynamics of HSS journals in Twitter from a broader perspective, the following exploratory research
questions are investigated in the study.
▪ RQ1: What types of actions on Twitter are prevalent among HSS journals?
▪ RQ2: What is the nature of Twitter conversations among the HSS journals?
▪ RQ3: What is the prevalent network structure in Twitter communication graphs of the HSS journals?
▪ RQ4: Which Twitter accounts act as hubs and authorities in the communication graphs of the HSS journals?
RELATED WORK
Several studies have investigated the social media usage of journals. Twitter is an important platform for journals as studies
have shown that journals with Twitter accounts have higher number of tweets and citations of their articles, when compared
with other journals (Ortega, 2017). Other studies have focused on the Twitter usage of journals from specific disciplines. Find-
ings from these studies show that the amount of Twitter accounts varies a lot across different research areas. About 14% of
dermatology journals (Amir et al., 2014), 25% of urological journals (Nason et al., 2015), 28% of radiology journals (Kelly et
al., 2016), and 28% of medical journals (Cosco, 2015) were found to have Twitter accounts, compared to 44% of medical
journals (Kamel Boulos & Anderson, 2014). Also, 17% of the top 10 2010 JIF journals from multiple disciplines (Kortelainen
& Katvala, 2012), were found to have Twitter accounts. Some studies have focussed on the correlation of Twitter and biblio-
metrics indicators. Even though there was no strong relation with the Journal Impact Factor (JIF) for urological journals (Nason
et al., 2015), the authors found the Twitter presence of journals to be positively associated with the JIF in radiology journals
(Kelly et al., 2016). For medical journals, it was found that journals with high JIF had a greater number of Twitter followers
than others (Cosco, 2015). Besides maintaining accounts, which are often used to share news and articles, some journals have
started to ask authors to create Wikipedia articles (Butler, 2008; Maskalyk, 2014), and to provide so-called tweetable abstracts
that journals can use to promote papers (Darling, Shiffman, Côté, & Drew, 2013). Some journals have created online journal
clubs to encourage community discussions about articles (Chan et al., 2015). Most use Twitter (Chan et al., 2015; Gardhouse,
Budd, Yang, & Wong, 2017; Leung, Siassakos, & Khan, 2015; Mehta & Flickinger, 2014; Thangasamy et al., 2014), but some
use other social media tools such as blogs, live videos, and podcasts (Rezaie, Swaminathan, Chan, Shaikh, & Lin, 2015; Thoma,
Rolston, & Lin, 2014).
Apart from journals, studies have been conducted on the Twitter usage of users at academic conferences as the main focus area.
With more user participation in a Twitter network, the network structure might show a tendency to change. However, a 'tight
crowd' network was consistently present in the case of the Association of Internet Researchers (AoIR) conference over the
years (Lee et al., 2017). Also, the authoritative Twitter accounts did not change much even though there were changes in the
conference theme every year. In a much larger study conducted with tweets from 16 computer science conferences (Parra et
al., 2016), authors found that users were increasingly engaged in retweeting and sharing of web links over time. There was a
drop in conversational tweets between users through the years, thereby changing the network structure to more of a broadcasting
network. From a study of the tweeting behaviour of participants of the 2013 International Congress for Conservation Biology
(ICCB) (Bombaci et al., 2016), it was found that the intended audiences, such as policy makers, government and non-govern-
ment organizations, were rarely reached by tweets. Thus, it is questionable if tweeting at conferences is an effective strategy
for promoting research to a wider audience other than the conference's research community.
Based on our literature review and to the best of our knowledge, there have been no studies that report about the Twitter usage
and communication network of HSS journals across multiple disciplines. The current study attempts to address this gap.
METHODOLOGY
Raw Data Extraction
The Master Journal List (MJL) was selected as the main source to obtain journal titles for this study. Specifically, journal titles
were extracted from the two major HSS indices – Arts & Humanities Citation (AHCI) and Social Science Citation Index
(SSCI). The study was conducted on a corpus of 321,094 tweets extracted from 4,999 journal accounts of the two citation
indices. Data collection details are provided below. MJL is generally acknowledged as one of the main sources for journal
titles. Journals are included in MJL after a quality check process, thereby ensuring compliance to scientific standards. Hence,
MJL can be considered as an authoritative source for journal titles across disciplines. Humanities and social sciences journals
have been traditionally indexed under two indices in MJL, namely Arts & Humanities Citation (AHCI) and Social Science
Citation Index (SSCI). All journal titles from the two indices AHCI and SSCI were manually downloaded. In total, 4,999
relevant journals were retrieved, including 1,769 journals from AHCI and 3,230 journals from SSCI. To examine whether the
2
extracted journals have their own Twitter accounts, we searched for their titles using the search option in Twitter. After col-
lecting the Twitter accounts of the journals in August 2016, we extracted the tweets from the Twitter accounts, using the Twitter
API. A maximum of 3,000 tweets were extracted for each Twitter account due to the restrictions in the basic Twitter API
service. A total of 321,094 tweets were extracted for the 4,999 journals.
Preparation of Data for Study
Tweets with URLs
The tweets which contained links to research articles were identified using a two-step process. First, the tweets containing
Uniform Resource Locators (URLs) were filtered. From this filtered list, further filtering was carried out based on the presence
of any one of the keywords 'doi', 'article' and 'issue' to identify the candidate tweets.
Twitter Mentions and Conversations
In Twitter terminology, mention is an instance of tagging/mentioning another Twitter user in a tweet. For example, if user A
wants to start a discussion with user B, the "@" is used to tag user B in the tweet. It should also be noted that when a user
retweets the tweet of another user, Twitter automatically adds the characters "RT @user_account" in the tweet. Hence, men-
tions are naturally present in retweets. From the full extract of tweets, only the tweets containing mentions were first filtered.
From the filtered tweets, the Twitter account name (Twitter handle) and the mentions data were extracted. A combination of
Twitter account name and mention is usually referred to as a conversation. A single tweet could contain multiple mentions.
Communication Graphs
The network analysis tool Gephi was used for addressing RQ3 and RQ4. The community detection algorithm ForeAtlas2
(Jacomy, Venturini, Heymann, & Bastian, 2014) was used in Gephi to align the communities in the graphs. The nodes in the
graphs were sized based on their betweenness centrality (Freeman, 1977) values. Betweenness centrality is a measure of the
centrality of nodes in a graph. Communication graphs were generated with the conversations data. In these graphs, the source
node is the Twitter user account while the target node is the mention. This type of graph is referred to as a directed graph since
the direction of communication is from the source to the target. Two separate directed graphs were generated using the Gephi
tool. After the data was loaded in Gephi, we filtered out the nodes which had a degree of 1 to avoid sparsity in the graphs.
RESULTS
Presence and Activities of HSS Journals in Twitter
In Table 1, statistics related to the journals presence in Twitter are listed. Specifically, counts and percentages of journals and
their tweets, retweets, mentions and presence of both general URLs & research article URLs in tweets. The percentage of
journals with Twitter accounts is around 7% to 9% across the two indices with AHCI having the higher percentage of journals
with Twitter accounts (8.99%). The low percentages indicate that a clear majority of HSS journals are yet to establish a presence
in Twitter. Secondly, the presence is also affected by publication houses which are based out of countries where Twitter is
banned. Retweeting is considered as one of the major activities in Twitter (Yang et al., 2010). Journals from SSCI had the
highest number of retweets (23.39% of total) closely followed by AHCI (22.01% of total). Apart from retweeting, URL sharing
is also one of the major activities of Twitter users (Java, Song, Finin, & Tseng, 2007). SSCI journals had a higher number of
tweets with URLs (89.89% of total), followed by AHCI (86.76% of total). The presence of URLs in a tweet indicates that the
journal is posting the URL of a research paper or website (e.g. news articles, blogs). The percentage of tweets containing links
to research articles is not substantial (less than 15% of total), with SSCI (11.03% of total) having a better percentage than AHCI
(4.98%).
Entity
Journals [A]
Journals with Twitter Accounts [B]
Extracted Tweets [C]
Journals with Public Tweets [D]
Retweets (RTs) [E]
Tweets containing URLs [F]
Tweets containing Links to Articles [G]
AHCI (n)
1769
SSCI (n)
3230
159 (8.99% of A)
249 (7.71% of A)
145419
175675
159 (100% of B)
249 (100% of B)
32002 (22.01% of C)
41096 (23.39% of C)
126172 (86.76% of C) 157918 (89.89% of C)
19370 (11.03% of C)
7240 (4.98% of C)
Table 1. Journals' Twitter Presence and Activities Statistics
3
Twitter Conversations
In Table 2, statistics related to the conversations of HSS journals in Twitter are listed for the two indices. The number of
conversations was the highest for SSCI (n=121,099) corresponding to the higher number of tweets (refer Table 1). Since only
the tweets containing mentions data were considered, some of the journals had zero conversations even though tweets could
have been posted by these accounts. For instance, out of the 249 journal accounts with tweets in SSCI (refer Table 1), 242
accounts had mentions data.
Entity
Total conversations [A]
Unique journal accounts initiating conversations [B]
Unique mentions [C]
Conversations where mentions are AHCI journals [D]
Conversations where mentions are SSCI journals [E]
Unique AHCI journal mentions [F]
Unique SSCI journal mentions [G]
Conversations where account and mention are same [H] 13015 (12.61% of A) 14398 (11.89% of A)
16048 (13.25% of A)
230 (95.04% of B)
13812 (13.39% of A)
70 (0.06% of A)
142 (93.42% of B)
63 (0.06% of A)
18
AHCI (n)
103181
152
31040
SSCI (n)
121099
242
32819
18
Table 2. Journals' Twitter Conversations Statistics
In a conversation, the mention could be any Twitter account. To ascertain the level of interaction with other journals, we
identified the mentions which were journal accounts. For journals within the same index, AHCI and SSCI conversations had
similar percentages (13.39% for AHCI, 13.25% for SSCI). This finding indicates that journals do not seem to be interacting
with other journals in Twitter to any great degree. In fact, interactions with journals from other index is very low with percent-
ages below 1%.
However, most of the journals within the indices are involved in the conversations. For instance, 95.04% of all SSCI journals
and 93.42% of all AHCI journals are presented as mentions in the conversations respectively. To investigate further, we iden-
tified the conversations where the user account and mentions were the same. We found that these types of conversations were
around the same range for both indices (11.89% for SSCI and 12.61% for AHICI of the total conversations respectively). This
finding is quite understandable since there are not many benefits for journals to tag their own Twitter account in their tweets
Communication Graphs
Statistics of the two communication graphs generated for AHCI and SSCI journals Twitter conversations are listed in Table 3.
The node count in Table 3 corresponds to the number of conversations for each index in Table 2. SSCI (n=4,656) and AHCI
(n=4,280) had similar number of nodes. In the case of average degree of a node, AHCI (a=2.84) and SSCI (a=3.08) were
relatively close to each other. This finding indicates that even though the number of nodes is lower in the graph, each node has
more connections with other nodes in the graph. Modularity (m) in a graph is an indication of how well a graph decomposes
into modular communities. A high modularity hints at a complex internal structure with multiple sub-graphs (communities)
densely connected to each other in the graph. The modularity value should be analysed together with the number of resultant
communities (c) and total number of nodes in the graph (n). The modularity value is almost the same for the two graphs (m=0.53
for AHCI and m=0.52 for SSCI). Resultantly, the number of communities is also comparable for AHCI (c=11) and SSCI (c=13).
Metric
Number of Nodes (n)
Number of Edges (e)
Average Degree (a)
Modularity (m)
Number of Communities (c)
SSCI
AHCI
4,280
4,656
12,194 14,353
2.84
0.53
11
3.08
0.52
13
Table 3. Journals' Communication Graphs Statistics
The two graphs generated for the citation indices are illustrated in Figures 1 and 2. The node colour indicates the community
to which they belong. The nodes size has been adjusted based on the betweenness centrality values of the nodes. We have
added representative labels for the different communities based on the topic commonality in the profile descriptions provided
in the Twitter accounts (journals). As an aid to interpret the graphs, we identified the top 20 nodes with the highest in-degrees
and out-degrees respectively in Tables 4 and 5. Out-degree of a node is the number of edges where the node is the source node
while in-degree is the number of edges where the node is a target node. Naturally, the nodes with the highest out-degrees will
be the journal Twitter accounts while the nodes with the highest in-degrees could be of any type. Accordingly, we have listed
4
the journal titles for the nodes with the highest out-degrees while we have identified type of the nodes with highest in-degrees.
Even though out-degree is an indication of the journal's outreach in Twitter, it is important to recognize the popularity of the
journals within the traditional citation network. This can be achieved by comparing the degree values with the journal impact
factor (JIF). We have not listed the JIF values in these tables since interpreting JIF with different disciplines is not meaningful.
However, we have listed the quartiles data of the journals based on the JIF. For example, if the journal belongs to the first
quartile, it is considered to be among the top 25 percentile of journals in that discipline. Therefore, the prestige of journals can
be ascertained with the JIF quartiles data. For AHCI journals, JIF data is not provided in the MJL, hence JIF quartiles column
is not applicable for Table 4.
AHCI Graph
In Figure 1, the AHCI graph is represented by multiple topics including philosophy, history, arts, architecture, film and litera-
ture. Most of the Twitter accounts in this graph are related to the literature topic. Also, the communities adjacent to each other
seem to be related - (1) architecture & art and (2) philosophy & history. This graph can be classified as a community clusters
graph since there are multiple communities with minimal interspersed nodes. From Table 4, we observe that magazines and
news portals are most frequently referenced as mentions in AHCI Twitter conversations. The top two nodes are the news portals
Nytimes and Guardian, while six other nodes are of the magazine type in the top 20. However, these magazines are all within
the scope of AHCI topics unlike the news portals which cover general topics. Libraries (@nypl, @ElectricLit) and museums
(@metmuseum, @MusuemModernArt) are also present, thereby indicating substantial interactions with accounts outside aca-
demia. Paris Review is the only journal with a high in-degree value in this list and this journal's node can be clearly identified
as the biggest node in Figure 1 due to its high betweeness centrality. The top 20 in-degree nodes indicate that AHCI journals
tend to interact most with news and magazine-related Twitter accounts. The top 20 out-degrees nodes comprise of mostly
literature and arts journals.
Figure 1. AHCI Graph
5
Top 20 Nodes with Highest In-degree
Top 20 Nodes with Highest Out-degree
Account Type
News
News
Twitter Account
in*
39
30
29 Missouri_Review
23
22
Social Bookmarking 22
Wasafiri1
Artforum
Journal
Library
kenyonreview
Magazine
AiANews
VQR
Magazine
Museum
Art Gallery
Magazine
Magazine
Magazine
Magazine
Digital Library
Museum
Publisher
Video Sharing
Email
NERweb
LonJournal
ArchRecord
BurlingtonMag
21 TheHudsonReview
20
19
18
18
18
18
18
16
16
16 Apollo_magazine
16
15
15
NOReview
MassReview
ARTnewsmag
AD_books
nybooks
TheTLS
TheAmScho
JCLJournal
Twitter Account
Nytimes
Guardian
NewYorker
Parisreview
Nypl
Sharethis
LAReviewofBooks
Metmuseum
Tate
LRB
PoetryFound
nybooks
TheAtlantic
ElectricLit
MuseumModernArt
OUPAcademic
YouTube
gmailcom
PublishersWkly
thelithub
Wasafiri
Journal Full Name
Architectural Record
Artforum International
Virginia Quarterly Review
Kenyon Review
Hudson Review
Art In America
Missouri Review
out+
549
468
439
422
391
366
356
346
New England Review-Middlebury Series 269
263
258
239
232
231
225
225
205
195
192
190
Journal Of Commonwealth Literature
Apollo-The International Art Magazine
New Orleans Review
Massachusetts Review
Burlington Magazine
Architectural Design
Tls-The Times Literary Supplement
New York Review Of Books
American Scholar
London Journal
Magazine
Not Active
Note: in* refers to in-degree value; out+ refers to out-degree value
Artnews
Table 4. Top 20 In-degree and Out-degree Nodes in AHCI Graph
SSCI Graph
The SSCI graph, which has the highest number of communities (c=13) among the two graphs (refer Table 3), is illustrated in
Figure 2. Interestingly, most of the communities are of different topics although the adjacent communities are related, similar
to AHCI. The community related to feminism/women's studies has the largest nodes (@FeministReview, @AFSJournal) and
this community is spread across other communities related to psychology and education. Similar to AHCI, this graph can also
be classified as a community clusters graph since there are multiple communities and minimal interspersed nodes even though
the feminism community is an exception.
Among the top 20 nodes with highest in-degrees, news portals (e.g., @nytimes, @washington) and magazines (e.g.,
@TheEconomist, @TheAtlantic) have a significant presence as already seen with AHCI. Unlike AHCI, news portals' (n=7)
presence is more than magazines (n=4). Also, the magazines are mainstream magazines and not from academic publishers.
Only two journals (@TheSocReview, @SAGEsociology) are present in this top 20 in-degree nodes list. The journals in the top
20 nodes with highest out-degrees are spread across different disciplines. From the JIF quartiles data, it can be ascertained that
only three journals (@AmJNurs, @ AmEthno, @ASQJournal) are from the first quartile. There are more second quartile (n=7),
third quartile (n=6) and fourth quartile (n=4) journals in this list. Therefore, the outreach is performed by journals from all tiers.
Also, there is no overlap among the journals in the in-degree and out-degree list.
6
Figure 2. SSCI Graph
Top 20 Nodes with Highest In-degree
Top 20 Nodes with Highest Out-degree
Twitter Account
Account Type
nytimes
guardian
washingtonpost
TheEconomist
TheAtlantic
WSJ
News
News
News
Magazine
Magazine
News
raulpacheco
Researcher
chronicle
sharethis
NPR
News
Social Bookmarking
Media Organization
NewYorker
HuffingtonPost
TheSocReview
SAGEsociology
timeshighered
YouTube
TIME
Slate
Magazine
News
Journal
Journal
Magazine
Video Sharing
Magazine
Magazine
po_qu
terpolv
AmJNurs
AFSJournal
EPSRjournal
in* Twitter Account
67
InternatlTheory
60
46
41
37
34 EvidencePolicy
27 BulletinAtomic
27
25
23
23
23
23
23
23 LAPerspectives
22 mgmt_learning
22
22
BASeditors
AmEthno
govandopp
ERSjournal
psychmag
CMPjournal
hhrjournal
Editor_IES
wordpressdotcom Content Management 21 socprobsjournal
ConversationUK
ASQJournal
News
21
International Theory
Corresponding Journal Title
Political Quarterly
Evidence & Policy
Business & Society
American Ethnologist
Australian Feminist Studies
American Journal Of Nursing
Bulletin Of The Atomic Scientists
Terrorism And Political Violence
out+ JQ^
3
338
3
336
1
277
2
European Political Science Review 268
4
260
2
255
4
253
2
251
2
242
1
242
3
215
2
211
4
208
3
195
3
186
2
185
3
173
4
166
2
162
1
154
Health And Human Rights
Irish Educational Studies
Administrative Science Quarterly
Culture Medicine And Psychiatry
Latin American Perspectives
Management Learning
Government And Opposition
Ethnic And Racial Studies
Psychologist
Social Problems
Note: in* refers to in-degree value; out+ refers to out-degree value; JQ^ refers to JIF quartile
Table 5. Top 20 In-degree and Out-degree Nodes in SSCI Graph
7
DISCUSSION
The presence of academic journals in Twitter is not yet substantial with AHCI having a slightly larger presence than SSCI
journals. There is not much difference between the indices in terms of having a presence in Twitter. As Twitter's usage and
popularity increases, more journals are expected to join the social media platform. However, the participation of journals in
social media might be constrained by monetary and manpower availability factors. For the journals in this study, the retweeting
frequency does not seem to exceed the general statistics reported in earlier studies (Holmberg & Thelwall, 2014) with SSCI
journals having the highest percentage (23.39% of total tweets) of the two indices. In terms of URL sharing in tweets, journals
exceed the sharing percentage from earlier studies (Raamkumar, Pang, & Foo, 2016). In fact, 89.89% of SSCI journals' tweets
contain URLs. Even though URLs were found in most of the tweets, the percentage of tweets containing links to research
articles was found to be low with AHCI being the lowest (4.98% of total tweets). The main reason could be the limited number
of articles published per journal issue. For instance, most journals post a new issue every quarter and the new issue might
comprise of eight to ten articles. Hence, the tweet count in such cases would obviously appear very small when compared to
the total count of tweets.
In Twitter, there has been an apparent lack of interpersonal communication due to the predominance of retweeting and URL
sharing by users (Parra et al., 2016). Therefore, in this context, understanding the volume of interpersonal communication is
important for journals. This analysis was performed by extracting the mentions data from the tweets. After filtering out the
retweets in the extract, it was found that AHCI tweets contained mentions in 22% of their total tweets. When the analysis is
extended to composition of the conversations, there are new insights gained from the data (refer to Table 2). In the mentions
data, the accounts which are journals were identified so that the extent of inter-journal communication could be ascertained.
SSCI mentions had the highest percentage of references to SSCI journals themselves at 13.25% of the total conversations. In
fact, SSCI and AHCI are closer in this aspect. This indicates that the journals from these indices are communicating more with
non-academic Twitter accounts than HSS journal accounts. At a consolidated level, we found a reasonable percentage of tweets
containing mentions data; however, most of the mentions were not academic HSS journal accounts. This clearly shows that
inter-journal communication in Twitter is not substantial across the two indices.
AHCI and SSCI mentions graph structure largely resemble a community clusters network where there are multiple communities
with dense intercommunication. There were a few exceptional cases such as the feminism community in SSCI which had nodes
spread across a few other communities. Authoritative nodes in the mentions graphs are the Twitter accounts which are centrip-
etal in nature i.e., most of the conversations are directed towards these nodes. After classifying the node type in the top 20
nodes with the highest in-degrees, it was evident that news portals such as the New York Times and Guardian along with
magazines such as the NewYorker and The Atlantic were the most authoritative Twitter accounts in the two graphs. This
finding underlines the influence of these sources on HSS academic journals. The presence of YouTube as an authoritative
source was not surprising due to the abundance of educational/informational videos hosted by the service. Subject-specific
magazines such as the New Scientist and The Economist were also prevalent in the top 20 in-degree nodes list of the two
indices respectively. The minimal presence of journals in the list of authoritative nodes was a surprising finding. AHCI and
SSCI had just a total of three journals combined. This finding not only shows that there are very few journals in the authoritative
nodes list of the indices but also there seems to be a conscious effort among journals to propagate tweets of non-academic
sources. The level of outreach was ascertained from the top 20 out-degrees nodes in the mentions graphs. These nodes are
centrifugal in nature and hence, they are referred as hubs. In these top 20 lists, AHCI and SSCI had journals from different
disciplines. On the question of ascertaining whether the top journals in Twitter were also top journals in the citation network,
SSCI had journals from all four JIF quartiles in the top 20 list.
There are a few limitations in this study. By considering journals exclusively from MJL, we might be missing some other
important journals which are indexed elsewhere. By the end of 2017, Twitter increased the character count in tweets to 280
from the earlier 140 characters. Hence, users can post more descriptive content and tag more users in their tweets. Therefore,
this user-interface (UI) level change could possibly alter the usage dynamics of Twitter users.
CONCLUSION
In this paper, our goal was to understand the Twitter usage dynamics of HSS journals sourced from the citation indices in MJL.
Using a corpus of 321,094 tweets which were extracted for the 4,999 journal accounts, analysis was performed at activity, tweet
composition and structural levels. The tweets of the journals from AHCI and SSCI were analysed separately. Results show that
URL sharing was a major activity performed by academic journals. HSS journals seem to focus more on initiating conversations
with other Twitter accounts, although most were of a non-academic nature. Inter-journal communication seemed to be largely
8
restricted to the journals within the same index. Tweets from public news portals and magazines were heavily disseminated by
journal accounts, thereby identifying non-academic sources as the authoritative sources in the communication graphs of the
two indices. Among the journals that initiate conversations, HSS journals irrespective of their standing in the citation network,
are involved in Twitter outreach. In future studies, we plan to conduct in-depth investigations on whether the activities per-
formed by HSS journals in Twitter lead to increased citations for constituent research articles. In addition, we plan to conduct
similar analysis on Science Citation Index Expanded (SCIE) journals to compare the findings with this study. We hope that
this study's findings are of value to publishers, researchers and social media campaign managers, who are responsible for the
marketing, branding, and promotion of a journal's services on Twitter.
ACKNOWLEDGMENTS
The research project "Altmetrics: Rethinking And Exploring New Ways Of Measuring Research" was supported by the Na-
tional Research Foundation, Prime Minister's Office, Singapore under its Science of Research, Innovation and Enterprise pro-
gramme (SRIE Award No. NRF2014-NRF-SRIE001-019).
REFERENCES
Amir, M., Sampson, B. P., Endly, D., Tamai, J. M., Henley, J., Brewer, A. C., … Dellavalle, R. P. (2014). Social Networking
Sites. JAMA Dermatology, 150(1), 56. https://doi.org/10.1001/jamadermatol.2013.6340
Benevenuto, F., Magno, G., Rodrigues, T., & Almeida, V. (2010). Detecting Spammers on Twitter. In Collaboration,
Electronic messaging, Anti-abuse and Spam Conference (CEAS). Redmond, Washington. Retrieved from
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.297.5340
Bombaci, S. P., Farr, C. M., Gallo, H. T., Mangan, A. M., Stinson, L. T., Kaushik, M., & Pejchar, L. (2016). Using Twitter to
communicate conservation science from a professional conference. Conservation Biology, 30(1), 216–225.
https://doi.org/10.1111/cobi.12570
Butler, D. (2008). Publish in Wikipedia or perish. Nature. https://doi.org/10.1038/news.2008.1312
Chan, T. M., Thoma, B., Radecki, R., Topf, J., Woo, H. H., Kao, L. S., … Lin, M. (2015). Ten Steps for Setting Up an Online
148–154.
of Continuing Education
the Health Professions,
Journal
35(2),
in
Journal Club.
https://doi.org/10.1002/chp.21275
Cosco, T. D. (2015). Medical journals, impact and social media: an ecological study of the Twittersphere. Canadian Medical
Association Journal, 187(18), 1353–1357. https://doi.org/10.1503/cmaj.150976
Darling, E. S., Shiffman, D., Côté, I. M., & Drew, J. A. (2013). The role of Twitter in the life cycle of a scientific publication.
PeerJ Inc. https://doi.org/10.7287/peerj.preprints.16v1
Eysenbach, G. (2011). Can tweets predict citations? Metrics of social impact based on Twitter and correlation with traditional
metrics of scientific impact. Journal of Medical Internet Research, 13(4), e123. https://doi.org/10.2196/jmir.2012
Freeman, L. C. (1977). A Set of Measures of Centrality Based on Betweenness. Sociometry, 40(1), 35.
https://doi.org/10.2307/3033543
Gardhouse, A. I., Budd, L., Yang, S. Y. C., & Wong, C. L. (2017). #GeriMedJC: The Twitter Complement to the Traditional-
Format Geriatric Medicine Journal Club. Journal of the American Geriatrics Society, 65(6), 1347–1351.
https://doi.org/10.1111/jgs.14920
Holmberg, K., & Thelwall, M. (2014). Disciplinary differences in Twitter scholarly communication. Scientometrics, 101(2),
1027–1042. https://doi.org/10.1007/s11192-014-1229-3
Jacomy, M., Venturini, T., Heymann, S., & Bastian, M. (2014). ForceAtlas2, a Continuous Graph Layout Algorithm for Handy
e98679.
Software.
Gephi
ONE,
PLoS
9(6),
Network
https://doi.org/10.1371/journal.pone.0098679
Visualization
Designed
for
the
Java, A., Song, X., Finin, T., & Tseng, B. (2007). Why We Twitter: Understanding Microblogging. In Proceedings of the 9th
WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis (pp. 56–65).
Kamel Boulos, M. N., & Anderson, P. F. (2014). Preliminary survey of leading general medicine journals' use of Facebook
and Twitter. Journal of the Canadian Health Libraries Association, 33(2), 38. https://doi.org/10.5596/c2012-010
Kelly, B. S., Redmond, C. E., Nason, G. J., Healy, G. M., Horgan, N. A., & Heffernan, E. J. (2016). The Use of Twitter by
Radiology Journals: An Analysis of Twitter Activity and Impact Factor. Journal of the American College of Radiology,
13(11), 1391–1396. https://doi.org/10.1016/j.jacr.2016.06.041
9
Kortelainen, T., & Katvala, M. (2012). "Everything is plentiful-Except attention". Attention data of scientific journals on
social web tools. Journal of Informetrics, 6(4), 661–668. https://doi.org/10.1016/J.JOI.2012.06.004
Lee, M. K., Yoon, H. Y., Smith, M., Park, H. J., & Park, H. W. (2017). Mapping a Twitter scholarly communication network:
a case of the association of internet researchers' conference. Scientometrics, 1–31. https://doi.org/10.1007/s11192-017-
2413-z
Letierce, J., Passant, A., Breslin, J., & Decker, S. (2010). Understanding how Twitter is used to spread scientific messages. In
Proceedings of the WebSci10: Extending the Frontiers of Society On-Line. Raleigh, NC: US. Retrieved from
http://journal.webscience.org/314/
Leung, E., Siassakos, D., & Khan, K. (2015). Journal Club via social media: authors take note of the impact of #BlueJC. BJOG:
An International Journal of Obstetrics & Gynaecology, 122(8), 1042–1044. https://doi.org/10.1111/1471-0528.13440
Maskalyk, J. (2014). Modern medicine comes online: How putting Wikipedia articles through a medical journal's traditional
process can put free, reliable information into as many hands as possible. Open Medicine, 8(4), e116-9. Retrieved from
http://www.ncbi.nlm.nih.gov/pubmed/25426179
Mehta, N., & Flickinger, T. (2014). The Times They Are A-Changin': Academia, Social Media and the JGIM Twitter Journal
Club. Journal of General Internal Medicine, 29(10), 1317–1318. https://doi.org/10.1007/s11606-014-2976-9
Nason, G. J., O'Kelly, F., Kelly, M. E., Phelan, N., Manecksha, R. P., Lawrentschuk, N., & Murphy, D. G. (2015). The
emerging use of Twitter by urological journals. BJU International, 115(3), 486–490. https://doi.org/10.1111/bju.12840
Ortega, J. L. (2017). The presence of academic journals on Twitter and its relationship with dissemination (tweets) and research
impact (citations). Aslib Journal of Information Management, 69(6), 674–687. https://doi.org/10.1108/AJIM-02-2017-
0055
Parra, D., Trattner, C., Gómez, D., Hurtado, M., Wen, X., & Lin, Y.-R. (2016). Twitter in Academic Events: A Study of
Temporal Usage, Communication, Sentimental and Topical Patterns in 16 Computer Science Conferences. Computer
Communications, 73, 301–314. https://doi.org/10.1016/j.comcom.2015.07.001
Raamkumar, A. S., Pang, N., & Foo, S. (2016). When countries become the talking point in microblogs: Study on country
hashtags in Twitter. First Monday, 21(1). https://doi.org/10.5210/fm.v21i1.6101
Rezaie, S. R., Swaminathan, A., Chan, T., Shaikh, S., & Lin, M. (2015). Global Emergency Medicine Journal Club: A Social
Media Discussion About the Age-Adjusted D-Dimer Cutoff Levels To Rule Out Pulmonary Embolism Trial. Annals of
Emergency Medicine, 65(5), 604–13. https://doi.org/10.1016/j.annemergmed.2015.02.024
Robinson-Garcia, N., Costas, R., Isett, K., Melkers, J., & Hicks, D. (2017). The unbearable emptiness of tweeting-About
journal articles. PLOS ONE, 12(8), e0183551. https://doi.org/10.1371/journal.pone.0183551
Sugimoto, C. R., Work, S., Larivière, V., & Haustein, S. (2016). Scholarly use of social media and altmetrics: a review of the
literature. Retrieved from http://arxiv.org/abs/1608.08112
Thangasamy, I. A., Leveridge, M., Davies, B. J., Finelli, A., Stork, B., & Woo, H. H. (2014). International Urology Journal
Club via Twitter: 12-Month Experience. European Urology, 66(1), 112–7. https://doi.org/10.1016/j.eururo.2014.01.034
Thelwall, M., Haustein, S., Larivière, V., & Sugimoto, C. R. (2013). Do Altmetrics Work? Twitter and Ten Other Social Web
Services. PLoS ONE, 8(5), e64841. https://doi.org/10.1371/journal.pone.0064841
Thoma, B., Rolston, D., & Lin, M. (2014). Global Emergency Medicine Journal Club: Social Media Responses to the March
2014 Annals of Emergency Medicine Journal Club on Targeted Temperature Management. Annals of Emergency
Medicine, 64(2), 207–12. https://doi.org/10.1016/j.annemergmed.2014.06.003
Wong, K., Piraquive, J., & Levi, J. R. (2018). Social media presence of otolaryngology journals: The past, present, and future.
The Laryngoscope, 128(2), 363–368. https://doi.org/10.1002/lary.26727
Yang, Z., Guo, J., Cai, K., Tang, J., Li, J., Zhang, L., & Su, Z. (2010). Understanding retweeting behaviors in social networks.
In Proceedings of the 19th ACM international conference on Information and knowledge management - CIKM '10 (p.
1633). New York, New York, USA: ACM Press. https://doi.org/10.1145/1871437.1871691
10
|
1709.03438 | 1 | 1709 | 2017-09-11T15:32:37 | Coin-flipping, ball-dropping, and grass-hopping for generating random graphs from matrices of edge probabilities | [
"cs.SI",
"cs.DM",
"math.CO"
] | Common models for random graphs, such as Erd\H{o}s-R\'{e}nyi and Kronecker graphs, correspond to generating random adjacency matrices where each entry is non-zero based on a large matrix of probabilities. Generating an instance of a random graph based on these models is easy, although inefficient, by flipping biased coins (i.e. sampling binomial random variables) for each possible edge. This process is inefficient because most large graph models correspond to sparse graphs where the vast majority of coin flips will result in no edges. We describe some not-entirely-well-known, but not-entirely-unknown, techniques that will enable us to sample a graph by finding only the coin flips that will produce edges. Our analogies for these procedures are ball-dropping, which is easier to implement, but may need extra work due to duplicate edges, and grass-hopping, which results in no duplicated work or extra edges.
Grass-hopping does this using geometric random variables. In order to use this idea on complex probability matrices such as those in Kronecker graphs, we decompose the problem into three steps, each of which are independently useful computational primitives: (i) enumerating non-decreasing sequences, (ii) unranking multiset permutations, and (iii) decoding and encoding z-curve and Morton codes and permutations. The third step is the result of a new connection between repeated Kronecker product operations and Morton codes. Throughout, we draw connections to ideas underlying applied math and computer science including coupon collector problems. | cs.SI | cs |
COIN-FLIPPING, BALL-DROPPING, AND GRASS-HOPPING FOR
GENERATING RANDOM GRAPHS FROM MATRICES OF EDGE
PROBABILITIES∗
ARJUN S. RAMANI† , NICOLE EIKMEIER‡ , AND DAVID F. GLEICH§
Abstract. Common models for random graphs, such as Erdos-R´enyi and Kronecker graphs,
correspond to generating random adjacency matrices where each entry is non-zero based on a large
matrix of probabilities. Generating an instance of a random graph based on these models is easy,
although inefficient, by flipping biased coins (i.e. sampling binomial random variables) for each possible
edge. This process is inefficient because most large graph models correspond to sparse graphs where
the vast majority of coin flips will result in no edges. We describe some not-entirely-well-known, but
not-entirely-unknown, techniques that will enable us to sample a graph by finding only the coin flips
that will produce edges. Our analogies for these procedures are ball-dropping, which is easier to
implement, but may need extra work due to duplicate edges, and grass-hopping, which results in no
duplicated work or extra edges. Grass-hopping does this using geometric random variables. In order
to use this idea on complex probability matrices such as those in Kronecker graphs, we decompose
the problem into three steps, each of which are independently useful computational primitives: (i)
enumerating non-decreasing sequences, (ii) unranking multiset permutations, and (iii) decoding and
encoding z-curve and Morton codes and permutations. The third step is the result of a new connection
between repeated Kronecker product operations and Morton codes. Throughout, we draw connections
to ideas underlying applied math and computer science including coupon collector problems.
Audience. This paper is designed, primarily, for undergraduates who have some experience
with mathematics classes at the level of introduction to probability, discrete math, calculus, and
programming, as well as for educators teaching these classes. We try and provide pointers to additional
background material where relevant – and we also provide links to various courses throughout applied
math and computer science to facilitate using this material in multiple places. Our program codes
are available through the github repository: https://github.com/dgleich/grass-hopping-graphs.
1. Introduction & Motivation for Fast Random Graph Generation. The
utility of a random graph is akin to the utility of a random number. Random
numbers, random variables, and the framework of statistical hypothesis testing provide
a convenient way to study and assess whether an apparent signal or pattern extracted
from noisy data is likely to be real or the result of chance. In this setting, a random
variable models the null-hypothesis where the effect is due to chance alone. By way
of example, testing if a standard six-sided dice is "fair" involves a random variable
with a χ2 distribution. The way this test works is illustrated in Figure 1. We
compare the number of times the dice rolls each number with the expected number
of times under the fair hypothesis. For each outcome, such as
, we compute
(Measured − Expected)2/Expected. Then we sum these over all outcomes. The
resulting number is a statistic called Pearson's cumulative test statistic. (In the figure,
this is 4/3.) The test statistic is also a random variable because if we rolled the dice
another set of times, we could get a different value. A random variable with a χ2
distribution is the behavior of this test statistic when the dice is exactly fair.
∗Funding: Partially supported by the NSF funded NSF CAREER award CCF-1149756, NSF Big
data IIS-1546488, NSF Center for Science of Information STC, CCF-093937, DARPA SIMPLEX and
the Sloan Foundation.
†West Lafayette Jr/Sr High School, 1105 North Grant Street, West Lafayette, IN 47906, USA
‡Department of Mathematics, Purdue University, [email protected]
§Department of Computer Science, Purdue University, 305 North University Avenue, West
([email protected]).
Lafayette, IN 47907, USA ([email protected]).
1
Measured
Expected
Statistic
30
30
0
32
30
33
30
31
30
29
30
25
30
2/15 3/10 1/30 1/30 5/6
4/3
Fig. 1. An example of statistical hypothesis testing in the classic scenario with a closed form
solution. Here, the closed form χ2 test works to determine if a dice is "fair". In this case, we
conclude there is a 93% chance the dice is fair. For random graph models, we often have no analytic
way to determine the quantities akin to the expected number or the values from the cumulative
distribution function. Thus, we need to quickly generate a large number of random graphs to generate
simulation based estimates instead.
Aside 1. This type of analysis and
methodology is called statistical hy-
pothesis testing and can be extended
to more complex scenarios. Esti-
mating these distributions from test
statistics results in studies which are
fascinating in their own right.
The famous p-value is the probability that a
fair die would give rise to a test statistic value
greater than the computed test statistics (which
is 4/3). In other words, we look at the probabil-
ity that a value from a χ2 distribution is bigger
than 4/3. The resulting probability (p = 0.931)
provides a convenient estimate of how likely the
dice is to be fair. In this case, we computed the
probability using an analytic description of the χ2 distribution (strictly speaking,
this test involves the χ2 distribution with 5 degrees of freedom). The probability
should be large if the dice is fair and small if it is unlikely to be fair. Often, the
probability p = 0.05 is arbitrarily chosen as a cut-point to distinguish the two cases
(p ≥ 0.05 means fair and p < 0.05 means maybe not fair), but this value should be
used judiciously.
Statistical hypothesis testing on graphs is largely the same (Moreno and Neville,
2013; Koyuturk et al., 2007, 2006; Milo et al., 2002). We use a random graph model
as the null hypothesis. This is akin to the fair hypothesis used in the example
above. Then we measure something on a real-world graph and compare what we
would have expected to get on a set of random graphs. Consider, for instance, the
study by Milo et al. (2002) on the presence of motifs in networks. This study defines
network motifs as patterns of connectivity that are found more frequently in a network
than what would be expected in a random network.
In social networks such as
Facebook, a common motif is a triangle. If you have two friends, then it is much
more likely that your friends are also friends, which forms a triangle structure in
the graph. This property does not exist in many random models of networks.
One critical difference from traditional statistics,
however, is that we often lack closed-form rep-
resentations for the probability of many events
in random graph models. There was no known
expression for the number of motifs that Milo
should expect unlike the case of the dice and the
χ2 distribution. In fact, in the studies above, only
(Koyuturk et al., 2006, 2007) had closed form
solutions.
Aside 2. In fact, creating ran-
dom graph models with the property
that they have a non-trivial num-
ber of triangles is an active area of
study! Recent work in this vein in-
cludes Kolda et al. (2014); Newman
(2009).
2
12345678910statistic0.00.20.40.60.81.0cum. dist. func. of χ25Thus, we turn to empirical simulations. One of the easiest and most common
methods to do these studies (such as Milo et al. (2002)) leverages the computer to
generate hundreds or hundreds of thousands of instances of a random graph and
compute their properties. In comparison with the dice example, if we had access
to a dice that was guaranteed to be fair, we could have generated an empirical
distribution for Pearson's cumulative test statistic by tossing the fair dice a few
thousand times. Then, an estimate of the probability that the statistic is larger could
be computed just by checking the number of instances where the sample was larger.
To do this, we would need a fast way of tossing
dice! For random graphs, it almost goes without
saying that we also need this random graph gener-
ation, which is also called random graph sampling,
to be as fast and efficient as possible.
Statistical hypothesis testing is not the only
use for random graphs. There are a variety of
other scenarios that also require fast sampling
such as benchmarking high performance com-
puters (Murphy et al., 2010) and synthetic data
to evaluate algorithms (Kloumann et al., 2016).
What distinguishes the statistical hypothesis test-
ing scenario is that it is important to exactly sample the true random graph model. As
we shall see, there are a variety of efficient methods that can slightly bias these results
or may take additional effort to compute.
Aside 3. Indeed, Fisher (1936) men-
tions this "trivial" toss-dice-and-
check idea as the basis of all rig-
orous work in the area of hypothesis
testing. More recently, as the power
of computation has grown, others
including Ernst (2004) have sug-
gested renewed focus on these empir-
ical and computational tests rather
than analytic results.
In this paper, we will explain and illustrate how to generate random graphs
efficiently when the random graph model is described by a matrix of probabilities for
each edge. This is admittedly a special case, but it handles some of the most widely
used random graph distributions:
- the Erdos-R´enyi model (§2.3),
- the Kronecker model (§2.6),
- the Chung-Lu model (§2.7), and
- the stochastic block model (§2.8).
We will pay special attention to some of the structures present in the matrices of
probabilities of stochastic Kronecker graphs and how to take advantage of them to
make the process go faster. Along the way, we'll see examples of a number of classic
discrete structures and topics:
- binomial and geometric random variables,
- the coupon collector problem,
- enumerating non-decreasing sequences,
- unranking multiset permutations, and
- Morton and Z-curves.
Throughout, we are going to explain these concepts and ideas both mathematically
and programmatically. We include runnable Python code in the manuscript to make
it easy to follow along, see https://github.com/dgleich/grass-hopping-graphs/
for our code.
2. Random Graph Models and Matrices of Probabilities. A graph con-
sists of a set of vertices V and a set of edges E, where each edge e ∈ E encodes
relationships between two vertices, which is often written e = (u, v) for u, v ∈ V .
We consider the more general setting of directed graphs in this paper, although
we describe how all of the ideas specialize to undirected graphs in Section 2.9. A
3
random graph consists of a set of random edges between a fixed number of vertices.
How should these random edges be chosen? That
turns out to depend on the particular random
graph model.
The models we consider generate a random
adjacency matrix where each entry Aij in the
adjacency matrix is 0 or 1 with probability Pij for
some given matrix of probabilities P . Let's dive
into these details to understand exactly what this
means.
Aside 4. There are more general
definitions of random graphs that
do not impose a fixed number of
vertices such as preferential attach-
ment (Barab´asi and Albert, 1999),
but this simple setting will serve our
purposes.
2.1. The adjacency matrix. The adjacency matrix encodes the information of
the nodes and edges into a matrix. For instance:
if the graph is A
C
D
B
E
F
G
, the adjacency matrix is
A B C D E F G
0 1 1 0 0 0 0
A
1 0 0 1 1 0 0
B
0 1 0 1 0 0 0
C
D 0 0 1 0 1 0 1
0 0 1 0 0 0 0
E
0 0 0 1 0 0 0
F
G
0 0 0 0 0 0 0
.
Formally, the adjacency matrix is created by assigning each vertex v ∈ V a unique
number between 1 and V often called an index. Then each edge e = (u, v) ∈ E
produces an entry of 1 in the coordinate of the matrix that results in mapping u and
v to their indices. That is, if i and j are the indices of u and v, then entry i, j of
the matrix has value 1. All other entries of the matrix are 0. In the case above, we
mapped A to index 1, B to index 2 and so on.
2.2. A random adjacency matrix as a
random graph. Note that this process can go
the other way as well.
If we have any n-by-n
matrix where each entry is 0 or 1, then we can
interpret that matrix as the adjacency matrix of
a graph! What we are going to do is (i) generate
a random matrix with each entry being 0 or 1 and
(ii) interpret that matrix as a set of random edges
to give us the random graph.
Aside 5. In fact, there are many as-
pects of sparse matrix computations
that are most easily understood by
viewing a sparse matrix as a graph
and computing a graph algorithm
such as breadth-first search (Davis,
2006).
At this point, we need to mention a distinction between directed and undirected
graphs. By convention, an undirected graph has a symmetric adjacency matrix where
Aij = 1 and Aji = 1 for each undirected edge. Our focus will be on generating
random non-symmetric matrices A. These techniques will still apply to generating
symmetric graphs, however. For instance, we can interpret a non-symmetric A as
an undirected graph by only considering entries Aij where i < j (or equivalently,
Aij where i > j) and then symmetrizing the matrix given one of these triangular
regions. (In Matlab, this would be: T = triu(A,1); G = T+T'; in Python, it would
be np.triu(A,1); G=T+T.T) We return to this point in Section 2.9.
2.3. The Erdos-R´enyi model. Perhaps the first idea that comes to mind at
this point is tossing a coin to determine if an entry in the adjacency matrix should be
0 or 1. While a simple 50%-50% coin toss is suitable for randomly picking between
the two, there is no reason we need 1's (the edges) to occur with the same probability
4
as 0's (the non-edges). Let p be the probability that we generate a 1 (an edge) and let
Aij =
1 with probability p
0 with probability 1 − p
for each i, j in an n-by-n matrix.
(2.1)
This model is called the Erdos-R´enyi model. It
is one of the simplest types of random graphs
and has n nodes where any 2 nodes have proba-
bility p of being connected with a directed edge.
Erdos-R´enyi graphs are traditionally constructed
by considering each edge separately and using the
method of coin-flipping, which will be discussed
in Section 2.5.
Aside 6. The Erdos-R´enyi graph as
we consider it was actually proposed
by Edgar Gilbert (Gilbert, 1959) at
the same time at Erdos and R´enyi's
famous paper (Erdos and R´enyi,
1959). Erdos and R´enyi proposed a
slight variation that fixed the num-
ber of edges and placed them uni-
formly at random.
(cid:40)
(cid:40)
2.4. Random graph models as matrices
of probabilities. Now, you might be wondering
why we use only a single probability p for each
edge in the Erdos-R´enyi model. The random graph models we study here have an entry
Pij for each i, j, which is a more general setting than the Erdos-R´enyi construction:
Aij =
1 with probability Pij
0 with probability 1 − Pij
for each i, j in an n-by-n matrix.
(2.2)
Thus, if we set Pij = p, then this more general model corresponds to the Erdos-R´enyi
model. Now, of course, this begs two questions. How do we choose Pij? How do we
generate a random matrix A? We will describe three common random graph models
that consist of a choice of Pij: the Kronecker model, the Chung-Lu model, and the
stochastic block models. We will also describe the coin-flipping method of sampling a
random graph at this point. However, in subsequent sections, we will show how to
sample each of these models more efficiently than the coin-flipping method.
random
variables).
2.5. The coin-flipping method for sampling a random graph. Given the
matrix of probabilities P , the easiest way to generate a random adjacency matrix where
Aij is 1 with probability Pij is to explicitly simulate biased coin flips (which are also
Bernoulli
A pragmatic way to do this is to use a random
number generator that produces a uniform distri-
bution of values between 0 and 1. This is prag-
matic because most computer languages include
such a routine and make sure it is efficient. Given
such a random value ρ, we set Aij to 1 if ρ ≤ Pij
(which happens with probability Pij). An exam-
ple of doing this is show in Listing 1. Note that the indices in Python range from 0 to
n − 1 rather than from 1 to n as is common in mathematical descriptions of matrices.
2.6. The Kronecker model. The Kronecker random graph model results in
a non-uniform but highly structured probability matrix P . It begins with a small
initiator matrix K with n nodes and then enlarges it to a bigger matrix of probabilities
P by taking successive Kronecker products (Chakrabarti et al., 2004; Leskovec et al.,
2005, 2010). For an example suppose K is a 2 × 2 initiator matrix
Aside 7. Computers typically use
pseudo-random number generators
which have their own fascinating
field (Gentle, 2003; Knuth, 1997).
K =
,
(2.3)
(cid:20)a b
(cid:21)
d
c
5
Listing 1 A simple code to generate a random graph by coin flipping
import random
import numpy as np
"""
Generate a random graph by coin flipping. The input is a square matrix P with entries
between 0 and 1. The result is a 0 or 1 adjacency matrix for the random graph.
# after this, random.random() gives a uniform [0,1] value
# numpy is the Python matrix package
Example:
coinflip(0.25*np.ones((8,8))) # generate a random Erdos-Renyi graph
"""
def coinflip(P):
n = P.shape[0]
assert(n == P.shape[1]) # make sure we have a square input
A = np.zeros_like(P)
# create an empty adjacency matrix
for j in range(n):
for i in range(n):
# fill in each entry as 1 with prob P[i,j]
A[i,j] = random.random() <= P[i,j]
return A
where each a, b, c, d is a probability. The Kronecker product of K with itself is given
by
(cid:20)a · K b · K
c · K d · K
(cid:21)
=
K ⊗ K =
(2.5)
We use these kth Kronecker products as the matrix of probabilities for the random
graph. This gives us (in general) an nk-by-nk matrix of probabilities P for an nk-
node random graph. It quickly becomes tedious to write out these matrices by hand.
Surprisingly, there is structure inside of this matrix of repeated Kronecker products,
and we will return to study and exploit its patterns in Section 5.
There are a variety of motivations for repeated Kronecker products as a graph
model. On the practical side, they are extremely parsimonious and require only
the entries of a small n-by-n matrix, where n would be between 2 and 5. Second,
they can generate a variety of graphs of different sizes by adjusting k. Third, the
graphs they produce have a number of highly skewed properties (Seshadhri et al.,
2013). These reasons make the Kronecker model a useful synthetic network model for
various real-world performance studies (Murphy et al., 2010). On the statistical side,
Kronecker models have some of the same properties as real-world networks (Leskovec
et al., 2010). As such, they provide non-trivial null models.
6
.
ac ad
cb
ca
cc
cd
bb
ba
bc
bd
da db
dc
dd
aa ab
(cid:125)
0.97 0.49 0.49 0.25 0.49 0.25 0.25 0.13
0.49 0.20 0.25 0.10 0.25 0.10 0.13 0.05
0.49 0.25 0.20 0.10 0.25 0.13 0.10 0.05
0.25 0.10 0.10 0.04 0.13 0.05 0.05 0.02
0.49 0.25 0.25 0.13 0.20 0.10 0.10 0.05
0.25 0.10 0.13 0.05 0.10 0.04 0.05 0.02
0.25 0.13 0.10 0.05 0.10 0.05 0.04 0.02
0.13 0.05 0.05 0.02 0.05 0.02 0.02 0.01
0.5 0.2 ], then
(2.4)
.
Finally, the kth Kronecker product of K is just
(cid:124)
K ⊗ K ⊗ . . . ⊗ K
,
(cid:123)(cid:122)
k times
which is a 2k-by-2k matrix. As a concrete example, let K = [ 0.99 0.5
(cid:20) 0.9801 0.495 0.495 0.25
(cid:21)
0.495 0.198 0.25 0.1
0.495 0.25 0.198 0.1
0.25
0.1 0.04
0.1
K⊗K =
, K⊗K⊗K =
2.7. The Chung-Lu model. Recall that the degree, du, of a vertex u is just the
number of edges leaving u. For example, in the graph from Section 2.1, the degrees of
the nodes in alphabetical order are (2, 3, 2, 3, 1, 1, 0). Many important and interesting
features of a graph are deeply connected to the degrees of the vertices (Adamic et al.,
2001; Litvak et al., 2006). This fact is the motivation for the Chung-Lu random graph
model. We wish to have a random graph with vertices of roughly the same degree
as a network we are studying to understand if the properties we observe (in the real
network) are due to the degrees or the network structure. This is almost exactly
what Milo et al. (2002) did when they wanted to understand if a motif pattern was
significant.
In the Chung-Lu model, we need, as input, the desired degree of each vertex in
the resulting random graph. For example, say we want to generate an n-by-n graph
where vertex 1 has degree d1, vertex 2 has degree d2 and so on. Specifically, suppose
we want an 8 vertex network with 1 node of degree 4, 1 node of degree 3, 3 nodes of
degree 2, and 3 nodes of degree 1. The corresponding matrix is:
1.00 0.75 0.50 0.50 0.50 0.25 0.25 0.25
0.75 0.56 0.38 0.38 0.38 0.19 0.19 0.19
0.50 0.38 0.25 0.25 0.25 0.13 0.13 0.13
0.50 0.38 0.25 0.25 0.25 0.13 0.13 0.13
0.50 0.38 0.25 0.25 0.25 0.13 0.13 0.13
0.25 0.19 0.13 0.13 0.13 0.06 0.06 0.06
0.25 0.19 0.13 0.13 0.13 0.06 0.06 0.06
0.25 0.19 0.13 0.13 0.13 0.06 0.06 0.06
.
P =
This matrix results from setting
didj(cid:80)
k dk
.
Pij =
(2.6)
To understand why this is a good choice, let's briefly consider the expected degree
of vertex i. In the adjacency matrix, we can compute the degree by taking a sum of
all entries in a row. Here, we have, in expectation:
E[(cid:80)
j Aij] =(cid:80)
j E[Aij] =(cid:80)
j Pij =(cid:80)
= di.
(2.7)
didj(cid:80)
k dk
j
This analysis shows that, in expectation, this choice of probabilities result in a random
graph with the correct degree distribution.
2.8. The stochastic block model. Another feature of real-world networks is
that they have communities (Flake et al., 2000; Newman and Girvan, 2004). A
community is a group of vertices that are more tightly interconnected than they are
connected to the rest of the graph. Pictorially this results in a graph such as:
where there are two communities: blue and red. The stochastic block model is designed
to mirror this structure in a random graph. Suppose we want a random graph with
two communities with n1 and n2 nodes respectively. We want there to be high
probability, p, of edges within a community, and a low probability of edges between
the communities, q < p. Formally, this corresponds to a probability matrix:
(cid:40)
Pij =
p if i, j are in the same community
if i, j are in different communities
q
, where p > q.
(2.8)
7
The reason this is called the stochastic block model is that it can be written with a
set of block matrices. Consider n1 = 3, n2 = 5, p = 0.7, and q = 0.1:
0.7 0.7 0.7 0.1 0.1 0.1 0.1 0.1
0.7 0.7 0.7 0.1 0.1 0.1 0.1 0.1
0.7 0.7 0.7 0.1 0.1 0.1 0.1 0.1
0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7
0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7
0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7
0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7
0.1 0.1 0.1 0.7 0.7 0.7 0.7 0.7
.
P =
p
q
q
p
=
(2.9)
Notice that each of the blocks is just an Erdos-R´enyi matrix. The model can be
extended to an arbitrary number of subsets and the values of p and q can be varied
between different subsets. In the more general case, let Qrs denote the probability of
an edge between a node in the rth block and the sth block. Then the block adjacency
matrix will look like:
n1
n2
n1 Q11 Q12
n2 Q21 Q22
...
...
nk Qk1 Qk2
.
nk
··· Q1k
. . .
Qkk
2.9. Undirected graphs. The focus of our paper is on generating random
graphs. To do this, we generate a random binary and non-symmetric adjacency matrix
A. However, many studies on real-world data start with undirected graphs with
symmetric matrices of probabilities P . Thus, we would like the ability to generate
undirected graphs! We have three ways to get an undirected graph (and it's symmetric
adjacency matrix) from these non-symmetric adjacency matrices.
The first way has already been mentioned: take the upper or lower triangular piece
of the non-symmetric matrix A and just explicitly symmetrize that. (See Section 2.4.)
The second way builds upon the first way. Recall that in many scenarios discussed
in the introduction, we are interested in generating a large number of random graphs
from the same distribution. In this case, we note that a non-symmetric adjacency
matrix A that results from a symmetric matrix P will give us two samples of a random
graph! One from the lower-triangular entries and one from the upper-triangular entries.
This is the easiest and most pragmatic way to proceed if you are generating multiple
samples as all of the code from this paper directly applies.
The third way proceeds by only generating edges in the upper-triangular region
itself. For instance, in Listing 1, we could easily restrict the for loops to i < j, and
set Aji = 1 whenever we set Aij = 1. This same strategy, however, will become
much more complicated when we look at some of the accelerated generation schemes
in subsequent sections. It is possible and it is an exercise worth exploring for those
interested, but we deemed the added layer of complexity too high for this particular
manuscript. Besides, the second method above is likely to be more useful in scenarios
where multiple samples are needed and is also very easy to implement.
8
Fig. 2. A simple illustration of the ball-dropping procedure to generate an Erdos-R´enyi graph.
"Balls" are dropped with equal probability, and wherever balls are dropped, generate an edge in the
adjacency matrix.
3. Efficiently Generating Edges for Erdos-R´enyi Graphs: Ball-dropping
and Grass-hopping. Recall that in an Erdos-R´enyi graph, all nodes have probability
p of being connected. As previously explained, the simplest way to generate these edges
involves flipping n2 weighted coins or "coin-flipping." The problem with coin-flipping
is that it is extremely inefficient when generating an Erdos-R´enyi model of a real-world
network. A common characteristic of real-world networks is that most pairs of edges
do not exist. Just consider how many friends you have on Facebook or followers
on Twitter. It is likely to be an extremely small fraction of the billions of people
present on these social networks. This makes most of the resulting adjacency matrices
entries equal to zero, which results in something called a sparse matrix. Coin-flipping
is an expensive procedure for this scenario because
it requires a coin flip for every conceivable pair
of nodes given by each entry of the matrix. Our
goal is something that does work proportional to
the number of edges of the resulting network.
Aside 8. We say a matrix is sparse
if the number of zero entries is so
large that it makes sense just to
store information on the locations
of the entries that are nonzero.
3.1. Ball-dropping. The first accelerated
procedure we'll consider is what we call ball-
dropping. The inspiration behind this method
is that we can easily "drop a ball" into a uniform random entry in a large matrix,
which results in a random edge, see figure 2. Careful and repeated use of this proce-
dure will allow us to generate a random adjacency matrix where non-edges are never
considered! This solves the efficiency problem that motivates our accelerated sampling
procedures.
The ball-dropping process, itself, is quite simple:
1. generate a uniform random integer between 1 and n for i,
2. generate a uniform random integer between 1 and n for j.
The probability that we generate any entry i, j is then 1/n · 1/n = 1/n2, which is a
uniform distribution over entries of the matrix. Two questions arise: (i) how many
balls (or edges) do we drop and (ii) what do we do about duplicates?
The solution to question (i) can be resolved by binomial random variables. The
number of balls that we want to drop is given by the number of edges we will generate
in an Erdos-R´enyi graph. Recall that each edge or entry in Aij is the result of a random,
independent coin flip or Bernoulli trial. The total number of edges is the number
of successes in these coin flips, which is exactly what a binomial random variable
9
describes. Thus, the number of edges in an Erdos-R´enyi graph is a binomial random
variable with n2 trials and probability p of success. Many standard programming
libraries include routines for sampling binomial random variables, which makes finding
the number of balls to drop an easy calculation.
That leaves question (ii): what do we do
about duplicate ball drops? Suppose the sample
from the binomial distribution specifies m edges.
Each ball-drop is exactly the procedure described
above and we make no provisions to avoid du-
plicate entries. One strategy would be to ignore
duplicate ball drops. While this is expedient, it
samples from a different distribution over graphs
than Erdos-R´enyi, since less than m unique edges
will likely be generated. The alternative is to discard duplicate ball drops and continue
dropping balls until we have exactly m distinct entries. This method gives the correct
Erdos-R´enyi distribution, and listing 2 implements this procedure. This procedure
returns the edges of a random graph instead of the adjacency matrix to support the
sparse use case that motivates our accelerated study.
Aside 9. The approximate distribu-
tion that results from ignoring du-
plicate ball drops may still be useful
if the random graph were used to
test system performance or in other
applications where the precise dis-
tribution is not required.
Listing 2 A simple code to generate an Erdos-R´enyi random graph by ball dropping
import random
import numpy as np # numpy is the Python matrix package
"""
Generate a random Erdos-Renyi graph by ball-dropping. The input is:
# random.randint(a,b) gives a uniform int from a to b
n: the number of nodes
p: the probability of an edge
The result is a list of directed edges.
Example:
ball_drop_er(8,0.25) # 8 node Erdos-Renyi with probability 0.25
"""
def ball_drop_er(n,p):
m = int(np.random.binomial(n*n,p))
edges = set()
while len(edges) < m:
# the number of edges
# store the set of edges
# the entire ball drop procedure is one line, we use python indices in 0,n-1 here
e = (random.randint(0,n-1),random.randint(0,n-1))
if e not in edges:
edges.add(e)
return list(edges)
# check for duplicates
# add it to the list
# convert the set into a list
Proof that this procedure exactly matches the Erdos-R´enyi description. We asserted
above that this procedure actually generates an Erdos-R´enyi graph where each edge
i, j occurs with probability p. This is easy to prove and is well-known, although proofs
can be difficult to find. We follow the well-written example by Moreno et al. (2014).
In order for an edge i, j to occur, it must occur after we have picked m, the number of
edges from the binomial. Thus,
Prob[Aij = 1] =
Prob[Aij = 1 A has m edges] · Prob[A has m edges].
(3.1)
m=0
The first term, Prob[Aij = 1 A has m edges] is equal to m/n2 because we are
sampling without replacement. The second term Prob[A has m edges] is exactly a
10
n2(cid:88)
Fig. 3. An illustration of grass-hopping. The idea with grass-hopping is that we can sample
geometric random variables to move between the coin-flips that produce edges (the heads) directly
and skip over all the tails.
binomial distribution. Hence,
Prob[Aij = 1] =
(m/n2) ·
pm(1 − p)n2−m
n2(cid:88)
m=0
= (1/n2)
(cid:19)
(cid:18)n2
(cid:18)n2
(cid:19)
m
m
m
(cid:123)(cid:122)
n2(cid:88)
(cid:124)
m=0
pm(1 − p)n2−m
= (1/n2) · n2p = p.
(3.2)
(cid:125)
= expectation of binomial
(cid:3)
The downside with this method is that we do not have a precise runtime because
the algorithm continues to generate edges until the number of unique edges is exactly
m. We analyze this case further in Section 3.3.
3.2. Grass-hopping. The second accelerated method we present is what we
have called grass-hopping. This method is also known, but hard to find described
(and we still encounter many individuals unaware of it!). The idea dates back to the
1960s (see Section 3.4). We first learned of it while studying the source code for the
Boost Graph Library implementation of Erdos-R´enyi graph generation (Siek et al.,
2001). The essence of the idea is that we wish to "grass-hop" from edge to edge as
we conceptually (but not actually) flip all n2 coins in the coin flipping method. Note
that in the real-world case, there will be many coin flips that come up as "no edge"
repeated. Ideally, we'd like to "hop" over all of these flips as illustrated in Figure 3. Is
such a task possible?
Indeed it is. For a Bernoulli random variable with probability p, the number of
consecutively failed trials can be derived from a geometric random variable. More
specifically, a geometric random variable models the number of trials needed to obtain
the next success in a series of coin flips with fixed probability. Thus, by sampling a
geometric random variable, we can "grass-hop" from success-to-success and skip over
all of the failed trials. A code implementing this is given in Listing 3.
Some useful properties of geometric random variables. A geometric random vari-
able is a discrete random variable parameterized by the value p, which is the success
probability of the Bernoulli trial. Let X be a geometric random variable with probabil-
ity p, the probability distribution function Prob[X = k] = (1 − p)k−1p. Note that this
is just the probability that a coin comes up tails k − 1 times in a row before coming up
heads in the last trial. The expected value of X is 1/p. A straightforward calculation
provides the variance as 1−p
p2 .
Proof that grass-hopping is correct. The proof that grass-hopping is correct is
essentially just the result that the geometric random variable models the gaps between
successes. However, in the interest of exposition, we present a proof that Prob[Aij =
1] = p explicitly. In the adjacency matrix of the graph, the probability that the i, j
11
Listing 3 A simple code to generate an Erdos-R´enyi random graph by grass-hopping
import numpy as np # numpy is the Python matrix package and np.random.geometric
# is a geometric random variate generator
"""
Generate a random Erdos-Renyi graph by grass-hopping. The input is:
n: the number of nodes
p: the probability of an edge
The result is a list of directed edges.
Example:
grass_hop_er(8,0.25) # 8 node Erdos-Renyi with probability 0.25
"""
def grass_hop_er(n,p):
edgeindex = -1
gap = np.random.geometric(p)
edges = []
while edgeindex+gap < n*n:
# we label edges from 0 to n^2-1
# first distance to edge
edgeindex += gap
src = edgeindex // n
dst = edgeindex - n*src
edges.append((src,dst))
gap = np.random.geometric(p) # generate the next gap
# check to make sure we have a valid index
# increment the index
# use integer division, gives src in [0, n-1]
# identify the column
return edges
cell will have an edge can be calculated by adding the probabilities of all sequences of
hops that land on that cell. Let (cid:96) be the index of the i, j cell in the linear order from
0 to n2 − 1 used in the code. The probability that Aij = 1 is then the probability that
the sequence of hops lands on (cid:96) or equivalently, is simply a series of geometric random
variables whose sum is equal to (cid:96) + 1. (Here, we have an off-by-one change because
the indices range from 0 to n2 − 1 but the sums of gaps range from 1 to n2.)
From the total probability theorem, the probability that an edge will be generated
is the sum of the probabilities of all length-k hop paths where k goes from 1 to (cid:96)+1.
Prob[A(cid:96) = 1] = Prob[A(cid:96) = 1 in 1 hop] + Prob[A(cid:96) = 1 in 2 hops] + ···
+ Prob[A(cid:96) = 1 in (cid:96) + 1 hops]
(3.3)
There are a number of ways to land on index l by k hops. For example, here are two
different length k = 4 hops landing on index l = 13:
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
-1
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Let q = 1 − p. Notice that the probability of the first path is
(cid:124)(cid:123)(cid:122)(cid:125)
(q2p)
hop 1
(cid:124)(cid:123)(cid:122)(cid:125)
(q2p)
hop 2
(cid:124)(cid:123)(cid:122)(cid:125)
(q3p)
hop 3
(cid:124)(cid:123)(cid:122)(cid:125)
(q3p)
hop 4
= q10p4.
The probability of the second path is (p)(q3p)(qp)(q6p) = q10p4. The fact that these
two are equal is not a coincidence. In fact, the probability of a hop path with k hops
landing on ((cid:96)+1) is the same for any such path! There are(cid:0) (cid:96)
overall probability of a hop path with k hops landing on ((cid:96) + 1) is(cid:0) (cid:96)
(cid:1) such paths, and so the
(cid:1)q(cid:96)−k+1pk−1p,
where again q = 1 − p. We see this formally by observing that any hop path is a
series of geometric random variables each with distribution Prob[X = x] = qx−1p.
k−1
k−1
12
Furthermore, all hop-paths with the same number of hops have the same probability of
occurring because any sequence of k geometric random variables will be an arrangement
of ((cid:96) − k + 1) q's and k p's, where we will assert that the last letter is a p. Thus, the
number of length k hop-paths can be generated using binomial coefficients for the
number of ways to arrange ((cid:96) − k + 1) q's and k − 1 p's.
On substituting these binomial coefficient probability expressions into (3.3):
Prob[A(cid:96) = 1] = (cid:80)(cid:96)+1
(cid:124)
k=1
(cid:0) (cid:96)
k−1
(cid:1)q(cid:96)−k+1pk−1
(cid:125)
(cid:123)(cid:122)
binomial expansion of (p + q)(cid:96)
· p = p.
(3.4)
Notice we are left with the binomial expansion of (p + q)(cid:96) = 1 multiplied by p.
(cid:3)
The runtime of this procedure is exactly O(E) where E is the number of edges
output because for each instance of the loop, we generate one distinct edge. (This
assumes a constant-time routine to generate a geometric random variable and an
appropriate data-structure to capture their results.)
3.3. Comparing ball-dropping to grass-hopping with coupon collectors.
Both ball-dropping and grass-hopping produce the correct distribution, but our next
question concerns their efficiency. For grass-hopping, this was easy. For ball-dropping,
note that we need to drop at least m balls to get m edges. But we haven't yet discussed
how many duplicate entries we expect. Intuitively, if n is very large and p is small,
then we would expect few duplicates. Our goal is a sharper analysis. Specifically, how
many times do we have to drop balls in order get exactly m distinct edges?
This is a variation on a problem called the coupon collector problem. The classic
coupon collector problem is that there are m coupons that an individual needs to
collect in order to win a contest. Each round, the individual receives a random coupon
with equal probability. How many rounds do we expect before the individual wins? A
closely related analysis to what we present shows that we expect the game to run for
m log m rounds.
In our variation of the coupon collector's problem, we must find the expected
number of draws needed to obtain m unique objects (these are edges) out of a set of
n2 objects (these are entries of the matrix) where we draw objects with replacement.
This can be analyzed as follows based on a post from math.stackexchange.com (Yu,
2012).
Let X be the random variable representing the number of draws needed to obtain
the mth unique object. Let Xi be a random variable representing the number of trials
needed to obtain the ith unique object given that i−1 unique objects have already been
drawn. Then, E[X] = E[X1]+E[X2]+. . .+E[Xm]. Each random variable Xi is geomet-
rically distributed with p = 1 − i−1
n2 because the probability of drawing a new object is
simply the complement of the chance of drawing an object that has already been drawn.
Using the expected value of a geometric random variable, we obtain E[Xi] = n2
n2−i+1 .
n2−i+1 . This can be rewritten in terms of harmonic sums. The
harmonic sum, Hn, is defined as the sum of the reciprocals of the first n integers:
n . Consequently, E[X] = n2(Hn2 − Hn2−m). The harmonic partial sums
i ≈ log(n + 1) + γ (Pollack, 2015).
Thus, E[X] =(cid:80)m
Hn =(cid:80)n
can be a approximated as follows: Hn =(cid:80)n
(cid:82) n
i=1
This approximation is derived from the left hand
Riemann sum approximation for the integral of
1
x dx. The difference between the Riemann
1
sum, which represents the harmonic sum, and
the integral, is the Euler-Mascheroni constant, γ.
the Euler-
is
10. Here,
Aside
Mascheroni
approximately 0.57721.
constant,
i=1
i=1
n2
γ,
1
1
13
(cid:80)∞
i −(cid:82) ∞
1
1
Fig. 4. At left, the number of random draws that the ball-dropping and grass-hopping procedures
must make as a function of p, normalized by the expected number pn2. At right, the same data,
but zoomed into the region where p < 0.1. For this figure, n = 1000, and we show the 1% and 99%
percentiles of the data in the region. The orange line plots the expected ratio 1
p log( 1
1−p ).
1
x = γ. After substituting in this
i=1
approximation, the expected number of draws, E[X], simplifies to n2[log(n2)−log(n2−
m)]. To get a better expression, we need a value of m. Recall that m is sampled
from a binomial whose expectation is n2p. Using m = n2p simplifies the expression to:
E[X] = n2 log 1
1−p . In
Problem 1, we show that p−1 log 1
1−p . Thus, the extra work involved is p−1 log 1
1−p ≥ 1 with a removable singularity at p = 0.
1−p = mp−1 log 1
Consequently, ball-dropping always takes more random samples than grass-hopping.
The difference between these two becomes considerable as p gets larger as show in
Figure 4.
Large values of p. At this point, we should make the following observation. There
is little reason to run ball-dropping once p gets large. This is for two reasons. First, if
p is any value like 0.1, then we would expect 0.1n2 "edges", in which case we might as
well do coin-flipping because it talks almost the same amount of time. So we generally
expect p to scale O(1/n) or 1/nγ for γ < 1, such as γ = 1/2. In the models we will
consider, however, there are often cases where p does get large in small regions. Once
p > 0.5, then we actually expect most edges to be present in the graph. In which case
it's more computationally efficient to use ball-dropping to determine which edges are
missing instead of which edges are present.
3.4. Literature on efficient Erdos-R´enyi generation: leap-frogging. The
idea of using a geometric distribution to grass-hop through the probabilities has been
known since the 1960s (Fan et al., 1962). In this original literature, it was called
a "leap-frog" procedure. But this is still not widely known and not always widely
implemented – despite this point being mentioned over a decade ago by Batagelj and
Brandes (2005), where it was called a geometric method. More recently, Hagberg and
Lemons (2015) discuss the idea, but simply describe it as sampling from a waiting-time
distribution.
14
0.00.10.20.30.40.50.60.70.80.9edge probability value0.81.01.21.41.61.82.02.22.42.6total draws over expected draws p/n2ball-droppinggrass-hoppingexpected0.000.020.040.060.080.10edge probability value0.800.850.900.951.001.051.101.151.20total draws over expected draws p/n2ball-droppinggrass-hoppingexpected4. Chung-Lu and Stochastic Block Models: Unions of Erdos-R´enyi
graphs. Thus far, we have only studied fast methods for Erdos-R´enyi graphs. The
same techniques, however, apply to Chung-Lu and Stochastic Block Model graphs
as well, because these probability matrices are unions of Erdos-R´enyi blocks. This is
immediate for the stochastic block model because that model defines a set of small
regions. For instance, it is easy to use our Erdos-R´enyi subroutines to create a two
block stochastic block model as the following code illustrates.
""" Generate edges for a stochastic block model with two blocks.
n1 and n2 are the sizes of the two blocks and p is the within group
probability and q is the between group probability.
Example: sbm(20,15,0.5,0.1) # 20 nodes in group 1, 15 nodes in group 2, ...
"""
def sbm2(n1,n2,p,q):
edges = grass_hop_er(n1,p)
edges.extend( [ (i+n1,j+n1) for i,j in grass_hop_er(n2,p) ])
edges.extend( [ (i,j+n1) for i,j in grass_hop_er(max(n1,n2),q) if i < n1 and j < n2])
edges.extend( [ (i+n1,j) for i,j in grass_hop_er(max(n1,n2),q) if i < n2 and j < n1])
return edges
# generate the n1-by-n1 block
# n2-by-n2 block
This program has a runtime that scales with the number of edges in the graph.
(where total-degree =(cid:80)
For Chung-Lu graphs, the situation is slightly more intricate. The example Chung-
Lu probability matrix P from Section 2.7 has 8 nodes, 16 different probabilities, and
64 total entries in the probability matrix. It turns out that the number of distinct
probabilities is given by the number of distinct degrees. That example had four distinct
degrees: 4, 3, 2, 1. Since the probability of each matrix entry is Pij = didj/total-degree
i di is just a constant), then if there are t distinct degrees, we
will have t2 distinct probabilities in P . This corresponds with t2 Erdos-R´enyi blocks.
This can be justified most easily if the vector of degrees d is sorted. Let d[1] be the
first degree in sorted order and d[2] be the next, and so on. Then the entire vector is:
d = [ d[1] d[1] ··· d[1]
d[2] d[2] ··· d[2]
··· d[t] d[t] ··· d[t]
].
(4.1)
(cid:125)
(cid:124)
(cid:123)(cid:122)
(cid:125)
(cid:124)
(cid:123)(cid:122)
n1 times
n2 times
nt times
It does not matter if the vector is sorted in increasing or decreasing order and many
of the values of ni may be 1. Let ρ = total-degree. The resulting matrix P now has a
clear block Erdos-R´enyi structure:
(cid:124)
(cid:123)(cid:122)
(cid:125)
.
P =
n1
n2
nt
n1
d[1]d[1]
ρ
d[2]d[1]
ρ
...
n2
d[1]d[2]
ρ
d[2]d[2]
ρ
...
···
. . .
nt
d[1]d[t]
ρ
d[t]d[1]
ρ
d[t]d[2]
ρ
d[t]d[t]
ρ
(4.2)
(Note that a very careful implementation can use(cid:0)t
(cid:1) Erdos-R´enyi blocks.) The first
We leave an implementation of this as a solved exercise at the conclusion of this paper.
2
reference we are aware of to this algorithm for Chung-Lu graphs is Miller and Hagberg
(2011).
Direct Ball-dropping for Chung-Lu and Stochastic Block Models.. It turns out that
there are equivalent procedures to ball dropping for both Chung-Lu and and Stochastic
15
Block Models. We've deferred these to the problem section (Problems 3, 6) where we
explain some of the intuition behind the differences and some of the advantages and
disadvantages. Both methods need to deal with the same type of duplicate entries
that arise in ball-dropping for simple Erdos-R´enyi models, however this setting is far
more complicated as the different probability values can result in regions where there
will be many duplicates. These can be discarded to easily generate a slightly biased
graph. This is what is done in the Graph500 benchmark, for example (Murphy et al.,
2010). On the other hand, the number of Erdos-R´enyi blocks grows quadratically for
(cid:1) for Chung-Lu and k2 for the block model. Thus, in the case where
both models: (cid:0)t
there are a large number of blocks, there are some non-trivial considerations as far as
when grass-hopping would be preferable to ball-dropping. As an example, Hagberg
and Lemons (2015) shows a technique that generalizes Chung-Lu and enables efficient
sampling in this scenario.
2
5. Fast Sampling of Kronecker Graphs via Grass-hopping. As far as we
are aware, a ball-dropping procedure or coin-flipping procedure was the standard
method to sample a large Kronecker graph until very recently. Ball dropping methods
often generated many duplicate edges in hard to control ways (Gro er et al., 2011). In
practice, these duplicates were often ignored to generate approximate distributions
that are usable in many instances (Murphy et al., 2010). As previously mentioned,
coin-flipping could never scale to large graphs. This situation changed when Moreno
et al. (2014) showed that a "small" number of Erdos-R´enyi blocks were hiding inside
the structure of the Kronecker matrix.
We will walk through a new presentation of these results that makes a number
of connections to various subproblems throughout discrete mathematics. The key
challenge is identifying the entries of the matrix where the Erdos-R´enyi blocks occur.
This was simple for both Chung-Lu and the stochastic block model, but it is the key
challenge here. We are not going to discuss ball dropping procedures for Kronecker
graphs because those are widely discussed elsewhere and it would be a diversion, but
we strongly encourage interested readers to study both Chakrabarti et al. (2004) and
Seshadhri et al. (2013).
5.1. Kronecker graphs as unions of Erdos-R´enyi. And why grass-hopping
is hard! You might be wondering what makes this problem hard once we exhibit that
Kronecker graphs are unions of Erdos-R´enyi regions. Looking at the matrix P from
Section 2.6 shows that there are some repeated probabilities. (Figure 5 shows a guide
to where the probabilities are the same.) However, it seems as if they are scattered
and not at all square like they were in the Chung-Lu and Stochastic Block Model
cases. There is a larger example in Figure 6 that shows what a single region looks
like for a 64-by-64 matrix. This seems to imply that it is extremely difficult to take
advantage of any Erdos-R´enyi subregions. Moreover, it is unclear how many such
regions there are. If there are many such regions that are all small, then it will not
help us to sample each region quickly (even if we can!).
We are going to address both of these questions: (i) How many Erdos-R´enyi
regions are there? and (ii) How can each region be identified? More specifically, let
the initiator matrix K be n-by-n, and let k be the number of Kronecker terms, so
there are nk nodes in the graph. In the remainder of Section 5, we show the following
results:
(cid:1) regions, which is asymptotically O(kn2−1).
• Question (i). There are(cid:0)k+n2−1
This is important because it means that the number of regions grows more
k
16
slowly than as the number of nodes nk, enabling us to directly enumerate the
set of regions and keep an efficient procedure. (Section 5.2)
• Question (ii). The regions are easy to identify in a multiplication table view
of the problem and the regions have a 1-1 correspondence with length k
non-decreasing sequences of elements up to n2. (Section 5.4)
• Question (ii). We can randomly sample in the multiplication table view by
• Question (ii). We can map between the multiplication table view and the
unranking multiset permutations. (Section 5.5)
repeated Kronecker products via Morton codes. (Section 5.6)
5.2. The number of Erdos-R´enyi regions in a Kronecker matrix. Con-
sider the result of taking a Kronecker product of a matrix K with itself. In the 2 × 2
case with K =(cid:2) a b
(cid:3), then
c d
aa ab
ac ad
cb
ca
cc
cd
.
bb
ba
bd
bc
da db
dc
dd
K ⊗ K =
(5.1)
Note that all combinations of symbols a, b, c, d occur between the Kronecker product.
This result holds generally. Consequently, we can identify a length-k string of the
. . . ⊗ K. If K is n × n, then there
symbols a, b, c, d with each entry of P = K ⊗ k terms
are (n2)k such strings. The feature we are trying to exploit here is that the string
aba results in the same probability as aab and baa, and hence we want to count the
number of these distinct probabilities.
An appropriate mathematical object here is the multiset. In a multiset, we have a
set of items, along with a multiplicity, but where the order of items is irrelevant. So the
strings aab and aba would both correspond to the multiset where a occurs twice and b
occurs once. The cardinality of this multiset is 3. Consequently, the number of unique
. . . ⊗ K is equivalent to the number of distinct multisets we
probabilities in K ⊗ k terms
can derive from the n2 symbols in K where each multiset has cardinality k.
A famous and well-known result in counting follows. Recall that (cid:0)n
(cid:1) is the
number of distinct sets of cardinality k that can be drawn from a set of n items. The
generalization to multisets is called "multichoose" and
k
= the number of multisets of cardinality k with n items
(5.2)
(cid:18)(cid:18)n
(cid:19)(cid:19)
(cid:19)
.
k
(cid:18)n + k − 1
Consequently, there are(cid:0)(cid:0)n2
=
k
k
matrix for a Kronecker graph.
The right hand side of this can be derived from a stars and bars argument (see, for
instance, Wikipedia).
(cid:1) Erdos-R´enyi regions in the probability
(cid:1)(cid:1) =(cid:0)k+n2−1
k
Recall that for large networks, we are expecting the network to be sparse, and so
we expect the number of edges generated to be about the same size as the number of
nodes. This expression, at the moment, is worrisome because there are nk nodes in a
Kronecker graph and so we'd like there to be fewer Erdos-R´enyi regions than there
are nodes. If this isn't the case, then just looking at all regions would result in more
work than we would do generating edges within each region.
17
Fig. 5. For a Kronecker graph with a 2 × 2 initiator matrix K = [ 0.99 0.5
been "⊗-powered" three times to an 8 × 8 probability matrix, see equation (2.5), the marked cells
illustrate the regions of identical probability that constitute an Erdos-R´enyi piece. Here, we have used
symmetry in K to reduce the number of regions.
b d
0.5 0.2 ] =(cid:2) a b
(cid:3) that has
Fig. 6. For a Kronecker graph with a 2×2 initiator matrix K =(cid:2) a b
(cid:3) that has been "⊗-powered"
six times (k = 6) to an 64 × 64 probability matrix, the marked cells illustrate one Erdos-R´enyi piece
that corresponds to the probability abcdab.
c d
We now show three results that will guarantee
that there are fewer Erdos-R´enyi regions than
nodes of the graph for sufficiently large values
of k. The first result is that there are at most
(e + 1)k regions for a large enough k, which gives
our result when e + 1 ≤ n. The second is that
if n = 2 or n = 3 there are at most 2k or 3k regions when k ≥ 10. The third is
(cid:1) is O(kn2−1) asymptotically, which means that the number of regions
Aside 11. We are using big-O no-
tation here to understand what hap-
pens for large values of k when n is
considered a fixed constant.
that(cid:0)n2+k−1
k
18
aaadddaababbaadabdbbbbddbbdaddabcdabasymptotically grows much more slowly than the number of nodes.
Once k ≥ e(n2 − 1), then we have at most (e + 1)k regions.
Result 1. By Sterling's approximation for combinations: (cid:0)a
(cid:1) ≤ ( ea
Substituting the expression for the number of regions yields: (cid:0)k+n2−1
(cid:1) ≤ ( e(k+n2−1)
(cid:1) ≤ 2k when k
Result 2. For n = 2, we will show by induction that (cid:0)k+n2−1
(cid:1), so when k = 7,(cid:0)k+3
(cid:1) = 120, 2k = 128, and
becomes large. Note(cid:0)k+n2−1
(cid:1) ≤ 2k+1.
assuming it holds true for k. Substituting k + 1, we need to show that(cid:0)k+4
120 < 128. For our inductive step we must show that our inequality holds true for k + 1
(cid:1) =(cid:0)k+n2−1
b )b (Das, 2017).
)k.
n2−1
k
k
k
k
3
b
3
Expanding the left hand side,
(cid:18)k + 4
(cid:19)
3
(k + 4)(k + 3)(k + 2)
3!
(cid:18)k + 1
(cid:19)
· (k + 4)(k + 3)(k + 2)
3!
=
=
k + 1
k + 1
k + 4
k + 1
=
3
≤ 2 · 2k = 2k+1
k
k
(cid:81)9
k+1 ≤ 2.
The last statement assumes k ≥ 2, so k+4
our inductive step we must show that our inequality holds true for k + 1 assuming it
The same strategy works for n = 3 to show that(cid:0)k+n2−1
becomes large. When k = 10,(cid:0)k+8
holds true for k. Substituting k + 1 into our inequality, we need to show(cid:0)k+9
inductive assumption that(cid:0)k+8
Result 3. Finally, we note that(cid:0)k+n2−1
(cid:1) ≤ 3k for n = 3 when k
(cid:1) = 43758, 3k = 59049, and 43758 < 59349. For
(cid:1) ≤ 3k+1,
(cid:1) ≤ 3k. Thus, we obtain k+9
(cid:1) = (k+n2−1)!
) because n is
a constant. If we use the simple upper-bound (k+n2−1)!
≤ (k + n2 − 1)n2−1 and then
take logs, we have: (n2 − 1) log(k + n2 − 1). The concavity of log gives the subadditive
property log(a + b) ≤ log(a) + log(b) when a, b ≥ 2. So (n2 − 1) log(k + n2 − 1) ≤
(n2 − 1) log(k) + (n2 − 1) log(n2 − 1). Exponentiating now yields O(kn2−1).
k+1 allows us to use our
k+1 ≤ 3 which is true when
≤ 3k · 3. Multiplying the LHS by k+1
or equivalently
k ≥ 3.
k!(n2−1)! = O( (k+n2−1)!
i=2 k+i
k!
k!
8!
k
8
8
We now have the results that show there are sufficiently few Erdos-R´enyi regions
in a Kronecker graph, and so our grass-hopping procedure could successfully be applied
to each region. This resolves question (i). We now turn to question (ii).
5.3. The strategy for grass-hopping on Kronecker graphs: Multiplica-
tion tables and Kronecker products. In order to find the Erdos-R´enyi regions in
a Kronecker graph easily, we need to introduce another structure: the multiplication
table. Let v be the vector(cid:2)a b
c d(cid:3)T
, then
.
(5.3)
av
bv
cv
dv
v ⊗ v =
19
This object can be reshaped into
reshape(v ⊗ v) =
For those accustomed to the mixed-product property of Kronecker products, this result
is just vec(vvT ) = v ⊗ v. The vec operator is a useful tool that converts a matrix into
a vector by stitching the column vectors of a matrix together:
bb
cb
bc
cc
bd
ba
ca
cd
da db dc dd
aa ab ac ad
a
(cid:21)(cid:19)
=
d
c
b
d
(cid:18)(cid:20)a b
vec
c
(5.4)
(5.5)
The reason this is called a multiplication table is that it is exactly the multiplication
table you likely learned in elementary school when a = 1, b = 2, c = 3, d = 4, . . ..
To get some sense of where this is going, compare (5.4) to (5.1) and notice that all
the same entries occur, but they are just reorganized. The idea with a multiplication
table is that we can keep going:
reshape(v ⊗ v ⊗ v) =
.
(5.6)
More generally, a k-dimensional multiplication table arises from
reshape(v ⊗ v ⊗ ··· ⊗ v
).
(cid:124)
(cid:123)(cid:122)
k times
(cid:125)
(5.7)
Here's how the multiplication table view helps us: it is easy to find the Erdos-R´enyi
regions in a multiplication table! Consider the entry aab. This occurs in cells (1, 1, 2),
(1, 2, 1), and (2, 1, 1). These are exactly the three permutations of the multiset with
two 1s and one 2.
However, that result does not do us any good without the following fact: the
entries of the k-dimensional multiplication table with v = vec(K) can be mapped 1-1 to
entries of the repeated Kronecker product matrix K ⊗ K ⊗ ··· ⊗ K
. More specifically,
we show that
(cid:124)
(cid:125)
k times
vec(K ⊗ K ⊗ ··· ⊗ K
) = M n,k vec(K) ⊗ vec(K) ⊗ ··· ⊗ vec(K)
(5.8)
(cid:123)(cid:122)
(cid:123)(cid:122)
k times
(cid:124)
(cid:123)(cid:122)
k times
(cid:125)
(cid:124)
(cid:125)
where M n,k is a permutation matrix based on a Morton code. This mapping is
illustrated in Figure 7 and Figure 8. We will explain exactly what is in that figure in
subsequent sections, but we hope it helps provide a visual reference for the idea of
mapping between the Kronecker information and the multiplication table.
These two results, together with the small number of regions result from Section 5.2,
enable the following strategy to grass-hop on an Kronecker graph efficiently. Grass-
hop independently in each region of the the multiplication table and then map the
multiplication table entries back to the Kronecker matrix. More programmatically:
20
daadabdacdaddbadbbdbcdbddcadcbdccdcdddaddbddcdddcaacabcaccadcbacbbcbccbdccaccbcccccdcdacdbcdccddbaababbacbadbbabbbbbcbbdbcabcbbccbcdbdabdbbdcbddaaaaabaacaadabaabbabcabdacaacbaccacdadaadbadcadd""" Generate a Kronecker graph via grass-hopping. The input K is the
Kronecker initiator matrix and the the value k is the number of levels.
Example: grass_hop_kron([[0.99,0.5],[0.5,0.2]], 3) """
def grass_hop_kron(K,k):
n = len(K) # get the number of rows
v = [K[i][j] for j in xrange(n) for i in xrange(n)] # vectorize by cols
edges_mult = []
for r in regions(v,k):
# for each region of the mult. table
edges_mult.extend(grass_hop_region(r, v)) # get edges in mult. table
edges_kron = []
for e in edges_mult:
# map edges from mult. table to kron
edges_kron.append(map_mult_to_kron(e, n))
return edges_kron
The goal of the next three subsections is to write the each of the functions: regions
(Section 5.4), grass_hop_region (Section 5.5), and map_mult_to_kron (Section 5.6).
Once we have these pieces, we will be able to efficiently grass-hop through a Kronecker
graph!
5.4. Enumerating all Erdos-R´enyi regions. Recall that each of the distinct
probabilities that occur in P = K ⊗ k terms
. . . ⊗ K can be identified with a multiset
of size k from a collection of n2 objects (Section 5.2). Our task is to enumerate all
of these multisets. Here, we note that each multiset can be identified with a non-
decreasing sequence of length k where the symbols are 0, 1, . . . , n2 − 1. For instance,
when n = 2, k = 3, these sequences are
[0,0,0],
[0,0,1],
[0,0,2],
[0,0,3],
Let v = vec((cid:2) a b
c d
[0,1,3],
[0,2,2],
[0,1,1],
[0,1,2],
(cid:3)) = [ a c b d ]T . The sequence [0, 2, 2], then, refers to the probability
[0,2,3],
[0,3,3],
[1,1,1],
[1,1,2],
[1,1,3],
[1,2,2],
[1,2,3],
[1,3,3],
[2,2,2],
[2,2,3],
[2,3,3],
[3,3,3].
v(1)v(3)v(3) = abb.
At this point, we are starting to mix programmatic indexes (0, . . . , n2 − 1) with
the mathematical indices (1, . . . , n2). Our goal is not to be confusing, but rather to
ensure that the discussion in the text matches the programs more precisely from this
point forward.
As justification, we hope it is easy to see that each non-decreasing sequence
of length k corresponds with a multiset of cardinality k. (For instance, [0, 2, 2, 3]
corresponds to one 0, two 2s, and one 3.) The other direction, that each multiset can
be represented as a non-decreasing sequence, is also straightforward. Given a multiset
of elements from 0 to n2 − 1 with k total elements, place them into a sequence with
repetitions in sorted order. So if we had two 5s, three 1s, and one 2, we would get the
sequence [1, 1, 1, 2, 5, 5, 5]. This sequence is non-decreasing and so we can do this for
any multiset.
Thus, we have justified that the length k non-
decreasing sequences are in 1 − 1 correspondence
with the Erdos-R´enyi regions. We now continue
with the problem of computationally enumerating
non-decreasing sequences.
Aside 12. One note, there could be
fewer Erdos-R´enyi regions due to
duplicated probability values. We
are assuming here that the values in
K are distinct.
For remainder of this section, k will represent
the length of the sequence, and m will represent
the largest entry + 1 that is valid in the sequence
in order to match the code precisely. In the previous example, k = 4 and m = 4. Our
code for this task is implemented in the subroutine regions in Listing 4. It begins
with the first sequence: [0, 0, 0, 0] and iteratively steps through all of them via the
function next_region.
21
The function next_region handles scenarios exemplified by the following three
cases
[0, 1, 1, 2] → [0, 1, 1, 3]
[1, 3, 3, 3] → [2, 2, 2, 2]
[3, 3, 3, 3] → [−1,−1,−1,−1]
easy
spill
spill and done.
(5.9)
Recall that Python indexes from 0. This next_region update works by incrementing
the last, or k−1th, entry of the sequence to the next value. In the easy case, this results
in [0, 1, 1, 2] → [0, 1, 1, 3]. In the spill case, we get [1, 3, 3, 3] → [1, 3, 3, 4]. We check for
these cases by examining the value of this last element again. If it is any value < m,
then we are in the easy case and there is nothing left to do. However, if the last value
is equal to m, then we need to handle the spill. In the spill scenario, we recursively
ask for next non-decreasing sequence for all but the last element. In our example, this
call produces next_update([1, 3, 3], 4), which yields [1, 3, 3] → [2, 2, 2]. At this
point, cur = [2, 2, 2, 4]. Because the sequence must be non-decreasing, we set
the last element (currently at 4) to be the first value possible. This is given by the
second-to-the-last element (2) after the prefix is updated the value is incremented by 1.
And so, this update produces [1, 3, 3, 3] → [2, 2, 2, 2]. The final case is if the array had
length 1, then there is no prefix to update. In this case, we simply flag this scenario
by introducing a −1 sentinel value. This sentinel value propagates through the array.
Listing 4 Code to update a non-decreasing sequence representing a subregion to the
next non-decreasing sequence
def next_region(cur, m):
k = len(cur)
cur[k-1] += 1
if cur[k-1] == m:
# increment the last element
# if there is spill
if len(cur) > 1: # there is an array
cur[0:k-1] = next_region(cur[0:-1],m) # recur on prefix
cur[k-1] = cur[k-2]
# update suffix
else:
cur[k-1] = -1
# singleton, no room left!
return cur
""" Generate the set of Erdos-Reyni regions in a Kronecker graph
where v = vec(K), and k = number of levels. Each region gives indices
into v that produce a distinct Erdos-Reyni probability.
Example: regions([0.99,0.5,0.5,0.2],3) """
def regions(v,k):
m = len(v)
rval = []
cur = [ 0 for _ in xrange(k) ] # initialize the regions to zero
while cur[0] != -1:
rval.append(list(cur)) # make a copy
next_region(cur, m)
return rval
Proof that regions and update work. The following is a sketch of a proof that
next_region gives the next region in lexicographic order. First, for arrays of length
1, this is true because at each step we increment the element up until we generate the
−1 termination symbol. We now inductively assume it is true for arrays of length < k.
When next_region runs on an array of length k, then either we increment the last
element, in which case we have proven the result or the last element is already n − 1.
If the last element is already n − 1, then we generate the next element in lexicographic
22
order in the prefix array, which is of length k − 1, and this occurs via our induction
hypothesis. Finally, note that the last element of the updated prefix has the same
value as our suffix.
5.5. Grass-hopping within an Erdos-R´enyi region in the Multiplication
Table: Unranking multiset permutations. Given an Erdos-R´enyi subregion, we
now turn to the problem of how to grass-hop within that region in the multiplication
table. Let v be a length m vector, which is vec(K), and consider the k-dimensional
multiplication table M . The entry (i, j, . . . , l) in the multiplication table is simply
equal to the product v(i)v(j) . . . v(l). In other words
(5.10)
M (i, j, . . . , (cid:96)) = v(i)v(j)··· v((cid:96))
,
k total terms
(cid:124)
(cid:123)(cid:122)
(cid:125)
where v(i) is the ith entry in the vector v. Recall from section 5.4 that each Erdos-
R´enyi subregion exactly corresponds with a length k non-decreasing sequence. Let
r be the length k non-decreasing sequence that labels the current region.
In the
multiplication table, this region corresponds to the element
M (r1 + 1, r2 + 1, . . . , rk + 1) = v(r1 + 1)v(r2 + 1)··· v(rk + 1).
(5.11)
(Note that we index the region programmatically, but the vector entries mathematically,
hence, the addition of 1.) The locations in the multiplication table in which this
Erdos-R´enyi subregion occurs are the distinct permutations of the sequence r. For
example
r = [0, 1, 1, 1] → [0, 1, 1, 1], [1, 0, 1, 1], [1, 1, 0, 1], [1, 1, 1, 0]
r = [0, 1, 2, 2] → [0, 1, 2, 2], [0, 2, 1, 2], [0, 2, 2, 1], [1, 0, 2, 2],
[1, 2, 0, 2], [1, 2, 2, 0], [2, 0, 1, 2], [2, 0, 2, 1],
[2, 1, 0, 2], [2, 1, 2, 0], [2, 2, 0, 1], [2, 2, 1, 0].
(5.12)
All of these entries have exactly the same probability because the multiplication
operation in (5.11) is associative.
Consequently, it is easy to find the regions of the multiplication table that share
the same probability. What is not entirely clear at this point is how we use this with a
grass-hopping procedure. In grass-hopping, we move around indices of the Erdos-R´enyi
region in hops. How can we hop from the element [0, 2, 1, 2] to [2, 0, 1, 2]?
The answer arises from an the ranking and unranking perspective on combinatorial
enumeration (Bonet, 2008). For a complex combinatorial structure, such as multiset
permutations, we can assign each permutation a rank from 0 to the total number of
objects minus one. Thus, in second example in (5.12) we have
[0, 1, 2, 2] → 0
[0, 2, 1, 2] → 1
...
[2, 2, 1, 0] → 11
(5.13)
This rank is based on the lexicographic order of the objects. Lexicographic order is
exactly the same order you'd expect things to be in based on your experience with
traditional sequences of numbers. The permutation [2, 1, 0, 2] occurs before [2, 2, 0, 1]
23
for the same reason we say 2102 is before 2201 in order. Unranking is the opposite
process. Given an integer between 0 and the total number of objects minus one, the
unranking problem is to turn that integer into the combinatorial object. Hence,
unrank→ [1, 2, 0, 2].
4
(5.14)
More generally, given the initial sequence r = [0, 1, 2, 2], and any integer between 0
and 11, the unranking problem is to turn that integer into the sequence with that
rank in lexicographic order.
This is exactly what we need in order to do grass-hopping on multiset permutations.
We grass-hop on the integers between 0 and the total number of multiset permu-
tations −1. The total number of multiset permutations is given by the the formula:
m!
a1!a2! . . . ak!
(5.15)
where ai is the number of times the ith element appears and m is the cardinality of the
multiset. (See the permutation page on Wikipedia for more details) At a high level, the
unrank algorithm (Listing 5) takes as input a multiset permutation in non-decreasing
form represented as an array, as well as an index or "rank" of the desired permutation.
The algorithm is recursively defined and simply returns the original array if the input
rank is 0 as the base case. In the other case, the algorithm searches for the first
element of the multiset permutation. (The details of this search are below.) Once it
finds the first element, then it recurs on the remainder of the sequence after removing
that element.
To make this code somewhat efficient, we maintain a counter representation of the
multiset. This counts the number of times each element occurs in the multiset and
keeps a sorted set of elements. For the multiset [0, 1, 2, 2], the counter representation
is:
keys = [0, 1, 2]
and mset =
(5.16)
(cid:124)
(cid:123)(cid:122)
(cid:125)
sorted elements
0 → 1
1 → 1
2 → 2
The functions ndseq_to_counter and counter_to_ndseq convert between the counter
and sequence representations. The function num_multiset_permutations returns the
number of permutations of a given multiset via (5.15). For our example, [0, 1, 2, 2], equa-
tion (5.15) is equal to 12, which matches our direct enumeration in (5.13). The main
algorithm is unrank_mset_counter, which takes as input the counter representation
of the multiset as well as the "rank" index. The objective of unrank_mset_counter
is to find the first element of the permutation in lexicographic order. We examine
the sorted elements in the keys array in order. For each element, we tentatively
remove it by decreasing its count in mset and then we count the number of multiset
permutations with the remaining elements. For our running example, this yields:
[0, 1, 2, 2] → starts with 0 and ends with a permutation of [1, 2, 2] = 3
starts with 1 and ends with a permutation of [0, 2, 2] = 3
starts with 2 and ends with a permutation of [0, 1, 2] = 6.
(5.17)
We interpret this output as follows. Let the desired rank be R. There are three
permutations which start with a zero, and they correspond to the first three ranks 0,
24
1, or 2. So if R < 3, in that case we can recurse and unrank the permutation with
sequence [1, 2, 2] and exactly the same rank R. If the rank is 3, 4, or 5, then the
permutation starts with 1 and we can recurse and unrank the permutation of [0, 2, 2]
with rank R − 3. Finally, if the rank is 6, . . . , 11, then the permutation starts with 2
and we can recurse and unrank the permutation of [0, 1, 2] with rank R − 6. These
recursions yield the suffix that we return.
Listing 5 Unranking a multiset permutation
# unrank takes as input:
# - C: a multiset represented by a list
# - n: the lexicographic rank to find
# and returns the nth permutation of C in
# lexicographic order.
#
# Examples:
# unrank([0,1,1,3], 0) returns [0,1,1,3]
# unrank([0,1,1,3], 1) returns [0,1,3,1]
# unrank([0,1,1,3], 2) returns [0,3,1,1]
def num_multiset_permutations(mset):
count = factorial(sum(mset.values()))
for k in mset.keys():
count = count//factorial(mset[k])
return count
def unrank_mset_counter(mset,keys,n):
if n==0:
# easy if rank == 0
return counter_to_ndseq(mset,keys)
for s in keys: # else find prefix key
from math import factorial
def ndseq_to_counter(seq):
mset = {}
for c in seq:
# get a value with a default
# of zero if it isn't there
mset[c] = mset.get(c,0)+1
return mset, sorted(mset.keys())
mset[s] -= 1 # decrease count of s
# determine number of prefixes with s
place = num_multiset_permutations(mset)
if place > n:
# then the first element is s
if mset[s] == 0: # remove the key
keys.remove(s) # if the count is 0
suffix = unrank_mset_counter(
mset, keys, n) # recurse!
# append s
suffix.insert(0, s)
return suffix
def counter_to_ndseq(mset,keys):
else: # here it does not start with s
seq = []
for k in keys: # keys in sorted order
# append k mset[k] times
for v in xrange(mset[k]):
seq.append(k)
return seq
mset[s] += 1 # restore the count
n -= place
# update search offset
raise(ValueError("rank too large"))
def unrank(seq,n):
mset,keys = ndseq_to_counter(seq)
return unrank_mset_counter(mset,keys,n)
5.6. Mapping from the Multiplication Table to the Kronecker graph:
Morton codes. In this section we prove a novel connection between repeated Kro-
necker product graph matrices and Morton codes that was mentioned in equation 5.8.
But first, some background on Morton codes!
Morton codes or Z-order codes are a neat primitive that arise in a surprising
diversity of applications. Relevant details of these applications are beyond the scope
of our tutorial, but they include high-performance computing (Bulu¸c et al., 2009),
database search, and computer graphics (see Wikipedia for references on these). When
Morton codes and Z-order are used in the context of matrices, the term refers to a
specific way to order the matrix elements when they are represented as a data array
with a single index. Common strategies to accomplish this include row and column
major order, that order elements by rows or columns, respectively. Morton codes adopt
a recursive, hierarchical pattern of indices. Here are four different ways to organize
25
Listing 6 Grass-hopping in an Erdos-R´enyi region of a Kronecker product matrix
import numpy as np # use np.random.geometric for the geometric random variables
# grass_hop_region takes as input
# - r: the region to be sampled represented by a non-decreasing array
# - v: the initiator matrix represented as a n^2-by-1 column vector
# and returns a list of edges represented by indexes in mult. table
# Example: v = [0.99,0.5,0.5,0.2]; grass_hop_region(regions(v,3)[2], v)
def grass_hop_region(r,v):
# p is the common prob value of the region
p = multtable(r,v)
n = num_multiset_permutations(ndseq_to_counter(r)[0]) # total size of region
edges_mult = []
i = -1
gap = np.random.geometric(p)
while i+gap < n:
# the initially empty list of edges
# starting index of the grass-hopping
# the first hop
# check to make sure we haven't hopped out
# increment the current index
i += gap
edges_mult.append(unrank(r,i)) # add the
gap = np.random.geometric(p) # generate the next gap
return edges_mult
# multtable takes as input:
# - r: an array with k elements specifying a cell in the multiplication table
# - v: the initiator matrix represented as a n^2-by-1 column vector
# and returns the value at the specified location in the multiplication table
def multtable(r,v):
final = 1.0
for val in r:
final *= v[val]
return final
the 16 values in a 4-by-4 matrix
(cid:124)
1
5
9
3
2
0
7
6
4
8
10 11
12 13 14 15
Row Major Order
(cid:123)(cid:122)
(cid:125)
(cid:124)
(cid:125)
8
9
12
0 4
13
1 5
2 6 10 14
3 7 11 15
(cid:123)(cid:122)
(cid:124)
1
3
9
5
4
0
7
6
2
8
12 13
10 11 14 15
Row Morton Order
(cid:123)(cid:122)
(cid:125)
(cid:124)
8
9
10
0 2
11
1 3
4 6 12 14
5 7 13 15
(cid:123)(cid:122)
(cid:125)
Column Major Order
Column Morton Order
The name "Z-curve" comes from the description of the row Morton order, which
enumerates the first 2-by-2 block in a "Z" shape, and then recursively repeats that in
growing 2-by-2 blocks. For the general Morton code, notice the recursive pattern as
well. We are going to use column Morton orders in this paper.
More specifically, a Morton code refers to the method used to generate the linear
index from the row and column, or the inverse map, which takes a linear Morton index
and produces the row and column in the matrix
MortonEncode(i, j) → I ∈ [0, n2 − 1]
MortonDecode(I) → (i, j) ∈ [0, n − 1]2.
(5.18)
At this point, we've fully switched to programmatic indices as otherwise the confu-
sion between the codes and the text would become extreme. Matrices and vectors,
now, are indexed from 0 as well.
In the previous 4-by-4 example of the orders,
MortonEncode(1, 2) = 9, and MortonDecode(7) = (3, 1). (Our row and column in-
dices start at zero if these numbers seem off by one!) The encoding and decoding
procedures work on bit-strings for the respective numbers. In fact, the procedure is
surprisingly elegant: take the bit-strings for the row and column index and interleave
26
Fig. 7. The Morton decoding process of a 2nd power Kronecker graph. The decoding process
takes the lexicographic index of a probability sequence and maps it to 2-dimensional (i, j) indices by
a z-order curve. In (a) and (c), the probability sequences are indexed directly in lexicographic order.
Writing the index in base 2 and separating every other digit yields the row and column indices for
each permutation as seen in (b). The placing of permutations in the matrix that arises is the same
as that of the 2nd power Kronecker matrix (d). The ordering of the lexicographic indexes in (b) is a
z-shaped fractal pattern (Follow the ordering of the numbers from 0 − 15.)
the digits. For example, let's say we want to encode the numbers 1 and 2 into a single
value. First, we convert both numbers into base 2: 1 → 012 and 2 → 102. Next we
interleave the digits starting from the column:
1 0
0 1
1 0 0 1
The resulting code 10012 = 9: the desired Morton index. To decode a Morton index
into the row and column numbers, we simply reverse the process. We consider 7 with
it's base-2 representation: 01112 and divide the digits into two groups, alternating
every binary digit:
0 1 1 1
0 1
1 1
This gives a column index of 1 and a row index of 3.
Now, suppose we consider the Morton code as map between two linear indices:
the column Morton order and the column major order. This is easy to build if we
are given a MortonDecode function because we can quickly move from the row and
column values to the linear index in column major order. (In case this isn't clear,
given the row r and column c indices, the column major index is r + cn where n is the
number of rows of the matrix.) The result is a permutation [0, n2 − 1] → [0, n2 − 1]:
0 → 0 4 → 2
1 → 1
5 → 3
2 → 4
6 → 6
7 → 7
3 → 5
8 → 8
9 → 9
10 → 12
11 → 13
27
12 → 10
13 → 11
14 → 14
15 → 15
.
(5.19)
This permutation induces a permutation matrix M :
1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0
0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0
0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1
(5.20)
The essence of our final primitive is that this Morton map translates between the
multiplication table and the Kronecker product as illustrated in Figure 7. In this case,
we have validated the case of equation (5.8)
vec(K ⊗ K)
=
(cid:124)
(cid:123)(cid:122)
(cid:125)
M(cid:124)(cid:123)(cid:122)(cid:125)
(cid:124)
[vec(K) ⊗ vec(K)]
(5.21)
(cid:123)(cid:122)
(cid:125)
Kronecker matrix
in column-major
MortonDecode
to column-major
linear index
from multiplication table
where K is two-by-two. We prove this statement in full generality shortly.
More generally, Morton codes can be defined with respect to any base. We
illustrate a case of equation (5.8) in Figure 8 where K is 3 × 3 and k = 3. Suppose, in
the multiplication table, we generate an edge at index 329. The value 329 in base 3 is
1100123. The resulting MortonDecode is
1 1 0 0 1 2
1 0 1
1 0 2
which gives a column index of 1 · 32 + 1 = 10 and a row-index of 1 · 32 + 2 = 11.
Looking up this entry in the Kronecker matrix (Figure 8, upper right), yields a value
of eaf . Checking back in the multiplication table (Figure 8, upper left) shows that
entry 329 corresponds to entry eaf as well! (Note that given the base 10 value 329 we
can determine its value in the multiplication table by doing a base 9 decode. Indeed,
32910 = 4059, which gives a multiset index of [4, 0, 5] corresponding to the values
v(5) = e, v(1) = a, v(6) = f .)
Returning to the problem of generating a random Kronecker graph, recall that
equation (5.8) gave us a way of mapping from elements of the multiplication table to
elements of the Kronecker matrix. This relationship, then, provides a computational
tool to determine where an arbitrary element of the multiplication table generated by
grass hop region occurs in the Kronecker matrix itself, providing the final piece of
the fast Kronecker sampling methodology.
The code that maps indices of the multiplication table through Morton codes to
the Kronecker indices is given in Listing 7. This code assumes that equation (5.8)
is correct, which we will prove in the next section. In the code, the index in the
multiplication table is converted into a single linear index. This conversion is just a
base n2 to base 10 conversion. Next, the linear index is MortonDecoded in base n.
The decoding proceeds by assigning the least significant digit to the row index, then
the next digit to the column, the next digit to the row, and so on. The most-significant
digit then goes to the column value.
What remains is the proof that equation (5.8) is correct, which we tackle in the
next section.
28
Listing 7 Mapping multiplication table indices to row and column indices of the
Kronecker matrix
""" Map a multi-index from the mult. table
table to a row and column in the Kronecker
matrix. The input is:
mind: the multi-index for the mult table
n: the size of the initiator matrix K
Example:
map_mult_to_kron([1,3],2)
map_mult_to_kron([4,0,7],3) # = (10,11)
# = (3,1)
"""
def map_mult_to_kron(mind,n):
I = multiindex_to_linear(mind,n*n)
return morton_decode(I,n)
def multiindex_to_linear(mind,n2):
I = 0
base = 1
for i in xrange(len(mind)-1,-1,-1):
I += mind[i]*base
base *= n2
return I
def morton_decode(I,n):
row = 0
rowbase = 1
col = 0
colbase = 1
i = 0
while I > 0:
digit = I%n
I = I // n
if i%2 == 0:
row += rowbase*digit
rowbase *= n
else:
col += colbase*digit
colbase *= n
i += 1
return (row,col)
29
Fig. 8. The connection between the multiplication table and a repeated Kronecker matrix with a
3 × 3 matrix K with k = 3. This gives a 9 element vector v and a 9 × 9 × 9 multiplication table for
a 27 × 27 matrix of probabilities.
30
(a) Mulitplication Table(c) Lexicographic RanksMorton EncodeMorton DecodeFig. 8. (continued)
31
0003 0013 0023 0103 0113 0123 0203 0213 0223 1003 1013 1023 1103 1113 1123 1203 1213 1223 2003 2013 2023 2103 2113 2123 2203 2213 222 3 0003 0013 0023 0103 0113 0123 0203 0213 0223 1003 1013 1023 1103 1113 1123 1203 1213 1223 2003 2013 2023 2103 2113 2123 2203 2213 222 300030013002301030113012302030213022310031013102311031113112312031213122320032013202321032113212322032213222300030013002301030113012302030213022310031013102311031113112312031213122320032013202321032113212322032213222 3(b) Kronecker Matrix(d) Kronecker IndicesMorton EncodeMorton Decodetation. In this section, we will prove (5.8) via the following theorem.
5.7. The proof of the Multiplication Table to Kronecker matrix permu-
Theorem 5.1. Let K be a n × n matrix and v = vec(K) be the column-major
representation of K. Consider an element in the multiplication table
with index (r1, r2, . . . , rk). Let I be the lexicographic index of the element (r1, . . . , rk).
Then the base n Morton decoding of I provides the row and column indices of an
element in
(cid:124)
v ⊗ v ⊗ ··· ⊗ v
k terms
(cid:125)
(cid:124)
K ⊗ K ⊗ ··· ⊗ K
k terms
(cid:123)(cid:122)
(cid:123)(cid:122)
(cid:125)
(cid:124)
with the same value. If we convert the row and column indices provided by Morton
into a column-major index, then we can build a permutation matrix M n,k in order to
write:
vec(K ⊗ K ⊗ ··· ⊗ K
) = M n,k(v ⊗ v ⊗ ··· ⊗ v
(cid:123)(cid:122)
k terms
(cid:125)
).
(cid:124)
(cid:123)(cid:122)
k terms
(cid:125)
Proof. To state the proof concisely, let K⊗k = K ⊗ k terms
. . . ⊗ K, and v⊗k be
the same.
In the proof, we will just show that the Morton code for I gives the
correct row and column indices for K⊗k. The resulting permutation matrix follows by
converting those row and column indices to a column-major index and building the
full permutation matrix. We will prove this statement by induction on the power of
the Kronecker product, k.
Base case. When k = 1, K⊗k = K is simply the initiator matrix. Consequently,
the theorem reads vec(K) = M n,1v. But the length 1 Morton code is simply the row
and column index in column major order, and so this result follows because the map
M n,1 is the identity.
Inductive step overview. We will prove our statement inductively by calculating
the new row and column values in two ways: first by recursively defining the row
and column values using a "zooming" argument, and second by applying the Morton
decoding process on a recursively defined lexicographic index, Ik+1. The following
figure shows an illustrative overview of how we will show the result in general.
t o b a s e 1 0
b a s e N 2
Lexicographical Index I
MortonDecode
Multiplication Table Index
'Zooming', Backward-Mapping
(i, j) row and column location
Inductive step formal. Assume M n,k correctly maps between v⊗k and K⊗k. More
specifically, this means we can find the row and column index (Rk, Ck) for a given
index of the multiplication table (r1, r2, . . . , rk).
Let (r1, r2, . . . , rk, rk+1) be the multiplication table index for an entry of v⊗k+1
Then notice that (r1, r2, . . . , rk) corresponds to an index in v⊗k. By assumption, the
Morton code correctly gives the correct row and column values in K⊗k: Rk and Ck.
32
Note that the structure of the K⊗k+1 is:
K1,1K⊗k K1,2K⊗k
K2,1K⊗k K2,2K⊗k
...
...
··· K1,nK⊗k
··· K2,1K⊗k
. . .
··· Kn,nK⊗k
...
(5.22)
Kn,1K⊗k Kn,2K⊗k
Then the row value for (r1, r2, . . . , rk, rk+1)
Rk+1 = Rk + (rk+1 mod n)nk.
(5.23)
The reasoning for this is as follows. The size of the previous iteration's matrix is nk.
When we incorporate the new value rk+1, we move to one of the n2 areas (of dimension
nk by nk) of the Kronecker matrix where (r1, r2, . . . , rk) is the suffix. The specific row
of the region can be found by simply taking the last multiplication table index rk+1
mod n, which corresponds to looking up the row index for rk+1 in column-major order.
The same reasoning can be translated to find the column index, jk+1.
(cid:106) rk+1
(cid:107)
n
Ck+1 = Ck +
nk
(5.24)
By taking the floor of rk+1 divided by n, we know the column index of the value
for rk+1. We call this procedure backward-mapping or zooming because we use the
inductive step to zoom into the right cell.
Now, we must show that the Morton decoding process arrives at the same updated
row and column values. First we will calculate the lexicographic index of our length
k + 1 multiplication table index. A given multiplication table index (r1, r2, . . . , rk) has
a lexicographic index Ik. When we move to the next Kronecker power, we incorporate
the value rk+1. We can determine the new lexicographic index Ik+1 using Ik and rk+1.
Ik+1 = Ik + rk+1(n2)
k
(5.25)
This relationship arises because the lexicographic index can be calculated by converting
our multiplication table index from base n2 to base 10. The last value rk+1 will occupy
k
the place value at the front of linearized index, i.e. (n2)
.
Now we must show that Morton decoding correctly maps Ik+1 to Rk+1 and Ck+1.
Using the division and remainder theorem on rk+1 divided by n in equation (5.25)
results in
rk+1 = (cid:98) rk+1
n
(cid:99)n + (rk+1 mod n)
Substituting this representation into (5.25) yields
Ik+1 = (cid:98) rk+1
n
(cid:99)n2k+1 + (rk+1 mod n)n2k + Ik
n (cid:99) and (rk+1 mod
Thus, the last two digits that Morton decoding will find here are (cid:98) rk+1
n), because these correspond to the final terms in a base n representation of Ik+1.
Consequently, Morton decoding of Ik+1 is equivalent to decoding Ik and appending
the digits (rk+1 mod n) and (cid:98) rk+1
n (cid:99) to the beginning of the new row and column
digit-strings respectively. This completes our proof because equation (5.27) gives
precisely the row and column values found in equations (5.23) and (5.24).
Note that this proof actually suggests a more straightforward way to generate
the row and column indices of the Kronecker matrix entries, see Problem 13 for more
information.
33
(5.26)
(5.27)
6. Problems and Pointers. We completed our major goal, which was to estab-
lish a new link between Morton codes and repeated Kronecker products and described
how that result is useful in efficiently generating a Kronecker graph. While we have
not focused on producing the most efficient implementation possible (see Problem 13
for a non-trivial improvement), we did focus on a procedure that only does a small
amount of additional work per edge and is faster than ball-dropping procedures that
have dominated the experimental landscape.
Our work builds strongly upon the work of Moreno et al. (2014), and highlights
new connections to classic problems in combinatorics including ranking and unrank-
ing (Bonet, 2008). Indeed, the ranking and unranking perspective has a tremendous
amount to offer for ever more complicated models of graphs. For instance, the original
specification of the Erdos-R´enyi graph due to Erdos and R´enyi (1959) was a random
choice of graphs with n vertices and m edges. It is straightforward to sample such
an object in the ranking and unranking perspective. To each graph, we associate a
binary string of length(cid:0)n
such a string, first generate a random number between 0 and(cid:0)(n
first number is 0 or 1. There are(cid:0)(n
(cid:0)(n
(cid:1), which represents the strictly upper-triangular region of an
(cid:1) − 1, then unrank
(cid:1) choices where the leading value is a 0 and
(cid:1) and then
(cid:1) choices where it is a 1, so we test if our number is larger than(cid:0)(n
that random number in lexicographic order. This procedure follows by testing if the
adjacency matrix. This binary string must have exactly m ones. To randomly generate
2)−1
m
2)
m
2)−1
m
2
2)−1
m−1
assign the first digit. This process can be repeated to deterministically generate the
string. This process could then be optimized by incorporating strategies to improve
the speed and efficiency (Bonet, 2008).
We conclude our manuscript by (i) reviewing the major timeline of the literature,
(ii) pointing out some strongly related work that falls outside of our specific scope,
and (iii) providing some follow-up problems.
tics (Fan et al., 1962)
6.1. Recap of major literature.
• 1959: Erdos-R´enyi paper (Erdos and R´enyi, 1959) with m fixed edges
• 1959: Gilbert's model for G(n, p) (Gilbert, 1959)
• 1962: Paper on grass-hopping or leap-frogging for sequential trials in statis-
• 1983: Stochastic block model proposed (Holland et al., 1983)
• 2002: Chung-Lu graphs proposed (Chung and Lu, 2002)
• 2004: RMAT, Kronecker predecessor, proposed (Chakrabarti et al., 2004)
• 2005: Kronecker graphs proposed (Leskovec et al., 2005)
• 2005: Grass-hopping for Erdos-R´enyi graphs (Batagelj and Brandes, 2005)
• 2011: Observation on Erdos-R´enyi blocks in Chung-Lu (Miller and Hagberg,
• 2013: Observation on Erdos-R´enyi blocks in Kronecker (Moreno et al., 2014)
6.2. Pointers to more complex graph models. The models we consider here
are not considered state of the art, although they are often used as synthetic examples
due to their simplicity and ubiquity. In this section, we provide a few references to
more intricate models that could be considered state of the art. We've attempted to
limit our discussion to the most strongly related literature. A full survey of random
graph models is well beyond our scope.
BTER, Kolda et al. (2014) The block-two-level Erdos-R´enyi (BTER) graph models
a collection of Erdos-R´enyi subgraphs akin to the diagonal blocks of a stochastic
block models. However, it also includes a degree constraint that better models
2011)
34
real-world networks.
mKPGM, Moreno et al. (2010) Another model of interest is called the mixed Kro-
necker Product Graph Model (mKPGM), which is a generalization of the
Kronecker model, but allows for more variance that you may expect in real
world populations of networks. The main difference in this model from the
standard Kronecker model that we explored, is that it is based on realizing an
adjacency matrix at stages of the Kronecker product calculation. This corre-
sponds to increasing or zeroing probabilities in the final Kronecker product,
e.g. P = A(cid:96) ⊗ (K ⊗ ··· k − (cid:96) terms ··· ⊗ K) where A(cid:96) is a realization of an
(cid:96)-level Kronecker graph with K.
Random Kernel Graph, Bollob´as et al. (2007) This models a general, but spe-
cific, structure for P , where Pi,j = min(f (vi, vj)/n, 1) and f is a kernel
function with a few special properties, and vi = i/n for each vertex. The
Chung-Lu model can be expressed in this form and there is an efficient sampling
algorithm due to (Hagberg and Lemons, 2015).
Multifractal networks, Palla et al. (2010) These are a continuous generalization
of the Kronecker matrix models we consider here and generate a network based
on a function P (x, y) where x and y are in [0, 1], but also where P (x, y) is
the result of repeated convolution of a generator (akin to repeated Kronecker
products, see the paper for details). With the resulting measure P (x, y), we
draw random coordinates vi for each node in [0, 1] and generate a graph where
Pij = P (vi, vj).
There are strong relationships among these classes of models. We conjecture that
this idea of grass-hopping can be extended to all of these random graph models, and
more generally, all random graph generation mechanisms that have a small number
of parameters and computationally efficient strategies to compute the probability of
a given edge. (For an nk vertex Kronecker graph, there are n2 parameters and each
probability can be computed in k steps.)
6.3. Problems. For the following problems. We will post solutions or solution
sketches in the online supplemental materials for our manuscript. However, we
encourage readers to solve them individually!
Problem 1 (Easy). When we were comparing ball-dropping to grass-hopping for
sampling Erdos-R´enyi graphs, we derived that an approximate count for the number of
edges used in ball-dropping is: m log(1/(1 − p))/p. First show that the term log(1/(1 −
p))/p has a removable singularity at p = 0 by showing that limp→0 log(1/(1− p))/p = 1.
Second, show that log(1/(1 − p))/p > 1 if p > 0.
Solution. We need to use L'Hopital's rule for the first question, in which was we
get (1/(1 − p))/1 for the ratio of derivatives. This clearly tends to 1. For the second
part, we take the Taylor series of log(1/(1 − p)), which is p + p2/2 + p3/3 + . . .. This
is always at least p when p > 0. (Note, that, indeed, this series divided by p gives
(cid:88)
1 + p/2 + p2/3 + . . .)
Problem 2 (Easy). Implement a grass-hopping scheme for Chung-Lu as described
in Section 4.
Solution. Note that this code uses the method grass hop er from listing 3.
"""Create a Chung-Lu graph via grass-hopping
Note this routine is only for pedagogical use as
It can be improved in many ways.
Example: chung_lu_grasshop([5,1,1,2,2,1])"""
def chung_lu_grasshop(d):
35
# sort d with a permutation
# http://stackoverflow.com/questions/7851077/how-to-return-index-of-a-sorted-list
dperm = sorted(range(len(d)), key=lambda k: d[k])
# build regions
n = 0
regions = []
while n < len(dperm):
first = n
deg = d[dperm[n]]
while n < len(dperm)-1 and d[dperm[n+1]] == deg:
n += 1
regions.append((first,n))
# grasshop within regions
vol = sum(d)
edges = []
for ri in xrange(len(regions)):
for rj in xrange(len(regions)):
rowinds = regions[ri] # start/end of row regions
colinds = regions[rj] # start/end of col region
p = d[dperm[rowinds[0]]]*d[dperm[colinds[0]]]/vol
rowsize = rowinds[1] - rowinds[0] + 1
colsize = colinds[1] - colinds[0] + 1
er_edges = grass_hop_er(max(rowsize, colsize), p)
edges.extend( [ (i+rowinds[0], j+colinds[0])
for i,j in er_edges if i < rowsize and j < colsize ] )
# build inverse permutation to re-permute edge indices
iperm = [0 for _ in dperm] # inverse permutation
for i,j in enumerate(dperm):
iperm[j] = i
# reverse permute edges
return [ (iperm[e[0]], iperm[e[1]]) for e in edges ]
(cid:88)
Problem 3 (Easy). While we considered coin-flipping, ball-dropping, and grass-
hopping for Erdos-R´enyi, we did not do so for some of the other models. Of these,
the Chung-Lu ball-dropping procedure is perhaps the most interesting. Recall how
ball-dropping works for Erdos-R´enyi. We determine how many edges we expect the
graph to have. Then we drop balls into random cells until we obtain the desired number
of edges. The way we dropped them was so that every single entry of the matrix was
equally likely. The procedure for Chung-Lu works in a similar manner, but we won't
select each cell equally likely. For simplicity, we describe it using the exact expected
number of edges.
Note that the expected number of edges in a Chung-Lu graph is just
(cid:88)
(cid:88)
(cid:88)
(cid:88)
E[
Aij] =
E[Aij] =
di,
(cid:88)
i
i
j
i
j
i di. We will ball-drop until we have m edges.
where we used the result of equation (2.7) in order to introduce di.
Let m =(cid:80)
The goal of each ball-drop is to pick cell (i, j) with probability didj/(cid:80)
draw an entry out of this list, then the probability of getting i is exactly di/(cid:80)
k,l dkdl. This
forms a valid probability distribution over cells. The difference from equation (2.6) is
subtle, but meaningful. Also note that each di is an integer. So to sample from this
distribution, what we do is build a list where entry i occurs exactly di times. If we
k dk.
Your first task is to show that if we draw two entries out of this list, sampling with
36
replacement, the probability of the two drawn entries being i and j is:
(cid:88)
didj/
dkdl.
k,l
This sampling procedure is easy to implement. Just build the list and randomly pick an
entry!
Your problem is then:
• show that the probability we computed above is correct
• implement this procedure on the computer akin to the Python codes we've seen
• prepare a plot akin to Figure 2 for the Chung-Lu graphs as you vary the
properties of the degree distribution.
probability di/(cid:80)
Solution. If we draw two samples from the list. The draws are independent, so the
probability of the event is the product of each draw's probability. Each occurs with
k dk. So if we saw i and then j, this even occurs with probability
di(cid:80)
dj(cid:80)
·
k dk
k dk
didj(cid:80)
k,(cid:96) dkdl
=
""" Build a list where entry i occurs d[i] times. """
def build_list(d):
L = []
for i in xrange(len(d)):
L.extend( [i for _ in xrange(d[i])] )
return L
"""Create a Chung-Lu graph via ball-dropping.
Note this routine is only for pedagogical use as
It can be improved in many ways.
Example: chung_lu_ball_drop([5,1,1,2,2,1])"""
def chung_lu_ball_drop(d):
M = sum(d)
L = build_list(d)
edges = set()
dups = 0
while len(edges) < M:
src = L[random.randint(0,len(L)-1)]
dst = L[random.randint(0,len(L)-1)]
if (src,dst) not in edges:
edges.add((src,dst))
else:
dups += 1
return (list(edges), dups)
.
(cid:88)
Problem 4 (Easy). In Section 4, we wrote a short code using grass_hop_er to
generate a two-block stochastic block model (2SBM). In that short code, we generated
larger Erdos-R´enyi blocks for the off-diagonal blocks then necessary and only included
edges if they fell in a smaller region. This inefficiency, which is severe if n1 (cid:29) n2 can
be addressed for a more general grass_hop_er function.
Implement grass_hop_er for an m × n region and rewrite the short two-block
stochastic block model to use this more general routine to avoid the inefficiency
Solution.
def grass_hop_er(m,n,p):
edgeindex = -1
# we label edges from 0 to n^2-1
37
gap = np.random.geometric(p)
edges = []
while edgeindex+gap < m*n:
# first distance to edge
edgeindex += gap
src = edgeindex // n
dst = edgeindex - n*src
edges.append((src,dst))
gap = np.random.geometric(p) # generate the next gap
# check to make sure we have a valid index
# increment the index
# use integer division, gives src in [0, n-1]
# identify the column
return edges
def sbm2(n1,n2,p,q):
edges = grass_hop_er(n1,n1,p)
# generate the n1-by-n1 block
edges.extend( [ (i+n1,j+n1) for i,j in grass_hop_er(n2,n2,p) ]) # n2-by-n2 block
edges.extend( [ (i,j+n1) for i,j in grass_hop_er(n1,n2,q) ])
# n1-by-n2 block
edges.extend( [ (i+n1,j) for i,j in grass_hop_er(n2,n1,q) ])
# n2-by-n1 block
return edges
(cid:88)
Problem 5 (Easy). Suppose that you have the following function implemented:
""" Generate a general stochastic block model where the input is:
ns: a list of integers for the size of each block (length k).
Q: a k-by-k matrix of probabilities for the within block sizes. """
def sbm(ns, Q)
Describe how you could implement a program to generate a Chung-Lu graph that makes
a single call to sbm.
Solution. Recall from section 4 that we can arrange the nodes of our graph in
increasing degree order, which forms a block structure. Sort the nodes in this way, and
set ns = [n1, . . . , nk], where ni is the number of degrees with the ith largest unique
in Qij. Then run the sbm procedure on this output. (cid:88)
degree. Store the values
d[i]d[j]
ρ
Problem 6 (Medium, Partially-solved). Implement and evaluate a ball-dropping
procedure for the stochastic block model. To determine the number of edges, use the
result about the number of edges in an Erdos-R´enyi block and apply it to each block.
To run ball-dropping, first pick a region based on the probability of Q, (hint, you
can do this with binary search and a uniform random variable) then pick within that
Erdos-R´enyi block.
Solution. We are going to sketch a solution and outline some interesting di-
rections to take as far as extending. The solution involves sampling an entry
at random based on the probabilities in Q. This can be done with a routine
such as those described here: http://stackoverflow.com/questions/4437250/
choose-list-variable-given-probability-of-each-variable. Then, once you
have the region of Q, you ball-drop like in Erdos-R´enyi. This assumes there is no
structure in Q. A more interesting case is where there is structure in Q. For instance,
where there is a single within group probability p and a single between group proba-
bility q such that Q = (p − q)I + qeeT or Qij = p if i = j and Qij = q if i (cid:54)= j, and
where all the sizes of each group are equal. In this case, you can first choose if the
ball will go into the diagonal or non-diagonal region. Then conditional on that choice,
pick an element of Q. Then do an Erdos-R´enyi ball-drop within the region of P that
(cid:88)
corresponds to an element of Q.
Problem 7 (Medium). Write an implementation to generate a stochastic block
model graph using grass_hop_er as a sub-routine.
Solution.
38
#Generate a general stochastic block model using grass-hopping where the input is:
#
#
def sbm_er(ns, Q):
ns: a list of integers for the size of each block (length k).
Q: a k-by-k matrix of probabilities for the within block sizes.
edges = [];
for i in range(len(ns)):
for j in range(len(ns)): #loop through each block
m=ns[i]; n=ns[j]; #find m x n size of block
row_loc=0;
for k in range(i):
row_loc+=ns[k]; #locate row of top left corner of block
col_loc=0;
for l in range(j):
col_loc+=ns[l]; #locate column of top left corner of block
for e in grass_hop_er(m,n,Q[i][j]): #find edges
edges.append([e[0]+row_loc,e[1]+col_loc]); #add edges updated with top left corner
return edges;
(cid:88)
Problem 8 (Easy). Extend all the programs in this tutorial to have proper input
validation so that they throw easy-to-understand errors if the input is invalid. (For
instance, Erdos-R´enyi graphs need the p input to be a probability.)
Problem 9 (Medium). In the paper, we worked out the number of Erdos-R´enyi
regions for a Kronecker graph assuming that the probabilities in K were non-symmetric.
But in Figure 5, we showed the Erdos-R´enyi regions where the matrix K was symmetric.
Determine a tight closed form expression for the number of Erdos-R´enyi regions when
K is symmetric.
Solution. Note that the kth Kronecker power of K contains all length-k permu-
tations of the probabilities contained in K. Thus, it suffices to count the number
of unique probabilities in K and apply the same stars-and-bars technique shown in
5.2. The number of unique values in an n x n symmetric matrix is equivalent to the
number of values in the upper-triangular matrix: (cid:0)n+1
(cid:0)(n+1
(cid:1). In order to count the number
of length-k sequences of these values, we apply the stars-and-bars formula and attain
(cid:88)
2 )+k−1
2
(cid:1)
k
Problem 10 (Hard). It turns out that Erdos-R´enyi's original proposal for graphs
and what we now call Erdos-R´enyi graphs are different! What Erdos and R´enyi (1959)
actually proposed was: generate a random adjacency matrix with exactly m non-zeros,
where m is specified. This is what we do in the ball-dropping procedure for generating
Erdos-R´enyi graphs, but m is chosen from a binomial distribution to emulate the
number of entries that result from coin-flips.
(cid:88)
Solution. Test
Problem 11 (Easy).
Implement a simple-change to ball_drop_er that will
generate non-edges when p > 0.5 and filter the list of all edges. Our own solution to
this involves adding four lines. (But we used a few pieces of python syntactic sugar –
the point is that it isn't a complicated idea.) Compare the run times of this approach
with the standard ball-dropping approach
Solution.
def ball_drop_er(n,p):
if p > 0.5:
nonedges = ball_drop_er(n,1-p)
alledges = set((i,j) for i in xrange(n) for j in xrange(n))
39
return list(alledges.difference(nonedges))
m = int(np.random.binomial(n*n,p)) # the number of edges
edges = set() # store the set of edges
while len(edges) < m:
# the entire ball drop procedure is one line, we use python indices in 0,n-1 here
e = (random.randint(0,n-1),random.randint(0,n-1))
if e not in edges: # check for duplicates
edges.add(e) # add it to the list
return list(edges)
(cid:88)
Problem 12 (Medium). In section 5.2, we showed that the number of subregions
is on the order of O(kn2−1). There are many ways to arrive at this result. Using
Stirling's approximation for combinations, find a different way to count the number of
subregions. Stirling's Approximation: log n! = n log n − n + 1
Solution. The number of subregions is given by (cid:0)n2+k−1
(cid:0)(n2+k−1)!
(cid:1), which expands to
(cid:1). Taking the log of our expression allows us separate out the components
k +(n2−1)(log(n2+k−1)−1)+ 1
(n2−1)!k!
of the combination and arrive at: log(n2 + k − 1)! − log(n2 − 1)! − log(k!). Now we
can substitute in Stirling's approximation for each log k! term and simplify arriving
at:k log n2+k−1
. Note that our simplification
process is made easier by eliminating all constant terms (those with no k). Using
L'Hopital's Rule, it can be found that limk → inf k log n2+k−1
= n2 − 1. Furthermore,
at the limit, 1
goes to 0. Thus, we can simplify our expression further to
(n2 − 1) log n2 + k − 1. Exponentiating this expression yields (n2 + k − 1)(n2 − 1),
which is O(k(n2 − 1) as desired.
(cid:88)
2 log n2+k−1
2 log(2π) + n
2 log n2+k−1
k
2 log n + 1
k
k
k
Problem 13 (Medium). Note that in the proof of Theorem 5.1, we began by
showing that the multiset region could be easily decoded into the row and column index
of the entry in the Kronecker matrix. Adapt our programs to use this insight to avoid
computing the linear multiindex index returned by multiindex_to_linear.
Solution.
set letters represented as numbers e.g. [0,1,3,1]
s: an array (edge probability sequence) consisting of a
# backward_map takes as input
#
#
#
# and returns the corresponding row or column index of the
# probability sequence in the kronecker product graph matrix
def backward_map(s,n):
n: the size of the n x n initiator matrix
row=0
col=0
# we want to "zoom" further into the matrix for each
# value of our cell
for i, r in enumerate(s):
length = len(s)-i;
row += (r mod n) * math.pow(n,length-1);
col += int(r/n) * math.pow(n,length-1);
return [row,col];
(cid:88)
Problem 14 (Easy). When we were unranking multisets, we would compute
the number of multisets that started with a digit as the prefix and then enumerate
the number of such sets. We used this to identify the first digit of the unranked set.
Double-check that we didn't miss any possibilities by summing
40
Solution. The number of multiset permutations is given by
Removing an instance of the first letter results in (k−1)!r0
the sum of all permutations with one digit removed as follows:
i=0 ri!
(cid:81)n2
. In general, we can compute
(6.1)
(6.2)
(6.3)
(6.4)
k!(cid:81)n2
i=0 ri!
n2(cid:88)
(k − 1)!rj
i=0 ri!
(cid:81)n2
n2(cid:88)
=
(cid:81)n2
(k − 1)!rj
i=0 ri!
rj
j=1
n2(cid:88)
j=1
It suffices to show that
j=1
k!(cid:81)n2
i=0 ri!
Canceling common terms yields
k =
This is true because the sum of all rj, the count of each letter, is just the length of
(cid:88)
the multiset.
Problem 15. Easy Determine the number of operations involved in each of the
components of the procedure to generate a Kronecker graph.
Solution. regions: In listing 4, every region is visited and the updateregion method
is performed. U pdateregion requires k calculations in the worst case because we must
spill over to every index in the region. Thus, our complexity is O(numberofregions· k).
grass hop region: From viewing 5.5, the number of operations is on the order of
the number of edges, E times the number of operations in the unrank algorithm.
Unranking requires k2 calculations bringing our total count to O(Ek2).
mult to kron: determining the linear index takes 2k calculations because we simply
have to loop through all the elements in our multiset index and make 2 calculations in
the loop. Morton Decoding takes 10k calculations because we must loop through 2k
(cid:88)
digits and do 5 calculations in each iteration. 12k calculations is O(k).
Problem 16 (Research level with appropriate generality). Another view of
Theorem 5.1 is that we have a permutation induced by different two different rep-
resentations of the same number. More specifically, the multi-index representation
is in base n2, which we convert to base n, and then interleave digits to build a row
and column representation. Hence, there are two equivalent representations of the
number in base 10. This hints at a far more general set of permutations based on this
type of digit interchange and base-conversion. As an example, the stride permutation
can be expressed as: represent a number from [0, n2 − 1] in base n. This gives a
two-digit representation. Swap the digits and convert back to [0, n2 − 1]. This gives a
permutation matrix that exactly corresponds with what is called a stride permutation,
which is closely related to the matrix transpose and the difference between row and
column major order. The research problem is to generalize these results. Possible
directions include: can any permutation matrix be expressed in this fashion? If not,
can you exhibit one and characterize the class of permutations possible?
41
REFERENCES
L. A. Adamic, R. M. Lukose, A. R. Puniyani, and B. A. Huberman. Search in power-law networks.
Physical Review E, 64 (4), 2001. doi:10.1103/physreve.64.046135. Cited on page 7.
A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286 (5439), pp.
509–512, 1999. doi:10.1126/science.286.5439.509. Cited on page 4.
V. Batagelj and U. Brandes. Efficient generation of large random networks. Physical Review E,
71 (3), 2005. Cited on pages 14 and 34.
B. Bollob´as, S. Janson, and O. Riordan. The phase transition in inhomogeneous random graphs.
Random Structures & Algorithms, 31 (1), pp. 3–122, 2007. doi:10.1002/rsa.20168. Cited on
page 35.
B. Bonet. Efficient algorithms to rank and unrank permutations in lexicographic order. AAAI-
workshop on Search in AI and Robotics, 2008. Cited on pages 23 and 34.
A. Buluc¸, J. T. Fineman, M. Frigo, J. R. Gilbert, and C. E. Leiserson. Parallel sparse matrix-
vector and matrix-transpose-vector multiplication using compressed sparse blocks. In Proceedings
of the Twenty-first Annual Symposium on Parallelism in Algorithms and Architectures, pp.
233–244. 2009. doi:10.1145/1583991.1584053. Cited on page 25.
D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-MAT: A recursive model for graph mining. In
Proceedings of the 2004 SIAM International Conference on Data Mining, pp. 442–446. 2004.
doi:10.1137/1.9781611972740.43. Cited on pages 5, 16, and 34.
F. Chung and L. Lu. Connected components in random graphs with given expected degree sequences.
Annals of Combinatorics, 6 (2), pp. 125–145, 2002. doi:10.1007/PL00012580. Cited on page 34.
S. Das. A brief note on estimates of binomial coefficients. 2017. Accessed February 9, 2017. Cited
on page 19.
T. A. Davis. Direct methods for sparse linear systems, SIAM, 2006. Cited on page 4.
P. Erdos and A. R´enyi. On random graphs i. Publicationes Mathematicae, 6, pp. 290–297, 1959.
Cited on pages 5, 34, and 39.
M. D. Ernst. Permutation methods: A basis for exact inference. Statist. Sci., 19 (4), pp. 676–685,
2004. doi:10.1214/088342304000000396. Cited on page 3.
C. T. Fan, M. E. Muller, and I. Rezucha. Development of sampling plans by using sequential
(item by item) selection techniques and digital computers. Journal of the American Statistical
Association, 57 (298), pp. 387–402, 1962. Cited on pages 14 and 34.
R. A. Fisher. "the coefficient of racial likeness" and the future of craniometry. The Journal of the
Royal Anthropological Institute of Great Britain and Ireland, 66, pp. 57–63, 1936. Cited on
page 3.
G. W. Flake, S. Lawrence, and C. L. Giles. Efficient identification of web communities. In
Proceedings of the Sixth ACM SIGKDD International Conference on Knowledge Discovery and
Data Mining, pp. 150–160. 2000. doi:10.1145/347090.347121. Cited on page 7.
J. E. Gentle. Random Number Generation and Monte Carlo Methods, Springer New York, 2003.
doi:10.1007/b97336. Cited on page 5.
E. N. Gilbert. Random graphs. Ann. Math. Statist., 30 (4), pp. 1141–1144, 1959. doi:10.1214/
aoms/1177706098. Cited on pages 5 and 34.
C. Gro er, B. D. Sullivan, and S. Poole. A mathematical analysis of the r-mat random graph
generator . Networks, 58 (3), pp. 159–170, 2011. doi:10.1002/net.20417. Cited on page 16.
A. Hagberg and N. Lemons. Fast generation of sparse random kernel graphs. PLoS One, 2015.
Cited on pages 14, 16, and 35.
P. W. Holland, K. B. Laskey, and S. Leinhardt. Stochastic blockmodels: First steps. Social
Networks, 5 (2), pp. 109–137, 1983. doi:10.1016/0378-8733(83)90021-7. Cited on page 34.
I. M. Kloumann, J. Ugander, and J. Kleinberg. Block models and personalized PageRank .
Proceedings of the National Academy of Sciences, 114 (1), pp. 33–38, 2016. doi:10.1073/pnas.
1611275114. Cited on page 3.
D. E. Knuth. The Art of Computer Programming, Volume 2 (3rd Ed.): Seminumerical Algorithms,
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1997. Cited on page 5.
T. G. Kolda, A. Pinar, T. Plantenga, and C. Seshadhri. A scalable generative graph model with
community structure. SIAM Journal on Scientific Computing, 36 (5), pp. C424–C452, 2014.
doi:10.1137/130914218. Cited on pages 2 and 34.
M. Koyuturk, A. Grama, and W. Szpankowski. Assessing significance of connectivity and
conservation in protein interaction networks. In Research in Computational Molecular Biology,
pp. 45–59. Springer Berlin Heidelberg, 2006. doi:10.1007/11732990_4. Cited on page 2.
M. Koyuturk, W. Szpankowski, and A. Grama. Assessing significance of connectivity and
conservation in protein interaction networks. Journal of Computational Biology, 14 (6), pp.
747–764, 2007. doi:10.1089/cmb.2007.R014. Cited on page 2.
42
J. Leskovec, D. Chakrabarti, J. Kleinberg, and C. Faloutsos. Realistic, mathematically tractable
graph generation and evolution, using kronecker multiplication. In Knowledge Discovery in
Databases: PKDD 2005, pp. 133–145. Springer Berlin / Heidelberg, 2005. doi:10.1007/
11564126_17. Cited on pages 5 and 34.
J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker
graphs: An approach to modeling networks. Journal of Machine Learning Research, 11, pp.
985–1042, 2010. Cited on pages 5 and 6.
N. Litvak, W. Scheinhardt, and Y. Volkovich. In-degree and PageRank of web pages: Why do
they follow similar power laws? arXiv, 2006. Cited on page 7.
J. C. Miller and A. Hagberg. Algorithms and Models for the Web Graph, chapter Efficient
Generation of Networks with Given Expected Degrees. Springer Berlin Heidelberg, 2011. Cited
on pages 15 and 34.
R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Net-
work motifs: Simple building blocks of complex networks. Science, 298 (5594), pp. 824–
827, 2002.
arXiv:http://science.sciencemag.org/content/298/5594/824.full.pdf, doi:
10.1126/science.298.5594.824. Cited on pages 2, 3, and 7.
S. Moreno, S. Kirshner, J. Neville, and S. V. N. Vishwanathan. Tied kronecker product
graph models to capture variance in network populations.
In 2010 48th Annual Allerton
Conference on Communication, Control, and Computing (Allerton), pp. 1137–1144. 2010.
doi:10.1109/ALLERTON.2010.5707038. Cited on page 35.
S. Moreno and J. Neville. Network hypothesis testing using mixed kronecker product graph
models. In 2013 IEEE 13th International Conference on Data Mining, pp. 1163–1168. 2013.
doi:10.1109/ICDM.2013.165. Cited on page 2.
S. Moreno, J. J. Pfieffer, J. Neville, and S. Kirshner. A scalable method for exact sampling
from kronecker family models. IEEE International Conference on Data Mining (ICDM), 2014.
Cited on pages 10, 16, and 34.
R. C. Murphy, K. B. Wheeler, B. W. Barrett, and J. A. Ang. Introducing the graph 500. Cray
User's Group, 2010. Cited on pages 3, 6, and 16.
M. E. J. Newman. Random graphs with clustering. Phys. Rev. Lett., 103, p. 058701, 2009.
doi:10.1103/PhysRevLett.103.058701. Cited on page 2.
M. E. J. Newman and M. Girvan. Finding and evaluating community structure in networks. Phys.
Rev. E, 69 (2), p. 026113, 2004. doi:10.1103/PhysRevE.69.026113. Cited on page 7.
G. Palla, L. Lov´asz, and T. Vicsek. Multifractal network generator . Proceedings of the National
Academy of Sciences, 107 (17), pp. 7640–7645, 2010. arXiv:http://www.pnas.org/content/
107/17/7640.full.pdf+html, doi:10.1073/pnas.0912983107. Cited on page 35.
P. Pollack. Euler and the partial sums of the prime harmonic series. Elem. Math, 70, pp. 13–20,
2015. Cited on page 13.
C. Seshadhri, A. Pinar, and T. G. Kolda. An in-depth analysis of stochastic kronecker graphs. J.
ACM, 60 (2), pp. 13:1–13:32, 2013. doi:10.1145/2450142.2450149. Cited on pages 6 and 16.
J. G. Siek, L.-Q. Lee, and A. Lumsdaine. The Boost Graph Library: User Guide and Reference
Manual, Addison-Wesley Professional, 2001. Cited on page 11.
E. Yu. http://math.stackexchange.com/questions/247569, 2012. Accessed January 4, 2017. Cited
on page 13.
Acknowledgements. We thank Sebastian Moreno for mentioning the original
problem during his thesis defense and providing an excellent starting point, as well
as Jennifer Neville. Along the way, we received helpful feedback from Eric Chi and
C. Seshadhri. Finally, we wish to thank all of our research team and especially Caitlin
Kennedy for a careful read. This project was supported in part by NSF CAREER
CCF-1149756, IIS-1422918, IIS-1546488, and the NSF Center for the Science of
Information STC CCF-093937. Gleich's work was also supported by the DARPA
SIMPLEX program and the Sloan Foundation.
43
|
1607.02334 | 1 | 1607 | 2016-07-08T12:18:03 | Betweenness centrality profiles in trees | [
"cs.SI",
"physics.soc-ph"
] | Betweenness centrality of a vertex in a graph measures the fraction of shortest paths going through the vertex. This is a basic notion for determining the importance of a vertex in a network. The k-betweenness centrality of a vertex is defined similarly, but only considers shortest paths of length at most k. The sequence of k-betweenness centralities for all possible values of k forms the betweenness centrality profile of a vertex. We study properties of betweenness centrality profiles in trees.
We show that for scale-free random trees, for fixed k, the expectation of k-betweenness centrality strictly decreases as the index of the vertex increases. We also analyze worst-case properties of profiles in terms of the distance of profiles from being monotone, and the number of times pairs of profiles can cross. This is related to whether k-betweenness centrality, for small values of k, may be used instead of having to consider all shortest paths. Bounds are given that are optimal in order of magnitude. We also present some experimental results for scale-free random trees. | cs.SI | cs |
Betweenness centrality profiles in trees
Benjamin Fish1(cid:63), Rahul Kushwaha1, and Gyorgy Tur´an1,2
1 Department of Mathematics, Statistics, and Computer Science,
2 MTA-SZTE Research Group on Artificial Intelligence, Szeged
University of Illinois at Chicago
Abstract. Betweenness centrality of a vertex in a graph measures the
fraction of shortest paths going through the vertex. This is a basic no-
tion for determining the importance of a vertex in a network. The k-
betweenness centrality of a vertex is defined similarly, but only consid-
ers shortest paths of length at most k. The sequence of k-betweenness
centralities for all possible values of k forms the betweenness centrality
profile of a vertex. We study properties of betweenness centrality profiles
in trees.
We show that for scale-free random trees, for fixed k, the expectation
of k-betweenness centrality strictly decreases as the index of the vertex
increases. We also analyze worst-case properties of profiles in terms of the
distance of profiles from being monotone, and the number of times pairs
of profiles can cross. This is related to whether k-betweenness centrality,
for small values of k, may be used instead of having to consider all
shortest paths. Bounds are given that are optimal in order of magnitude.
We also present some experimental results for scale-free random trees.
1
Introduction
The study of large networks uses many graph parameters measuring properties
of vertices, groups of vertices, or the whole network. Some, like connectivity, are
classical concepts. Others, like the Bavelas centrality index [3], come from appli-
cations in sociology and psychology. Still others, like k-betweenness centrality,
to be discussed in this paper, have been introduced recently, partly motivated
by efficiency considerations. Several of these notions have mostly been studied
experimentally, but they also raise many questions for theoretical study. We
consider some problems of this kind.
A basic property of a vertex in a network is its centrality. Possible definitions
are surveyed by Borgatti and Everett [6] and Brandes and Erlebach [8]. One
intuition is that a vertex is central if it lies on many shortest paths. A popular
formalization, introduced by Anthonisse [1] and Freeman [15], is betweenness
centrality, measuring the fraction of shortest paths going through the vertex.
Betweenness centrality has many applications, for example in examining "trade
(cid:63) Contact author: [email protected]. Benjamin Fish was funded in part by Army Re-
search Office grant #66497-NS.
routes between medieval cities" where "the cities with high betweenness central-
ity have opportunities for amassing wealth and exerting control that other cities
would not have" [6,20]. Even though betweenness centrality can be computed in
polynomial time using all-pairs shortest paths algorithms, for large networks it
is important to reduce the running times. Algorithms are discussed, for example,
in Brandes [7], Eppstein and Wang [13], and Riondato and Kornaropoluos [21].
In this paper, we will focus on the behavior of betweenness centrality in trees.
The distribution of path lengths in trees has been studied before, for example
by Faudree et al. [14], Chaudhary and Gordon [11], Gordon and McDonnell [16],
and Dankelmann [12]. Riondato and Kornaropoulos [21] give bounds on the VC-
dimension of shortest paths of length at most k in arbitrary graphs, which is
relevant for determining the sample size needed by approximation algorithms.
The notion of k-betweenness centrality, introduced by Borgatti and Everett [6],
differs from betweenness centrality in that shortest paths are restricted to length
at most k. In applications, shorter paths may be more important in determin-
ing the centrality of a vertex. Shorter paths may also give more information
about the centrality of vertices, e.g., when two vertices have the same centrality
when not restricted to shorter paths. In addition, considering only short paths
can have computational advantages as well: considering only short paths may
increase the locality of the computation, which can make computing faster and
easier.
An experimental study of k-betweenness centrality, and other bounded ver-
sions of centrality measures, is given by Pfeffer and Carley [19]. They consider
the following general requirements: 1) computing the bounded versions should
be similar to the unbounded version, 2) the bounded versions should approxi-
mate the unbounded one and 3) the bounded versions should converge to the
unbounded one when the bound parameter grows. As an illustration, [19] shows
k-betweenness centralities in a tree displaying the required properties. Approx-
imation and convergence are used in an informal sense in [19]; in their exam-
ple k-betweenness centralities converge to betweenness centrality monotonically
from below. Experiments of [19] on random graphs also support the claim that
k-betweenness centrality has "good" properties.
The experiments of [19] motivate a theoretical study of k-betweenness cen-
trality. We ask to what degree does the bounded version of betweenness cen-
trality (i.e. k-betweenness centrality) approximate the unbounded version, and
more generally, to what degree does k-betweenness centrality approximate (cid:96)-
betweenness centrality for k smaller than (cid:96)? If smaller values of k approximate
the larger values well, then we may safely consider only short paths in the graph.
We consider the maximum size of the gap between the k-betweenness central-
ity and the betweenness centrality. However, even if the k-betweenness centrality
approximates the betweenness centrality poorly, in some applications this might
not matter. For example, we might wish to rank vertices by their centrality [21],
begging the following question: Is the vertex ranking by betweenness centrality
preserved under k-betweenness centrality? Failing that, will the k-betweenness
centrality increase or decrease as k increases?
Let BCk(v) be the k-betweenness centrality of a vertex v in a graph G. The
betweenness centrality profile, or, for simplicity, the profile of v is the sequence
B(v) = (BC2(v), BC3(v), . . . , BCd(v)), where d is the diameter of G. To answer
the above questions we introduce the notions of dips and crossings in profiles.
Informally, a dip in a profile is non-monotonic segment of the profile, and a cross-
ing between two profiles is a segment where the comparison of the two profiles
switches. If there are many crossings, than rankings on k-betweenness centrality
are unreliable, and if there are many dips, then estimates as to whether the k-
betweenness centrality will increase or decrease as k increases will be unreliable.
The k-betweenness centralities are properties which, with increasing k, tran-
sition from being local to being global. The general, informal conclusion of [19] is
that this transition from local to global is smooth. Properties of profiles provide
quantifiable information about this transition. In what follows we refer to results
indicating a smooth transition as "positive", and to results showing pathologies
in this transition as "negative". For instance, profiles in a path have no dips and
do not cross, indicating a completely smooth transition. Trees with many dips
and crossings represent a non-smooth transition.
In this paper we consider probabilistic and worst-case properties of profiles.
We restrict our attention to trees. Trees are a natural first case to consider as
there is exactly one shortest path between any two vertices.
We consider preferential attachment, or scale-free, random trees [2]. We con-
sider this model due to its popularity and its ability to model vertices that act
as 'hubs,' those vertices that are much more central than the rest of the vertices.
Scale-free trees were studied in the 1990's under the name plane-oriented re-
cursive trees (see, e.g., Mahmoud [18] and Smythe and Mahmoud [22]). Results
on path lengths in scale-free trees are given by Bollob´as and Riordan [4] (see
also Szab´o et al. [23]). Recent work includes studies of the influence of the seed
graph on the limiting distribution of the maximum degree (Bubeck et al. [10]),
algorithms identifying the root node of a scale-free tree (Bubeck et al. [9]), and
the persistence of a centroid (a vertex minimizing the maximal subtree when
chosen as the root) in a scale-free tree (Jog and Loh [17]).
1.1 Results
We give a positive result for scale-free trees. We show that for fixed k, the
expectation of k-betweenness centrality strictly decreases as the index of the
vertex increases, i.e., for every k and vertices v < w it holds that E[BCk(v)] >
E[BCk(w)]. This result can be viewed as giving evidence that k-betweenness
centrality is "well-behaved" for random trees. The proof is based on a formula of
Bollob´as and Riordan [5] (see also Bollob´as and Riordan [4]) for the probability
of the presence of a fixed subgraph in a scale-free tree. Proving stronger positive
results on the distribution of k-betweeness centralities, even for trees, seems to
be an interesting open problem. Extending the results to general graphs may
not be easy; as far as we know, the results of Bollob´as and Riordan [4] have not
been extended to the general case either.
We also prove negative results by studying worst-case behavior: how many
dips and crossings can profiles have? We consider worst-case results in order to
bound the behavior of all profiles.
We also make some simple observations on the worst-case approximation
properties of betweenness centrality by k-betweenness centralities (Proposition 7).
It is noted that there are trees where the k-betweenness centralities of a vertex
can be much smaller, resp., much larger, than the betweenness centrality of the
same vertex, holding for all possible values of k, resp., for k up to a small constant
multiple of the diameter. It follows that there is no constant-factor approxima-
tion guarantee when using k-betweenness centrality to approximate betweenness
centrality.
As the diameter is always an upper bound to the number of dips and cross-
ings, we consider proving lower bounds for the number of dips and crossings in
terms of this quantity. Theorem 10 shows that there are trees of diameter d with
some vertex having Ω(d) dips in its profile. The construction is simple, but the
choice of the parameters and the analysis requires careful computation as the
dips are small. Theorem 11 gives trees of diameter d with a pair of vertices such
that their profiles cross each other Ω(d) many times. In particular, it follows
from these results that the worst-case behavior of dips and crossings for general
graphs can be achieved with trees already.
The paper is structured as follows. In Section 2 we give the basic definitions
and in Section 2.1 we discuss the case of paths. Approximation is considered
in Section 2.2. Scale-free trees are discussed in Section 3. Then lower bounds
on the number of dips and crossings are given in Sections 4, resp., 5. Finally,
experimental results are mentioned in Section 6.
2 Preliminaries
We consider undirected graphs with unweighted edges. The length of a path is
the number of its edges. The degree of s is denoted by deg(s) and the distance
between s and t is denoted by (cid:96)(s, t). The diameter of a graph, denoted by d,
is the maximum of the distances (cid:96)(s, t). The set of vertices having distance at
most k from v, not including v, is denoted by N k
v .
Let δst be the number of distinct shortest paths between s and t. For v (cid:54)= s, t,
let δst(v) be the number of distinct shortest paths between s and t that pass
through v. The normalized betweenness centrality of a vertex v is
n(n − 1) − 2E · (cid:88)
2
BC(v) =
δst(v)
δst
.
s<t, 2≤(cid:96)(s,t)
Normalization (division by the number terms in the sum, i.e., the number
of nonadjacent pairs) ensures that betweenness centrality is [0, 1]-valued. (This
version of the definition is undefined when the graph is complete, so we define
the betweenness centrality of any vertex in the complete graph as 0.)
Definition 1 The normalized k-betweenness centrality of a vertex v is
· (cid:88)
s<t, 2≤(cid:96)(s,t)≤k
δst(v)
δst
.
(cid:80)
BCk(v) =
2
i − deg(i))
i(N k
Here, similarly to the general case, one normalizes by dividing with the number
of terms in the sum, i.e., the number of pairs of vertices s, t where 2 ≤ (cid:96)(s, t) ≤
k. In this paper, we drop the term "normalized" and simply refer to it as k-
betweenness centrality. If k is the diameter then the k-betweenness centrality of
a vertex is its betweenness centrality.
If the graph is a tree then BCk(v) is simply the fraction of shortest paths of
length between 2 and k which contain v as an interior vertex (the interior vertices
of a path are all vertices that are not endpoints). For example, the center of a
star has 2-betweenness centrality 1.
We refer to the number of shortest paths of length between 2 and k containing
v as an interior vertex as Pk(v), and the total number of paths of length between
2 and k as Pk. Also, we refer to the number of shortest paths of length exactly
k containing v as an interior vertex as pk(v), and similarly the total number of
shortest paths of length exactly k as pk.
Definition 2 The profile of a vertex v ∈ G is
B(v) = (BC2(v), BC3(v), . . . , BCd(v)).
We use the following definition for measuring non-monotonicity.
Definition 3 (Dip in a profile) Given a profile B(v), an interval
BCi(v), BCi+1(v), . . . , BCj(v)
is a dip if it can be partitioned into two intervals, the first of which is monotoni-
cally non-increasing and the second of which is monotonically non-decreasing, but
the entire interval is neither monotonically non-increasing nor non-decreasing.
A profile has q dips if there are q disjoint intervals that are dips.
Note that if a profile has q dips then at least q entries must be changed to
make it monotonic (increasing or decreasing), thus in this sense it is q-far from
being monotonic. The following definition is about comparing two profiles.
Definition 4 (Crossing) Profiles B(u) and B(v) have m crossings if there ex-
ist indices i1 < . . . < im+1 (2 ≤ is ≤ d) where for all such indices, BCis (u) (cid:54)=
BCis(v) and the values alternate order (so if BCis(u) < BCis (v) then BCis+1(u) >
BCis+1(v) and vice versa).
As an illustration, consider the example in Figure 1 below.
The diameter of this tree is 6, so a profile consists of the k-betweenness
centralities for k = 2 through k = 6. The profile of the four leaves is the all
zero vector as no paths contain them as an internal vertex. The profiles of v5,
v5
v6
v7
v1
v2
v3
v4
Fig. 1. Example tree
Fig. 2. The profiles of vertices v1, v2, v3, v4, and v5 from Figure 1, in the order
v4, v3, v2, v5, v1 from top to bottom.
v6, and v7 are the same, so we omit the latter two and plot the other five
profiles in Figure 2. Note that the profiles of v1 and v5 are not monotonic,
but the rest of the vertices do have monotonic profiles. It is also interesting
to note that BC(v1) = BC(v5), but BCk(v1) ≤ BCk(v5) for all k. If short
paths are considered more relevant then it may be reasonable to consider v5 as
having a higher centrality than v1. Thus, in this case the profiles give useful
extra information in addition to betweenness centrality. On the other hand, the
profiles of v2 and v5 cross at k = 4. In this case, based on the profiles, one might
qualify the judgement using betweenness centrality alone that v2 is more central
than v5.
2.1 Paths
We begin the discussion of k-betweenness centralities of trees by considering the
simplest nontrivial case, that of paths. It is relatively easy to find examples of
trees where the vertices' profiles behave well. As a first example, we consider
23456k0.00.10.20.30.40.50.60.70.80.9Normalized k-betweenness centralitysimple paths, where the relevant quantities are easily calculated explicitly. The
profiles of vertices in simple paths neither have dips nor crossings:
Proposition 5 In every simple path, profiles are monotonically increasing as k
increases and pairs of paths do not cross.
Proof. A path of length n has n− (cid:96) + 1 subpaths of length (cid:96), i.e., p(cid:96) = n− (cid:96) + 1.
Label the vertices 0 through n− 1 along the path. A subpath of length (cid:96) starting
at vertex j < i includes i if and only if its other end is past the vertex i but
it is not past the last vertex, i.e., if i − j + 1 ≤ (cid:96) ≤ n − j, or equivalently
i + 1 − (cid:96) ≤ j < n − (cid:96) + 1. It then follows that if (cid:96) ≤ i, there are (cid:96) − 1 subpaths
including i of length (cid:96), i.e., p(cid:96)(i) = (cid:96) − 1. Similarly, if i < (cid:96) ≤ n + 1 − i then
p(cid:96)(i) = i. Finally, if (cid:96) > n + 1 − i then p(cid:96)(i) = n − (cid:96) + 1. Therefore p(cid:96)(i)/p(cid:96) is
monotonically increasing in (cid:96) and so
(cid:80)k
(cid:80)k
(cid:96)=2 p(cid:96)(i)
(cid:96)=2 p(cid:96)
BCk(i) =
is monotonically increasing in k. It also follows that p(cid:96)(i) is monotonically in-
creasing in i, so Pk(i) is also monotonically increasing in i. Thus profiles do not
cross.
For the sake of completeness, we now give the exact values of the k-betweenness
centralities, which may be proved by examining the proof above. It also may be
viewed as a warm-up for the direct calculations of k-betweenness centralities in
Theorems 10 and 11.
Corollary 6 Let i be the ith vertex of a simple path of length n, for 0 ≤ i ≤ (cid:98) n
2(cid:99).
For 2 ≤ k ≤ n, the number of paths of length at most k containing vertex i is
(cid:1)
(cid:0)k
(cid:1) + i(k − i)
(cid:0)i
(cid:0)i
(cid:1) + i(n − 2i + 1) + (n + 1)(k − n + i − 1)
(cid:1) −(cid:0)k+1
+(cid:0)n+2−i
(cid:1)
2
2
2
2
2
Pk(i) =
if k ≤ i
if i < k ≤ n + 1 − i
otherwise
and the k-betweenness centrality of a path of length n at vertex i is
BCk(i) =
2.2 Approximation
k(n + 1) − n −(cid:0)k+1
(cid:1) .
Pk(i)
2
Lower bounds are proven by constructing sequences of trees where profiles behave
badly. As a first simple example we consider approximation properties.
A broom Hmn consists of a path of length m with n leaves attached to an
endpoint. A double broom Kmn consists of a path of length m with n leaves
attached to both endpoints. Double brooms and the middle vertex show that
k-betweenness centralities can be much smaller than betweenness centrality for
every k smaller than the diameter. Brooms and the center vertex show that k-
betweenness centralities can be much larger than betweenness centrality, as long
as k is at most a small constant fraction of the diameter. Thus k-betweenness
centralities in the corresponding ranges cannot be guaranteed to approximate
betweenness centrality within a constant factor.
Proposition 7 a) For every > 0 there is a d0 such that for every d ≥ d0 there
is a tree T of diameter d and a vertex v in T such that for all k < d it holds that
BCk(v)
BCd(v)
< .
b) For every C > 0 there is d0 and > 0 such that for every d ≥ d0 there is
a tree T of diameter d and a vertex v in T such that for every k ≤ · d it holds
that
BCk(v)
BCd(v)
> C.
Proof (Proposition 7 (a)). Consider the double broom Kmn, where m is even,
and let v be the middle vertex on the path of length m. The diameter is d = m+2.
If k < d then no paths between two leaves have length at most k and go
through v, no matter whether the leaves are attached to the same endpoint of
the central path of the broom, or to different endpoints. Thus counting pairs of
leaves attached to the same, resp. to different, endpoints, we get
(cid:18)m + 2n
(cid:19)
2
Pk(v) ≤
− n(n − 1) − n2 ≤ 2mn + m2 + n.
The total number of paths of length at most k include paths between neighbors
of same endpoint thus Pk ≥ n2. Paths between leaves attached to different
endpoints do go through v thus Pd(v) ≥ n2. Thus for some constant K depending
on if n ≥ K · m then
BCk(v)
BCd(v)
=
Pk(v) · Pd
Pk · Pd(v)
≤ (2mn + m2 + n) · (m + 2n)2
n4
< .
Proof (Proposition 7 (b)). Consider the broom Hmn, shown in Figure 3, and let
v be the endpoint with the leaves attached. The diameter is d = m + 1. Now we
can estimate the relevant quantities as follows. Looking at the neighbors of v it
(cid:1). The total number of paths of length at most k can
follows that Pk(v) ≥(cid:0)n+1
be estimated as
2
Pk ≤
(cid:18)n + 1
(cid:19)
2
+ kn + 2km.
This counts paths between the neighbors of v, paths between a neighbor of v
and one of the k vertices of the path nearest to v, and at most k vertices for
each of the m vertices on the path. The number of paths going through v is
m
n
···
...
v
Pd(v) = (cid:0)n+1
2
Fig. 3. Hmn
(cid:1) + mn, counting paths between the leaf neighbors of v, resp.,
between a leaf neighbor of v and a vertex on the path. Thus
BCk(v)
BCd(v)
=
Pk(v) · Pd
Pk · Pd(v)
≥
(cid:0)n+1
(cid:1)(cid:0)m+n+1
(cid:1)
(cid:1) + kn + 2km)((cid:0)n+1
2
2
2
((cid:0)n+1
2
(cid:1) + mn)
.
Now let n = δ · m and assume k ≤ δ2 · m. The numerator is Θ(δ2(1 + δ)2m4) =
Θ(δ2m2). The denominator is upper bounded by substituting the maximal value
for k, and then we get
Θ((δ2m2 + 2δ3m2 + 2δ2m2) · (δ2m2 + 2δm2)) = Θ(δ3m4).
Thus choosing a sufficiently small δ the statement follows.
3 Scale-free random trees
A scale-free random tree (also called a preferential attachment tree, correspond-
ing to the case m = 1 in the general preferential attachment model) is formed
by adding vertices one at a time. In the beginning there is a single vertex with
degree 1 (corresponding to a "virtual edge"). The new vertex will be connected
to one old vertex, and the probability of being connected to a particular old
vertex is proportional to the current degree of that vertex (thus, with t vertices
in the tree already, the sum of the degrees is 2t − 1). We will call the vertices
{1, . . . , n}. Vertex v is earlier than vertex w when v < w, so that if v < w then v
was added to the tree earlier than w. Call the tree formed after n vertices have
been added Tn.
Bollob´as and Riordan [4] give asymptotic results for the distribution of
length-k paths in the scale-free trees, including that all but o(n2) of the paths
are of length Θ(log n). Their work is based on a formula for the probability of
the scale-free tree Tn containing a given subgraph [5]. If the subgraph is a path
then the formula simplifies [4].
Let P be a path in Tn and let a and b be the endpoints of P , assuming,
without loss of generality, that a < b. Let c be the least common ancestor of a
and b in the path, where a = c is possible (where the least common ancestor is
the least vertex c such that a < c and b < c). Finally, let L be the set of vertices
v of P such that c < v < a and R the set with a < v < b. Thus the set of
interior vertices of P is {c}∪ L∪ R. The tuple (a, b, c, L, R) does not completely
determine the path: an element of L may either be on the path from a to c or
from c to b. Nevertheless, the probability that the path is in Tn depends only on
(a, b, c, L, R).
Lemma 8 (Bollob´as and Riordan [4]) Given a path P , let a, b, c, L, and R
be as above. Then the probability that P is in Tn, written q(a, b, c, L, R), is
(cid:40) 2
2c−1 ·
(cid:81)
(cid:81)
(cid:81)
(cid:81)b
(cid:81)b
q(a, b, c, L, R) =
1
2b−2
i∈L
1
2i−1
2b−2
1
i∈R
i∈R
1
2i−2
2i−2
1
if a (cid:54)= c
2t−2
2t−3
2t−2
2t−3 if a = c.
t=a+1
t=a+1
We use this lemma to show that the sequence of the expected values of the
k-betweeness centralities in scale-free random trees do not cross.
Theorem 9. Let v and w be nodes in Tn such that v < w. Then for all 2 ≤ k <
n it holds that
E[BCk(v)] > E[BCk(w)].
Proof. The normalization factor for both centralities is the same, so BCk(v) >
BCk(v + 1) if and only if Pk(v) > Pk(v + 1). Therefore it suffices to show that
E[pk(v)] > E[pk(v + 1)].
E[pk(v)] = (cid:80)
(1)
The case where v + 1 = n is trivial, so assume 0 ≤ v ≤ n − 2. It holds that
P(cid:51)v p(a, b, c, L, R), where the sum is over all possible paths of
length k containing v as an interior vertex. Inequality (1) is proved by con-
structing an injective map f from the set of paths of length k containing v + 1
as an interior vertex into the set of paths of length k containing v as an interior
vertex such that for every path P it holds that P[f (P ) ∈ Tn] ≥ P[P ∈ Tn] and
for some paths the inequality is strict.
Consider a path P containing v + 1 as an interior vertex. If v is an interior
vertex of P as well then f (P ) = P . If P is not a vertex of P then f (P ) is
obtained by replacing v + 1 with v, i.e., neighbors of v + 1 become neighbors
of v and v + 1 is deleted. The only remaining case to consider is when v is an
endpoint of P . It has to be the case then that v = a, and v + 1 belongs to the
subpath between c and b. In order to construct f (P ), we delete v + 1 from the
subpath, and add it as a parent of v. Thus v + 1 becomes the vertex a in f (P )
and v becomes an interior vertex on the path from c to a in f (P ). Note that the
in-degree of c in f (P ) is 2, even if it had in-degree 1 in P .
We now define f more formally. In view of (1), it suffices to show how f acts
on the tuple (a, b, c, L, R) corresponding to the path P :
f (a, b, c, L, R) :=
(a, b, c, L, R)
if v is interior in P,
if v (cid:54)∈ P and v + 1 = c,
(a, b, v, L, R)
(a, b, c, L, R ∪ {v} \ {v + 1})
if v (cid:54)∈ P and v + 1 ∈ R,
(a, b, c, L ∪ {v} \ {v + 1}, R)
if v (cid:54)∈ P and v + 1 ∈ L,
(v + 1, b, v,∅, R \ {v + 1})
if v = a = c,
(v + 1, b, c, L ∪ {v}, R \ {v + 1}) if v = a (cid:54)= c.
Abusing notation slightly, we will then define f (P ) as the natural path that
corresponds with the tuple f (a, b, c, L, R), where a given vertex in L under P
stays on the subpath between a and b in f (P ) and vice versa (and a vertex v
added to L stays on the side corresponding to the removed v + 1). Note that
not all of these six cases (which we will call (1) through (6) in descending order)
exist for all values of v and k.
For the injectivity of f note that the mapping preserves the path length.
It follows directly from the definition that the mapping is injective within each
case of the definition. Paths obtained in the different cases have (1) v + 1 as an
interior vertex, (2), (3), (4) do not contain v + 1, (5), (6) contain v + 1 as an
endpoint. Cases (2), (3), (4) are distinguished by v being the root, in R and in
L. Cases (5), (6) are distinguished by v + 1 being a parent of the root or not.
It remains to show that P[f (P ) ∈ Tn] ≥ P[P ∈ Tn] and inequality holds in
some cases. The intuition is that under f the set of vertices in the path stay
the same or get smaller, e.g. v + 1 is removed in favor of v, and that a path
whose vertices are earlier is more likely. The relation between P[f (P ) ∈ Tn] and
P[P ∈ Tn] can be calculated explicitly using Lemma 8.
For example, in the second case (v (cid:54)∈ P and v + 1 = c), Lemma 8 gives
q(a, b, v, L, R) =
2v + 1
2v − 1
q(a, b, v + 1, L, R) > q(a, b, v + 1, L, R).
In the last case (v = a (cid:54)= c), again using Lemma 8 we get
q(v + 1, b, c, L ∪ {v}, R \ {v + 1})
1
(cid:89)
b(cid:89)
2
=
2c − 1
·
1
2b − 2
·
2v
2v − 1
2t − 2
2t − 3
(cid:89)
i∈L
2i − 1
i∈R
1
2i − 2
t=a+2
= q(v, b, c, L, R).
The other cases are similar:
q(a, b, c, L, R) = q(a, b, c, L, R)
q(a, b, v, L, R) = 2v+1
2v−1 q(a, b, c, L, R)
q(a, b, c, L, R ∪ {v} \ {v + 1}) = 2v
q(a, b, c, L ∪ {v} \ {v + 1}, R) = 2v+1
q(v + 1, b, v,∅, R \ {v + 1}) = 2 · q(a, b, c, L, R)
q(v + 1, b, c, L ∪ {v}, R \ {v + 1}) = q(a, b, c, L, R)
if v is interior in P,
if v (cid:54)∈ P and v + 1 = c,
2v−2 q(a, b, c, L, R) if v (cid:54)∈ P and v + 1 ∈ R,
2v−1 q(a, b, c, L, R) if v (cid:54)∈ P and v + 1 ∈ L,
if v = a = c,
if v = a (cid:54)= c.
1
2
i
j
j
v
...
...
j
···
...
...
···
···
···
...
...
···
Fig. 4. Gij
Thus E[pk(v)] ≥ E[pk(v + 1)]. Strict inequality comes from noticing that
in some cases P[f (P ) ∈ Tn] > P[P ∈ Tn] (namely the cases where v (cid:54)∈ P or
v = a = c) or noticing that f is not surjective. However, some of these cases do
not always exist for all values of v and k. If v ≤ n − k, then certainly the case
where v = a = c exists. This implies this case exists for v = 1 because k ≤ n− 1.
Otherwise, for 2 ≤ v ≤ n− 2, we show that f is not surjective: Consider the path
n, w1, . . . ws, v, ws+1, . . . , wk−3, 1, v + 1 for any appropriate s. Here a = v + 1,
b = n, and c = 1. This path cannot be in the image of f : v + 1 is in this path,
but it is not an interior vertex, v (cid:54)= c, and L = ∅. On the other hand, no path
f (P ) satisfies each of these properties, but this path has v as an interior vertex,
completing the proof.
4 Dips
In this section we show that profiles in trees can be arbitrarily far from mono-
tonic, in the sense that a profile may have many dips. One difficulty in proving
such a result is that a large number of length-k paths not containing a vertex
v - which contributes to a decrease in its k-betweenness centrality compared to
previous values - affects the normalization terms for other (cid:96)-betweenness cen-
tralities. This means constructing a tree so that a given dip occurs may interfere
with v having other dips in its profile. The following theorem shows that this
barrier is not insurmountable.
Theorem 10. For any integer i ≥ 1, there is a tree G of diameter Θ(i) and a
vertex v in G such that the profile of v has Ω(i) dips.
Proof (Outline). For any i, j > 0 let Gij be the tree shown in Figure 4. It consists
of a 'central' path of length i(j + 1) + 2, with 2i simple paths adjoined to the
central path, each of length j (which we will refer to as the 'branches'). Two
of these paths are adjoined to vertex (cid:96) on the central path, for every (cid:96) = 3
mod j + 1 (where (cid:96) = 0 refers to one of the leaves of the central path, (cid:96) = 1 its
Table 1. Values of Pk for Gij
2 j2 − 3j − 1
Pk
k
r(j + 1) + 2 r2(− 9
i(−6j2 + 16j − 7) − 3j2 + 15j − 17
r(j + 1) + 3 Pr(j+1)+2 + (9j − 3)(i − r) + 6j − 18
r(j + 1) + 4 Pr(j+1)+3 + (9j − 3)(i − r) + 6j − 25
2 ) + r(9ij2 + 6ij + i + 6j2 − 23
2 j + 17
2 ) +
neighbor, etc.) The tree has diameter ij + i + j − 1 (as long as j ≥ 3). The vertex
that we show has Ω(i) dips is the vertex (cid:96) = 1. Call this vertex v.
for 2 ≤ r ≤ i − 1:
We show that for an appropriately chosen fixed constant j the following holds
BCr(j+1)+2(v) > BCr(j+1)+3(v) < BCr(j+1)+4(v).
(2)
This yields i − 1 dips in the profile, which suffices.
It is straightforward to calculate the number of paths through v, because all
paths through v start at the vertex l = 0 and end at each of the other vertices
except for v itself: Pr(j+1)+2(v) = r(3j + 1) + 1, Pr(j+1)+3(v) = r(3j + 1) + 2,
and Pr(j+1)+4(v) = r(3j + 1) + 5.
We omit the calculations for Pk, which are calculated in a manner similar
to the manner Pk is calculated in the proof of Lemma 6. The number of such
length-k paths is counted by counting the number of paths that are 1) along the
central path, 2) on two of the branches, or 3) on only one of the branches. By
direct calculation, we get that the values of Pk needed are as given by Table 1
when j ≥ 5.
when j = 5 for all 2 ≤ r ≤ i − 1.
This explicit calculation of the values of Pk and Pk(v) yields that (2) holds
A more complete enumeration of the calculations may be found in the ap-
pendix.
Note that the number of dips in this proof is not only asymptotically as large
as possible in the diameter, but also in the number of vertices, since these trees
have Θ(i) vertices.
5 Crossings
In this section we analyze the number of crossings between two profiles. The
number of crossings of two profiles does not depend on whether normalization
is used or not - thus examining crossings avoids the issue of normalization.
Theorem 11. For any integer (cid:96) ≥ 1, there is a tree T of diameter Θ((cid:96)) with
vertices u and v whose profiles cross Ω((cid:96)) times.
...
A0
u
···
···
2(cid:96)
···
v
···
A1
...
2i − 1
···
2(cid:96) − 3
B0
···
Ai
...
···
A(cid:96)−1
Fig. 5. T(cid:96)
···
···
B1
...
···
2i
···
Bi
2(cid:96) − 2
...
···
B(cid:96)−1
Proof. For each (cid:96) ≥ 1, we build a tree T(cid:96) with vertices u and v as shown in
Figure 5, where the number of leaves in the sets Ai and Bi will be determined
shortly. This tree consists of a simple path of length 2(cid:96) between u and v and (cid:96)
brooms attached to each. The tree is constructed so that paths of length 2i that
include u (as an interior vertex) can reach the set Ai−1 of vertices as depicted (as
exterior vertices), but that paths of length 2i through v cannot reach the set Bi−1
of vertices. Let ai = Ai and bi = Bi. We then choose ai−1 so that BC2i(u) >
BC2i(v), and similarly we choose bi−1 so that BC2i+1(v) > BC2i+1(u). This
gives us 2(cid:96) − 1 crossings when 1 ≤ i ≤ (cid:96) − 1.
We will start, for 2 ≤ k ≤ 2(cid:96) + 1, by upper and lower bounding pk(u) and
pk(v) as a function of the ai's and bi's. Certainly, since the path between u and
v is length 2(cid:96), all paths containing u do not contain v and vice-versa (as internal
nodes). So we can upper bound pk(u) as the square of the number of vertices
within distance k−1 of u on both the path between u and v and the subtree of u,
ignoring that paths can't start and end at the same vertex (this approximation
will be easily sufficient for our needs.) We show the following holds:
aj + ((cid:96) + 1)(k − 1)
.
(3)
j=0
Since the leaves of the a(cid:98) k
2 (cid:99)−1 edges as depicted are length no more than
k − 1 from u, there is at least one path through u of length k, so certainly
2 (cid:99)−1. On the subtree of u, at distance j from u, there are either
pk(u) > a(cid:98) k
aj + k − 1 vertices or k vertices, depending on the parity of j. Thus there are no
(cid:98) k
2 (cid:99)−1(cid:88)
a(cid:98) k
2 (cid:99)−1 < pk(u) <
2
more than a total of(cid:80)(cid:98) k
2 (cid:99)−1
aj + (cid:96)(k− 1) vertices. Including the additional k− 1
vertices on the path between u and v, this yields an upper bound on the number
of paths of length no more than k containing u as given on the right-hand side
of equation (3). Similarly, we get the following for pk(v):
j=0
(cid:100) k
2 (cid:101)−2(cid:88)
j=0
2
b(cid:98) k
2 (cid:99)−1 < pk(v) <
bj + ((cid:96) + 1)(k − 1)
.
(4)
Now we choose each ai and bi inductively, ensuring that BC2i(u) > BC2i(v)
and BC2i+1(v) > BC2i+1(u). In the base case, for k = 2, where we will define
2 −1 = a0, we will need BC2(u) > BC2(v). BC2(u) = p2(u) > ak and the
a k
degree of v is (cid:96) + 1, so it suffices to set ak =(cid:0)(cid:96)+1
(cid:1).
want to show that BCk(u) > BCk(v). BCk(u) =(cid:80)k
2 −1. BCk(v) =(cid:80)k
For arbitrary even k, a0, . . . , a k
2 −2 and b0, . . . , b k
2
a k
i=2 pi(v), and from the right-hand side of (4), it suffices to
notice that each pi(v) from this sum is upper-bounded by a function of (cid:96) and
2 −2; for convenience call the sum over all pi(v) of these upper bounds
b0, . . . , b k
sk. Thus it suffices to set a k
2 −2 are already defined. We
+
i=2 pi(u) > 2
2 −2
j=0 aj
(cid:16)(cid:80) k
(cid:17)
2 −1 such that
(cid:16)(cid:80) k−1
Similarly, for arbitrary odd k, a0, . . . , a k−1
2 −2 are already
defined and we want to show that BCk(u) < BCk(v). And similarly, we know
and BCk(u) is upper-bounded by a function s(cid:48)
that BCk(v) > 2
of (cid:96) and a0, . . . , a k−1
2 −1 and b0, . . . , b k−1
2 −1
2 −1. So we set b k−1
2 −1 such that
j=0
bj
k
2 −2(cid:88)
k
j=0
aj.
a k
2 −1 ≥ sk − 2
(cid:17)
s(cid:48)
.
bj
2 −2(cid:88)
k−1
j=0
b k−1
2 −1 ≥ 1
2
k − 2
Hence constructing ai and bi for all i ≤ (cid:96)−1 yields the desired 2(cid:96)−1 crossings.
The bound of Ω((cid:96)) crossings is worst possible in order of magnitude as a
function of the diameter, but unlike in the construction in Theorem 10, the
diameter is not linear in the number of vertices n. Indeed, T(cid:96) has O((cid:96)2(cid:96)
) vertices,
which yields Ω(log log n) crossings. We leave for future work if it is possible to
increase the number of crossings as a function of n.
6 Experiments
Theorem 9 shows that the profiles of expected betweenness centralities do not
cross, but it does not imply results on the expected number of crossings or the
Fig. 6. Clockwise, from top left: the estimated probability that B(1) and B(2) have
no crossings as the number of vertices n increases, the estimated probability that B(i)
and B(i + 1) have no crossings as i increases, the estimated probability that B(i) is
monotone, as i increases, and the estimated probability that B(1) is monotone, as n
increases.
probability that there is at least one crossing. Towards results of this kind, we
give experimental results that give initial evidence for the behavior of profiles in
scale-free random trees in terms of crossings and dips.
We give here some examples of experiments performed with scale-free trees
and discuss the problems suggested by these experiments. In Figure 6 (top left),
we estimate the probability that there are no crossings between the profiles of
the first two vertices. We also show the results for fixed n (we use n = 250) but
between vertices i and i+1 as i increases (top right) and results for the likelihood
of monotonicity - i.e. no dips - of a vertex (bottom). In each experiment, each
value is averaged over 5000 independent trials.
As n increases the likelihood of there being no dips in the profile of vertex
1 (bottom left) or no crossings between the profiles of vertex 1 and 2 (top left)
actually decreases (where small deviations are likely due to sampling error). This
is indication that profiles in large trees may be more likely to behave badly. In
050100150200250n0.870.880.890.900.910.920.93Percent without a cross01020304050i0.40.50.60.70.80.9Percent without a cross050100150200250n0.8650.8700.8750.8800.8850.8900.8950.900Percent monotone01020304050i0.840.850.860.870.880.890.900.91Percent monotonethat context, the worst-case results discussed in Sections 4 and 5 may provide
useful information.
On the other hand, the likelihood of having no crossings and being monotonic
as the vertex i increases for fixed n (again, we use n = 250) looks very different
(top right and bottom right of Figure 6). After initial decreases, the likelihood of
being monotonic and not having crossings increases as i increases. This implies
that having crosses and dips may be limited to earlier vertices and that vertices
close to leaves do not behave similarly to our worst-case results. We leave a more
precise analysis of which vertices in scale-free trees behave badly for future work.
7 Remarks and future work
In this paper we studied k-betweenness centrality by considering properties of
the betweenness centrality profiles of trees, motivated by experimental results
of Pfeffer and Carley [19]. We showed that for scale-free random trees it holds
that if v < w then E[BCk(v)] > E[BCk(w)]; thus the profile of the expected
betweenness centralities of an earlier vertex dominates the profile of the expected
betweenness centralities of a later vertex.
We also show, in the worst case, that there are profiles of vertices in trees
where the number of crossings and dips is proportional to the diameter, which is
always an upper bound. This means that in the worst case it suffices to consider
trees; vertices' profiles in trees may behave as non-smoothly as vertices' profiles
in any graph.
Smoothness is an important property for understanding how the structure of
local neighborhoods of a graph generalize to the entire graph. However, our work
demonstrates that in the worst case vertices' profiles may be very non-smooth
and that smoothness assumptions will not hold in general, opening up for future
work questions on establishing more precise bounds on how severe departures
from smoothness may be.
For example, is it possible to construct examples where many vertices in the
same tree have profiles all with many dips or crossings? More generally, to what
degree is non-smooth behavior an isolated problem where any dips or crossings
are very small or short-lived?
We also leave as an open problem further results on the expected behavior
of profiles in scale-free trees, such as determining the number of crosses, say,
between the root and the next vertex, as n goes to infinity. Our preliminary
experimental results, described in the previous section, provide some information
towards this type of question. Problems about crossings tend to be easier than
problems about dips, as the former do not have to deal with a normalization
term. Our experimental results, however, give a starting point towards, say,
determining the expected number of dips in a profile.
Our result for the scale-free random trees is based on the work of Bollob´as
and Riordan [5,4]; their other results in [4] may be relevant in this context. Both
earlier techniques and results, e.g. Smythe and Mahmoud [22], and more recent
results, e.g. Bubeck et al. [10,9] and Jog and Loh [17], form an emerging picture
of scale-free trees and may be useful for future work.
References
1. J.M. Anthonisse. The rush in a directed graph. Stichting Mathematisch Centrum.
Mathematische Besliskunde, pages 1 -- 10, 1971.
2. Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence of scaling in random networks.
Science, 286(5439):509 -- 512, 1999.
3. Alex Bavelas. A mathematical model for group structures. Human Organization,
7(3):16 -- 30, 1948.
4. B´ela Bollob´as and Oliver Riordan. Shortest paths and load scaling in scale-free
trees. Physical Review E, 69(3):036114, 2004.
5. B´ela Bollob´as and Oliver M. Riordan. Mathematical results on scale-free random
In S. Bornholdt and H. G. Schuster, editors, Handbook of Graphs and
graphs.
Networks, pages 1 -- 34. Wiley-VCH, 2002.
6. Stephen P. Borgatti and Martin G. Everett. A graph-theoretic perspective on
centrality. Social Networks, 28(4):466 -- 484, 2006.
7. Ulrik Brandes. A faster algorithm for betweenness centrality. Journal of Mathe-
matical Sociology, 25(2):163 -- 177, 2001.
8. Ulrik Brandes and Thomas Erlebach, editors. Network Analysis: Methodological
Foundations, volume 3418 of Lecture Notes in Comp. Sci. Springer, 2005.
9. S´ebastien Bubeck, Luc Devroye, and G´abor Lugosi. Finding Adam in random
growing trees. CoRR, abs/1411.3317, 2014.
10. S´ebastien Bubeck, Elchanan Mossel, and Mikl´os Z. R´acz. On the influence of the
seed graph in the preferential attachment model. CoRR, abs/1401.4849, 2014.
11. Sharad Chaudhary and Gary Gordon. Tutte polynomials for trees. Journal of
Graph Theory, 15(3):317 -- 331, 1991.
12. Peter Dankelmann. On the distance distribution of trees. Discrete Applied Math-
ematics, 159(10):945 -- 952, 2011.
13. David Eppstein and Joseph Yannkae Wang. Fast approximation of centrality. In
Proc. 12th Symp. Discrete Algorithms, pages 228 -- 229. ACM and SIAM, Jan. 2001.
14. R.J. Faudree, C.C. Rousseau, and R.H. Schelp. Theory of Path Length Distribu-
tions I. Discrete Mathematics, 6(1):35 -- 52, 1973.
15. Linton C. Freeman. A set of measures of centrality based on betweenness. Sociom-
etry, pages 35 -- 41, 1977.
16. Gary Gordon and Eleanor McDonnell. Trees with the same degree sequence and
path numbers. Discrete Mathematics, 147(1):297 -- 300, 1995.
17. Varun Jog and Po-Ling Loh. Analysis of centrality in sublinear preferential at-
tachment trees via the CMJ branching process. CoRR, abs/1601.06448, 2016.
18. Hosam M. Mahmoud. Distances in random plane-oriented recursive trees. Journal
of Computational and Applied Mathematics, 41(1):237 -- 245, 1992.
19. Jurgen Pfeffer and Kathleen M. Carley. k-centralities: Local approximations of
global measures based on shortest paths. In Proceedings of the 21st International
Conference Companion on World Wide Web, pages 1043 -- 1050. ACM, 2012.
20. Forrest R. Pitts. The medieval river trade network of Russia revisited. Social
Networks, 1(3):285 -- 292, 1979.
21. Matteo Riondato and Evgenios M. Kornaropoulos. Fast approximation of between-
In Proceedings of the 7th ACM International
ness centrality through sampling.
Conference on Web Search and Data Mining, pages 413 -- 422. ACM, 2014.
22. Robert T. Smythe and Hosam M. Mahmoud. A survey of recursive trees. Theory
of Probability and Mathematical Statistics, (51):1 -- 28, 1995.
23. G´abor Szab´o, Mikko Alava, and J´anos Kert´esz. Shortest paths and load scaling in
scale-free trees. Physical Review E, 66(2):026101, 2002.
Appendix
A Dips
In the proof of Theorem 10, we omitted the calculation of Pk for Gij, which we
return to in this section. Specifically, we show that pk, the number of paths of
exactly length k, is as given in Table 2, for all 2 ≤ r ≤ i − 1 and j ≥ 5 (if j < 5
then not all of these cases are distinct):
Table 2. Values of pk for Gij
pk
k
3ij + 4i + 1
k = 2
3ij + 7i
k = 3
i(3j + 3) + (3k − 5)(i − 1) + 6
4 ≤ k ≤ j + 1
k(3i − 9) + i(3j − 6) + 6j + 21
j + 2 ≤ k ≤ j + 4
k(3i − 9) + i(3j − 6) + 6j + 23
j + 5 ≤ k ≤ 2j
k(−4i + 1) + i(17j + 1) − 14j + 13
k = 2j + 1
k(−4i − 1) + i(17j + 9) − 10j + 9
2j + 2 ≤ k ≤ 2j + 3
−9k + i(9j − 3) + 6j + 12r + 9
r(j + 1) + 2 ≤ k ≤ r(j + 1) + 3
r(j + 1) + 4 ≤ k ≤ (r + 1)j + r − 1 −9k + i(9j − 3) + 6j + 12r + 11
(r + 1)j + r ≤ k ≤ (r + 1)j + r + 1 k(4i − 3 − 4r) + i(−3 + 5j − 4rj − 4r) +
j(−2r + 4r2) + 6r + 4r2 + 11
k(−4i − 3 + 4r) + i(4rj + 13j + 4r + 5) +
j(−4r2 − 10r) − 4r2 − 2r + 9
k = (r + 1)j + r + 2
The number of such length-k paths are counted by counting the number of
paths that are 1) along the central path, 2) on two of the branches, and 3) on
only one of the branches. For brevity's sake, we will show just the cases when
k = 2 and the cases when r(j + 1) + 2 ≤ k ≤ (r + 1)j + r − 1. The other cases
are similar.
We use two simple facts: There are m− k + 1 subpaths of length k ≤ m along
a path of length m, and for a fixed path of length m, there are k − m + 1 paths
of length k ≥ m that contain the fixed path as a subpath.
First we show that there are 3ij + 4i + 1 length k = 2 paths. The length of
the central path is i(j + 1) + 2, so there are i(j + 1) + 2 − k + 1 such subpaths
of length k. Otherwise a length k path must intersect either two branches that
attach to the same vertex or only one of those branches. There are i pairs of
branches, each inducing a path of length 2j, so there are i(2j− k + 1) such paths.
Else the length k path intersects only one branch. For each branch, there are
two paths that intersect that branch but do not intersect another branch: the
path can go to the 'left' or 'right', giving us a total of 4i such paths. Summing
up, we get 3ij + 4i + 1 paths.
The other cases we consider are the two cases are (as given above) when
r(j + 1) + 2 ≤ k ≤ (r + 1)j + r − 1, for which we will need j ≥ 5. The length of
the central path is i(j + 1) + 2, so there are i(j + 1) + 2− k + 1 such subpaths of
length k. Otherwise, a path of length k intersects one of the branches in at least
one edge. Paths can, of course, only intersect at most two different branches.
Since k > 2j, these branches cannot attach to the central path at the same
vertex. Then branches are at integer multiples of j + 1 apart. So a length k path
is too short to reach between branches that are r + 1 apart (we say the branches
are 0 apart when they are attached to the same vertex, etc.) because then the
vertices at which the branches attach are distance (r + 1)(j + 1) from each other,
but k ≤ (r + 1)j + r − 1. Similarly, the branches cannot be as close as r − 1
apart. Thus there are only two cases for the paths that intersect at exactly two
branches: the branches are either r − 1 apart or r apart. There are 4(i− (r − 1))
pairs of branches r− 1 apart, and the path induced by the two branches and the
central path is length (r + 1)j + r − 1, so there are a total of
4((r + 1)j + r − k)(i − r + 1)
length k paths in this case. (Note in this case all such paths of length k auto-
matically include all of the appropriate edges of the central path.) Otherwise,
the branches are r apart. However, now not all length k paths along the path
induced by the branches contain the part of the induced path along the cen-
tral path. Here we use the second simple fact as mentioned above: the length of
the central path that all the length k paths must include is r(j + 1), but they
must include at least one vertex from each of the branches as well, so there are
k − r(j + 1) + 1− 2 such paths. Now there are 4(i− r) pairs of branches r apart,
yielding a total of
4(k − r(j + 1) − 1)(i − r)
such paths. Finally, there are the length k paths that intersect only one branch.
A path starting on a branch has two directions along the central path where its
end can lie. There are j vertices along a branch where the vertex can start, and
2(i − r) such branches if the paths goes to the 'right' and 2(i − (r + 1)) going to
the 'left' for which no length k path is too long. There are two more branches in
either direction at which length k paths can start, for which it is straightforward
to verify that there are 2((r + 1)j + r − 1 − k + 1) going to the 'right' end, and
2(j + r(j + 1) + 3 − k + 1) if k > r(j + 1) + 3,
if k = r(j + 1) + 3,
if k = r(j + 1) + 2
2j
2j + 2
paths going to the 'left' end. Thus we get the two cases as listed above, for
r(j + 1) + 2 ≤ k ≤ r(j + 1) + 3 and for r(j + 1) + 4 ≤ k ≤ r(j + 1) + r − 1.
Using these numbers, we can now calculate Pk =(cid:80)k
given in Table 3.
Table 3. Values of Pk for Gij
(cid:96)=2 p(cid:96), yielding the values
2 j2 − 3j − 1
Pk
k
r(j + 1) + 2 r2(− 9
i(−6j2 + 16j − 7) − 3j2 + 15j − 17
r(j + 1) + 3 Pr(j+1)+2 + (9j − 3)(i − r) + 6j − 18
r(j + 1) + 4 Pr(j+1)+3 + (9j − 3)(i − r) + 6j − 25
2 ) + r(9ij2 + 6ij + i + 6j2 − 23
2 j + 17
2 ) +
Counting the number of paths through v is much easier. Since v has only one
vertex on its left, Pk(v) is just the number of vertices to its right that are within
distance k. Specifically, this gives us
Pr(j+1)+2(v) = r(3j + 1) + 1,
Pr(j+1)+3(v) = r(3j + 1) + 2,
Pr(j+1)+4(v) = r(3j + 1) + 5.
Plugging in these values and the values from Table 3, we get that for j = 5
and for all 2 ≤ r ≤ i − 1,
Pr(j+1)+2(v)
Pr(j+1)+2
>
Pr(j+1)+3(v)
Pr(j+1)+3
<
Pr(j+1)+4(v)
Pr(j+1)+4
.
as needed.
That is, BC6r+2(v) > BC6r+3(v) < BC6r+4(v) for all 2 ≤ r ≤ i − 1 in Gi,5,
Note that the number of dips we get, namely i − 2 dips, is not only asymp-
totically as large as possible in the diameter, but also in the number of vertices,
since the trees Gi,5 have Θ(i) vertices.
|
1606.08518 | 3 | 1606 | 2019-03-04T07:31:18 | Stability of SIS Spreading Processes in Networks with Non-Markovian Transmission and Recovery | [
"cs.SI",
"math.PR",
"physics.soc-ph",
"q-bio.PE"
] | Although viral spreading processes taking place in networks are often analyzed using Markovian models in which both the transmission and the recovery times follow exponential distributions, empirical studies show that, in many real scenarios, the distribution of these times are not necessarily exponential. To overcome this limitation, we first introduce a generalized susceptible-infected-susceptible (SIS) spreading model that allows transmission and recovery times to follow phase-type distributions. In this context, we derive a lower bound on the exponential decay rate towards the infection-free equilibrium of the spreading model without relying on mean-field approximations. Based on our results, we illustrate how the particular shape of the transmission/recovery distribution influences the exponential rate of convergence towards the equilibrium. | cs.SI | cs | Stability of SIS Spreading Processes in Networks
with Non-Markovian Transmission and Recovery
Masaki Ogura, Member, IEEE, and Victor M. Preciado, Member, IEEE
1
9
1
0
2
r
a
M
4
]
I
S
.
s
c
[
3
v
8
1
5
8
0
.
6
0
6
1
:
v
i
X
r
a
Abstract -- Although viral spreading processes taking place in
networks are often analyzed using Markovian models in which
both the transmission and the recovery times follow exponential
distributions, empirical studies show that, in many real scenarios,
the distribution of these times are not necessarily exponential.
To overcome this limitation, we first introduce a generalized
susceptible-infected-susceptible (SIS) spreading model that allows
transmission and recovery times to follow phase-type distribu-
tions. In this context, we derive a lower bound on the exponential
decay rate towards the infection-free equilibrium of the spreading
model without relying on mean-field approximations. Based
on our results, we illustrate how the particular shape of the
transmission/recovery distribution influences the exponential rate
of convergence towards the equilibrium.
I. INTRODUCTION
U NDERSTANDING the dynamics of spreading processes
in complex networks is a challenging problem with a
wide range of practical applications in epidemiology and pub-
lic health [3], information propagation in social networks [21],
or cyber-security [40]. During the last decade, significant
progress has been made towards understanding the relationship
between the topology of a network and the dynamics of
spreading processes taking place over the network (see [28],
[37] for recent surveys). A common approach to investigate
this relationship is by modeling spreading processes using net-
worked Markov processes, such as the networked susceptible-
infected-susceptible (SIS) model [46]. Based on these Marko-
vian models, it is then possible to find an explicit relationship
between epidemic thresholds and network eigenvalues in static
topologies [18], [36], [46], [48], as well as in multilayer
[10], [42], time-varying [29], [35], and adaptive [23], [30]
networks. Markovian models also allow us to design optimal
strategies for containment of spreading processes taking place
in static [39], uncertain [13], and temporal [31] networks.
A consequence of using Markovian models in the analysis
of spreading processes is that both transmission times (i.e.,
the time it takes for an infection to be transmitted from an
infected node to one of its neighbors) and recovery times
(i.e., the time it takes for an infected node to recover) follow
exponential distributions. However, empirical studies show
that, in many real networks, the distribution of transmission
and recovery times are not necessarily exponential. For ex-
ample, the transmission time of messages in Twitter, or news
M. Ogura is with the Division of
Information Science, Nara Insti-
tute of Science and Technology, Ikoma, Nara 630-0192, Japan. E-mail:
[email protected]
V. M. Preciado is with the Department of Electrical and Systems
Engineering, University of Pennsylvania, Philadelphia, PA 19104, USA.
E-mail: [email protected]
in other social media outlets, follows (approximately) a log-
normal distribution [21], [47]. In the context of human contact
networks, the transmission of various infectious diseases [4],
[7], [17], [26], or the time it takes to recover from the influenza
virus [44] are often non-exponential.
Since realistic transmission and recovery times often follow
non-exponential distributions, it is of practical importance to
understand the role of these distributions on the dynamics of
the spread. In this direction, the authors in [47] illustrated,
via numerical simulations, that non-exponential transmission
times can have a substantial effect on the dynamics of the
spread. Motivated by this study, several approximative meth-
ods for quantifying the steady-state fraction of infected nodes
have been proposed in the literature. In this direction, the
authors in [5] analyzed spreading processes with general trans-
mission and recovery times using mean-field approximations.
In [16], [25], simple but yet analytically solvable spreading
models with non-exponential transmission times were studied.
Moment-closure approximations for analyzing spreading pro-
cesses with non-exponential transmission and recovery times
were proposed in [19], [38]. Under the assumption that re-
covery times follow an exponential distribution, the analytical
framework in [43] enables us to reduce non-exponentially
distributed transmission times into exponentially distributed
counterparts without changing the steady-state of the spread.
The authors in [27] used a mean-field approximation to
derive stability conditions for the infection-free equilibrium
of a spreading process with three compartments and non-
Markovian transition dynamics. However, their conditions are
either conservative or guarantees only the local stability of the
infection-free equilibrium.
In this paper, we propose a tractable but rigorous approach
to analyze the transient of SIS spreading processes over
arbitrary networks with general (non-exponential) transmission
and recovery times. In this direction, we first introduce the
generalized networked SIS (GeNeSIS) model, which allows for
transmission and recovery times following arbitrary phase-type
distributions (see, e.g., [2]). Defined as the exit time of time-
homogeneous Markov processes, phase-type distributions form
a dense family in the space of positive-valued distributions [9].
Therefore, the GeNeSIS model allows to theoretically analyze
arbitrary transmission and recovery times within an arbitrary
accuracy [2]. We are particularly interested in quantifying the
exponential decay rate of the spread towards the infection-free
equilibrium; in other words, to eradicate the viral spreading
process. The key tool used in our derivations is a vectorial
representation of phase-type distributions, which we use to
bound the exponential decay rate towards the infection-free
2
equilibrium in the stochastic dynamics of the GeNeSIS model.
This paper is organized as follows. In Section II, we
introduce elements of graph theory and stochastic differential
equations with Poisson jumps. In Section III, we describe a
generalized SIS model over networks with arbitrary trans-
mission and recovery times. In Section IV, we provide a
vectorial representation of the GeNeSIS model, which we use
in Section V to analyze the exponential decay rate towards the
infection-free equilibrium. We validate the effectiveness of our
results via numerical simulations in Section VI, where we also
illustrate the effect of non-exponential transmission/recovery
times in the dynamics of the spread.
II. MATHEMATICAL PRELIMINARIES
Let R and N denote the set of real numbers and positive
integers, respectively. For a positive integer n, define [n] =
{1, . . . ,n}. For a real function f , let
f (t−) denote the limit
of f from the left at time t. We let In and On denote the
n×n identity and zero matrices. By 1p and 0p, we denote the
p-dimensional vectors whose entries are all ones and zeros,
respectively. A real matrix A (or a vector as its special case)
is said to be nonnegative, denoted by A ≥ 0, if A is nonnegative
entry-wise. The notation A ≤ 0 is understood in the obvious
manner. For a square matrix A, the maximum real part of
its eigenvalues, called the spectral abscissa of A, is denoted
by η(A). We say that A is Metzler if the off-diagonal entries
of A are all non-negative. It is easy to see that, if A is Metzler,
then eAt ≥ 0 for every t ≥ 0. The Kronecker product [15] of
two matrices A and B is denoted by A⊗ B, and the Kronecker
sum of two square matrices A ∈ Rp×p and B ∈ Rq×q is defined
by
A⊕ B = A⊗ Iq + Ip ⊗ B.
Given a collection of n matrices A1, . . . ,An having the same
number of columns,
the matrix obtained by stacking the
matrices in vertical (A1 on top) is denoted by col(A1, . . . ,An).
An undirected graph is a pair G = (V,E ), where V =
{1, . . . ,n} is the set of nodes, and E ⊂ V × V is the set of
edges, consisting of distinct and unordered pairs {i, j} for
i, j ∈ V. We say that a node i is a neighbor of j (or that i and j
are adjacent) if {i, j} ∈ E. The set of neighbors of node i is
denoted by Ni. The adjacency matrix of G is defined as the
n× n matrix whose (i, j)-th entry is 1 if and only if nodes i
and j are adjacent, 0 otherwise.
We let P(·) denote the probability of events. The expectation
of a random variable is denoted by E[·]. A Poisson counter [6,
Chapter 4] of rate λ > 0 is denoted by Nλ . In this paper,
we extensively use a specific class of stochastic differential
equations with Poisson jumps, described below. For each
fi : R × R → R be a continuous function, Nλi
i ∈ [m], let
be a Poisson counter, and κi be a continuous-time, real,
and stationary stochastic process defined over the probability
space Ω. All the above stochastic processes are assumed to
be independent of each other. Then, we say that a real and
right-continuous function x is a solution of the stochastic
differential equation
dx =
m
∑
i=1
fi(x(t),κi(t))dNλi,
(1)
if x is constant on any interval where none of the counters Nλ1,
. . ., Nλm jumps, and
x(t) = x(t−) + fi(x(t−),κi(t))
when Nλi
jumps at time t. This definition can be naturally
extended to the vector case. Below, we present two lemmas for
this class of stochastic differential equations. The first lemma
states a version of Ito's formula:
Lemma II.1. Assume that x is a solution of (1). Let g be a
real continuous function. Then, y(t) = g(x(t)) is a solution of
the stochastic differential equation
m
dy =
∑
i=1
i.e., y satisfies
[g (x(t) + fi (x(t),κi(t)))− g(x(t))]dNλi,
y(t) = y(t−) + g(cid:0)x(t−) + fi(x(t−),κi(t))(cid:1)
− g(x(t−)),
if the Poisson counter Nλi jumps at time t and is constant over
any interval in which none of the counters Nλ1, . . . ,Nλm jumps.
Proof. Assume that the counter Nλi jumps at time t. Since x is
the solution of the stochastic differential equation (1), it fol-
lows that y(t)− y(t−) = g (x(t−) + fi(x(t−),κi(t)))− g(x(t−)),
as desired.
We also state the following lemma concerning the expecta-
tion of the solution to the stochastic differential equation (1):
Lemma II.2. Assume that x is a solution of
the
functions f1, . . .,
fm are affine with respect to the second
variable, then
d
dt
E(cid:2) fi(x(t),E[κi(t)])(cid:3)λi.
E[x(t)] =
(1). If
(2)
m
∑
i=1
Proof. By the assumption, for each i ∈ [m] we can take real
functions fi,1 and fi,2 such that fi(a,b) = fi,1(a) + b fi,2(a) for
every a,b ∈ R. Let t ≥ 0 and h > 0 be arbitrary. We have the
following three possibilities: (i) no counter jumps on the time
interval [t,t +h]; (ii) exactly one counter jumps in the interval;
or (iii) more than one counter jumps in the interval. The
first case happens with probability 1− (λ1 +··· +λm)h +o(h).
For the second case, for each i ∈ [m], one and the only one
counter Nλi jumps on the time interval [t,t +h] with probability
λih + o(h). In this case we have
x(t + h) = x(t) + fi(x(t),κi(τ))
= x(t) + fi,1(x(t)) + κi(τ) fi,2(x(t))
for some τ ∈ [t,t + h] and, therefore,
E[x(t + h)] = E[x(t)] + E[ fi,1(x(t))] + E[κi(τ)]E[ fi,2(x(t))]
= E[x(t)] + E(cid:2) fi(x(t),E[κi(t)])(cid:3)
because κi is a stationary stochastic process. Finally, the third
case occurs with probability o(h). Summarizing, we have
shown that
E(cid:2) fi(x(t),E[κi(t)])(cid:3)λi,
E[x(t + h)]− E[x]
h
=
o(h)
h +
m
∑
i=1
which proves (2) in the limit of h → 0.
III. SIS MODEL WITH GENERAL TRANSMISSION AND
RECOVERY TIMES
The aim of this section is to introduce the generalized
networked susceptible-infected-susceptible (GeNeSIS) model,
which will allow us to analyze the effect of non-exponential
transmission and recovery times in the spreading dynamics.
A. Generalized Networked SIS Model
We start by giving a brief overview of the standard SIS
model (see, e.g., [28], [37]). Let G = (V,E ) be an undirected
and unweighted graph with n nodes. In the SIS model, at
a given (continuous) time t ≥ 0, each node can be in one
of two possible states: susceptible or infected. If a neighbor
of node i is infected, then this neighbor can infect node i
with an instantaneous rate βi, where βi > 0 is called the
transmission rate of node i. Therefore, while being infected,
the neighbor attempts to infect node i with the inter-event times
following an exponential distribution of rate βi. On the other
hand, when a node i is infected, it can randomly transition to
the susceptible state with an instantaneous rate δi > 0, called
the recovery rate of node i. This implies that the time it
takes for an infected node i to recover follows an exponential
distribution of rate δi.
Before we introduce the generalized networked susceptible-
infected-susceptible (GeNeSIS) model, we introduce the fol-
lowing notations. We describe the state of a node i ∈ V by a
{0,1}-valued continuous-time stochastic process, denoted by
zi = {zi(t)}t∈R. We say that node i is susceptible (respectively,
infected) at time t if zi(t) = 0 (respectively, zi(t) = 1). We
assume that the function zi is continuous from the right for
all i ∈ [n]. Under this assumption, we say that node i be-
comes infected (respectively, becomes susceptible) at time t if
zi(t−) = 0 and zi(t) = 1 (respectively, zi(t−) = 1 and zi(t) = 0).
It is assumed that all nodes are susceptible before time t = 0,
i.e., zi(t) = 0 for t < 0. We now introduce the GeNeSIS model
as follows.
Definition III.1. We say that
the family z = {zi}i∈[n] of
stochastic processes is a generalized networked susceptible-
infected-susceptible model (GeNeSIS model, for short) if there
exist a subset V0 ⊂ [n], as well as random variables
0 = τ ji
0 (t) < τ ji
1 (t) < ··· ,
and ρi(t) > 0 satisfying the following conditions for all i ∈ [n],
j ∈ Ni, and t ≥ 0:
a) Node i becomes infected at time t = 0 if and only if
i ∈ V0, i.e., V0 is the initially infected subset.
b) Assume that node i becomes infected at time t. Then,
node i remains infected during the time interval [t,t +
ρi(t)) and becomes susceptible at time t +ρi(t), i.e., the
random variable ρi(t) is the recovery time of node i;
c) If node i becomes infected at time t, then, until its
recovery, the node attempts to infect node j ∈ Ni at
times {t + τ ji
k (t)}k∈N, i.e., if node j is susceptible at
k (t) for any k ∈ N, then node j becomes
time t + τ ji
infected.
3
k (t)−τ ji
the random increments {τ ji
Remark III.2. We call
k (t) −
τ ji
k−1(t)} j∈Ni,t≥0,k∈N the transmission times of node i, since
the difference τ ji
k−1(t) represents the time between in-
fection attempts from an infected node i towards a neighboring
node j. Note that, when all the recovery and transmission times
follow exponential distributions, the GeNeSIS model recovers
the standard networked SIS model described at the beginning
of this subsection.
Notice that the origin (i.e., zi = 0 for all i ∈ V) is an
absorbing state of the GeNeSIS dynamics. In what follows, we
will refer to the origin as the infection-free equilibrium. The
aim of this paper is to quantify the transient dynamics of the
generalized SIS model according to the following definition:
Definition III.3. The exponential decay rate of the GeNeSIS
model is defined by
log∑n
i=1 E[zi(t)]
.
t
limsup
t→∞
Since the sum ∑n
λ = − sup
V0⊂[n]
i=1 E[zi(t)] equals the expected number of
infected nodes at time t, the decay rate λ quantifies how
fast the infectious spreading process dies out in the network
(in average). Besides quantifying the impact of contagious
spreading processes over networks [12], [20], [47], the ex-
ponential decay rate has been used as a standard tool for
measuring the performance of strategies aiming to contain
epidemic outbreaks [1], [13], [39], [48]. We further remark
that, although exponential distributions are not necessarily
appropriate for modeling realistic transmission and recovery
times as discussed in the Introduction, the exponential decay
rate is still a valid quantity for measuring the spreading
capability of epidemic processes.
B. Phase-type Transmission and Recovery Times
In this paper, we consider the GeNeSIS model with trans-
mission and recovery times following phase-type distribu-
tions [2]. In what follows, we briefly describe this class
of probability distributions. Consider a time-homogeneous
Markov process x in continuous-time with p +1 (p ∈ N) states
(also called phases) such that the states 1, . . . , p are transient
and the remaining state p + 1 is absorbing. The infinitesimal
generator of the process is then necessarily of the form
(cid:20)T
(3)
where T ∈ Rp×p is an invertible Metzler matrix with non-
positive row-sums. Let(cid:20)φ
(cid:21)
b = −T 1p,
(cid:21)
b
0
0
,
denote the initial distribution of the Markov process x, i.e.,
0
(φ ∈ Rp)
∈ Rp+1
(cid:40)
φm, m ∈ [p],
0,
m = p + 1.
P(x(0) = m) =
Then, the time to absorption into the state p + 1 is a random
variable following a phase-type distribution, which we denote
4
by the pair (φ ,T ). In the rest of the paper, we make the follow-
ing assumption on the distribution of (random) transmission
and recovery times in the GeNeSIS model:
Assumption III.4. Transmission and recovery times of all
nodes follow phase-type distributions (φ ,T ) and (ψ,R), re-
spectively.
The class of phase-type distributions include various dis-
tributions of theoretical and practical interests. For example,
if we choose the parameters p = 1, T = −β , and φ = 1,
then the phase-type distribution (φ ,T ) equals an exponential
distribution with mean 1/β . A phase-type distribution can also
represent various classes of distributions including the Erlang,
Coxian, and hyper-exponential distributions [8]. Furthermore,
it is known that the set of phase-type distributions is dense
in the set of positive-valued distributions [9]. Therefore, it is
possible to approximate an arbitrary distribution by a phase-
type distribution within any given accuracy. Moreover, there
are efficient numerical algorithms for finding the parame-
ters of an approximating phase-type distribution [2]. Hence,
under Assumption III.4, the GeNeSIS model allows us to
efficiently approximate realistic spreading processes having
non-Markovian transmission and recovery distributions.
IV. VECTORIAL REPRESENTATIONS
The aim of this section is to introduce a vectorial repre-
sentation of the GeNeSIS model under Assumption III.4. We
start our exposition by providing a vectorial representation
of an arbitrary phase-type distribution (Subsection IV-A),
and then present a vectorial representation of the GeNeSIS
model (Subsection IV-B) that shall be used in Section V for
analyzing the decay rate of the spreading model.
A. Vectorial Representation of Phase-Type Distributions
In what follows, we use the following notation: For m,m(cid:48) ∈
[p], let Emm(cid:48) denote the p × p matrix whose entries are all
zeros, except for its (m,m(cid:48))-th entry being one. Also, let em
denote the m-th vector of the canonical basis in Rp (i.e., all the
entries of em are zeros, except for the m-th entry being one).
Finally, given a probability distribution φ on [p], we say that
an Rp-valued random variable x follows the distribution φ,
denoted by x ∼ φ, if
P(x = em) = φm
for every m ∈ [p].
By identifying the state space of the underlying Markov
process by the set of vectors {e1, . . . ,ep,0}⊂ Rp, the following
proposition allows us to represent the phase-type distribution
as the exit time (see [34, p. 117]) of a vectorial stochastic
differential equation:
Proposition IV.1. Let (φ ,T ) be a phase-type distribution
having p +1 phases (i.e., T ∈ Rp×p) and define the vector b ∈
Rp as in (3). Consider the Rp-valued stochastic differential
equation
with random initial condition x(0) ∼ φ. Then, the random
variable
ρ = min{t > 0: x(t) = 0}
= min{t > 0: ∃m ∈ [p] such that x(t−) = em,
and Nbm jumps at time t}
(5)
follows (φ ,T ).
Proof. A detailed investigation of the differential equation (4)
shows that the solution x of (4) is a Markov process with
state space {e1, . . . ,ep,0} ⊂ Rp and infinitesimal generator
given by (3). This fact specifically shows that the second
equality in (5) is true. Furthermore, since x(0) follows the
probability distribution φ,
the time to absorption of the
stochastic process x into the absorbing state 0 follows the
phase-type distribution (φ ,T ). This completes the proof of the
proposition.
The stochastic differential equation (4) shall be used for
describing phase-type recovery events in the proof of our first
main result (Theorem V.2). On the right-hand side of the
stochastic differential equation (4), the first term represents
the transitions between non-absorbing states, while the second
term represents the transitions into the absorbing state.
In order to derive stochastic differential equations for trans-
mission events, we appropriately modify the second term in
the stochastic differential equation (4) and derive a vectorial
representation for renewal sequences (see, e.g., [6, Chapter 9])
whose inter-renewal times follow a phase-type distribution:
Proposition IV.2. Let (φ ,T ) be a phase-type distribution. Let
eφ = {eφ (t)}t≥0 be independent and identically distributed
random variables such that eφ (t) follows the distribution φ
for all t ≥ 0. Consider the Rp-valued stochastic differential
equation
dx =
p
∑
m=1
p
∑
m(cid:48)=1
(Em(cid:48)m − Emm)xdNTmm(cid:48)
+
p
∑
m=1
(eφ (t)e(cid:62)m − Emm)xdNbm
(6)
with a random initial state x(0) following the distribution φ.
Define τ0 = 0 and let 0 < τ1 < τ2 < ··· be the (random) times
at which x(t−) = em and the counter Nbm jumps for some m ∈
[p]. Then, the increments {τk −τk−1}k∈N are independent and
identically distributed random variables following (φ ,T ).
Proof. Since the stochastic differential equation given in the
proposition is equivalent to the one in Proposition IV.1 on
the time interval [0,τ1), the random variable τ1 has the same
probability distribution as the random variable ρ defined in (5)
and, therefore, follows the phase-type distribution (φ ,T ) by
Proposition IV.1. Furthermore, by the definition of τ1, there
exists an m ∈ [p] such that x(τ1) = (eφ (τ1)e(cid:62)m − Emm)x(τ−1 ) +
x(τ−1 ) = eφ (τ1), which follows φ. Therefore, by the same
argument as above, we see that the random increment τ2 − τ1
also follows (φ ,T ). An induction completes the proof.
dx =
p
∑
m=1
p
∑
m(cid:48)=1
(Em(cid:48)m − Emm)xdNTmm(cid:48) −
p
∑
m=1
EmmxdNbm,
(4)
Using Propositions IV.1 and IV.2 as the machinery for
describing phase-type recovery and transmission events, in the
next subsection we present a set of vectorial stochastic differ-
ential equations for describing the whole GeNeSIS spreading
model.
B. Vectorial Representation of the Generalized SIS Model
In this subsection, we use Propositions IV.1 and IV.2 to
provide a vectorial representation of the GeNeSIS model under
Assumption III.4. Let A = [ai j]i, j be the adjacency matrix of
the graph G. Define the vectors b and d by (3) and
d = −R1q ∈ Rq,
γ and Ni
respectively. For (cid:96), (cid:96)(cid:48) ∈ [q], let F(cid:96)(cid:96)(cid:48) denote the q × q matrix
whose entries are all zeros, except for its ((cid:96), (cid:96)(cid:48))-th entry being
one. Also, let f(cid:96) denote the (cid:96)-th vector in the canonical basis
of Rq. Finally, for i, j ∈ [n] and γ > 0, we let Ni j
γ denote
independent Poisson counters with rate γ. The next theorem
is the first main result of this paper:
Theorem IV.3. For each i ∈ [n] and j ∈ Ni,
{e ji
φ (t)}t≥0 and f i
cally distributed random variables such that
f i
ψ (t) ∼ ψ
φ =
ψ (t)}t≥0 be independent and identi-
ψ = { f i
e ji
φ (t) ∼ φ ,
for all t ≥ 0. Let x ji and yi be, respectively, the Rp- and Rq-
valued stochastic processes satisfying the following stochastic
differential equations:
let e ji
dx ji =
p
p
+
∑
m=1
p
∑
m=1
∑
∑
(Em(cid:48)m − Emm)x ji dN ji
Tmm(cid:48)
m(cid:48)=1
φ e(cid:62)m − Emm)x ji dN ji
(e ji
yi
(cid:96) dNi
d(cid:96)
φ (1− 1(cid:62)q yi)
+ e ji
bm
q
− x ji
∑
q
(cid:96)=1
q
n
∑
k=1
aik
p
∑
m=1
m dNik
xik
bm,
(7)
(cid:96)=1
dyi =
− yi
∑
(F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))yi dNi
R(cid:96)(cid:96)(cid:48)
(cid:96)(cid:48)=1
q
∑
yi
(cid:96) dNi
d(cid:96)
conditions satisfy(cid:40)
where for an initially infected subset V0 ⊂ [n], the initial
ψ (1− 1(cid:62)q yi)
m dNik
xik
bm,
∑
m=1
∑
k=1
+ f i
(8)
aik
(cid:96)=1
n
p
x ji(0) ∼ φ , yi(0) ∼ ψ,
if i ∈ V0,
x ji(0) = 0p, yi(0) = 0q, otherwise.
(9)
Then, the generalized networked SIS model in Definition III.1
with transmission and recovery times following, respectively,
phase-type distributions (φ ,T ) and (ψ,R) can be equivalently
described as the family of stochastic processes z = {zi}n
i=1,
where
zi(t) = 1(cid:62)q yi(t)
(10)
for all t ≥ 0 and i ∈ [n].
The representations of the GeNeSIS model as the set of
stochastic differential equations (7) and (8) allows us to
analyze the model via symbolic computations, as will be
illustrated in Section V. Before proceeding to the proof of
Theorem IV.3, we provide an intuitive explanation of the
5
theorem. As is shown in Corollary IV.5 below, the variable x ji
is related to spread of the infection from an infected node i to
a susceptible node j, while yi controls the recovery process of
node i. Specifically, on the right-hand side of the differential
equation (7), the first two terms have the same structure as in
(6) and correspond to renewal sequences of transmissions. The
third and fourth terms represent the recovery and infection of
node i, respectively. Similarly, on the right-hand side of the
differential equation (8), the first two terms correspond to the
phase-type recovery and have almost the same structure as
in (4), while the remaining last term is related to the infection
of the node i.
In order to prove Theorem IV.3, we first state the following
lemma.
Lemma IV.4. The following statements are true for all i ∈ [n],
j ∈ Ni, and t ≥ 0:
1) 1(cid:62)p x ji(t) = 1(cid:62)q yi(t).
2) x ji(t) ∈ {0p,e1, . . . ,ep}.
3) yi(t) ∈ {0q, f1, . . . , fq}.
Proof. To prove the first statement, fix i ∈ [n] and j ∈ Ni, and
let
ε = 1(cid:62)p x ji − 1(cid:62)q yi.
From (7) and (8), we obtain that
∑
dε = ε
q
(cid:96) dNi
yi
d(cid:96)
.
(cid:96)=1
This equation implies that ε is constant over [0,∞) because
ε(0) = 0. Therefore, we have ε(t) = ε(0) = 0 for every t ≥ 0,
completing the proof of the first statement.
Let us prove the second and third statements. Notice that
x ji and yi are piecewise constant since they are the solutions
of the stochastic differential equations (7) and (8). Moreover,
their values can change only when one of the Poisson counters
in the stochastic differential equations jumps. Finally, if we let
U = {0p,e1, . . . ,ep},
V = {0q, f1, . . . , fq},
then, (9) shows x ji(0) ∈ U and yi(0) ∈ V . Therefore, it is
sufficient to show that the jump of any Poisson counter leaves
the sets U and V invariant.
R(cid:96)(cid:96)(cid:48)
, Ni
, N ji
Tmm(cid:48)
, and N ji
t > 0 be arbitrary and assume that x ji(t−) ∈ U
Let
and yi(t−)∈V . The stochastic differential equations (7) and (8)
have the following five different types of Poisson counters:
bm, Ni
Nik
bm. Careful investigations of the
d(cid:96)
stochastic differential equations (7) and (8) show that any of
these counters leave the sets U and V invariant as follows. For
example, when Nik
x ji(t) =x ji(t−) + e ji
bm jumps at time t, we have that
φ (t)(1− 1(cid:62)q yi(t−))aikxik
if 1(cid:62)q yi(t−) = 1, aik = 0, or xik
otherwise.
m(t−) = 0,
m(t−)
x ji(t−),
e ji
φ (t),
(cid:40)
=
(11)
6
Also,
yi(t) = yi(t−) + f i
(cid:40)
=
yi(t−),
f i
ψ (t),
ψ (t)(1− 1(cid:62)q yi(t−))aikxik
if 1(cid:62)q yi(t−) = 1, aik = 0, or xik
otherwise.
m(t−)
m(t−) = 0,
(12)
Therefore, this jump leaves U and V invariant. Similarly, when
Ni
d(cid:96)
jumps at time t, we obtain
(cid:40)
(cid:40)
x ji(t) = x ji(t−)− x ji(t−)yi
if yi
(cid:96)(t−)
0,
x ji(t−), otherwise,
(cid:96)(t−) = 1,
=
yi(t) = yi(t−)− yi(t−)yi
if yi
(cid:96)(t−)
(cid:96)(t−) = 1,
0,
yi(t−), otherwise.
=
(13)
(14)
and hence x ji(t) ∈ U. We also have yi(t) ∈ V because
The cases of other counters can be analyzed in a similar
manner and, therefore, the proofs are omitted.
The next corollary of Lemma IV.4 clarifies the roles of
the variables x ji, yi and the various Poisson counters in the
stochastic differential equations (7) and (8).
Corollary IV.5. The following statements are true for every
i ∈ [n], j ∈ Ni, and t ≥ 0:
1) Node i attempts to infect node j at time t, if and only if,
x ji
m(t−) = 1 and N ji
jumps at time t for some m ∈ [p].
bm
2) Node i becomes susceptible at time t, if and only if,
yi
(cid:96)(t−) = 1 and Ni
jumps at time t for some (cid:96) ∈ [q].
d(cid:96)
Proof. From the proof of Lemma IV.4, the value of zi =
1(cid:62)p x ji = 1(cid:62)q yi can change from zero to one when and only
when a counter Nik
bm jumps. Therefore, from equations (11)
and (12), we see that node i becomes infected at time t ≥ 0, if
and only if, zi(t−) = 0, node i is adjacent to node k, xik
m(t−) = 1,
and Nik
bm jumps at time t for some m ∈ [p]. Therefore, node k
attempts to infect node i at time t if and only if xik
m(t−) = 1
and Nik
bm jumps at time t for some m ∈ [p], as desired.
Similarly, we see that the value of zi can change from one
to zero when and only when a counter Ni
jumps. Therefore,
d(cid:96)
equations (13) and (14) imply that node i becomes susceptible
at time t if and only if yi
jumps
at time t for some (cid:96) ∈ [q], showing the second assertion of the
corollary.
(cid:96)(t−) = 1 and the counter Ni
d(cid:96)
Now we are ready to prove Theorem IV.3.
Proof of Theorem IV.3. We prove that the family of stochastic
processes z = {zi}n
i=1, defined by (7) -- (10), satisfies items a)-c)
in Definition III.1, as well as Assumption III.4. Item a) is true
by the given initial conditions. Let us prove item b). Assume
that node i becomes infected at time t ≥ 0; hence, we have
that either t = 0 or t > 0. In this proof, we only consider the
case t = 0, as the other case can be proved in a similar way.
Let ρ be the earliest time at which yi(ρ) = 0q. Then, on the
time interval [0,ρ), the stochastic differential equation (8) is
equivalent to
dyi =
q
∑
(cid:96)=1
q
∑
(cid:96)(cid:48)=1
(F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))yi dNi
R(cid:96)(cid:96)(cid:48) −
q
∑
(cid:96)=1
F(cid:96)(cid:96)yi dNi
d(cid:96)
(cid:96) = F(cid:96)(cid:96)yi. Moreover,
the vector yi(0) follows the
since yiyi
distribution ψ. Therefore, by Proposition IV.1, we see that
ρ follows the phase-type distribution (ψ,R), proving item b)
in Definition III.1 under Assumption III.4 for t = 0. A similar
discussion using Proposition IV.2 shows that the family of
stochastic processes z satisfies item c) in Definition III.1
under Assumption III.4. This completes the proof of the
theorem.
Before presenting our analysis of the decay rate in the next
section, we state another corollary of Lemma IV.4:
Corollary IV.6. The family of stochastic processes
ξ = {x ji,yi}i∈[n], j∈Ni,
(15)
where x ji and yi are the solutions of the stochastic differential
equations (7) and (8), is a Markov process. Moreover, the
states of ξ are all transient except for the absorbing state α at
which x ji = 0 and yi = 0 for all i∈ [n] and j ∈Ni. Furthermore,
the size of the state space of ξ equals
Nξ =
n
∏
i=1
(1 + pNiq),
where Ni denotes the size of the neighbor set Ni.
Proof. A careful investigation of the proof of Lemma IV.4
shows the first and the second claims. The third claim is an
immediate consequence from the constraint 1(cid:62)p x ji(t) = 1(cid:62)q yi(t)
that was proved in Lemma IV.4.
V. DECAY RATE ANALYSIS
In this section, we use our previous results to bound the
exponential decay rate of the GeNeSIS model under Assump-
tion III.4. We begin by presenting a characterization of the
decay rate in terms of the eigenvalues of a matrix whose size
grows exponentially with respect to the model parameters. To
overcome the difficulty of computing the eigenvalues of a very
large matrix, we then present an alternative bound on the decay
rate based on the representation of the GeNeSIS model as the
stochastic differential equations (7) and (8).
Throughout this section, we consider the GeNeSIS model
with transmission and recovery times following, respectively,
phase-type distributions (φ ,T ) and (ψ,R) (i.e., satisfying As-
sumption III.4). The following proposition illustrates the com-
putational difficulty in computing the exponential decay rate
of the GeNeSIS model:
Proposition V.1. Let Q ∈ RNξ×Nξ be the transition rate matrix
of the Markov process ξ (see (15) for the definition of ξ ), and
let r < 0 be the maximum real part of the non-zero eigenvalues
of Q. Then, the exponential decay rate of the GeNeSIS model
is given by
λ = −r.
Proof. Since ξ (t) (cid:54)= α if and only if at least one node is
infected at time t, we have the inequality
n
∑
i=1
E[zi(t)] ≤ P(ξ (t) (cid:54)= α) ≤
E[zi(t)]
for all i ∈ [n] and t ≥ 0. Therefore, the exponential decay
is determined by that of the
rate of the GeNeSIS model
function P(ξ (t) (cid:54)= α) of t. By Corollary IV.6, a basic argument
on Markov processes (see [46] for the case of exponential
transmission and recover times) shows that i) if λ < −r, there
exists a constant C > 0 such that P(ξ (t) (cid:54)= α) ≤ Ce−λt for all
t and any initial state ξ (0), and ii) if λ > −r, there exists an
initial state of ξ such that the function P(ξ (t) (cid:54)= α) cannot be
bounded from above by the exponential function Ce−λt for any
value of C. These observations immediately prove the claim
of the proposition.
Proposition V.1 yields the exact value of the decay rate,
since the proposition uses the transition rate matrix of the
whole Markov process ξ that exactly describes the GeNeSIS
model. However, Proposition V.1 is not easily applicable in
practice because the dimension Nξ of the matrix Q grows
exponentially as
Nξ ≥
n
∏
i=1
(pNiq) = p2mqn,
(16)
where m denotes the number of the edges in the network. The
following theorem overcomes this computational difficulty by
providing a lower bound on the growth rate in terms of the
eigenvalues of a matrix whose size grows linearly with respect
to the parameters in the GeNeSIS model.
Theorem V.2. Define the (npq)× (npq) matrix
A = (φb(cid:62))⊗A⊗ (ψ1(cid:62)q ) +Inp⊗R(cid:62) + (T(cid:62) +φb(cid:62))⊗Inq, (17)
where A is the adjacency matrix of the graph G and the
vector b is defined in (3). Then,
λ ≥ −η(A),
(18)
where η(A) is the spectral abscissa of A.
Before providing a proof of Theorem V.2, we below present
a series of corollaries of the theorem. The proofs of the
corollaries are straightforward and, therefore, omitted. The first
corollary gives a bound on the decay rate of the GeNeSIS
model with exponential transmission times and phase-type
recovery times.
Corollary V.3. Assume that the transmission times follow an
exponential distribution with mean 1/β . Define the (nq)×(nq)
matrix
Aβ = β A⊗ (ψ1(cid:62)q ) + In ⊗ R(cid:62)
Then, the decay rate satisfies λ ≥ −η(Aβ ).
The next corollary deals with the dual case with phase-type
transmission times and exponential recovery times.
Corollary V.4. Assume that the recovery times follow an
exponential distribution with mean 1/δ . Define the (np)×(np)
matrix
7
Aδ = (φb(cid:62))⊗ A + (T(cid:62) + φb(cid:62))⊗ In − δ Inp.
Then, the decay rate satisfies λ ≥ −η(Aδ ).
As the special case of Theorem V.2, as well as Corollar-
ies V.3 and V.4, we can prove the following bound on the
decay rate of the standard SIS model:
Corollary V.5 ([12], [39]). Assume that the transmission and
recovery times follow exponential distributions with means
1/β and 1/δ , respectively. Define the n× n matrix
Aβ ,δ = β A− δ In.
Then, the decay rate satisfies λ ≥ −η(Aβ ,δ ).
The above corollaries suggest an intuitive understanding of
the terms in the matrix A defined in (17). Comparing the
expressions of the matrices Aδ and Aβ ,δ , we see that the role
of the exponential transmission rate β is played by the p× p
matrix φb(cid:62) in the case of phase-type transmission times. On
the other hand, the second term of the matrix Aδ , namely,
(T(cid:62) + φb(cid:62))⊗ In, can be understood as a correction term that
arises independently of the topology of the network. Similarly,
comparing the matrices Aβ and Aβ ,δ , we see that the second
term In ⊗ R(cid:62) of the matrix Aβ represents the effect of phase-
type recoveries. On the other hand, we can understand the
matrix ψ1(cid:62)q as a correction term resulting from using phase-
type recovery times.
We now give the proof of Theorem V.2.
Proof of Theorem V.2. Combining equations (7) and (8), we
obtain the following Rp+q-valued stochastic differential equa-
tion
Then, we apply Ito's formula in Lemma II.1 using the function
to obtain the following Rpq-valued stochastic differential equa-
tion (after tedious, but simple, algebraic manipulations)
(cid:20)x ji
(cid:21)
yi
d
dN ji
Tmm(cid:48)
(cid:35)
dNik
bm.
dN ji
bm
R(cid:96)(cid:96)(cid:48)
q
p
+
+
+
p
p
=
(cid:96)
(cid:96)
0nq
(cid:21)
(cid:96)=1
q
∑
dNi
dNi
d(cid:96)
0nq
0np
∑
m=1
p
∑
m=1
q
∑
(cid:20)
(Em(cid:48)m − Emm)x ji
(cid:20)
(cid:21)
∑
m(cid:48)=1
(e ji
φ e(cid:62)m − Emm)x ji
(cid:20)
(cid:21)
(cid:21)
(cid:20)
∑
(F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))yi
(cid:96)(cid:48)=1
−x jiyi
(cid:34)
−yiyi
∑
aik
m=1
(cid:21)(cid:19)
(cid:18)(cid:20)x ji
(cid:0)(Em(cid:48)m − Emm)⊗ Iq
(cid:0)(e ji
= w ji = x ji ⊗ yi
(cid:1)w ji dN ji
(cid:1)w ji dN ji
φ e(cid:62)m − Emm)⊗ Iq
(cid:96)=1
n
∑
k=1
e ji
φ (1− 1(cid:62)q yi)xik
ψ (1− 1(cid:62)q yi)xik
f i
m
m
yi
+
bm
g
Tmm(cid:48)
dw ji =
p
∑
m(cid:48)=1
p
∑
m=1
p
∑
m=1
+
(cid:0)Ip ⊗ (F(cid:96)(cid:48)(cid:96) − F(cid:96)(cid:96))(cid:1)w ji dNi
R(cid:96)(cid:96)(cid:48)
(cid:96)w ji)dNi
d(cid:96)
8
+
+
+
q
∑
(cid:96)=1
q
∑
(cid:96)=1
n
∑
k=1
q
∑
(cid:96)(cid:48)=1
(−yi
∑
m=1
p
aik(e ji
φ ⊗ f i
ψ )(1− 1(cid:62)pqw ji)(e(cid:62)m ⊗ 1(cid:62)q )wik dNik
bm.
(19)
For brevity, we omit the details of this derivation. Define
ω ji(t) = E[w ji(t)]
for t ≥ 0. Then, using Lemma II.2, from (19) we can derive
the Rpq-valued differential equation
dω ji
dt =
(cid:104)
+(cid:0)Ip ⊗ (R(cid:62) + D)(cid:1)(cid:105)
(T(cid:62) + B)⊗ Iq + (φb(cid:62) − B)⊗ Iq
p
ω ji − (Ip ⊗ D)ω ji
∑
m=1
∑
k=1
bm
n
(aikωik)− ε ji,
(20)
+ (φ ⊗ ψ)(e(cid:62)m ⊗ 1(cid:62)q )
where B and D are the n × n diagonal matrices having
the diagonals b1, . . . ,bn and d1, . . . ,dn, respectively, and the
Rpq-valued function ε ji is defined by
ε ji(t) =
n
∑
k=1
p
∑
m=1
bmaik(φ ⊗ ψ)E[1(cid:62)pqw ji(t)(e(cid:62)m ⊗ 1(cid:62)q )wik(t)]
(21)
for every t ≥ 0.
Now, for every i ∈ [n], we take an arbitrary ji ∈ Ni. We then
define the function ωi by ωi = ω jii, as well as the Rnpq-valued
function
ω = col(ω1, . . . ,ωn).
Notice that, from (19), for each i ∈ [n], all the stochastic
processes in the set {w ji} j∈Ni follow the same stochastic
differential equation and, therefore, present the same proba-
bility distribution. This implies that ωi = ω ji for every j ∈ Ni.
Therefore, we can rewrite the last summation appearing in (20)
as ∑n
k=1 aikωk = (Ai ⊗ Ipq)ω, where Ai denotes
the i-th row of the adjacency matrix A. Then, from (11), it
follows that
k=1 aikωik = ∑n
(cid:16)
(cid:17)
(cid:17)
(cid:16)
T(cid:62) ⊗ Iq + Ip ⊗ R(cid:62) + (φb(cid:62))⊗ Iq
Ai ⊗ (φb(cid:62))⊗ (ψ1(cid:62)q )
+
ωi
ω − ε jii.
dωi
dt =
Defining
ε = col(ε j11, . . . ,ε jnn),
we obtain the differential equation
dω
dt = A(cid:48)ω − ε,
for the matrix A(cid:48) = In ⊗ (T(cid:62) ⊗ Iq + Ip ⊗ R(cid:62) + (φb(cid:62))⊗ Iq) +
A⊗ (φb(cid:62))⊗ (ψ1(cid:62)q ).
Since A(cid:48) is Metzler, we have that eA(cid:48)t ≥ 0 for every t ≥ 0.
Also, since both x ji(t) and yi(t) are nonnegative for all i ∈ [n],
j ∈ Ni, and t ≥ 0, we have that ε(t) ≥ 0 for every t ≥ 0.
Therefore, it follows that
ω(t) = eA(cid:48)tω(0)−
(cid:90) t
0
eA(cid:48)(t−τ)ε(τ)dτ ≤ eA(cid:48)tω(0).
This inequality implies that ω(t) converges to zero as t → ∞
with a decay rate at least −η(A(cid:48)) since ω(t) ≥ 0 for all t ≥ 0.
On the other hand, for each i ∈ [n] and j ∈ Ni, we have
1(cid:62)pqw ji(t) = (1(cid:62)p x ji(t))(1(cid:62)q yi(t)) = 1(cid:62)q yi(t) = zi(t)
from Lemma IV.4. Therefore, we have E[zi(t)] = 1(cid:62)pqω ji(t),
which shows the exponentially fast convergence of E[zi(t)]
towards zero with a decay rate at least −η(A(cid:48)). This completes
the proof of the inequality (18) since A(cid:48) and A are similar.
Remark V.6. Unlike the necessary and sufficient condition
in Proposition V.1,
the condition in Theorem V.2 is only
sufficient. This conservatism arises from ignoring the higher-
order term ε ji in (21). The inclusion of these higher-order
terms into the analysis (see, e.g., [33], [41]) would allow
us to reduce the conservatism, at the cost of increasing the
dimension of the matrix A .
VI. NUMERICAL SIMULATIONS
In this section, we illustrate the effectiveness of our re-
sults with numerical simulations in a real social network
having n = 247 nodes and 940 edges. We focus on log-
normal transmission and recovery times, which are observed
in empirical studies, including information spread on online
social networks [11], [45] and human epidemiology [22], [26].
In our simulations, we illustrate the effect of using exponential
distributions to model transmission and recovery times that,
in reality, follow log-normal distributions. In particular, we
analyze how using standard Markovian models with expo-
nential rates induce errors in the computation of the decay
rate. Furthermore, we are also interested in how the variances
of log-normal distributions, which cannot be incorporated
into the standard Markovian model, affect the decay rates.
For this purpose, we use the following four distributions to
model transmission and recovery times in the GeNeSIS model:
(i) the exponential distribution with mean µ (and, hence,
variance µ2); (ii) the log-normal distribution with mean µ and
variance µ2; (iii) the log-normal distribution with mean µ and
variance 2µ2; and (iv) the log-normal distribution with mean µ
and variance 4µ2.
In order to analyze the decay rate of the GeNeSIS model
whose transmission and recovery times follow one of these
four distributions, we first approximate the three log-normal
distributions in (ii) -- (iv) using phase-type distributions (as
described in Section III) having p = 10 phases. Fig. 1 shows
the probability density functions of the (exact) log-normal dis-
tributions, as well as the fitted phase-type distributions, when
the value of the parameter µ is in the range [0.5 : 0.1 : 1.5].
We notice that, since the inequality (16) shows that the size of
the exact state transition matrix satisfies Nξ > 102127, it is not
practical to use Proposition V.1 to compute the exact decay
rate.
Using the proposed phase-type distributions, we apply
Theorem V.2 to analyze the decay rate of the GeNeSIS
9
Fig. 1. Approximations by phase-type distributions. Solid: Probability density functions of the log-normal distributions for µ in the range [0.5 : 0.1 : 1.5].
Dashed: Probability density functions of phase-type distributions. The darker the colors of the plots, the smaller the values of µ.
Fig. 2. Lower bound −η(A) on the exponential decay rate of generalized SIS model. Horizontal axes: µ. Vertical axes: µ divided by the spectral radius of
the graph. The white region corresponds to unstable epidemics; the darker the region, the faster the epidemics converges toward the infection-free equilibrium.
model when the transmission/recovery times follow one of
the four distributions described above. We compute the decay
rate −η(A) for each one of the possible sixteen combinations
of transmission/recovery distributions when µ is in the range
[0.5 : 0.05 : 1.5]. In the subfigures of Fig. 2, we include contour
plots of the decay rates for these sixteen cases. In the figure,
the values of the decay rates are indicated by different colors.
The darker the color, the faster the epidemics converges to the
infection-free equilibrium.
We remark that, even though the four distributions used in
our simulations have the same mean, the resulting GeNeSIS
models exhibit different decay rates. We can furthermore
observe that the variances of the distributions used to model
transmission and recovery times can dramatically affect the de-
cay rate of the GeNeSIS model, as was previously indicated by
numerical simulations [47] and mean-field approximations [5].
For a fixed recovery distribution (i.e., for a fixed column in the
table in Fig. 2), the colored region (indicated by black solid
lines) shrinks as we increase the variance of the log-normal
distribution modeling the transmission times (see rows 2 to 4
in Fig. 2). From this observation, we see that the heavier the
tail of the transmission distribution, the slower the extinction
9(a)Log-normaldistributions(solidlines)withmeanµandvarianceµ2,andtheirphase-typeapproximations(dashedlines).(b)Log-normaldistributions(solidlines)withmeanµandvariance2µ2,andtheirphase-typeapproximations(dashedlines).(c)Log-normaldistributions(solidlines)withmeanµandvariance4µ2,andtheirphase-typeapproximations(dashedlines).Fig.1.Approximationsbyphase-typedistributions.Solid:Probabilitydensityfunctionsofthelog-normaldistributionsforµintherange[0.5:0.1:1.5].Dashed:Probabilitydensityfunctionsofphase-typedistributions.Thedarkerthecolorsoftheplots,thesmallerthevaluesofµ.9(a)Log-normaldistributions(solidlines)withmeanµandvarianceµ2,andtheirphase-typeapproximations(dashedlines).(b)Log-normaldistributions(solidlines)withmeanµandvariance2µ2,andtheirphase-typeapproximations(dashedlines).(c)Log-normaldistributions(solidlines)withmeanµandvariance4µ2,andtheirphase-typeapproximations(dashedlines).Fig.1.Approximationsbyphase-typedistributions.Solid:Probabilitydensityfunctionsofthelog-normaldistributionsforµintherange[0.5:0.1:1.5].Dashed:Probabilitydensityfunctionsofphase-typedistributions.Thedarkerthecolorsoftheplots,thesmallerthevaluesofµ.0.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.5-9-8-7-6-5-4-3-2-101a)Exponentialrecoverytimeswithmeanµb)Log-normalrecoverytimeswithmeanµandvarianceµ2c)Log-normalrecoverytimeswithmeanµandvariance2µ2d)Log-normalrecoverytimeswithmeanµandvariance4µ21)Exponentialtransmissiontimeswithmeanµ2)Log-normaltransmissiontimeswithmeanµandvarianceµ23)Log-normaltransmissiontimeswithmeanµandvariance2µ24)Log-normaltransmissiontimeswithmeanµandvariance4µ2012345678Fig.2.Lowerbound−η(A)ontheexponentialdecayrateofgeneralizedSISmodel.Horizontalaxes:µ.Verticalaxes:µdividedbythespectralradiusofthegraph.Thewhiteregioncorrespondstounstableepidemics;thedarkertheregion,thefastertheepidemicsconvergestowardtheinfection-freeequilibrium.modelwhenthetransmission/recoverytimesfollowoneofthefourdistributionsdescribedabove.Wecomputethedecayrate−η(A)foreachoneofthepossiblesixteencombinationsoftransmission/recoverydistributionswhenµisintherange[0.5:0.05:1.5].InthesubfiguresofFig.2,weincludecontourplotsofthedecayratesforthesesixteencases.Inthefigure,thevaluesofthedecayratesareindicatedbydifferentcolors.Thedarkerthecolor,thefastertheepidemicsconvergestotheinfection-freeequilibrium.Weremarkthat,eventhoughthefourdistributionsusedinoursimulationshavethesamemean,theresultingGeNeSISmodelsexhibitdifferentdecayrates.Wecanfurthermoreobservethatthevariancesofthedistributionsusedtomodeltransmissionandrecoverytimescandramaticallyaffectthede-cayrateoftheGeNeSISmodel,aswaspreviouslyindicatedbynumericalsimulations[47]andmean-fieldapproximations[5].Forafixedrecoverydistribution(i.e.,forafixedcolumninthetableinFig.2),thecoloredregion(indicatedbyblacksolidlines)shrinksasweincreasethevarianceofthelog-normaldistributionmodelingthetransmissiontimes(seerows2to4inFig.2).Fromthisobservation,weseethattheheavierthetailofthetransmissiondistribution,theslowertheextinctionFig.2.Lowerbound−η(A)ontheexponentialdecayrateofgeneralizedSISmodel.Horizontalaxes:µ.Verticalaxes:µdividedbythespectralradiusofthegraph.Thewhiteregioncorrespondstounstableepidemics;thedarkertheregion,thefastertheepidemicsconvergestowardtheinfection-freeequilibrium.modelwhenthetransmission/recoverytimesfollowoneofthefourdistributionsdescribedabove.Wecomputethedecayrate−η(A)foreachoneofthepossiblesixteencombinationsoftransmission/recoverydistributionswhenµisintherange[0.5:0.05:1.5].InthesubfiguresofFig.2,weincludecontourplotsofthedecayratesforthesesixteencases.Inthefigure,thevaluesofthedecayratesareindicatedbydifferentcolors.Thedarkerthecolor,thefastertheepidemicsconvergestotheinfection-freeequilibrium.Weremarkthat,eventhoughthefourdistributionsusedinoursimulationshavethesamemean,theresultingGeNeSISmodelsexhibitdifferentdecayrates.Wecanfurthermoreobservethatthevariancesofthedistributionsusedtomodeltransmissionandrecoverytimescandramaticallyaffectthede-cayrateoftheGeNeSISmodel,aswaspreviouslyindicatedbynumericalsimulations[47]andmean-fieldapproximations[5].Forafixedrecoverydistribution(i.e.,forafixedcolumninthetableinFig.2),thecoloredregion(indicatedbyblacksolidlines)shrinksasweincreasethevarianceofthelog-normaldistributionmodelingthetransmissiontimes(seerows2to4inFig.2).Fromthisobservation,weseethattheheavierthetailofthetransmissiondistribution,theslowertheextinction9(a)Log-normaldistributions(solidlines)withmeanµandvarianceµ2,andtheirphase-typeapproximations(dashedlines).(b)Log-normaldistributions(solidlines)withmeanµandvariance2µ2,andtheirphase-typeapproximations(dashedlines).(c)Log-normaldistributions(solidlines)withmeanµandvariance4µ2,andtheirphase-typeapproximations(dashedlines).Fig.1.Approximationsbyphase-typedistributions.Solid:Probabilitydensityfunctionsofthelog-normaldistributionsforµintherange[0.5:0.1:1.5].Dashed:Probabilitydensityfunctionsofphase-typedistributions.Thedarkerthecolorsoftheplots,thesmallerthevaluesofµ.0.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.50.511.5-9-8-7-6-5-4-3-2-101a)Exponentialrecoverytimeswithmeanµb)Log-normalrecoverytimeswithmeanµandvarianceµ2c)Log-normalrecoverytimeswithmeanµandvariance2µ2d)Log-normalrecoverytimeswithmeanµandvariance4µ21)Exponentialtransmissiontimeswithmeanµ2)Log-normaltransmissiontimeswithmeanµandvarianceµ23)Log-normaltransmissiontimeswithmeanµandvariance2µ24)Log-normaltransmissiontimeswithmeanµandvariance4µ2012345678Fig.2.Lowerbound−η(A)ontheexponentialdecayrateofgeneralizedSISmodel.Horizontalaxes:µ.Verticalaxes:µdividedbythespectralradiusofthegraph.Thewhiteregioncorrespondstounstableepidemics;thedarkertheregion,thefastertheepidemicsconvergestowardtheinfection-freeequilibrium.modelwhenthetransmission/recoverytimesfollowoneofthefourdistributionsdescribedabove.Wecomputethedecayrate−η(A)foreachoneofthepossiblesixteencombinationsoftransmission/recoverydistributionswhenµisintherange[0.5:0.05:1.5].InthesubfiguresofFig.2,weincludecontourplotsofthedecayratesforthesesixteencases.Inthefigure,thevaluesofthedecayratesareindicatedbydifferentcolors.Thedarkerthecolor,thefastertheepidemicsconvergestotheinfection-freeequilibrium.Weremarkthat,eventhoughthefourdistributionsusedinoursimulationshavethesamemean,theresultingGeNeSISmodelsexhibitdifferentdecayrates.Wecanfurthermoreobservethatthevariancesofthedistributionsusedtomodeltransmissionandrecoverytimescandramaticallyaffectthede-cayrateoftheGeNeSISmodel,aswaspreviouslyindicatedbynumericalsimulations[47]andmean-fieldapproximations[5].Forafixedrecoverydistribution(i.e.,forafixedcolumninthetableinFig.2),thecoloredregion(indicatedbyblacksolidlines)shrinksasweincreasethevarianceofthelog-normaldistributionmodelingthetransmissiontimes(seerows2to4inFig.2).Fromthisobservation,weseethattheheavierthetailofthetransmissiondistribution,theslowertheextinction10
of the spreading process, as was numerically confirmed in [47].
We also observe that for a fixed transmission distribution (i.e.,
for a fixed row in the table), the colored region remains almost
unaltered as we increase the variance of the distribution mod-
eling the recovery time, confirming the validity of the mean-
field analysis in [5] for the case of exponential transmission
times. We can furthermore observe that the exponential decay
rate −η(A) increases more abruptly inside the region as
we decrease this variance as indicated by steeper gradients.
The above observations illustrate the effectiveness of the
proposed framework for analyzing the decay rate of epidemics
in networks with non-Poissonian transmission and/or recovery
distributions.
VII. CONCLUSION
In this paper, we have analyzed the dynamics of an SIS
model of spreading over arbitrary networks with phase-type
transmission and recovery times. Since phase-type distribu-
tions form a dense family in the space of positive-valued dis-
tributions, our results allow to theoretically analyze arbitrary
transmission and recovery times within an arbitrary accuracy.
In this context, we have derived conditions for this generalized
spreading model to converge towards the infection-free equi-
librium (i.e., to eradicate the spread) with a given exponential
decay rate. We have specifically provided a transient analysis
of the stochastic spreading dynamics over arbitrary networks
without relying on mean-field approximations. Our results
illustrate that the particular shape of the transmission/recovery
distribution heavily influences the exponential decay rate of the
convergence towards the infection-free equilibrium. Through
numerical simulations, we have specifically observed that
our results allow to theoretically confirm some observations
previously obtained by numerical simulations and mean-field
approximations.
A possible direction for future research is considering time-
varying (temporal) networks [14], [24] in which transmis-
sion and recovery events follow non-Poissonian distributions.
Another interesting research direction is developing an opti-
mal resource allocation strategy for non-Markovian epidemic
spreading processes. Although we can find in the literature
various research efforts [1], [13], [32], [39], [48] for designing
containment methodologies for networked epidemic spreading
processes, many of them are based on decay rates that are
derived under the Markovian assumption on transmission and
recovery events. In this direction, it is of practical interest to
investigate how the non-Markovianity of spreading dynamics
alters the optimal allocation strategies that have been investi-
gated in the literature.
REFERENCES
[1] J. Abad Torres, S. Roy, and Y. Wan, "Sparse resource allocation for
linear network spread dynamics," IEEE Transactions on Automatic
Control, vol. 62, no. 4, pp. 1714 -- 1728, 2017.
[2] S. Asmussen, O. Nerman, and M. Olsson, "Fitting phase-type distribu-
tions via the EM algorithm," Scandinavian Journal of Statistics, vol. 23,
no. 4, pp. 419 -- 441, 1996.
[3] N. T. J. Bailey, The Mathematical Theory of Infectious Diseases and its
Applications. Griffin, 1975.
[4] S. P. Blythe and R. M. Anderson, "Variable infectiousness in HFV
transmission models," Mathematical Medicine and Biology, vol. 5, no. 3,
pp. 181 -- 200, 1988.
[5] E. Cator, R. van de Bovenkamp, and P. Van Mieghem, "Susceptible-
infected-susceptible epidemics on networks with general infection and
cure times," Physical Review E, vol. 87, no. 6, p. 062816, 2013.
[6] E. C¸ inlar, Introduction to Stochastic Processes. Prentice-Hall, 1975.
[7] G. Chowell and H. Nishiura, "Transmission dynamics and control of
Ebola virus disease (EVD): a review," BMC Medicine, vol. 12, no. 1,
p. 196, 2014.
[8] C. Commault and S. Mocanu, "Phase-type distributions and representa-
tions: Some results and open problems for system theory," International
Journal of Control, vol. 76, no. 6, pp. 566 -- 580, 2003.
[9] D. R. Cox, "A use of complex probabilities in the theory of stochastic
processes," Mathematical Proceedings of the Cambridge Philosophical
Society, vol. 51, no. 02, pp. 313 -- 319, 1955.
[10] F. Darabi Sahneh, C. Scoglio, and P. Van Mieghem, "Generalized
epidemic mean-field model for spreading processes over multilayer
complex networks," IEEE/ACM Transactions on Networking, vol. 21,
no. 5, pp. 1609 -- 1620, 2013.
[11] C. Doerr, N. Blenn, and P. Van Mieghem, "Lognormal infection times of
online information spread." PLoS ONE, vol. 8, no. 5, p. e64349, 2013.
[12] A. Ganesh, L. Massouli´e, and D. Towsley, "The effect of network
topology on the spread of epidemics," in 24th Annual Joint Conference
of the IEEE Computer and Communications Societies, 2005, pp. 1455 --
1466.
[13] S. Han, V. M. Preciado, C. Nowzari, and G. J. Pappas, "Data-driven
network resource allocation for controlling spreading processes," IEEE
Transactions on Network Science and Engineering, vol. 2, no. 4, pp.
127 -- 138, 2015.
[14] P. Holme, "Modern temporal network theory: a colloquium," The Euro-
pean Physical Journal B, vol. 88, no. 9, p. 234, 2015.
[15] R. Horn and C. Johnson, Matrix Analysis. Cambridge University Press,
1990.
[16] H.-H. Jo, J. I. Perotti, K. Kaski, and J. Kert´esz, "Analytically solvable
model of spreading dynamics with non-Poissonian processes," Physical
Review X, vol. 4, no. 1, p. 011041, 2014.
[17] M. J. Keeling and B. T. Grenfell, "Understanding the persistence of
measles: Reconciling theory, simulation and observation," Proceedings
of the Royal Society B: Biological Sciences, vol. 269, no. 1489, pp.
335 -- 343, 2002.
[18] A. Khanafer, T. Bas¸ar, and B. Gharesifard, "Stability of epidemic models
over directed graphs: A positive systems approach," Automatica, vol. 74,
pp. 126 -- 134, 2016.
[19] I. Z. Kiss, G. Rost, and Z. Vizi, "Generalization of pairwise models to
non-Markovian epidemics on networks," Physical Review Letters, vol.
115, no. 7, p. 078701, 2015.
[20] A. Lajmanovich and J. A. Yorke, "A deterministic model for gonorrhea
in a nonhomogeneous population," Mathematical Biosciences, vol. 28,
no. 1976, pp. 221 -- 236, 1976.
[21] K. Lerman and R. Ghosh, "Information contagion: An empirical study
of the spread of news on Digg and Twitter social networks," in Fourth
International AAAI Conference on Weblogs and Social Media, 2010, pp.
90 -- 97.
[22] E. Limpert, W. A. Stahel, and M. Abbt, "Log-normal distributions across
the sciences: keys and clues," BioScience, vol. 51, no. 5, pp. 341 -- 352,
2001.
[23] V. S. Mai, A. Battou, and K. Mills, "Distributed algorithm for suppress-
ing epidemic spread in networks," IEEE Control Systems Letters, vol. 2,
no. 3, pp. 555 -- 560, 2018.
[24] N. Masuda and R. Lambiotte, A Guide to Temporal Networks. World
Scientific Publishing, 2016.
[25] B. Min, K.-I. Goh, and I.-M. Kim, "Suppression of epidemic outbreaks
with heavy-tailed contact dynamics," Europhysics Letters, vol. 103,
no. 5, p. 50002, 2013.
[26] H. Nishiura and M. Eichner, "Infectiousness of smallpox relative to
disease age: estimates based on transmission network and incubation
period," Epidemiology and Infection, vol. 135, no. 07, pp. 1145 -- 1150,
2007.
[27] C. Nowzari, M. Ogura, V. M. Preciado, and G. J. Pappas, "A general
class of spreading processes with non-Markovian dynamics," in 54th
IEEE Conference on Decision and Control, 2015, pp. 5073 -- 5078.
[28] C. Nowzari, V. M. Preciado, and G. J. Pappas, "Analysis and control
of epidemics: A survey of spreading processes on complex networks,"
IEEE Control Systems, vol. 36, no. 1, pp. 26 -- 46, 2016.
11
PLACE
PHOTO
HERE
Victor M. Preciado received the PhD degree in
electrical engineering and computer science from the
Massachusetts Institute of Technology, in 2008. He
is currently an associate professor of electrical and
systems engineering with the University of Penn-
sylvania, where he is a member of the Networked
and Social Systems Engineering (NETS) program,
the Warren Center for Network and Data Sciences,
and the Applied Math and Computational Science
(AMCS) program. He is a recipient of the 2017
National Science Foundation Faculty Early Career
Development (CAREER) Award and the 2018 Outstanding Paper Award
from the IEEE Control Systems Magazine. His main research interests lie
at the intersection of big data and network science; in particular, in using
innovative mathematical and computational approaches to capture the essence
of complex, high-dimensional dynamical systems. Relevant applications of
this line of research can be found in the context of socio-technical networks,
brain dynamical networks, healthcare operations, biological systems, and
critical technological infrastructure.
[29] M. Ogura and V. M. Preciado, "Stability of spreading processes over
time-varying large-scale networks," IEEE Transactions on Network
Science and Engineering, vol. 3, no. 1, pp. 44 -- 57, 2016.
[30] -- -- , "Epidemic processes over adaptive state-dependent networks,"
Physical Review E, vol. 93, p. 062316, 2016.
[31] -- -- , "Optimal Containment of Epidemics in Temporal and Adaptive
Springer, 2017, pp.
Networks," in Temporal Networks Epidemiology.
241 -- 266.
[32] -- -- , "Optimal design of switched networks of positive linear systems
via geometric programming," IEEE Transactions on Control of Network
Systems, vol. 4, no. 2, pp. 213 -- 222, 2017.
[33] -- -- , "Second-order moment-closure for tighter epidemic thresholds,"
Systems & Control Letters, vol. 113, pp. 59 -- 64, 2018.
[34] B. Øksendal, Stochastic Differential Equations. Springer, 2003.
[35] P. E. Par´e, C. L. Beck, and A. Nedic, "Epidemic processes over time-
varying networks," IEEE Transactions on Control of Network Systems,
vol. 5, no. 3, pp. 1322 -- 1334, 2018.
[36] P. E. Par´e, J. Liu, C. L. Beck, B. E. Kirwan, and T. Bas¸ar, "Analysis,
estimation, and validation of discrete-time epidemic processes," IEEE
Transactions on Control Systems Technology, 2018.
[37] R. Pastor-Satorras, C. Castellano, P. Van Mieghem, and A. Vespignani,
"Epidemic processes in complex networks," Reviews of Modern Physics,
vol. 87, no. 3, pp. 925 -- 979, 2015.
[38] L. Pellis, T. House, and M. J. Keeling, "Exact and approximate moment
closures for non-Markovian network epidemics," Journal of Theoretical
Biology, vol. 382, pp. 160 -- 177, 2015.
[39] V. M. Preciado, M. Zargham, C. Enyioha, A. Jadbabaie, and G. J.
Pappas, "Optimal resource allocation for network protection against
spreading processes," IEEE Transactions on Control of Network Systems,
vol. 1, no. 1, pp. 99 -- 108, 2014.
[40] S. Roy, M. Xue, and S. K. Das, "Security and discoverability of spread
dynamics in cyber-physical networks," IEEE Transactions on Parallel
and Distributed Systems, vol. 23, no. 9, pp. 1694 -- 1707, 2012.
[41] N. A. Ruhi, C. Thrampoulidis, and B. Hassibi, "Improved bounds on
the epidemic threshold of exact SIS models on complex networks," in
55th IEEE Conference on Decision and Control, 2016, pp. 3560 -- 3565.
[42] A. Santos, J. M. F. Moura, and J. M. F. Xavier, "Bi-virus SIS epidemics
over networks: Qualitative analysis," IEEE Transactions on Network
Science and Engineering, vol. 2, no. 1, pp. 17 -- 29, 2015.
[43] M. Starnini, J. P. Gleeson, and M. Bogun´a, "Equivalence between Non-
Markovian and Markovian dynamics in epidemic spreading processes,"
Physical Review Letters, vol. 118, 2017.
[44] T. Suess, U. Buchholz, S. Dupke, R. Grunow, M. An der Heiden, A. Hei-
der, B. Biere, B. Schweiger, W. Haas, and G. Krause, "Shedding and
transmission of novel influenza virus A/H1N1 infection in households-
Germany, 2009," American Journal of Epidemiology, vol. 171, no. 11,
pp. 1157 -- 1164, 2010.
[45] P. Van Mieghem, N. Blenn, and C. Doerr, "Lognormal distribution in the
digg online social network," The European Physical Journal B, vol. 83,
pp. 251 -- 261, 2011.
[46] P. Van Mieghem, J. Omic, and R. Kooij, "Virus spread in networks,"
IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1 -- 14, 2009.
[47] P. Van Mieghem and R. van de Bovenkamp, "Non-Markovian infection
spread dramatically alters the susceptible-infected-susceptible epidemic
threshold in networks," Physical Review Letters, vol. 110, no. 10, p.
108701, 2013.
[48] Y. Wan, S. Roy, and A. Saberi, "Designing spatially heterogeneous
strategies for control of virus spread," IET Systems Biology, vol. 2, no. 4,
pp. 184 -- 201, 2008.
PLACE
PHOTO
HERE
Masaki Ogura received the B.Sc. degree in Engi-
neering and M.Sc. degree in Informatics from Kyoto
University, and the Ph.D. degree in Mathematics
from Texas Tech University. He was a Postdoctoral
Researcher with the Department of Electrical and
Systems Engineering at the University of Pennsyl-
vania. He is currently an Assistant Professor with
the Division of Information Science, Nara Institute
of Science and Technology, Japan. His research
interests include network science, dynamical sys-
tems, and convex optimizations with applications to
epidemic control, consensus formation, and product development processes.
|
1909.00543 | 1 | 1909 | 2019-09-02T04:41:15 | On Privacy of Socially Contagious Attributes | [
"cs.SI",
"physics.soc-ph"
] | A commonly used method to protect user privacy in data collection is to perform randomized perturbation on user's real data before collection so that aggregated statistics can still be inferred without endangering secrets held by individuals. In this paper, we take a closer look at the validity of Differential Privacy guarantees, when the sensitive attributes are subject to social influence and contagions. We first show that in the absence of any knowledge about the contagion network, an adversary that tries to predict the real values from perturbed ones, cannot achieve an area under the ROC curve (AUC) above $1-(1-\delta)/(1+e^\varepsilon)$, if the dataset is perturbed using an $(\varepsilon,\delta)$-differentially private mechanism. Then, we show that with the knowledge of the contagion network and model, one can do significantly better. We demonstrate that our method passes the performance limit imposed by differential privacy. Our experiments also reveal that nodes with high influence on others are at more risk of revealing their secrets than others. The performance is shown through extensive experiments on synthetic and real-world networks. | cs.SI | cs | On Privacy of Socially Contagious Attributes
Aria Rezaei, Jie Gao
Stony Brook University
{arezaei,jgao}@cs.stonybrook.edu
9
1
0
2
p
e
S
2
]
I
S
.
s
c
[
1
v
3
4
5
0
0
.
9
0
9
1
:
v
i
X
r
a
Abstract -- A common approach to protect users privacy in
data collection is to perform random perturbations on user's
sensitive data before collection in a way that aggregated statistics
can still be inferred without endangering individual secrets. In
this paper, we take a closer look at the validity of Differential
Privacy guarantees, when sensitive attributes are subject to
social contagion. We first show that in the absence of any
knowledge about the contagion network, an adversary that tries
to predict the real values from perturbed ones, cannot train a
classifier that achieves an area under the ROC curve (AUC)
above 1 − (1 − δ)/(1 + eε), if the dataset is perturbed using
an (ε, δ)-differentially private mechanism. Then, we show that
with the knowledge of the contagion network and model, one
can do substantially better. We demonstrate that our method
passes the performance limit imposed by differential privacy.
Our experiments also reveal that nodes with high influence on
others are at more risk of revealing their secrets than others.
Our method's superior performance is demonstrated through
extensive experiments on synthetic and real-world networks.
I. INTRODUCTION
The last decade has witnessed the exponential growth of
data collection practices. While access to large-scale data has
fueled the unprecedented power to solve problems previously
thought impossible, it also imposes a great risk on the privacy
of individuals in this new environment. A common policy is to
consider individual data items to be sensitive, while knowledge
of aggregated statistics on a population is not. For example, the
fact that a person has a certain disease is considered sensitive,
while it is safe to release the percentage of people with that
disease within a population. This model has been the founda-
tion of the popular differential privacy (DP) framework [1], in
which individual entries are sensitive but queries on aggregated
knowledge are answered with the guarantee that an adversary
cannot use the answers to accurately infer individual data
items.
In this paper we examine the interplay of personally
sensitive data in a social environment. It has been widely
recognized that social
interactions shape the landscape of
individual attributes -- infectious diseases spread through social
interactions and contacts; behavior changes such as obesity [2],
exercising [3], or decision making processes such as voting [4]
or charity donation [5] are contagious.
Due to the ubiquity of online social platforms in recent
years, information about social ties and social interaction has
become available. Such data can be available to the public
with little effort (e.g.: professional affiliation on public web
pages or friendship networks in public social networks such
as Twitter), or can be mined through other means such as
human mobility traces [6]. So the question we ask is: how
safe are people's sensitive attributes in a socially connected
world?
Our Contribution. In this paper we answer this question by
proposing a novel attack to users' sensitive attributes using
information on social network connectivity, despite the fact
that attributes are protected by DP mechanisms.
Suppose that the individuals participate in a survey in which
they are asked about the sensitive attribute X with value 0 or
1. The goal of the survey is to learn the aggregated percentage
of population who report "1". Since the participants may not
trust the data collector, they use a randomized perturbation
mechanism M to report data zi = M(xi). A simple scheme
for M is to flip a coin. If head, report 1 or 0 at random,
otherwise report the true value. After aggregating the perturbed
reports, one can approximate the true statistics by removing
certain biases introduced by M. For example, if there are p
fraction in the population whose attributes are 1, the perturba-
tion mechanism leads to a total fraction of 1/4+p/2 reporting
1. From this, one can solve for p. Meanwhile, knowing zi is
not enough to accurately determine xi -- such protection can
be formulated by differential privacy guarantee.
Pr[M(x) = z] ≤ eε Pr[M(x(cid:48)) = z] + δ,
(1)
the best classifier from an attacker, without information
of the social ties and the contagion models, has the Area
Under the ROC Curve (AUC) at most 1−(1−δ)/(eε +1).
• Next, we propose a method to infer the original sensitive
values {xi}, using the contagion model,
the network
structure, the perturbation mechanism M and the noisy
reported values {zi}. This requires understanding how
the real values correlate by accurately modeling the
way they are produced by a contagion process. In prior
work, contagions are ignored in modeling correlation
between individual values, which results in models that
are too simplistic to reflect real-world phenomena. In
contrast, our model incorporates the network structure
and contagion model directly into our calculations.
We proceed in two phases. First, we find the probabilistic
effectors -- a probability αv that each node v is an initiator
Now assume that the attacker knows the social connections
between individuals in the survey as well as the contagion
model (how this attribute spreads through the social ties). We
propose an attack that exploits this information to infer the
initial state {xi}, with a performance bound exceeding that
which is guaranteed by DP. More accurately, we show
• For any perturbation mechanism M that guarantees
(ε, δ)-differential privacy, i.e., ∀z, x (cid:54)= x(cid:48),
of a contagion that results in observed {zi}. Next we run
the contagion model forward from the probabilistic seeds
to estimate {xi}.
• Our experiments on both synthetic and real-world net-
works show that our method can achieve an AUC value
higher than the limit
imposed by DP, weakening its
guarantee as a result. This also means that the social
network information, while not sensitive itself, can in-
deed be exploited to infer sensitive knowledge. We also
observe that nodes with high influence over others are
more vulnerable to such attacks.
In what follows, we first present the background and related
work on DP and its many variants along with prior work on
social influence and contagions. We then report the theoretical
upper bound on the performance of a binary classification with
differential privacy protection, when there is no knowledge
of the contagion network. This is followed by our attack
leveraging social network structure and contagion model. We
report the results of our experiments at the end.
II. BACKGROUND AND RELATED WORK
Contagion Models: Many attributes are socially contagious.
The way that these attributes spread in a social network is
described via contagion models. A few models have received
great attention in the literature. In the Linear Threshold model
each edge has a weight that represents the influence between
nodes, and nodes are activated when the sum of influence
receiving from their neighbors exceeds a threshold randomly
selected from [0, 1]. Independent Cascade model assumes that
each node u, upon acivation, has one chance to activate each
of its neighbors, with different probabilities. This differs from
prior work on virus contagion such as SI (susceptible-Infected)
where activated node continuously try to activate their inactive
neighbors in time-synchronous rounds. Recently there has
been growing attention in General Threshold model [7] (first
proposed by Granovetter [8]) and Complex Contagions, where
infection requires a specific number of infected neighbors [9],
[10]. In this work we mainly use the Linear Threshold model
and discuss possible extensions in the last section.
Data Privacy: The most widely adopted privacy model is the
model of differential privacy (DP) [1], which imposes con-
straints on publishing aggregate information about a database
such that the privacy impact on individual entries is limited.
Specifically, a randomized algorithm A that takes a dataset
as input is said to have (ε, δ)-differential privacy, if for all
datasets D1 and D2 that differ on a single entry, and all subsets
S of the image of A: Pr[A(D1) ∈ S] ≤ eε Pr[A(D2) ∈ S]+δ.
The probability is taken over the randomness of the algorithm.
The original DP model does not explicitly specify the
ramifications of the presence of correlation between data
points, which could be accessible from outside. In fact, it is
proved that when the data is assumed to be correlated, the
privacy guarantees provided by DP becomes weaker [11]. This
issue is acknowledged in a number of later definitions that try
to address it. For example, inferential privacy [12] captures the
largest possible ratio between the posterior and prior beliefs
about an individual's data, after observing the results of a
computation on a database. Here the data items may not be
independent and the correlation is captured by a prior belief
on the data items. In adversarial privacy [13], domain experts
could plug in various data generating distributions and the goal
is to protect the presence/absence of a tuple in the data set.
The most general definition is PufferFish privacy [11], where
one explicitly specifies the set of secrets to protect, how they
shall be protected (by specifying indistinguishable pairs), how
data evolve or are generated (e.g., are data items correlated),
and what extra knowledge the potential attackers have. These
definitions add to the complexity of DP and, as a result, we
have yet to see any of them being as widely adopted as DP.
Our work could be considered as a motivation to devise
mechanisms that explicitly incorporate contagion models into
their privacy protection guarantees. In an age when activities
are shared online and individuals interact with each other
more as each day passes,
is not unimaginable that an
adversary might have access to social information that can
jeopardize individuals' secrets. We propose a concrete attack
that beats DP guarantees. Since many attributes shared by
humans are socially correlated, this work reopens many of the
problems studied under traditional DP setting (with no explicit
assumption on data correlation and generation processes) and
forces us to inspect new methods that can endure higher levels
of scrutiny.
Analyzing Social Contagions and Finding Effectors: Our
attack is closely related to analyzing social contagions, in
particular the two problems of influence maximization and
finding roots of contagion.
it
Influence maximization is initially studied in [14]: how to
pick k initial seeds such that the number of nodes eventually
infected is maximized. It is an NP-hard problem but could be
approximated up to 1 − 1/e, if one can have an oracle for
computing the influence of a set of seeds S -- the (expected)
number of nodes infected with seed set S. Obviously one
can run simulations to estimate the influence of a seed set.
Computing the exact influence of a node can be done in linear
time on a DAG but is #P-hard on a general graph [15]. A
heuristic to speed-up the algorithm is to utilize local simple
structures, such as local DAGs, to estimate the influence of a
node [15]. Alternatively, Borgs et al. [16] proposed to use the
reverse cascades to estimate influence, picking nodes that more
frequently appear in cascades simulated in reverse direction.
Given the current activation state of a contagion in a social
network, the k-effector problem is to find the most likely k
effectors (initiators of contagions) You can see that influence
maximization is a special case of this problem where all
nodes are activated in the end. The k-effector problem is NP-
hard for general graphs or even a DAG, but is solvable in
polynomial time by dynamic programming on trees [17]. For
general graphs, a heuristic algorithm [18] is to extract the most
probable tree (which is NP-hard) and run the optimal algorithm
on that tree. Finding effectors is also extensively studied for
the Susceptible-Infected (SI) propagation model [19], [20].
Privacy of Social Networks and Attributes: Our work is
different from previous work on protecting social network
privacy, which assumes that the social network graph itself
is private data and network-wide statistics (e.g., degree dis-
tribution) is released [21]. We assume that the social network
structure is publicly available and only the socially contagious
attributes are sensitive.
Links between individuals in a social network can be
telling. For instance, Kifer and Machanavajjhala [22] show that
future social links can be predicted from the number of inter-
community edges by assuming that network evolution follows
some particular model. Somewhat similar to our work, Song
et al. [23] considered flu infection -- estimating how many
people get flu while preventing the status of any particular in-
dividual being revealed. To avoid the intricate details of social
contagion, they assume an overly simplistic model where all
nodes in the same connected component are correlated and in
each component, all pairs of nodes are equally correlated. In
our work, we assume a contagion model that is aligned with
established literature on contagion and social influence.
III. PROBLEM DEFINITION
For a population of n individuals, let xi be a sensitive
binary attribute for individual i, xi ∈ {0, 1}, and denote by
X the set of all values (cid:104)x1,··· , xn(cid:105). We assume that this
attribute is contagious and propagates over a directed network
G(V, E) following the Linear Threshold cascade model. In
this model, each edge has a weight w(u, v) ∈ (0, 1] which
represents the influence that node u exerts on node v. Each
node also has a threshold λv which is selected uniformly at
random from (0, 1]. If the sum of influence from infected in-
going neighbors goes beyond λv, v becomes activated in the
next round. Assuming that the set of activated nodes, A, is not
empty at time 0, we can build it iteratively at every step via
the following rule:
A ← A ∪(cid:8)v ∈ V \ A :
w(u, v) ≥ λv
(2)
(cid:88)
(cid:9).
u∈Nin(v)∩A
Here Nin(v) is the set of neighbors with edges pointing to v
(i.e., imposing influence on v). The process proceeds until A
stops growing.
Imagine that these individuals participate in a survey in
which they are each asked about
their sensitive attribute
xi. The goal of this survey is to calculate some aggregate
statistic, e.g., the percentage of individuals having attribute 1.
To avoid revealing their secrets, they could use a randomized
perturbation mechanism, M : {0, 1} → {0, 1}, and use the
resulting values to answer the survey. The observed answer of
participants is the sequence (cid:104)z1,··· , zn(cid:105), denoted by Z, where
zi = M(xi). Assume that M guarantees (ε, δ)-DP, i.e.,
∀z, x (cid:54)= x(cid:48) : Pr[M(x) = z] ≤ eε Pr[M(x(cid:48)) = z] + δ.
In this paper we want to examine two problems:
• What is the performance of the best classifier, using only
information in Z and M, to infer the true values X?
(3)
• If we also know the contagion network G and the conta-
gion model, can we perform better? In other words, how
much more information is revealed by knowing the social
structure and the way this sensitive attribute propagates
in the network? The difference from the answer to the
earlier question is the loss of privacy.
IV. LIMITATIONS OF BINARY CLASSIFICATION WITH
DIFFERENTIAL PRIVACY
To show that
the presence of the underlying contagion
network provides essential information that can pose a real
threat to privacy, we study the limits of binary classification
given only the reported values (Z) and the randomization
parameters of M. This is a fair assumption since the real
values, X, are never disclosed but Z is, and M is known to
all participants.
A classifier scores and subsequently ranks the participants
based on their likelihood of having x = 1. We measure the
success of such ranking by the probability that a randomly
selected sample with x = 1 (a positive sample) is ranked
higher than a randomly selected sample with x = 0 (a negative
sample). This is known to be the area under the receiver
operating characteristic curve (ROC curve) in an unsupervised
classification problem, namely the AUC value [24].
Theorem 1. Any classification attempt by an adversary,
having access to only Z and M, will have an Area Under
the ROC Curve (AUC) at most 1 − (1 − δ)/(eε + 1).
Recall that the ROC curve of a classifier is plotting the
true positive rate (TPR) against the false positive rate (FPR)
at various threshold settings. AUC can be understood as the
probability that the classifier ranks R1 higher than R0, denoted
by P (R1 > R0), where R1 (R0) is a randomly chosen positive
(negative) sample, with x = 1 (x = 0).
Suppose we take a positive (negative) sample x (x(cid:48)) and
the perturbation mechanism M produces a perturbed value z
(z(cid:48)). Let's denote Pr(M(x) = z) by P (x )z) for brevity. Let
S1 and S0 be two distributions over (−∞, +∞) from which
a score is drawn, if z = 1 or z = 0 respectively. For the
perturbed value z, z(cid:48), the classifier chooses a score s, s(cid:48) from
Sz, Sz(cid:48) respectively and the ranking is produced based on the
scores. Denote by γ(z, z(cid:48)) the probability that s is higher than
s(cid:48), i.e., Pr[s > s(cid:48)s ∼ Sz, s(cid:48) ∼ Sz(cid:48)]. Obviously,
Pr[s = s(cid:48)s ∼ Sz, s(cid:48) ∼ Sz(cid:48)] = 1 − γ(z, z(cid:48)) − γ(z(cid:48), z).
Then we can write P (R1 > R0) as (Section 2 of
(cid:88)
P (1 )z) P (0 )z(cid:48))(cid:0)P (s > s(cid:48)) +
[25]):
P (s = s(cid:48))(cid:1).
1
2
z,z(cid:48)∈{0,1}
Continuing the above, we have:
P (R1 > R0)
=
=
=
P (1 )z) P (0 )z(cid:48))
(cid:88)
(cid:88)
(cid:18) 1 + γ(z, z(cid:48)) − γ(z(cid:48), z)
P (1 )z) P (0 )z(cid:48))(cid:0)γ(z, z(cid:48)) − γ(z(cid:48), z)(cid:1) +
z,z(cid:48)
1
2
z,z(cid:48)
P (1 )1) P (0 )0) − P (0 )1) P (1 )0)
(cid:17)·
(cid:16)
2
(cid:19)
1
2
γ(1, 0) − γ(0, 1)
1
(4)
2
Observation 1. Let γ∗ be the one maximizing AUC, i.e.,
arg maxγ P (R1 > R0). Then, γ∗(1, 0) = 1, if
+
2
P (1 )1) P (0 )0) > P (1 )0) P (0 )1)
(5)
and 0 otherwise.
The above is clear from the right hand side of (4). This
shows that an optimal AUC is achieved by a deterministic
classification rule based solely on the condition in Observa-
tion 1.
Corollary 1. Bayesian inference achieves optimal AUC.
Proof. By Bayes' rule we have:
P (0 )z) =
P (z) − P (1 )z) P (x = 1)
.
P (x = 0)
Using the above, we can substitute P (0 )1) and P (0 )0) in
(5). After canceling out phrases from both sides, we have:
P (1 )1) P (z = 0)
P (x = 0)
P (x = 1, z = 1)
P (1 )0) P (z = 1)
P (x = 0)
P (x = 1, z = 0)
>
>
P (x = 1)P (z = 1)
P (x = 1 z = 1) > P (x = 1z = 0).
P (x = 1)P (z = 0)
The proof is symmetrical for the reverse inequality.
We can now prove Theorem 1. Without loss of generality,
we assume that the condition in Lemma 1 holds, we can then
further simplify (4) as below:
1
2
P (1 )1) + P (0 )0) − 1
Pr(R1 > R0) =
(cid:16)
(cid:17)
1
2
P (1 )1) + P (0 )0)
+
2
By the ε-DP guarantees we have:
=
P (1 )1) + eεP (0 )0) ≤ eε + δ
P (0 )0) + eεP (1 )1) ≤ eε + δ,
As a result, we have:
Pr(R1 > R0) ≤ 1 − 1 − δ
1 + eε .
Thus, Theorem 1 is proved. Note that the bound is realized
if the inequalities in Equation (3) become equality. This
theorem shows that if
this bound is significantly surpassed,
the guarantee of ε-DP no longer holds.
V. ALGORITHM
A. Objective Function
The goal is to infer P (xv = 1) for all v. We denote this
probability by xv throughout this paper (note the difference
between x and x). To do this, we first find the initial seeds of
contagion, then calculate the corresponding xv. Our solution
is hence an arrangement of probabilities of each node v being
initially active, denoted by αv. Rather than a fixed number of
most likely seeds, we seek to find a distribution of initial seeds
that are likely to produce the observed Z. This is shown to
significantly boost our performance. We now define the main
objective for our problem.
Definition 1 (Symmetric Difference). Given two instances of
reports, Z1 and Z2, we define their Symmetric Difference by:
D(Z1, Z2) = Z1 \ Z2 + Z2 \ Z1.
(9)
Let α be an assignment of the initial activation proba-
bilities. Suppose that C is the distribution of all possible
cascades, C, and R is the distribution of all possible reports,
Z = (z1,··· , zn). Then, the expected symmetric difference
between Z and the originally observed values, Z, will be as
below:
D( Z, Z)
Pr( Z)D( Z, Z)
(cid:105)
(cid:88)
(cid:88)
v∈V
Z∼R
E(cid:104)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
C∼C
C∼C
v∈V
v
=
=
=
=
=
v∈V
Pr(C)
Pr(zv (cid:54)= zv C)
Pr(zv (cid:54)= zv xv = x) Pr(xv = x C)
(cid:88)
(cid:88)
(cid:0)P (1 )∼zv) − P (0 )∼zv)(cid:1)xv + P (0 )∼zv)
Pr(zv (cid:54)= zv xv = x) Pr(xv = x)
x∈{0,1}
x∈{0,1}
(10)
(6)
(7)
(8)
as f = E(cid:2)D( Z, Z)(cid:3) and find an α that minimizes f. Since
In the above ∼zv = 1 − zv, and the last line is due to
Pr(xv = 0) = 1 − xv. We define our objective function
P (0 )∼zv) is a constant, we can further simplify f as
f =
cvxv
s.t. 0 ≤ xv ≤ 1,
(11)
(cid:88)
v∈V
where cv = P (1 )∼zv) − P (0 )∼zv).
B. Bounds on X
Suppose that X∗ = (x∗
1,··· , x∗
n) are the real attribute
values.
Theorem 2. Let P (z) be the fraction of vertices reporting 1
and c = P (1 )1) − P (0 )1),
P (x) =
P (z) − P (0 )1)
c
.
Then, with high probability1:
(cid:88)
(cid:114)
(cid:12)(cid:12)(cid:12)(cid:12) ≤
x∗
v
log n
2nc2 .
(12)
n
(cid:12)(cid:12)(cid:12)(cid:12) P (x) − 1
(cid:88)
Proof. We can treat P (z) as the mean of n random variables,
representing individual acts of reporting 0 or 1. The expected
value of P (z) can be written as:
=
1
n
vP (1 )1) + (1 − x∗
x∗
(13)
Since 0 ≤ zv ≤ 1 and each individual report is independent
of others, we can apply Chernoff's bound. By using (13) we
have:
v)P (0 )1) .
(cid:105)
E(cid:104) P (z)
(cid:34)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1
n
Pr
(cid:88)(cid:16)
(cid:35)
≤ e−2n2
,
(14)
x∗
vP (1 )1) +
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≥
(cid:17) − P (z)
(cid:12)(cid:12)(cid:12)(cid:12) ≥ (cid:48)(cid:21)
(cid:88)
x∗
v
(1 − x∗
v)P (0 )1)
(cid:20)(cid:12)(cid:12)(cid:12)(cid:12) P (x) − 1
Using the definition of P (x) in (14), we have:
Pr
(15)
Recall that c = P (1 )1) − P (0 )1). The probability above is
asymptotically zero when:
n
.
≤ e−2n(cid:48) 2c2
(cid:114)
(cid:48) =
log n
2nc2
(16)
The value of P (z) can be estimated from data by
{v ∈ V : zv = 1} /n. We can now update our objective func-
tion to accommodate this new constraint:
cvxv
(cid:88)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) 1
(cid:88)
v∈V
v∈V
n
(cid:114)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ≤
log n
2nc2 ,
(17)
xv − P (x)
α = arg min
α
s.t., 0 ≤ xv ≤ 1,
Although our solution finds soft probabilities (xv ∈ [0, 1])
instead of discrete values (xv ∈ {0, 1}), our experiments show
that having this constraint can increase the accuracy of inferred
values, especially when the amount of added noise is not
extremely high (DP's ε is not extremely low).
C. Modelling Contagion
With α, we want to derive a formula for xv, the probability
that node v is active in the end. Computing the influence of
contagion given a fixed α can be done in linear time for a
DAG, using the following formula: (Lemma 3 [15]).
xv = αv + (1 − αv)
w(u, v)xu.
(18)
(cid:88)
u∈Nin(v)
Since the original graph G is not necessarily a DAG, we find
local DAGs containing nodes who impose high influence. In
1If limn→∞ P (a) = 1, a happens with high probability.
this way, we try to benefit from the structural simplicity of
DAGs, while losing minimal information. The approach of
using local structures to approximate the influence in a general
graph has been widely used in prior works in the context of
influence maximization [15], [26], [27].
Algorithm 1 Local DAG with target t. (Algorithm 3 [15])
Require: G(V, E), Node t, η: Threshold for Inf, Nmax: Max
allowed nodes.
0, Inf(t, t) = 1.
Ensure: Dt(Vt, Et): The DAG around node v.
1: Initialization: Vt = ∅, Et = ∅, ∀v ∈ V : Inf(v, t) =
2: while maxv∈V \Vt Inf(v, t) ≥ η and Vt ≤ Nmax do
3:
4:
5:
6:
7:
end for
8:
9: end while
10: return Dt(Vt, Et)
u ← arg maxv∈V \Vt Inf(v, t)
Et ← Et ∪ {(u, v) v ∈ Nout(u) ∩ Vt}
Vt ← Vt ∪ u
for v ∈ Nin(u) do
(cid:46) Neighbors' Inf is updated.
Inf(v, t) += w(v, u) Inf(u, t)
Algorithm 1 starts by the DAG Dt containing only t. We
then calculate the influence of each node v on t, which is
the activation probability of t if only v was initially active
and influence would only spread through nodes already in
Dt. This is denoted by Inf(v, t). At each step,
the node
outside of Dt with highest Inf(.) is added to Dt along with
its outgoing edges that connect to nodes already in Dt. This
is to ensure that the final Dt is a DAG. We then update the
influence of incoming neighbors of v that are not yet in Dt.
There can be two stopping criteria to the growing process: (1)
When the influence of the most influential node falls below a
threshold η, or (2) the number of nodes in Dt grows bigger
than a maximum allowed number, Nmax. If implemented using
an efficient priority queue for Inf(v, t) values, Algorithm 1
runs in O(Et log Et) time. Among nodes in Dt, the local
activation probability, xt(v), is as below:
xt(v) = αv + (1 − αv)
w(u, v)xt(u).
(19)
(cid:88)
u∈Nin(v)∩Vt
Note that xt(t) is the probability that t is activated only
through nodes that are most influential on it and, as a result,
can be considered to be a reasonable approximations of xt.
Our experiments show that this approach in selecting DAGs
is essential to achieving high-quality results, and superior to
alternative approaches.
Now we can move on to optimizing the objective function f
in Equation (11). More specifically, we need to find ∂f
for all
∂αv
v. Chen et al. have established that in a DAG, there is a linear
relationship between xt(t) and xt(v) for all v ∈ Vt [15]. The
linear factor, which is equal to ∂xt(t)
∂xt(v) is computed as below:
∂xt(t)
∂xt(v)
=
u∈Nout(v)∩Vt
w(v, u)(1 − αu)
∂xt(t)
∂xt(u)
.
(20)
(cid:88)
We can compute the above for all nodes v ∈ Dt by initially
setting ∂xt(t)
∂xt(t) as 1 and then going through nodes in reverse
topological order. Finding this ordering and computing the
partial gradients each takes O(Et) time. Next, we find
gradients of f based on each αv. Let Iv = {t ∈ V : v ∈ Vt}.
Then, by taking the gradient of (11) and applying the chain
rule we can write:
(cid:88)
(cid:88)
t∈Iv
t∈Iv
ct
∂xt(t)
∂αv
ct
∂xt(t)
∂xt(v)
∂f
∂αv
=
=
=
(cid:88)
1 − (cid:88)
t∈Iv
ct
∂xt(t)
∂xt(v)
∂xt(v)
∂αv
xt(u)w(u, v)
u∈Nin(v)∩Vt
.
(21)
The last line is produced by taking a derivative of (19) by
αv. Since αv does not have any effect on the activation
probability of predecessors of v in any DAG, we can treat the
summation on the right side of (19) as a constant with respect
to αv. Calculating this summation is possible by dynamic
programming when nodes are visited in their topological
ordering. Computing values in (21) and (20) for all DAGs
has a collective runtime of O((cid:80)Et).
VI. EXPERIMENTS
In this section, we test our method on both synthetic and
real-world networks. We demonstrate that our proposed con-
straints in Section V-B and greedily retrieved DAGs described
in Section V-C play a key role in maintaining a high quality
for our results. We also investigate attributes that can indicate
how vulnerable nodes are to such attacks, namely in-degree,
out-degree and PageRank.
A. Methods
We tested the following methods in our experiments:
1) CO-DAG: Our main method, which optimizes our ob-
jective subject to the constraints in (17) using DAGs
retrieved by Algorithm 1.
2) O-DAG: Similar to CO-DAG, but without enforcing the
constraint on(cid:80) xv/n.
3) CO-RND: To show that our selected DAGs are essen-
tial to the high quality of our results, we repeat the
experiments with a method similar to CO-DAG but with
DAGs that grow by adding random neighbors of nodes
already in the DAG, until the number of nodes reaches
a threshold Nmax.
4) O-RND: Similar to CO-RND, but without enforcing the
constraint on(cid:80) xv/n.
5) Lappas+ [17]: The algorithm to find k-effectors, when
k is known beforehand. Note that by knowing k, this
method has access to more information compared to
others.
6) Bayesian: Simple Bayesian inference as described in
Corollary 1.
B. Datasets
We now introduce the datasets used in our experiments.
Synthetic Networks: We use 4 types of randomly generated
networks:
1) Core-Periphery [28]: A random network where nodes
in a periphery are loosely connected to a dense center.
These networks are generated as Kronecker graphs [29]
with matrix parameter [0.9, 0.5; 0.5, 0.3].
2) Erdos-Renyi: A random network in which all possible
edges have equal probability p to appear. We set p such
that the expected out-degree of every node will be 5.
3) Power-law: A network with a power-law degree distri-
bution where f (x) ∝ x−γ. We set γ = 1 to produce
a degree sequence and ran configuration model [30] to
obtain a network.
4) Hierarchical [31]: Random hierarchies generated as
to
Kronecker graphs with matrix parameter
[0.9, 0.1; 0.1, 0.9].
set
We generate networks with 500 nodes, remove from it
self-loops and nodes having both in and out-degrees less
than 3 (except for Hierarchical networks). We assign random
influence weights in the according to Section V.A of [15]:
Random numbers between (0, 1] are assigned to edges, then
incoming links to each node is normalized to sum to 1.
TABLE I: Real-world networks.
Network
GrQc
HepTh
Amazon Videos
Amazon DVDs
#Nodes
#Edges
2,422
4,909
1,598
9,488
21,842
38,704
8,402
55,146
Real-world Networks: We also test our method on real-world
networks that have been extensively studied in the context
of influence maximization before (Table I): two co-authorship
networks GrQc and HepTh [32] and two co-purchase networks
in Amazon, one containing videos and the other DVDs [33],
[34].
C. Experiment Setting
We simulate 10 cascades for each generated network. For
each simulated cascade, we choose a specific number of
initially active nodes (seed nodes) at random. These numbers
are selected in a way that makes it easier to produce cascades
of reasonable size in the networks (with at least 1/4 and at
most 3/4 of all nodes). For Hierarchical networks, 50 and
for the rest of synthetic networks 5 seed nodes were chosen.
For real-world networks, we selected 5% of nodes at random
since the networks' size greatly varied. We then simulate a
cascade using the triggering set approach in Theorem 4.6 of
[14]: Each edge (u, v) is kept with probability w(u, v) and
tossed otherwise. Then, any node reachable from any of the
seed nodes is deemed active.
To produce differentially private perturbations for the final
xv values, we choose the Randomized Response (RR) mecha-
TABLE II: AUC values of 7 methods for 3 values of β across all networks. Note that (1) our method outperforms others in
almost all cases and (2) Lappas+ fails to pass the upper bound in almost all cases, despite having access to more information.
c
i
t
e
h
t
n
y
S
d
l
r
o
w
-
l
a
e
R
Network
Core-Periphery
Erdos Renyi
Power-law Graph
Hierarchical
GrQc
HepTh
Amazon Videos
Amazon DVDs
β
0.1
0.3
0.5
0.7
0.9
0.1
0.3
0.5
0.7
0.9
0.1
0.3
0.5
0.7
0.9
0.1
0.3
0.5
0.7
0.9
0.1
0.3
0.5
0.7
0.9
0.1
0.3
0.5
0.7
0.9
0.1
0.3
0.5
0.7
0.9
0.1
0.3
0.5
0.7
0.9
ε
Upper Bound
Bayesian
CO-DAG
O-DAG
CO-RND
O-RND
Lappas+
0.201
0.619
1.099
1.735
2.944
0.201
0.619
1.099
1.735
2.944
0.201
0.619
1.099
1.735
2.944
0.201
0.619
1.099
1.735
2.944
0.201
0.619
1.099
1.735
2.944
0.201
0.619
1.099
1.735
2.944
0.201
0.619
1.099
1.735
2.944
0.201
0.619
1.099
1.735
2.944
0.550
0.650
0.750
0.850
0.950
0.550
0.650
0.750
0.850
0.950
0.550
0.650
0.750
0.850
0.950
0.550
0.650
0.750
0.850
0.950
0.550
0.650
0.750
0.850
0.950
0.550
0.650
0.750
0.850
0.950
0.550
0.650
0.750
0.850
0.950
0.550
0.650
0.750
0.850
0.950
0.550
0.648
0.751
0.847
0.951
0.545
0.659
0.752
0.851
0.949
0.545
0.646
0.745
0.850
0.949
0.540
0.652
0.753
0.852
0.949
0.554
0.644
0.744
0.849
0.951
0.553
0.658
0.751
0.849
0.950
0.554
0.649
0.747
0.849
0.950
0.551
0.652
0.750
0.851
0.952
0.575
0.716
0.833
0.904
0.967
0.571
0.704
0.806
0.897
0.967
0.590
0.715
0.813
0.890
0.959
0.602
0.730
0.821
0.893
0.964
0.577
0.720
0.833
0.908
0.973
0.584
0.733
0.831
0.917
0.972
0.598
0.748
0.854
0.919
0.975
0.576
0.735
0.830
0.906
0.963
0.597
0.708
0.803
0.870
0.955
0.555
0.699
0.791
0.874
0.948
0.609
0.713
0.805
0.883
0.948
0.584
0.711
0.803
0.883
0.961
0.576
0.718
0.834
0.892
0.960
0.579
0.716
0.825
0.893
0.958
0.604
0.748
0.836
0.899
0.962
0.584
0.739
0.829
0.897
0.957
0.568
0.689
0.802
0.887
0.965
0.553
0.678
0.781
0.876
0.960
0.580
0.689
0.801
0.884
0.939
0.577
0.699
0.808
0.887
0.960
0.564
0.683
0.798
0.892
0.971
0.568
0.698
0.793
0.884
0.962
0.584
0.706
0.828
0.906
0.974
0.567
0.699
0.806
0.894
0.957
0.587
0.699
0.793
0.868
0.957
0.564
0.685
0.781
0.870
0.955
0.587
0.700
0.795
0.876
0.953
0.591
0.724
0.796
0.881
0.963
0.561
0.685
0.797
0.878
0.965
0.566
0.703
0.793
0.876
0.962
0.585
0.714
0.812
0.894
0.967
0.570
0.707
0.802
0.886
0.941
0.614
0.657
0.695
0.706
0.711
0.527
0.571
0.587
0.611
0.620
0.586
0.672
0.701
0.743
0.753
0.534
0.573
0.612
0.669
0.756
N/A*
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
* Due to the large size of real-world networks, performing experiments with Lappas+ was not viable.
nism [35]. Given a value x ∈ {0, 1} an RR mechanism works
as below:
x, with probability β;
1, with probability (1 − β)/2;
0. with probability (1 − β)/2.
RR(x) =
(22)
where β is a parameter that determines the rate by which
respondents report the true value x. A RR mechanism with pa-
rameter β is a DP mechanism with ε = log ((1 + β)/(1 − β)).
To do the inference, we need to extract DAGs for each node.
For random DAGs (used in O-RND and CO-RND), we use the
average number of nodes in their corresponding greedy DAGs
(used in O-DAG and CO-DAG) as node capacity. To optimize
(17), we use ALGLIB2 library.
2ALGLIB (www.alglib.net), Sergey Bochkanov
D. Going Above the Bound
In Section III we proved that, without extra information
about the contagion, it is impossible to achieve an AUC higher
than 1 − (1 − δ)/(1 + eε) on binary attributes perturbed by
a (ε, δ)-DP mechanism. Here, we test this guarantee after
the contagion graph is known to an adversary. For 5 values
of RR's β we perform inference using methods described
in Section VI-A and report the resulting AUC scores, the
corresponding ε and theoretical upper bounds in Table II.
the AUC scores
for
Bayesianis close to the theoretical upper bound. Further-
more, note that in almost all cases CO-DAG achieves the
highest AUC score and inall cases the value is beyond the
AUC upper bound with DP guarantees. For the medium range
of β this difference becomes significant. We also observe that
in cases where β is extremely low and the perturbed data
As expected, we observe that
Fig. 1: Impact of maximum allowed nodes (Nmax) in each DAG on increase in AUC scores relative to Nmax = 3.
Fig. 2: Impact of threshold on Inf, η on increase in AUC scores relative to η = 0.01.
Fig. 3: The correlation between E[Acc] and from top to bottom (1) out-degree, (2) in-degree, and (3) PageRank.
on(cid:80) xv/n when the added noise becomes too big. It is also
cases, dropping the greedy DAGs or the constraint on(cid:80) xv/n
worth noting that our method's capability to go beyond the
bound does not come trivially, since Lappas+ fails to do so
in all but one cases, even as it receives more information as
input (number of seeds, k). Finally, notice that in virtually all
is exremely noisy, O-DAG tends to outperform CO-DAG. We
believe that this is due to the deteriorating quality of the bound
hurts performance.
E. Impacts of DAG's size on Inference Quality
We now test the impact of changing η (the threshold on
nodes' influence) or Nmax (maximum allowed nodes) of DAGs
on the quality of inferred values.
We iterate over an increasing Nmax with a fixed RR's β
across 4 synthetic networks. Since we are interested in the
change in resulting AUC scores and not their absolute values,
we move each resulting curve so that their starting points
would land on 0.00. Similarly for η, we start from η = 0.01
and exponentially grow the threshold to 0.64 while β is fixed.
To make it easier to observe the change in AUC scores, we
036912151821242730Nmax0.000.020.040.060.08AUC IncreaseCore-Periphery036912151821242730Nmax0.000.010.020.030.040.050.06Erdos Renyi036912151821242730Nmax0.020.000.020.040.060.08Power-law036912151821242730Nmax0.000.020.040.06Hierarchicalbeta = 0.1beta = 0.3beta = 0.5beta = 0.7beta = 0.91021010.000.020.040.06AUC IncreaseCore-Periphery1021010.000.010.020.030.040.05Erdos Renyi1021010.040.020.000.020.040.06Power-law1021010.000.010.020.030.040.050.06Hierarchicalbeta = 0.1beta = 0.3beta = 0.5beta = 0.7beta = 0.9Fig. 4: The correlation between out-degree (x-axis) and E[Acc]. Each column represents experiments with the same β.
collocate the ending point of all curves on 0.00.
The results for Nmax and η are depicted in Figures 1 and
2 respectively. Intuitively, one might expect that larger DAGs
will always lead to more accurate results, albeit with some
additional computational cost. This is almost
true in both
experiments. Interestingly, in some of the networks when the
perturbation is minimal (β = 0.9, ε = 2.94), the quality
actually drops as DAGs grow larger. This means that having
a more selective DAG, with more restrictive criteria, can
sometimes yield better results.
F. Who is More Vulnerable?
The AUC value describes the effectiveness of our inference
algorithm but does not provide details on individual vertex
level. Here we look into attributes that can indicate a node's
vulnerability to such an inference attack. Without access to
ground truth values of xv, finding the best cutoff threshold
of xv for classification is not possible. As an alternative, we
calculate the expected accuracy of a single node's inferred
value if the threshold θ is selected at random from [0, 1]:
E[Acc] = Eθ∼[0,1] [I(xv = 1)xv + I(xv = 0)(1 − xv)] ,
(23)
where I(·) is an indicator function. Note that we are not
interested in the absolute values of E[Acc], but the relative
difference between different nodes, in order to compare nodes'
vulnerability to our attack.
We tested 3 node attributes related to the centrality and
importance of a node in a complex network: (1) (Weighted)
Out-degree, (2) (Weighted) In-degree, and (3) PageRank [36].
We limit our visualizations to Core-Periphery networks due
to limited space. Results are similar for the other 3 networks.
We test 9 values of β = {0.1, 0.2,··· , 0.9} and infer the
real values using CO-DAG. In Figure 3 the resulting E[Acc]
for each node v is plotted against the 3 metrics mentioned
above along with correlation analysis printed on each plot.
Each column contains plots with a similar β value, printed
on the top. Among the 3 metrics, two of them (in-degree
and PageRank) show a negative correlation, while a strong
correlation is observed between E[Acc] and out-degree which
grows even stronger as β is increased and the added noise
becomes minimal. A reasonable explanation is that when v
has a high impact on many nodes in the network, it essentially
sends signals of its true value to those nodes during the spread
of the contagion. These signals, each insignificant on its own,
can collectively reveal the true value of xv to a great extent.
Of course, these signals only grow stronger when the amount
of added noise to each report is reduced as β grows bigger. In
contrast, there might be many signals on the influence received
by a node with a high in-degree, but without that influence
spreading around, we only have the report by that node as
a single indicator of its true value which is masked well by
conventional privacy protection techniques.
We repeat this experiment on other synthetic networks to see
if we observe similar results. In Figure 4, E[Acc] is plotted
against out-degree of all nodes for β between 0.1 and 0.9.
A similar trend is visible across all 4 types of network, with
different intensity. In the 3 networks where the distribution
of influence is skewed, namely Core-Periphery, Power-law
and Hierarchical, the correlation is strong. Moreover, as β
increases and the added noise become smaller, the correlation
grows stronger. In Erdos-Renyi networks, where degrees are
distributed more evenly, the difference in E[Acc] among nodes
is minor and as a result, the correlation is weaker. Notice that
in Hierarchical network, this unequal distribution of influence
reaches its extreme point, where the majority of the nodes are
leaves, with no impact on others, while a handful of nodes at
Core-PeripheryErdos-RenyiPower-lawHierarchicalthe top influence many others. This radical difference leads to
a constant unbalance between E[Acc] of the two groups across
all values of β.
VII. CONCLUSION AND FUTURE WORK
In this work, we provide further evidence that a privacy-
protecting measure that is oblivious to socially contagious
properties of attributes is unlikely to provide guarantees in
practice as advertised. There are two obvious directions for
future research: 1) design a privacy protection mechanism
that is aware of the contagious property of some attributes
and employs models of contagions in its design; Our method
can be used to test if that method succeeds. 2) extend the
results to other contagion models. Notice that the extension
to any progressive contagion model (where active nodes stay
active) with a differentiable formula (e.g, Independent Cascade
model) is easily possible. However, ideas specific to those
models are required for efficient implementation and model
design.
ACKNOWLEDGEMENT
Aria Rezaei and Jie Gao acknowledge support through NSF
DMS-1737812, NSF CNS-1618391 and NSF CCF-1535900.
REFERENCES
[1] C. Dwork and A. Roth, "The algorithmic foundations of differential
privacy," Found. Trends Theor. Comput. Sci., vol. 9, no. 3 -- 4, pp. 211 --
407, 2014.
[2] E. Cohen-Cole and J. M. Fletcher, "Is obesity contagious? social
networks vs. environmental factors in the obesity epidemic," J. Health
Econ., vol. 27, no. 5, pp. 1382 -- 1387, Sep. 2008.
[3] J. Hamari and J. Koivisto, ""working out for likes": An empirical study
on social influence in exercise gamification," Comput. Human Behav.,
vol. 50, pp. 333 -- 347, Sep. 2015.
[4] R. M. Bond, C. J. Fariss, J. J. Jones, A. D. I. Kramer, C. Marlow,
J. E. Settle, and J. H. Fowler, "A 61-million-person experiment in social
influence and political mobilization," Nature, vol. 489, no. 7415, pp.
295 -- 298, Sep. 2012.
[5] J. Meer, "Brother, can you spare a dime? peer pressure in charitable
solicitation," J. Public Econ., vol. 95, no. 7, pp. 926 -- 941, Aug. 2011.
[6] D. Wang, D. Pedreschi, C. Song, F. Giannotti, and A.-L. Barabasi,
"Human mobility, social ties, and link prediction," in Proceedings of the
17th ACM SIGKDD international conference on Knowledge discovery
and data mining, Aug. 2011, pp. 1100 -- 1108.
[7] J. Gao, G. Ghasemiesfeh, G. Schoenebeck, and F.-Y. Yu, "General
threshold model for social cascades: Analysis and simulations," in Pro-
ceedings of the 2016 ACM Conference on Economics and Computation,
Jul. 2016, pp. 617 -- 634.
[8] M. S. Granovetter, "The strength of weak ties," Am. J. Sociol., vol. 78,
no. 6, pp. 1360 -- 1380, 1973.
[9] D. Centola and M. Macy, "Complex contagions and the weakness of
long ties," Am. J. Sociol., vol. 113, no. 3, pp. 702 -- 734, Nov. 2007.
[10] G. Ghasemiesfeh, R. Ebrahimi, and J. Gao, "Complex contagion and
the weakness of long ties in social networks: Revisited," in Proceedings
of the Fourteenth ACM Conference on Electronic Commerce, 2013, pp.
507 -- 524.
[11] D. Kifer and A. Machanavajjhala, "Pufferfish: A framework for mathe-
matical privacy definitions," ACM Trans. Database Syst., vol. 39, no. 1,
pp. 3:1 -- 3:36, Jan. 2014.
[12] A. Ghosh and R. Kleinberg, "Inferential privacy guarantees for differ-
entially private mechanisms," Mar. 2016.
[13] V. Rastogi, M. Hay, G. Miklau, and D. Suciu, "Relationship privacy:
Output perturbation for queries with joins," in Proceedings of
the
Twenty-eighth ACM SIGMOD-SIGACT-SIGART Symposium on Princi-
ples of Database Systems, 2009, pp. 107 -- 116.
[14] D. Kempe, J. Kleinberg, and ´E. Tardos, "Maximizing the spread of
influence through a social network," in Proceedings of the ninth ACM
SIGKDD international conference on Knowledge discovery and data
mining, 2003, pp. 137 -- 146.
[15] W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization
in social networks under the linear threshold model," in 2010 IEEE
International Conference on Data Mining, Dec. 2010, pp. 88 -- 97.
[16] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier, "Maximizing social
influence in nearly optimal time," in Proceedings of the Twenty-Fifth
Annual ACM-SIAM Symposium on Discrete Algorithms, Dec. 2013, pp.
946 -- 957.
[17] T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila, "Finding effectors in
social networks," in Proceedings of the 16th ACM SIGKDD international
conference on Knowledge discovery and data mining, 2010, pp. 1059 --
1068.
[18] W. Luo, W. P. Tay, and M. Leng, "Identifying infection sources and
regions in large networks," IEEE Trans. Signal Process., vol. 61, no. 11,
pp. 2850 -- 2865, Jun. 2013.
[19] H. T. Nguyen, P. Ghosh, M. L. Mayo, and T. N. Dinh, "Multiple infection
sources identification with provable guarantees," in Proceedings of the
25th ACM International on Conference on Information and Knowledge
Management, Oct. 2016, pp. 1663 -- 1672.
[20] B. A. Prakash, J. Vreeken, and C. Faloutsos, "Spotting culprits in epi-
demics: How many and which ones?" in 2012 IEEE 12th International
Conference on Data Mining, Dec. 2012, pp. 11 -- 20.
[21] C. Task and C. Clifton, "A guide to differential privacy theory in
social network analysis," in 2012 IEEE/ACM International Conference
on Advances in Social Networks Analysis and Mining, Aug. 2012, pp.
411 -- 417.
[22] D. Kifer and A. Machanavajjhala, "No free lunch in data privacy," in
Proceedings of the 2011 ACM SIGMOD International Conference on
Management of Data, 2011, pp. 193 -- 204.
[23] S. Song, Y. Wang, and K. Chaudhuri, "Pufferfish privacy mechanisms
for correlated data," in Proceedings of the 2017 ACM International
Conference on Management of Data, 2017, pp. 1291 -- 1306.
[24] T. Fawcett, "An introduction to roc analysis," Pattern recognition letters,
vol. 27, no. 8, pp. 861 -- 874, 2006.
[25] J. A. Hanley and B. J. McNeil, "The meaning and use of the area under a
receiver operating characteristic (roc) curve." Radiology, vol. 143, no. 1,
pp. 29 -- 36, 1982.
[26] C. Wang, W. Chen, and Y. Wang, "Scalable influence maximization for
independent cascade model in large-scale social networks," Data Mining
and Knowledge Discovery, vol. 25, no. 3, pp. 545 -- 576, 2012.
[27] A. Goyal, W. Lu, and L. V. Lakshmanan, "Simpath: An efficient
algorithm for influence maximization under the linear threshold model,"
in 2011 IEEE 11th international conference on data mining, 2011, pp.
211 -- 220.
[28] M. Gomez-Rodriguez, J. Leskovec, and A. Krause, "Inferring networks
of diffusion and influence," ACM Transactions on Knowledge Discovery
from Data (TKDD), vol. 5, no. 4, p. 21, 2012.
[29] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahra-
mani, "Kronecker graphs: An approach to modeling networks," Journal
of Machine Learning Research, vol. 11, no. Feb, pp. 985 -- 1042, 2010.
[30] M. E. Newman, "The structure and function of complex networks,"
SIAM review, vol. 45, no. 2, pp. 167 -- 256, 2003.
[31] A. Clauset, C. Moore, and M. E. Newman, "Hierarchical structure and
the prediction of missing links in networks," Nature, vol. 453, no. 7191,
p. 98, 2008.
[32] J. Leskovec, J. Kleinberg, and C. Faloutsos, "Graph evolution: Den-
sification and shrinking diameters," ACM Transactions on Knowledge
Discovery from Data (TKDD), vol. 1, no. 1, p. 2, 2007.
[33] J. Leskovec, L. A. Adamic, and B. A. Huberman, "The dynamics of
viral marketing," ACM Transactions on the Web (TWEB), vol. 1, no. 1,
p. 5, 2007.
[34] A. Rezaei, B. Perozzi, and L. Akoglu, "Ties that bind: Characterizing
classes by attributes and social ties," in Proceedings of the 26th Interna-
tional Conference on World Wide Web Companion, 2017, pp. 973 -- 981.
[35] S. L. Warner, "Randomized response: A survey technique for eliminating
evasive answer bias," Journal of the American Statistical Association,
vol. 60, no. 309, pp. 63 -- 69, 1965.
[36] L. Page, S. Brin, R. Motwani, and T. Winograd, "The pagerank citation
ranking: Bringing order to the web." Stanford InfoLab, Tech. Rep., 1999.
|
1610.08597 | 1 | 1610 | 2016-10-27T03:21:49 | Word Embeddings to Enhance Twitter Gang Member Profile Identification | [
"cs.SI",
"cs.CL",
"cs.CY",
"cs.IR"
] | Gang affiliates have joined the masses who use social media to share thoughts and actions publicly. Interestingly, they use this public medium to express recent illegal actions, to intimidate others, and to share outrageous images and statements. Agencies able to unearth these profiles may thus be able to anticipate, stop, or hasten the investigation of gang-related crimes. This paper investigates the use of word embeddings to help identify gang members on Twitter. Building on our previous work, we generate word embeddings that translate what Twitter users post in their profile descriptions, tweets, profile images, and linked YouTube content to a real vector format amenable for machine learning classification. Our experimental results show that pre-trained word embeddings can boost the accuracy of supervised learning algorithms trained over gang members social media posts. | cs.SI | cs | Word Embeddings to Enhance Twitter Gang Member
Profile Identification
Sanjaya Wijeratne
[email protected]
Lakshika Balasuriya
[email protected]
Derek Doran
Amit Sheth
[email protected]
[email protected]
Kno.e.sis Center, Wright State University, Dayton, Ohio, USA.
6
1
0
2
t
c
O
7
2
]
I
S
.
s
c
[
1
v
7
9
5
8
0
.
0
1
6
1
:
v
i
X
r
a
Abstract
Gang affiliates have joined the masses
who use social media to share thoughts
and actions publicly. Interestingly, they
use this public medium to express re-
cent illegal actions, to intimidate oth-
ers, and to share outrageous images and
statements. Agencies able to unearth
these profiles may thus be able to antici-
pate, stop, or hasten the investigation of
gang-related crimes. This paper inves-
tigates the use of word embeddings to
help identify gang members on Twitter.
Building on our previous work, we gen-
erate word embeddings that translate
what Twitter users post in their profile
descriptions, tweets, profile images, and
linked YouTube content to a real vector
format amenable for machine learning
classification. Our experimental results
show that pre-trained word embeddings
can boost the accuracy of supervised
learning algorithms trained over gang
members' social media posts.
1 Introduction
Street gangs are defined as "a coalition of peers, united
by mutual interests, with identifiable leadership and
internal organization, who act collectively to conduct
illegal activity and to control a territory, facility, or
enterprise" [Mil92]. They promote criminal activities
such as drug trafficking, assault, robbery, and threat-
ening or intimidating a neighborhood [20113]. To-
day, over 1.4 million people, belonging to more than
33,000 gangs, are active in the United States [20111],
of which 88% identify themselves as being members
of a street gang1. They are also active users of so-
cial media [20111]; according to 2007 National As-
sessment Center's survey of gang members, 25% of
individuals in gangs use the Internet for at least 4
hours a week [20007]. More recent studies report ap-
proximately 45% of gang members participate in on-
line offending activities such as threatening, harass-
ing individuals, posting violent videos or attacking
someone on the street for something they said on-
line [DP11, PDJ15]. They confirm that gang members
use social media to express themselves in ways similar
to their offline behavior on the streets [PEB13].
Despite its public nature, gang members post on so-
cial media without fear of consequences because there
are only few tools law enforcement can presently use
to surveil social media [WDSD15]. For example, the
New York City police department employs over 300 de-
tectives to combat teen violence triggered by insults,
dares, and threats exchanged on social media, and the
Toronto police department teaches officers about the
use of social media in investigations [pol13]. From of-
fline clues, the officers monitor just a selected set of
social media accounts which are manually discovered
and related to a specific investigation. Thus, devel-
oping tools to identify gang member profiles on social
media is an important step in the direction of using
machine intelligence to fight crime.
To help agencies monitor gang activity on so-
cial media, our past work investigated how features
from Twitter profiles,
including profile text, profile
images, tweet text, emjoi use, and their links to
YouTube, may be used to reliably find gang member
profiles [BWDS16]. The diverse set of features, chosen
to combat the fact that gang members often use local
terms and hashtags in their posts, offered encourag-
ing results. In this paper, we report our experience in
1The terms 'gang' and 'street gang' will henceforth be used
interchangeably.
1
integrating deep learning into our gang member pro-
file classifier. Specifically, we investigate the effect of
translating the features into a vector space using word
embeddings [MSC+13]. This idea is motivated by the
recent success of word embeddings-based methods to
learn syntactic and semantic structures automatically
when provided with large datasets. A dataset of over
3,000 gang and non-gang member profiles that we pre-
viously curated is used to train the word embeddings.
We show that pre-trained word embeddings improve
the machine learning models and help us obtain an F 1-
score of 0.7835 on gang member profiles (a 6.39% im-
provement in F 1-score compared to the baseline mod-
els which were not trained using word embeddings).
This paper is organized as follows. Section 2 dis-
cusses the related literature and frames how this work
differs from other related works. Section 3 discusses
our approach based on word embeddings to identify
gang member profiles. Section 4 reports on the evalu-
ation of the proposed approach and the evaluation re-
sults in detail. Section 5 concludes the work reported
while discussing the future work planned.
2 Related Work
Researchers have begun investigating the gang mem-
bers' use of social media and have noticed the impor-
tance of identifying gang members' Twitter profiles a
priori [PEB13, WDSD15]. Before analyzing any tex-
tual context retrieved from their social media posts,
knowing that a post has originated from a gang mem-
ber could help systems to better understand the mes-
sage conveyed by that post. Wijeratne et al. developed
a framework to analyze what gang members post on
social media [WDSD15]. Their framework could only
extract social media posts from self identified gang
members by searching for pre-identified gang names
in a user's Twitter profile description. Patton et al.
developed a method to collect tweets from a group of
gang members operating in Detroit, MI [Pat15]. How-
ever, their approach required the gang members' Twit-
ter profile names to be known beforehand, and data
collection was localized to a single city in the coun-
try. These studies investigated a small set of manually
curated gang member profiles, often from a small geo-
graphic area that may bias their findings.
In our previous work [BWDS16], we curated what
may be the largest set of gang member profiles to study
how gang member Twitter profiles can be automati-
cally identified based on the content they share online.
A data collection process involving location neutral
keywords used by gang members, with an expanded
search of their retweet, friends and follower networks,
led to identifying 400 authentic gang member profiles
on Twitter. Our study discovered that the text in
their tweets and profile descriptions, their emoji use,
their profile images, and music interests embodied by
links to YouTube music videos, can help a classifier
distinguish between gang and non-gang member pro-
files. While a very promising F 1 measure with low
false positive rate was achieved, we hypothesize that
the diverse kinds and the multitude of features em-
ployed (e.g. unigrams of tweet text) could be amenable
to an improved representation for classification. We
thus explore the possibility of mapping these features
into a considerably smaller feature space through the
use of word embeddings.
Previous research has shown word embeddings-
based methods can significantly improve short text
classification [WXX+16, LZZ15]. For example, Lille-
berget et al. showed that word embeddings weighted
by tf -idf outperforms other variants of word embed-
ding models discussed in [LZZ15], after training word
embedding models on over 18,000 newsgroup posts.
Wang et al.
showed that short text categorization
can be improved by word embeddings with the help
of a neural network model that feeds semantic cliques
learned over word embeddings in to a convolutions
neural network [WXX+16]. We believe our corpus of
gang and non-gang member tweets, with nearly 64.6
million word tokens, could act as a rich resource to
train word embeddings for distinguishing gang and
non-gang member Twitter users. Our investigation
differs from other word embeddings-based text classi-
fication systems such as [WXX+16, LZZ15] due to the
fact that we use multiple feature types including emo-
jis in tweets and image tags extracted from Twitter
profile and cover images in our classification task.
3 Word Embeddings
A word embedding model is a neural network that
learns rich representations of words in a text corpus.
It takes data from a large, n-dimensional 'word space'
(where n is the number of unique words in a corpus)
and learns a transformation of the data into a lower
k-dimensional space of real numbers. This transfor-
mation is developed in a way that similarities between
the k-dimensional vector representation of two words
reflects semantic relationships among the words them-
selves. These semantics are not captured by typical
bag-of-words or n-gram models for classification tasks
on text data [MYZ13, MSC+13].
Word embeddings have led to the state-of-the-art
results in many sequential learning tasks [LBH15]. In
fact, word embedding learning is an important step for
many statistical language modeling tasks in text pro-
cessing systems. Bengio et al. were the first ones to
introduce the idea of learning a distributed represen-
tation for words over a text corpus [BDVJ03]. They
2
learned representations for each word in the text cor-
pus using a neural network model that modeled the
joint probability function of word sequences in terms
of the feature vectors of the words in the sequence.
Mikolov et al. showed that simple algebraic operations
can be performed on word embeddings learned over a
text corpus, which leads to findings such as the word
embedding vector of the word "King" − the word em-
bedding vectors of "Man" + "Woman" would results
in a word embedding vector that is closest to the word
embedding vector of the word "Queen" [MYZ13]. Re-
cent successes in using word embeddings to improve
text classification for short text [WXX+16, LZZ15],
encouraged us to explore how they can be used to
improve gang and non-gang member Twitter profile
classification.
Word embeddings can be performed under differ-
ent neural network architectures; two popular ones are
the Continuous Bag-of-Words (CBOW) and Continu-
ous Skip-gram (Skip-gram) models [MCCD13]. The
CBOW model learns a neural network such that given
a set of context words surrounding a target word, it
predict a target word. The Skip-gram model differs
by predicting context words given a target word and
by capturing the ordering of word occurrences. Recent
improvements to Skip-gram model make it better able
to handle less frequent words, especially when negative
sampling is used [MSC+13].
3.1 Features considered
Gang member tweets and profile descriptions tend to
have few textual
indicators that demonstrate their
gang affiliations or their tweets/profile text may carry
acronyms which can only be deciphered by others in-
volved in gang culture [BWDS16]. These gang-related
terms are often local to gangs operating in neigh-
borhoods and change rapidly when they form new
gangs. Consequently, building a database of keywords,
phrases, and other identifiers to find gang members na-
tionally is not feasible. Instead, we use heterogeneous
sets of features derived not only from profile and tweet
text but also from the emoji usage, profile images, and
links to YouTube videos reflecting their music prefer-
ences and affinity. In this section, we briefly discuss the
feature types and their broad differences in gang and
non-gang member profiles. An in-depth explanation of
these feature selection can be found in [BWDS16].
1. Tweet text:
In our previous work, we ob-
served that gang members use curse words nearly
five times more than the average curse words
use on Twitter [BWDS16]. Further, we noticed
that gang members mainly use Twitter to discuss
drugs and money using terms such as smoke, high,
hit, money, got, and need while non-gang mem-
bers mainly discuss their feelings using terms such
as new, like, love, know, want, and look.
2. Twitter profile description: We found gang
member profile descriptions to be rife with curse
words (nigga,
fuck, and shit) while non-gang
members use words related to their feelings or in-
terests (love, life, music, and book). We noticed
that gang members use their profile descriptions
as a space to grieve for their fallen or incarcer-
ated gang members as about 12% of gang member
Twitter profiles used terms such as rip and free.
3. Emoji features: We found that the fuel pump
emoji was the most frequently used emoji by gang
members, which is often used in the context of
selling or consuming marijuana. The pistol emoji
was the second most frequently used emoji, which
is often used with the police cop emoji in an 'emoji
chain' to express their hatred towards law enforce-
ment officers. The money bag emoji, money with
wings emoji, unlock emoji, and a variety of the
angry face emoji such as the devil face emoji and
imp emoji were also common in gang members'
but not in non-gang members' tweets.
4. Twitter profile and cover images: We no-
ticed that gang members often pose holding or
pointing weapons, seen in a group fashion which
displays a gangster culture, show off graffiti, hand
signs, tattoos, and bulk cash in their profile and
cover images. We used Clarifai web service2 to tag
the profile and cover images of the Twitter users
in our dataset and used the image tags returned
by Clarifai API to train word embeddings. Tags
such as trigger, bullet, and worship were unique
for gang member profiles while non-gang member
images had unique tags such as beach, seashore,
dawn, wildlife, sand, and pet.
5. YouTube videos: We found that 51.25% of the
gang members in our dataset have a tweet that
links to a YouTube video. Further, we found that
76.58% of the shared links are related to hip-hop
music, gangster rap, and the culture that sur-
rounds this music genre [BWDS16]. Moreover,
we found that eight YouTube links are shared
on average by a gang member. The top 5 terms
used in YouTube videos shared by gang members
were shit, like, nigga, fuck, and lil while like, love,
peopl, song, and get were the top 5 terms in non-
gang members' video data.
2http://www.clarifai.com/
3
3.2 Classification approach
Figure 1 gives an overview of the steps to learn word
embeddings and to integrate them into a classifier. We
first convert any non-textual features such as emoji
and profile images into textual features. We use Emoji
for Python3 and Clarifai services, respectively, to con-
vert emoji and images into text. Prior to training the
word embeddings, we remove all the seed words used
to find gang member profiles and stopwords, and per-
form stemming across all tweets and profile descrip-
tions. We then feed all the training data (word wt
in Figure 1) we collected from our Twitter dataset to
Word2Vec tool and train it using a Skip-gram model
with negative sampling. When training the Skip-gram
model, we set the negative sampling rate to 10 sample
words, which seems to work well with medium-sized
datasets [MSC+13]. We set the context word window
to be 5, so that it will consider 5 words to left and
right of the target word (words wt−5 to wt+5 in Fig-
ure 1). This setting is suitable for sentences where
average sentence length is less than 11 words, as is
the case in tweets [HTK13]. We ignore the words that
occur less than 5 times in our training corpus.
We investigated how well the local language has
been captured by the word embedding models we
trained. We used the 'most similar' functionality of-
fered by Word2Vec tool to understand what the model
has learned about few gang-related slang terms which
are specific to Chicago area. For example, we ana-
lyzed the ten most similar words learned by the word
embedding model for the term BDK (Black Desciples
Killers). We noticed that out of the 10 most similar
words, five were names of local Chicago gangs, which
are rivals of the Black Disciples Gang, two were dif-
ferent syntactic variations of BDK (bdkk, bdkkk) and
the other three were different syntactic variations of
GDK (gdk, gdkk, gdkkk). GDK is a local gang slang for
'Gangster Disciples Killer' which is used by rivals of
Gangster Disciples gang to show their hatred towards
them. We found similar results for the term GDK. Out
of the ten most similar words, six were showing hatred
towards six different Gangster Disciples gangs that op-
erate in Chicago area. We believe that those who used
the term GDK to show their hatred towards Gangster
Disciples gangs might be also having rivalry with the
six gangs we found.
We obtain word vectors of size 300 from the learned
word embeddings. To represent a Twitter profile, we
retrieve word vectors for all the words that appear in a
particular profile including the words appear in tweets,
profile description, words extracted from emoji, cover
and profile images converted to textual formats, and
words extracted from YouTube video comments and
3https://pypi.python.org/pypi/emoji/
Figure 1: Classifier Training with Word Embeddings.
descriptions for all YouTube videos shared in the user's
timeline. Those word vectors are combined to compute
the final feature vector for the Twitter profile. To
combine the word vectors, we consider five different
methods. Letting the size of a word vector be k = 300,
for a Twitter profile p with n unique words and the
vector of the ith word in p denoted by wip, we compute
the feature vector for the Twitter profile Vp by:
1. Sum of word embeddings Vpsum . This is the
sum the word embedding vectors obtained for all
words in a Twitter profile:
n(cid:88)
i=0
Vpsum =
wip
2. Mean of word embeddings Vpavg . This is the
mean of the word embedding vectors of all words
found in a Twitter profile:
Vpavg = 1/n
wip
n(cid:88)
i=0
n(cid:88)
n(cid:88)
3. Sum of word embeddings weighted by term
frequency Vpsum(count). This is each word embed-
ding vector multiplied by the word's frequency for
the Twitter profile:
Vpsum(count) =
wip.cip
i=0
where cip is the term frequency for the ith word
in profile p.
4. Sum of word embeddings weighted by tf -idf
Vpsum(tf−idf ). This is each word vector multiplied
by the word's tf -idf for the Twitter profile:
Vpsum(tf−idf ) =
wip.tip
i=0
where tip is the tf -idf value for the ith word in
profile p.
4
Represent Training Examples using Word EmbeddingsClassifier TrainingWord VectorsSkip-gram model implemented in Word2Vec TargetWord from TwitterOutput ProjectionInput# of
Words in
Tweets
Profiles
Emoji
Videos
Images
Total
Gang
Members
3,825,092
3,348
732,712
554,857
10,162
Non-gang
Members
45,213,027
21,182
3,685,669
10,459,235
73,252
Total
49,038,119
24,530
4,418,381
11,014,092
83,414
5,126,171
59,452,365
64,578,536
Table 1: Dataset Statistics.
5. Mean of word embeddings weighted by
term frequency Vpavg(sum(count)). This is the
mean of the word embedding vectors weighted by
term frequency:
n(cid:88)
Vpavg(sum(count)) = 1/n
wip.cip
i=0
4 Evaluation
We evaluate the performance of using word embed-
dings to discover gang member profiles on Twitter.
We first discuss the dataset, learning algorithms and
baseline comparison models used in the experiments.
Then we discuss the 10-fold cross validation experi-
ments and the evaluation matrices used. Finally we
present the results of the experiments.
4.1 Evaluation setup
We consider a dataset of curated gang and non-gang
members' Twitter profiles collected from our previous
work [BWDS16].
It was developed by querying the
Followerwonk Web service API4 with location-neutral
seed words known to be used by gang members across
the U.S. in their Twitter profiles. The dataset was fur-
ther expanded by examining the friends, follower, and
retweet networks of the gang member profiles found
by searching for seed words. Specific details about our
data curation procedure are discussed in [BWDS16].
Ultimately, this dataset consists of 400 gang mem-
ber profiles and 2,865 non-gang member profiles. For
each user profile, we collected up to most recent 3,200
tweets from their Twitter timelines, profile description
text, profile and cover images, and the comments and
video descriptions for every YouTube video shared by
them. Table 1 provides statistics about the number of
words found in each type of feature in the dataset. It
includes a total of 821,412 tweets from gang members
and 7,238,758 tweets from non-gang members.
To build the classifiers we used three different
learning algorithms, namely Logistic Regression (LR),
Random Forest (RF), and Support Vector Machines
(SVM). We used version 0.17.1 of scikit-learn5 machine
learning library for Python to implement the classi-
fiers. An open source tool of Python, Gensim [ RS10]
was used to generate the word embeddings. We com-
pare our results with the two best performing systems
reported in [BWDS16] which are the two state-of-the-
art models for identifying gang members in Twitter.
Both baseline models are built from a random forest
classifier trained over term frequencies for unigrams in
tweet text, emoji, profile data, YouTube video data
and image tags. Baseline Model(1) considers all 3,285
gang and non-gang member profiles in our dataset.
Baseline Model(2) considers all Twitter profiles that
contain every feature type discussed in Section 3.1.
Because a Twitter profile may not have every feature
type, baseline Model(1) represents a practical scenario
where not every Twitter profile contains every type
of feature. However, we compare our results to both
baseline models and report the improvements.
4.2 10-fold cross validation
We conducted 10-fold cross validation experiments to
evaluate the performance of our models. We used
all Twitter profiles in the dataset to conduct exper-
iments on the five methods we used to combine word
embedding vectors. For each of the five vector com-
bination methods (as mentioned in Section 3.2), we
trained classifiers using each learning algorithm we
considered.
In each fold, the training set was used
to generate the word vectors, which were then used to
compute features for both the training set and test set.
For each 10-fold cross validation experiment, we report
three evaluation metrics for the 'gang' (positive) and
'non-gang' (negative) classes, namely, the Precision =
tp/(tp + f p), Recall = tp/(tp + f n), and F 1-score =
2 ∗ (P recision ∗ Recall)/(P recision + Recall), where
tp is the number of true positives, f p is the number of
false positives, tn is the number of true negatives, and
f n is the number of false negatives. We report these
metrics for the 'gang' and 'non-gang' classes separately
because of the class imbalance in the dataset.
4.3 Experimental results
Table 2 presents 10-fold cross validation results for the
baseline models (first and second rows) and our word
embeddings-based models (from third row to seventh
row). As mentioned earlier both baseline models use
a random forest classifier trained on term frequencies
of unigram features extracted from all feature types.
The two baseline models only differs on the training
data filtering method used, which is based on the avail-
ability of features in the training dataset as described
4https://moz.com/followerwonk/bio
5http://scikit-learn.org/stable/index.html
5
Model
Classifier
Gang
Non-Gang
Precision Recall F 1-score Precision Recall F 1-score
Vpsum
Vpavg
Vpsum(count)
Baseline Model(1) RF
Baseline Model(2) RF
LR
RF
SVM
LR
RF
SVM
LR
RF
SVM
LR
RF
SVM
LR
RF
SVM
Vpavg(sum(count))
Vpsum(tf−idf )
0.8792
0.8961
0.6007
0.7412
0.5929
0.8394
0.7627
0.8405
0.6768
0.7484
0.5656
0.7901
0.7979
0.7352
0.8490
0.7657
0.7921
0.6374
0.6994
0.7045
0.7085
0.7728
0.5789
0.7439
0.7217
0.6699
0.7346
0.7180
0.7078
0.7074
0.6810
0.7327
0.7443
0.7194
0.7364
0.7755
0.6459
0.7213
0.6559
0.6824
0.7501
0.7740
0.6681
0.7386
0.6267
0.7438
0.7470
0.6952
0.7835
0.7519
0.7500
0.9507
0.9575
0.9576
0.9596
0.9661
0.9442
0.9650
0.9624
0.9537
0.9631
0.9594
0.9595
0.9598
0.9557
0.9634
0.9650
0.9615
0.9881
0.9873
0.9346
0.9659
0.9116
0.9850
0.9675
0.9807
0.9540
0.9648
0.9212
0.9742
0.9746
0.9628
0.9815
0.9678
0.9735
0.9690
0.9720
0.9458
0.9626
0.9369
0.9641
0.9662
0.9715
0.9537
0.9639
0.9395
0.9667
0.9671
0.9589
0.9723
0.9663
0.9674
Table 2: Classification Results Based on 10-Fold Cross Validation.
in [BWDS16]. The baseline Model(1) uses all profiles
in the dataset and has a F 1-score of 0.7364 for 'gang'
class and 0.9690 for 'non-gang' class. The baseline
Model(2) which only uses profiles that contain each
and every feature type has a F 1-score of 0.7755 for
'gang' class and F 1-score of 0.9720 for 'non-gang' class.
Vector sum is one of the basic operations we can
perform on word embedding vectors. The random
forest classifier performs the best among vector sum-
based classifiers where logistic regression and SVM
classifiers also perform comparatively well (Vpsum ).
Using vector mean (Vpavg ) improves all classifier re-
sults and SVM classifier trained on the mean of word
embeddings achieves very close results to the baseline
Model(2). Multiplying vector sum with correspond-
ing word counts for each word in word embeddings
degrades the classifier accuracy for correctly identify-
ing the positive class (Vpsum(count)). When we multi-
ply words by their corresponding tf -idf values before
taking the vector sum, we again observe an increase
in the classifiers' accuracy (Vpsum(tf−idf )). We achieve
the best performance by averaging the vector sum
weighted by term frequency (Vpavg(sum(count))). Here we
multiply the mean of the word embeddings by count
of each word, which beats all other word embeddings-
based models and the two baselines. In this setting, lo-
gistic regression classifier trained on word embeddings
performs the best with a F 1-score of 0.7835. This is
a 6.39% improvement in performance when compared
to the baseline Model(1) and a 1.03% improvement
in performance when compared to baseline Model(2).
Overall, out of the five vector operations that we used
to train machine learning classifiers, four gave us classi-
fier models that beat baseline Model(1) and two vector
based operations gave us classifier models that either
achieved very similar results to baseline Model(2) or
beat it. This evaluation demonstrates the promise of
using pre-trained word embeddings to boost the ac-
curacy of supervised learning algorithms for Twitter
gang member profile classification.
5 Conclusion and Future Work
This paper presented a word embeddings-based ap-
proach to address the problem of automatically iden-
tifying gang member profiles on Twitter. Using a
Twitter user dataset that consist of 400 gang mem-
ber and 2,865 non gang member profiles, we trained
word embedding models based on users' tweets, pro-
file descriptions, emoji,
images, and videos shared
on Twitter (textual features extracted from images,
and videos). We then use the pre-trained word em-
bedding models to train supervised machine learning
classifiers, which showed superior performance when
compared to the state-of-the-art baseline models re-
ported in the literature. We plan to further extend
our work by building our own image classification sys-
tem specifically designed to identify images commonly
shared by gang members such as guns, gang hand
signs, stacks of cash and drugs. We would also like
to experiment with automatically building dictionar-
ies that contain gang names and gang-related slang us-
ing crowd-sourced gang-related knowledge-bases such
as HipWiki6. We also want to experiment with us-
ing such knowledge-bases to train word embeddings
to understand whether having access to gang-related
knowledge could boost the performance of our models.
6http://www.hipwiki.com/Hip+Hop+Wiki
6
Finally, we would like to study how we can further use
social networks of known gang members to identify
new gang member profiles on Twitter.
[MCCD13] T. Mikolov, K. Chen, G. Corrado, and
J. Dean. Efficient estimation of word rep-
resentations in vector space. CoRR, 2013.
Acknowledgements
[Mil92]
We are grateful
to Sujan Perera and Monireh
Ebrahimi for thought-provoking discussions on the
topic. We acknowledge partial support from the
National Science Foundation (NSF) award: CNS-
1513721: "Context-Aware Harassment Detection on
Social Media" and National Institutes of Health (NIH)
award: MH105384-01A1: "Modeling Social Behavior
for Healthcare Utilization in Depression". Any opin-
ions, findings, and conclusions/recommendations ex-
pressed in this material are those of the author(s) and
do not necessarily reflect the views of the NSF or NIH.
References
W. B. Miller. Crime by youth gangs and
groups in the United States. US Dept. of
Justice, Office of Justice Programs, Office
of Juvenile Justice and Delinquency Pre-
vention Washington, DC, 1992.
[MSC+13] T. Mikolov, I. Sutskever, K. Chen, G. S.
Corrado, and J. Dean. Distributed repre-
sentations of words and phrases and their
compositionality. In Proc. of NIPS 2013,
pages 3111–3119. 2013.
[MYZ13] T. Mikolov, W. Yih, and G. Zweig. Lin-
guistic regularities in continuous space
word representations.
In Proc. of ACL
NAACL, 2013, pages 746–751, June 2013.
[20007]
Survey of Gang Members Online Habits
and Participation (2007) Survey results
reported at the i-SAFE Annual Internet
Safety Education Review Meeting Carls-
bad, California. National Assessment Cen-
ter, 2007.
[Pat15]
[PDJ15]
[20111]
2011 National Gang Threat Assessment
Issued Emerging Trends. 2011.
[20113]
National Gang Report. 2013.
[PEB13]
[BDVJ03] Y. Bengio, R. Ducharme, P. Vincent, and
C. Janvin. A neural probabilistic language
model. J. Mach. Learn. Res., 3:1137–1155,
March 2003.
[BWDS16] L. Balasuriya, S. Wijeratne, D. Doran,
and A. Sheth. Finding street gang mem-
bers on twitter.
In Technical Report,
Wright State University, 2016.
[pol13]
[DP11]
S. Decker and D. Pyrooz. Leaving the
gang: Logging off and moving on. coun-
cil on foreign relations, 2011.
[ RS10]
[HTK13] Y. Hu, K. Talamadupula, and S. Kamb-
hampati. Dude, srsly?: The surprisingly
formal nature of twitter's language.
In
ICWSM, 2013.
[LBH15]
[LZZ15]
Y. LeCun, Y. Bengio, and G. Hinton.
Deep learning. Nature, 521(7553):436–
444, 2015.
J. Lilleberg, Y. Zhu, and Y. Zhang. Sup-
port vector machines and word2vec for
text classification with semantic features.
In Proc. of IEEE ICCI*CC, 2015, pages
136–140, July 2015.
7
D. U. Patton. Gang violence, crime, and
substance use on twitter: A snapshot of
gang communications in detroit, Jan 2015.
S. H. Decker,
D. C. Pyrooz,
and
R. K. Moule Jr. Criminal and routine ac-
tivities in online settings: Gangs, offend-
ers, and the internet. Justice Quarterly,
32(3):471–499, 2015.
D. U. Patton, R. D. Eschmann, and D. A.
Butler. Internet banging: New trends in
social media, gang violence, masculinity
and hip hop. Computers in Human Be-
havior, 29(5):A54 – A59, 2013.
Social media and tactical considerations
for law enforcement. Technical report,
United States Office of Community Ori-
ented Policing Services and United States
Department of Justice, 2013.
R. Rehurek and P. Sojka. Software Frame-
work for Topic Modelling with Large Cor-
pora. In Proc. of LREC, 2010, pages 45–
50, Valletta, Malta, May 2010.
[WDSD15] S. Wijeratne, D. Doran, A. Sheth, and
J. L. Dustin. Analyzing the social media
footprint of street gangs. In Proc. of IEEE
ISI, 2015, pages 91–96, May 2015.
[WXX+16] P. Wang, B. Xu, J. Xu, G. Tian, C. Liu,
and H. Hao. Semantic expansion using
word embedding clustering and convolu-
tional neural network for improving short
text classification. Neurocomputing, 174,
Part B:806 – 814, 2016.
|
1708.01236 | 2 | 1708 | 2018-04-18T12:56:07 | Multiscale mixing patterns in networks | [
"cs.SI",
"physics.data-an",
"physics.soc-ph"
] | Assortative mixing in networks is the tendency for nodes with the same attributes, or metadata, to link to each other. It is a property often found in social networks manifesting as a higher tendency of links occurring between people with the same age, race, or political belief. Quantifying the level of assortativity or disassortativity (the preference of linking to nodes with different attributes) can shed light on the factors involved in the formation of links and contagion processes in complex networks. It is common practice to measure the level of assortativity according to the assortativity coefficient, or modularity in the case of discrete-valued metadata. This global value is the average level of assortativity across the network and may not be a representative statistic when mixing patterns are heterogeneous. For example, a social network spanning the globe may exhibit local differences in mixing patterns as a consequence of differences in cultural norms. Here, we introduce an approach to localise this global measure so that we can describe the assortativity, across multiple scales, at the node level. Consequently we are able to capture and qualitatively evaluate the distribution of mixing patterns in the network. We find that for many real-world networks the distribution of assortativity is skewed, overdispersed and multimodal. Our method provides a clearer lens through which we can more closely examine mixing patterns in networks. | cs.SI | cs |
Multiscale mixing patterns in networks
Leto Peel,1, 2, ∗ Jean-Charles Delvenne,1, 3, † and Renaud Lambiotte4, ‡
1ICTEAM, Universit´e catholique de Louvain, Louvain-la-Neuve, B-1348, Belgium
2naXys, Universit de Namur, Namur, B-5000, Belgium
3CORE, Universit´e catholique de Louvain, Louvain-la-Neuve, B-1348, Belgium
4Mathematical Institute, University of Oxford, Oxford, UK
Assortative mixing in networks is the tendency for nodes with the same attributes, or metadata,
to link to each other. It is a property often found in social networks manifesting as a higher tendency
of links occurring between people with the same age, race, or political belief. Quantifying the level
of assortativity or disassortativity (the preference of linking to nodes with different attributes) can
shed light on the organisation of complex networks. It is common practice to measure the level
of assortativity according to the assortativity coefficient, or modularity in the case of categorical
metadata. This global value is the average level of assortativity across the network and may not be
a representative statistic when mixing patterns are heterogeneous. For example, a social network
spanning the globe may exhibit local differences in mixing patterns as a consequence of differences
in cultural norms. Here, we introduce an approach to localise this global measure so that we can
describe the assortativity, across multiple scales, at the node level. Consequently we are able to
capture and qualitatively evaluate the distribution of mixing patterns in the network. We find
that for many real-world networks the distribution of assortativity is skewed, overdispersed and
multimodal. Our method provides a clearer lens through which we can more closely examine mixing
patterns in networks.
Networks are used as a common representation for a
wide variety of complex systems, spanning social [1–3],
biological [4, 5] and technological [6, 7] domains. Nodes
are used to represent entities or components of the system
and links between them used to indicate pairwise inter-
actions. The link formation processes in these systems
are still largely unknown, but the broad variety of ob-
served structures suggest that they are diverse. One ap-
proach to characterise the network structure is based on
the correlation, or assortative mixing, of node attributes
(or "metadata") across edges. This analysis allows us to
make generalisations about whether we are more likely to
observe links between nodes with the same characteristics
(assortativity) or between those with different ones (dis-
assortativity). Social networks frequently contain posi-
tive correlations of attribute values across connections [8].
These correlations occur as a result of the complemen-
tary processes of selection (or "homophily") and influ-
ence (or "contagion") [9]. For example, assortativity has
frequently been observed with respect to age, race and
social status [10], as well as behavioural patterns such as
smoking and drinking habits [11, 12]. Examples of disas-
sortative networks include heterosexual dating networks
(gender), ecological food webs (metabolic category), and
technological and biological networks (node degree) [13].
It is important to note that just as correlation does not
imply causation, observations of assortativity are insuf-
ficient to imply a specific generative process for the net-
work.
The standard approach to quantifying the level of as-
∗ [email protected]
† [email protected]
‡ [email protected]
FIG. 1. Local assortativity of gender in a sample of Facebook
friendships [14]. Different regions of the graph exhibit strik-
ingly different patterns, suggesting that a single variable, e.g.
global assortativity, would provide a poor description of the
system.
sortativity in a network is by calculating the assortativ-
ity coefficient [13]. Such a summary statistic is useful to
capture the average mixing pattern across the whole net-
work. However, such a generalisation is only really mean-
ingful if it is representative of the population of nodes in
the network, i.e., if the assortativity of most individuals
is concentrated around the mean. But when networks
are heterogeneous and contain diverse mixing patterns,
a single global measure may not present an accurate de-
scription. Furthermore it does not provide a means for
quantifying the diversity or identifying anomalous or out-
lier patterns of interaction.
Quantifying diversity and measuring how mixing may
vary across a network becomes a particularly perti-
2
FIG. 2. Five networks (top) of n = 40 nodes and m = 160 edges with the same global assortativity rglobal = 0, but with
different local mixing patterns as shown by the distributions of rmulti (bottom).
nent issue with modern advances in technology that
have enabled us to capture, store and process massive-
scale networks. Previously social interaction data was
collected via time-consuming manual processes of con-
ducting surveys or observations. For practical reasons
these were often limited to a specific organisation or
group [1, 2, 15, 16]. Summarising the pattern of as-
sortative mixing as a single value may be reasonable
for these small-scale networks that tend to focus on a
single social dimension (e.g., a specific working environ-
ment or common interest). Now, technology such as on-
line social media platforms allow for the automatic col-
lection of increasingly larger amounts of social interac-
tion data. For instance, the largest connected compo-
nent of the Facebook network was previously reported
to account for approximately 10% of the global popula-
tion [17]. These vast multi-dimensional social networks
present more opportunities for heterogeneous mixing pat-
terns, which could conceivably arise, for example, due
to differences in demographic and cultural backgrounds.
Figure 1 shows, using the methods we will introduce, an
example of this variation in mixing on a subset of nodes
in the Facebook social network [14]. A high variation
in mixing patterns indicates that the global assortativity
may be a poor representation of the entire population.
To address this issue, we develop a node-centric measure
of the assortativity within a local neighbourhood. Vary-
ing the size of the neighbourhood allows us to interpolate
from the mixing pattern between an individual node and
its neighbours to the global assortativity coefficient. In a
number of real-world networks we find that the global as-
sortativity is not representative of the collective patterns
of mixing.
I. MIXING IN NETWORKS
Currently the standard approach to measure the
propensity of links to occur between similar nodes is
to use the assortativity coefficient introduced by New-
man [13]. Here we will focus on undirected networks
and categorical node attributes, but assortativity and the
methods we propose naturally extend to directed net-
works and scalar attributes (see Appendix A & B).
The global assortativity coefficient rglobal for categori-
cal attributes compares the proportion of links connect-
ing nodes with same attribute value, or type, relative to
the proportion expected if the edges in the network were
randomly rewired. The difference between these pro-
portions is commonly known as modularity Q, a mea-
sure frequently used in the task of community detec-
tion [18]. The assortativity coefficient is normalised such
that rglobal = 1 if all edges only connect nodes of the same
type (i.e., maximum modularity Qmax) and rglobal = 0 if
the number of edges is equal to the expected number for
a randomly rewired network in which the total number
of edges incident on each type of node is held constant.
The global assortativity rglobal is given by [13]
(cid:80)
g egg −(cid:80)
1 −(cid:80)
g a2
g
rglobal =
Q
Qmax
=
g a2
g
,
(1)
(cid:80)
h egh =(cid:80)
in which egh is half the proportion of edges in the network
that connect nodes with type yi = g to nodes with type
yj = h (or the proportion of edges if g = h) and ag =
i∈g ki/2m is the sum of degrees (ki) of nodes
with type g, normalised by twice the number of edges, m.
78 2 0 0 080 0 0 27838 22020 02020 0 23878 2 0 0 080 0 0 27838 2 0 0 080 0 0 2381020202010202010201078 2 0 0 080 0 0 27838 2 0 0 080 010201078 2 0 0 080 0 0 2781020 0 01080 0102010(cid:88)
We calculate egh as:
(cid:88)
normalisation constant Qmax = 1 −(cid:80)
1
2m
egh =
i:yi=g
j:yj =h
where Aij is an element of the adjacency matrix. The
g ensures that
the assortativity coefficient lies in the range −1 ≤ r ≤ 1
(see Appendix C).
g a2
Aij ,
(2)
3
graph. A simple random walker at node i jumps to node
j by selecting an outgoing edge with equal probability,
Aij
and, in an undirected network, the stationary proba-
ki
bility πi = ki/2m of being at node i is proportional to its
degree. Then, every edge of the network is traversed in
each direction with equal probability πi
= 1/2m. In
this context, a key observation is that we can equivalently
rewrite (2) as,
Aij
ki
(cid:88)
(cid:88)
egh =
πi
Aij
ki
,
(3)
A. Local patterns of mixing
i:yi=g
j:yj =h
The summary statistic rglobal describes the average
mixing pattern over the whole network. But as with all
summary statistics there may be cases where it provides
a poor representation of the network e.g., if the network
contains localised heterogeneous patterns. Figure 2 il-
lustrates an analogy to Anscombe's quartet of bivariate
datasets with identical correlation coefficients [19]. Each
of the five networks in the top row have the same number
of nodes (n = 40) and edges (m = 160) and have been
constructed to have the same rglobal with respect to a bi-
nary attribute, indicated by a cross (c) or a diamond (d).
All five networks have mcc + mdd = 80 edges between
nodes of the same type and mcd = 80 edges between
nodes of different types, such that each has rglobal = 0.
Local patterns of mixing are formed by splitting each of
the types {c, d} further into two equally sized subgroups
{c1, c2, d1, d2}. The middle row depicts the placement of
edges within and between the four subgroups. Distribut-
ing edges uniformly between subgroups creates a network
with homogeneous mixing [Fig. 2(a)].
We propose a local measure of assortativity r((cid:96)) that
captures the mixing pattern within the local neighbour-
hood of a given node of interest (cid:96). Trivially one could
calculate the local assortativity by adjusting (1) to only
consider the immediate neighbours of (cid:96). However, taking
this approach can encounter problems. For nodes with
low degree, we would be calculating assortativity based
only on a small sample, providing a potentially poor es-
timate of the node's mixing preference. And when all of
(cid:96)'s neighbours are of the same type, then we would assign
r((cid:96)) = ∞ because 1 −(cid:80)
g a2
g = 0.
We face similar issues in time-series analysis when we
wish to interpret how a noisy signal varies over time. Di-
rect analysis of the series may be more descriptive of the
noise process than the underlying signal we are interested
in. Averaging over the whole series provides an accurate
estimate of the mean, but treats all variation as noise and
ignores any important trends. A common solution to this
problem is to use a local filter such as the exponential
weighted moving average, in which values further in time
from the point of interest are weighted less. We adopt a
similar strategy in calculating the local assortativity. To
make the connection with time-series analysis concrete,
we define a random time-series where each value is the
attribute yi of a node i visited in a random walk on the
which is the total probability that a simple random
walker will jump from a node with type g to one with
type h. We can then interpret the global assortativity of
the network as the autocorrelation (with time lag of 1)
of this random time-series (see Appendix D for details).
Global assortativity counts all edges in the network
equally just as the stationary random walker visits all
edges with equal probability. To create our local mea-
sure of assortativity we instead reweight the edges in the
network based on how local they are to the node of inter-
est, (cid:96). We do so by replacing the stationary distribution
π in (3) with an alternative distribution over the nodes
w(i; (cid:96)),
(cid:88)
(cid:88)
i:yi=g
j:yj =h
egh((cid:96)) =
w(i; (cid:96))
Aij
ki
,
(4)
value ν((cid:96)) = (cid:80)
and compare the proportion of links between nodes of
the same type in the local neighbourhood to the global
g(egg((cid:96)) − egg). Then we can calculate
the local assortativity as the deviation from the global
assortativity:
(cid:33)
(cid:32)
(cid:88)
(cid:88)
egg −(cid:88)
ν((cid:96)) +
g
g
(egg((cid:96)) − a2
g) .
a2
g
(5)
(6)
1
Qmax
1
r((cid:96)) =
=
Qmax
g
All that remains is to define a distribution w(i; (cid:96)).
We choose the well-known personalised PageRank vec-
tor, the stationary distribution wα(i; (cid:96)) of a simple ran-
dom walk, modified so that at each time step we re-
turn to the node of interest (cid:96) with probability (1 − α)
[Fig. 3(a)].
In the special case of a network consisting
of nodes linked in a line, wα(i; (cid:96)) corresponds to an ex-
ponential distribution [Fig. 3(b)] and is analogous to the
previously mentioned exponential filter commonly used
in time-series analysis. The personalised PageRank vec-
tor is an intuitive choice given its role in local community
detection [20] and connections to the stochastic block
model [21].
It is however, not the only way to define
a local neighbourhood (e.g., a number of graph kernels
may be suitable [22]), but we leave exploration of other
neighbourhood functions for future work.
4
FIG. 3. Example of the local assortativity measure for categorical attributes. (A) assortativity is calculated (as in (1)) according
to the actual proportion of links in the network connecting nodes of the same type relative to the expected proportion of links
between nodes of the same type, (B) the nodes in the network are weighted according to a random walk with restart probability
of 1−α, (C) an example of the local assortativity applied to a simple line network with two types of nodes: yellow or green. The
blue bars show the stationary distribution (w(i; (cid:96))) of the random walk with restarts at (cid:96) for different values of α. Underneath
each distribution the nodes in the line network are coloured according to their local assortativity value.
We can now calculate a local assortativity rα((cid:96)) for
each node and use α to interpolate from the trivial lo-
cal neighbourhood assortativity (α = 0, the random
walker never leaves the initial node) to the global as-
sortativity (α = 1, the random walker never restarts)
r1((cid:96)) = rglobal [Fig. 3(c)]. We can also view this lo-
cal assortativity as a (normalised) autocovariance of the
random time-series of node attributes, defined as before
but now generated by a stationary random walker with
restarts and only when traversing edges of the original
network.
B. Choice of α
We can use α to interpolate from the global measure at
α = 1 to the local measure based only on the neighbours
of (cid:96) when α = 0. As previously mentioned, either ex-
treme can be problematic, r1 is uniform across network,
while r0 may be based on a small sample (particularly
in the case of low degree nodes) and therefore subject
to overfitting. Moreover, both extremes are blind to the
possible existence of coherent regions of assortativity in-
side the network, as r1 considers the network as a whole
while r0 considers the local assortativities of the nodes
as independent entities.
To circumvent these issues, we consider calculating the
assortativity across multiple scales by calculating a "mul-
tiscale" distribution wmulti by integrating over all possi-
ble values of α [23],
(cid:90) 1
wmulti(i; (cid:96)) =
wα(i; (cid:96)) dα ,
(7)
0
which is effectively the same as treating α as an unknown
with a uniform prior distribution (see Appendix H for
details). Using this distribution, we can calculate a mul-
tiscale measure rmulti that captures the assortativity of a
given node across all scales.
As a simple demonstration, we return to Figure 2 in
which the distribution of rmulti for each synthetic network
is shown in the bottom row. We see under homogeneous
mixing [Fig. 2(a)] a unimodal distribution peaked around
0 confirming that the global measure rglobal is represen-
tative of the mixing patterns in the network. However,
when mixing is heterogeneous [Fig 2(b–e)] we observe
multimodal distributions of rmulti that allow us to dis-
ambiguate between different local mixing patterns.
II. REAL NETWORKS
Next we use rmulti to evaluate the mixing patterns in
some real networks: an ecological network and set of on-
line social networks. In both cases nodes have multiple
attributes assigned to them, providing different dimen-
sions of analysis.
A. Weddell Sea Food Web
We first examine a network of ecological consumer
interactions between species dwelling in the Weddell
Sea [4]. Figure 4 shows the distributions (green) of local
assortativity for five different categorical node attributes.
For comparison we present a null distribution (black ) ob-
tained by randomly re-wiring the edges such that the at-
tribute values, degree sequence and global assortativity
are all preserved (see Appendix I). In each case we ob-
serve skewed and/or multi-modal distributions. The em-
pirical distributions appear overdispersed compared to
the null distributions.
It may be surprising to see that, for some attributes,
the null distribution appears to be multi-modal. Closer
inspection reveals that the different modes are correlated
with the attribute values and that multi-modality arises
from the unbalanced distribution of nodes and incident
edges across different node types. This effect is particu-
larly pronounced for the attribute "Metabolic Category"
for which we observe two distinct peaks in the distri-
bution. The larger peak that occurs around rmulti ∼ 0
221 = 1.0= 0.0= 0.5ABC5
FIG. 4. Multiscale assortativity for different attributes in the Weddell Sea Food Web. The observed distribution is depicted
by the solid green bars. The black outline shows the null distribution.
represents all species that belong to the metabolic cate-
gory plant and accounts for the majority (348/492) of the
species in the network, upon which approximately two
thirds of the edges are incident. This bias in the distri-
bution of edges across the different node types means that
randomly assigned edges are more likely to connect two
nodes of the majority class than any other pair of nodes.
In fact, it is impossible to assign edges such that nodes
in each Metabolic Category exhibit (approximately) the
same assortativity as the global value. Specifically, to
achieve rglobal = −0.13 it is necessary that more than
half of the edges connect species from different metabolic
categories. However, this is impossible for the plant cate-
gory without changing the distribution of edges over cat-
egories.
B. Facebook 100
We next consider a set of online social networks col-
lected from the Facebook social media platform at a time
when it was only open to 100 US universities [3]. The pro-
cess of incrementally providing these universities access
to the platform, meant that at this point in time very few
links existed between each of the universities' networks,
which provides the opportunities to study each of these
social systems in a relatively independent manner. One
of the original studies on this dataset examined the assor-
tativity of each demographic attribute in each of the net-
works [3]. This study found some common patterns that
occurred in many of the networks, such as a tendency
to be assortative by matriculation year and dormitory of
residence, with some variation around the magnitude of
assortativity for each of the attributes across the different
universities.
In this case it makes sense to analyse the universities
separately since it is reasonable to assume that univer-
sity membership played an important and restricting role
in the organisation of the network. However, a mod-
ern version of this dataset might contain a higher den-
sity of inter-university links, making it less reasonable
to treat them independently; in general partitioning net-
works based on attributes without careful considerations
can be problematic [24].
Figure 5 depicts the distributions of rmulti for each of
the 100 networks according to dormitory. For many of
the networks we observe a positively-skewed distribution.
The surrounding subplots show details for four univer-
sities with approximately the same global assortativity
rglobal ∼ 0.13, but with qualitatively different distribu-
tions of rmulti. Common across these distributions is that
all of the empirical distributions exhibit a positive skew
beyond that of the null distribution. Closer inspection re-
veals that in all four networks the nodes associated with a
higher local assortativity belong to a community of nodes
more loosely connected to the rest of the network. These
nodes also correspond to first-year students, which sug-
gests that residence is more relevant to friendship among
new students than it is for the rest of the student body.
We see this pattern in many of the other schools too,
first-year students are more assortative by year (for all
schools except one) and by residence (more than 75% of
schools), see Figs. 8 & 9 in the Appendix for details.
We can also use local assortativity to compare how
the mixing of multiple attributes covary across a net-
work. This may be of interest as a positive corre-
lation could suggest a relationship between attributes,
while a negative correlation indicates that assortativity
of one attribute may replace the assortativity of another.
Note that differences in normalisation between attributes
mean that the actual values may not be directly compa-
rable, which is why we focus on correlation. Figure 6
compares rmulti for year of study and place of residence.
The central scatter plot shows, for each university: the
correlation between local assortativities of the two at-
tributes (x-axis) against the difference in the two global
assortativities for each network (y-axis), which was pre-
viously the only way to compare assortativities [3]. The
four surrounding sub-plots show the joint distribution of
year and dorm local assortativity for specific universi-
ties. The yellow points indicate students in their first
year.
In most universities we observed that first-year
students were the most assortative by either year, resi-
dence or both. In both Auburn and Pepperdine there is
a negative correlation between year and dorm assortativ-
ity suggesting that many friendships are associated with
either being in the same year or from sharing a dorm.
For Simmons and Rice we observe a positive correla-
tion between dorm and year local assortativity. However,
in Simmons we see that the first-year students form a
separate cluster, while in Rice they are much more in-
terspersed. This difference may relate to how students
are placed in university dorms. At Simmons all first year
6
FIG. 5. Distributions of the local assortativity by residence (dorm) for each of the schools in the Facebook 100 dataset [3].
Dotted black lines indicate the 10 and 90 percentiles while the solid black lines show the interquartile range. The global
assortativity is indicated by the blue square markers. The distributions for four schools (Dartmouth, Wesleyan, Wellesley and
Haverford) are shown in detail in the surrounding. Each of them has approximately the same global assortativity (rglobal ∼ 0.13),
but the distributions indicate different levels of heterogeneity in the pattern of mixing by residence. While the distributions are
different, there exists a common trend that the first year students tend to be more loosely connected to the rest of the network
and exhibit the higher values of assortativity (nodes to the right of the dashed cyan line).
FIG. 6. A scatter plot in which each school is a point indicating the correlation of local assortativities by dorm and matriculation
year (x-axis) and proportion of nodes which are more assortative by dorm than by year (y-axis). For reference, the blue vertical
line indicates zero assortativity (random mixing) and the red horizontal line indicate zero difference in rglobal. Joint distributions
of the dorm and year assortativities for four of the schools are shown in the surrounding plots. Blue lines indicate rglobal.
students live on campus1 and form the majority residents
in the few dorms they occupy. Rice houses their new in-
takes according to a different strategy, by placing them
evenly spread across all the available dorms. The fact
that students are mixed across years and that the vast
majority (almost 78%2) of students reside in university
accommodation, offers a possible explanation for why we
1 source:http://www.simmons.edu/student-life/
life-at-simmons/housing/residence-halls
2 source:http://campushousing.rice.edu/
a b c da. Dartmouthd. Wesleyanb. Wellesleyc. Haverfordassorta�vedisassorta�veuniform mixingRiceSimmonsAuburnPepperdineRiceCaltechMichiganAuburnOklahomaobserve a smooth variation in values of assortativity with-
out a distinction between new students and the rest of
the population.
III. DISCUSSION
Characterising the level of assortativity plays an im-
portant role in understanding the organisation of com-
plex systems. However, the global assortativity may not
be representative given the variation present in the net-
work. We have shown that the distribution of mixing in
real networks can be skewed, overdispersed and possibly
multimodal. In fact, for certain network configurations
we have seen that a unimodal distribution may not even
be possible.
As network data grow bigger there is a greater pos-
sibility for heterogeneous sub-groups to co-exist within
the overall population. The presence of these sub-
populations adds further to the ongoing discussions of
the interplay between node metadata and network struc-
ture [24] and suggests that while we may observe a re-
lationship between particular node properties and exis-
tence of links in part of a network, it does not imply that
this relationship exists across the network as a whole.
This heterogeneity has implications on how we make gen-
eralisations in network data, as what we observe in a
subgraph might not necessarily apply to the rest of the
7
network. However, it may also present new opportu-
nities too. Recent results show that with an appropri-
ately constructed learning algorithm it is still possible
to make accurate predictions about node attributes in
networks with heterogeneous mixing patterns [25] and in
some cases even utilise the heterogeneity to further im-
prove performance [26]. Quantifying local assortativity
offers a new dimension to study this predictive perfor-
mance. Heterogeneous mixing also offers a potential new
perspective for the community detection problem [27],
i.e., to identify sets of nodes with similar assortativity,
which may be useful in the study of "echo chambers" in
social networks [28].
Our approach to quantifying local mixing could easily
be applied to any global network measure, such as clus-
tering coefficient or mean degree. It may also be used to
capture the local correlation between node attributes and
their degree, a relationship that plays a definitive role in
network phenomena such as the majority illusion [29] and
the generalised friendship paradox [30].
ACKNOWLEDGEMENTS
This work was
supported by ARC (Federation
Wallonia-Brussels) [LP, JCD, RL] and FNRS-F.R.S.
[LP].
[1] David Krackhardt, "The ties that torture: Simmelian tie
analysis in organizations," Research in the Sociology of
Organizations 16, 183–210 (1999).
[2] Emmanuel Lazega, The collegial phenomenon: The social
mechanisms of cooperation among peers in a corporate
law partnership (Oxford University Press, 2001).
[3] Amanda L Traud, Peter J Mucha, and Mason A Porter,
"Social structure of facebook networks," Physica A 391,
4165–4180 (2012).
[4] Ulrich Brose et al., "Body sizes of consumers and their
resources," Ecology 86, 2545 (2005).
[5] H Jeong, B Tombor, R Albert, ZN Oltvai,
and
AL Barabasi, "The large-scale organization of metabolic
networks," Nature 407, 651 (2000).
[6] R´eka Albert, Hawoong Jeong,
and Albert-L´aszl´o
Barab´asi, "Internet: Diameter of the world-wide web,"
Nature 401, 130 (1999).
[7] Duncan J Watts and Steven H Strogatz, "Collective
dynamics of 'small-world' networks," Nature 393, 440
(1998).
[8] Miller McPherson, Lynn Smith-Lovin,
and James M
Cook, "Birds of a feather: Homophily in social net-
works," Annu. Rev. Sociol. 27, 415–444 (2001).
[9] Sinan Aral, Lev Muchnik, and Arun Sundararajan, "Dis-
tinguishing influence-based contagion from homophily-
driven diffusion in dynamic networks," Proc. Natl. Acad.
Sci. 106, 21544–21549 (2009).
[10] James Moody, "Race, school integration, and friendship
segregation in america," Am. J. Sociol. 107, 679–716
(2001).
[11] Jere M Cohen, "Sources of peer group homogeneity," So-
ciol Educ , 227–241 (1977).
[12] Denise B Kandel, "Homophily, selection, and socializa-
tion in adolescent friendships," Am. J. Sociol. 84, 427–
436 (1978).
[13] Mark EJ Newman, "Mixing patterns in networks," Phys.
Rev. E 67, 026126 (2003).
[14] Julian J McAuley and Jure Leskovec, "Learning to dis-
cover social circles in ego networks," in Adv. Neur. In.
25, Vol. 2012 (2012) pp. 539–547.
[15] Samuel F Sampson, A novitiate in a period of change:
An experimental and case study of social relationships,
Ph.D. thesis, Cornell University Ithaca, NY (1968).
[16] Wayne W Zachary, "An information flow model for con-
flict and fission in small groups," J. Anthropol. Res. ,
452–473 (1977).
[17] Johan Ugander, Brian Karrer, Lars Backstrom,
and
Cameron Marlow, "The anatomy of the facebook social
graph," preprint arXiv:1111.4503 (2011).
[18] Mark EJ Newman and Michelle Girvan, "Finding and
evaluating community structure in networks," Phys. rev.
E 69, 026113 (2004).
[19] Francis J Anscombe, "Graphs in statistical analysis,"
Am. Stat. 27, 17–21 (1973).
[20] Reid Andersen, Fan Chung,
and Kevin Lang, "Local
graph partitioning using pagerank vectors," in Founda-
tions of Computer Science (FOCS'06) (IEEE, 2006) pp.
475–486.
[21] Isabel M Kloumann, Johan Ugander, and Jon Kleinberg,
"Block models and personalized pagerank," Proc. Natl.
Acad. Sci. 114, 33–38 (2016).
[22] Fran¸cois Fouss, Marco Saerens, and Masashi Shimbo,
Algorithms and models for network data and link analysis
(Cambridge University Press, 2016).
[23] Paolo Boldi, "Totalrank: Ranking without damping," in
Special interest tracks and posters of the 14th interna-
tional conference on World Wide Web (WWW) (ACM,
2005) pp. 898–899.
[24] Leto Peel, Daniel B Larremore, and Aaron Clauset, "The
ground truth about metadata and community detection
in networks," Sci. Adv. 3, e1602548 (2017).
[25] Leto Peel, "Graph-based semi-supervised learning for re-
lational networks," in SIAM International Conference on
Data Mining (SIAM, 2017) pp. 435–443.
[26] Kristen M Altenburger and Johan Ugander, "Bias and
variance in the social structure of gender," preprint
arXiv:1705.04774 (2017).
[27] Michael T Schaub, Jean-Charles Delvenne, Martin Ros-
vall, and Renaud Lambiotte, "The many facets of com-
munity detection in complex networks," Applied Network
Science 2, 4 (2017).
[28] Elanor Colleoni, Alessandro Rozza, and Adam Arvids-
son, "Echo chamber or public sphere? predicting political
orientation and measuring political homophily in twitter
using big data," J. Commun. 64, 317–332 (2014).
[29] Kristina Lerman, Xiaoran Yan,
and Xin-Zeng Wu,
"The" majority illusion" in social networks," PloS one
11, e0147617 (2016).
[30] Young-Ho Eom and Hang-Hyun Jo, "Generalized friend-
ship paradox in complex networks: The case of scientific
collaboration," Sci. Rep. 4, srep04603 (2014).
[31] George Udny Yule, "On the methods of measuring as-
sociation between two attributes," J. R. Stat. Soc. 75,
579–652 (1912).
[32] George A Ferguson, "The factorial interpretation of test
difficulty," Psychometrika 6, 323–329 (1941).
[33] Joy Paul Guilford, Fundamental statistics in psychology
and education. (McGraw-Hill, 1950).
[34] Ernest C Davenport Jr and Nader A El-Sanhurry,
review and synthesis," Educ. Psychol.
"Phi/phimax:
Meas. 51, 821–828 (1991).
[35] Edward E. Cureton, "Note on φ/φmax," Psychometrika
24, 89–91 (1959).
[36] Jacob Cohen, "A coefficient of agreement for nominal
scales," Educ Psychol Meas 20, 37–46 (1960).
[37] Paolo Boldi, Massimo Santini, and Sebastiano Vigna,
"A deeper investigation of pagerank as a function of the
damping factor," in Web Information Retrieval and Lin-
ear Algebra Algorithms, 07071 (2007).
[38] Bailey K Fosdick, Daniel B Larremore, Joel Nishimura,
and Johan Ugander, "Configuring random graph models
with fixed degree sequences," preprint arXiv:1608.00607
(2016).
8
and ending at each of the attribute types. Then the di-
rected global assortativity of a network with respect to a
particular categorical node attribute yi is:
g egg −(cid:80)
(cid:80)
1 −(cid:80)
g agbg
g agbg
rglobal =
,
(A1)
where ag and bg represent the total number of outgoing
and incoming links of all nodes of type g:
(cid:88)
(cid:88)
ag =
egh ,
bh =
egh .
(A2)
h
g
Then we can update our definition of local assortativity
accordingly,
r((cid:96)) =
1
Qmax
g
(egg((cid:96)) − agbg) .
(A3)
(cid:88)
Appendix B: Scalar attributes
For scalar attributes we can simply calculate the Pear-
son's correlation across edges. Using xi and xj to indicate
the scalar attribute value of the nodes in edge Aij then
we can write the global assortativity as,
cov(xi, xj)
rglobal =
(cid:80)
σiσj
ij Aij(xi − ¯x)(xj − ¯x)
i ki(xi − ¯x)2
(B1)
,
(B2)
(cid:80)
=
(cid:80)
where ¯x = 1
i kixi is the mean value of x weighted
2m
by node degree k and σi is the standard deviation of
the attribute values. If we standardise the scalar values
using the linear transformation xi = xi−¯x
, then we can
simplify this further as,
σi
rglobal =
Aij
2m
xi xj .
(B3)
Then we can calculate the local assortativity rα((cid:96)) for
scalar variables as,
rα((cid:96)) =
wα(i; (cid:96))
Aij
ki
xi xj .
(B4)
Figure 7 gives some examples of distributions of rmulti for
scalar attributes in the food web network.
(cid:88)
ij
(cid:88)
ij
Appendix A: Directed networks
correlation
Appendix C: Categorical assortativity as a
We can easily extend the multiscale mixing measure
rα described in the main text to directed networks. The
main change is to incorporate two sets of marginals a
and b that describe the proportion of edges starting from
The assortativity coefficient rglobal for categorical at-
tributes can be interpreted as a normalised Pearson's
correlation. To see this, we start by observing that the
Pearson's correlation of two binary variables is equivalent
9
FIG. 7. Multiscale assortativity for different scalar attributes in the Weddell Sea Food Web: node degree, average species mass
and mobility. Note that mobility is a discrete ordinal variable (taking integer values in [1,4]) and in the main text we treat it
as an unordered discrete variable.
TABLE I. Binary contingency table
yi = 0
yi = 1
yj = 0 yj = 1
e00
e10
b0
a0
a1
e01
e11
b1
to the Phi coefficient for binary contingency tables [31].
Table I shows a contingency table using the same nota-
tion as the directed assortativity, i.e., a and b give the
marginal proportions and e gives the joint proportions.
Then the Pearson product-moment correlation of these
variables is known as φ, which we derive using the mo-
ments of a Bernoulli distribution:
φ =
=
E[yi, yj] − E[yi]E[yj]
σyi σyj
e11 − a1b1
√
√
b1b0
a1a0
.
(C1)
(C2)
Note that it is only necessary to calculate this in terms of
e11, since e11 − a1b1 = e00 − a0b0. We can see this using
the identity e00 = b0 − a1 + e11:
e00 − a0b0 = b0 − a1 + e11 − (1 − a1)(1 − b1)
(C3)
= (1 − b1) − a1 + e11 − (1 − a1 − b1 + a1b1)
(C4)
= e11 − a1b1 .
(C5)
A well-known issue with φ is that the extreme values of
+1 and −1 are typically unobtainable, which can cause
issues with its interpretation.
In fact φ = 1 can only
occur if a1 = b1, e.g., when the network is undirected,
while φ = −1 can only occur if a1 = b2 = 0.5 [32, 33]. To
address this issue, there have been a number of proposed
normalisations to ensure the φ = 1 is obtainable [34].
One such normalisation is the φ/φmax proposed by Cure-
ton [35],
φ
φmax
=
e11 − a1b1
β − a1b1
,
(C6)
where β is the maximum possible value that e11 can take,
i.e., min(a1b1). Note for undirected networks
(cid:112)
(cid:113)
a1b1a2b2 =
a2
1a2
2
= a1a2
= a1(1 − a1)
= a1 − a2
1 ,
which equals φmax wnen a1 ≤ a2.
(C7)
(C8)
(C9)
(C10)
Then we can generalise φ/φmax from binary to multi-
category variables by treating each distinct value as a
binary variable and taking their sum. If we set β = 1,
then we obtain (A1) and thus we recover Newman's as-
sortativity [13]. We also note that (A1) also corresponds
to Cohen's κ that is frequently used to assess inter-rater
agreement [36].
means that rmin ≤ r ≤ 1 and
the assortativity coefficient
The normalisation of
(cid:80)
1 −(cid:80)
g agbg
rmin = −
g agbg
which lies in the range −1 ≤ rmin < 0.
,
(C11)
Appendix D: Assortativity as autocorrelation of a
time-series
Assume a scalar attribute xi on each node i of an undi-
rected network. As mentioned in the main text, the prob-
ability of being at node i is stationary and proportional
to the degree, πi = ki/2m. Given that a random walker
is currently at node i, it moves to node j with probability
Aij/ki.
We define a random time-series, using the simple ran-
dom walker, as the sequence of attributes of the nodes
visited in the random walk, i.e., the value of the time se-
ries at time t is the attribute value x of the node visited at
time t in the random walk. Asymptotically, the average
i πixi =
value observed by the random walker is ¯x =(cid:80)
(cid:80) kixi/2m and the variance is σ2 =(cid:80)
i − ¯x2.
i πix2
Likewise, the autocovariance between the attribute ob-
served at two consecutive steps (time lag of 1) is Rx =
2.01.51.00.50.00.51.01.50.00.51.01.52.0degree1.00.50.00.51.01.52.00.00.20.40.60.81.01.21.41.61.8meanMass1.00.50.00.51.01.50.00.51.01.52.02.5Mobilityglobalobserved(cid:80)
the autocorrelation Rx =(cid:80)
ij πi
Aij
ki
with rglobal as defined in (B3).
xixj − ¯x2. Replacing x by x = x−¯x
σ , we obtain
xi xj, which coincides
ij πi
Aij
ki
each type g of the autocovariance, Q = (cid:80)
When faced with categorical data, we proceed as in SI
C. We consider for each type g of nodes the scalar at-
tribute xg valued at 1 for nodes with type g and zero
elsewhere. The modularity Q is therefore the sum for
g Rg. As in
SI C, this can be normalised in various ways, one of
which is Newman's global assortativity as used in this
article, which therefore represents a sort of categorical
autocorrelation of the time-series process of the categor-
ical attributes observed by the stationary simple random
walker.
Appendix E: Disconnected networks
By using the personalised PageRank as a neighbour-
hood function it means that only nodes within the same
connected component contribute to rmulti. Consequently
rmulti for each node is insensitive to whether or not mul-
tiple connected components are included.
Appendix F: Missing values
It is common when dealing with real datasets that
some values may be missing. This is the case for the
Facebook100 data, where a number of node attributes are
missing. When considering the global assortativity previ-
ous work has simply ignored contributions from missing
data values [3]. That is, only edges that connect nodes
for which both the attribute values are known are consid-
ered when calculating egh. This treatment works fine for
the global assortativity because each edge counts equally.
However, simply omitting missing values when calculat-
ing the local assortativity can cause a bias in the distribu-
tion. For example, consider the case when node (cid:96) and its
immediate neighbours have missing values, but beyond
those the attribute values are known. For small values
of α the weight wα(i; (cid:96)) is largest for nodes with miss-
ing attribute values. Simply ignoring their edges would
mean reassigning more weight to edges further away from
gh egh((cid:96)) = 1, a nec-
essary step in calculating the assortativity. Then when
we examine the distribution of r((cid:96)) across all nodes in the
network, the resulting distribution will be biased repre-
sentation. To deal with this issue we calculate each of the
local assortativities as normal, but assign each a weight
gh egh((cid:96)), i.e., the sum of local edge counts before
normalisation. The weight z(cid:96) describes our confidence in
the local assortativity estimate from z(cid:96) = 0, indicating no
confidence, to z(cid:96) = 1 when all node attributes within the
neighbourhood are known. We adjust for these weights
when plotting the histograms in the main text.
(cid:96) when normalising to ensure that(cid:80)
z(cid:96) =(cid:80)
Appendix G: Calculating the personalised PageRank
vector
10
The personalised PageRank vector is the stationary
distribution of a random walk with restarts. We calculate
it by direct simulation of the random walk process using
the power method:
wα(i; (cid:96))s+1 = α
wα(j; (cid:96))s + (1 − α)δi,(cid:96) ,
(G1)
Aij
ki
(cid:88)
j
and at convergence yields a distribution w(i; (cid:96)) with a
mode at (cid:96).
Appendix H: Integrating over α
To integrate over all values of α, we take advantage of
the fact that we can equivalently write the η-th approx-
imation the power method in (G1) as the η-th degree
truncation of the power series [37]:
(cid:34)(cid:18) Ai(cid:96)
ki
(cid:19)s −
(cid:18) Ai(cid:96)
ki
(cid:19)(s−1)(cid:35)
.
η(cid:88)
s=1
wα(i; (cid:96))η = δi,(cid:96) +
αs
(H1)
By taking advantage of the relationship between α and
the sequence of approximations computed by the power
method, we can calculate the distribution wα(i; (cid:96)) for a
given α = α0 and use the sequence of approximations to
calculate the distribution for any other α [37]:
wα(i; (cid:96))η = δi,(cid:96) +
(w(i; (cid:96), α0)s − w(i; (cid:96), α0)s−1) .
αs
αs
0
(H2)
We can then integrate over all possible values of α [23],
η(cid:88)
(cid:90) 1
s=1
wmulti(i; (cid:96))η =
wα(i; (cid:96))η dα
η(cid:88)
0
= δi,(cid:96) +
(wα0 (i; (cid:96))s − wα0 (i; (cid:96))s−1)
s=1
(s + 1)αs
0
(H3)
.
(H4)
Appendix I: Null model network generation
We created a null model to generate networks with
the same global assortativity as the observed network to
compare the distributions of rmulti. For a fair compari-
son, we decided to keep the node degree and metadata
label fixed while randomly rewiring the network. We do
so using a modified version of the Markov chain Monte
Carlo (MCMC) sampling of the configuration model for
stub-labelled3 simple graphs [38]. The modification is to
3 for simple graphs sampling from the space of stub-labelled
graphs is equivalent to sampling from the space of vertex-labelled
graphs [38]
11
Facebook. The dataset contains a total of 93, 969, 074
friendship edges between users of the same college. Each
node has a set of categorical social variables:
status
{undergraduate, graduate student, summer student, fac-
ulty, staff, alumni}, dorm, major, gender {male, female},
and graduation year.
ensure that we sample a graph with (approximately) the
same global assortativity as the observed network. We
achieve this by adding a rejection sampling step based on
the binomial likelihood of observing the number of edges
g egg given
the proportion of edges required to maintain the global
between nodes of the same type min = m(cid:80)
assortativity ωin =(cid:80)
(cid:18) m
g egg,
(cid:19)
(ωin)min (1 − ωin)m−min .
(I1)
L(Gi) = log
min
The modified MCMC algorithm is shown in Algo-
rithm 1
Algorithm 1 stub-labeled MCMC
Require: initial simple graph G0, initial temp t0
Ensure: sequence of graphs Gi
for i < number of graphs to sample do
choose two edges at random
randomly choose one of the two possible swaps
if edge swap would create a self-loop or multiedge then
resample current graph: Gi ← Gi−1
else
if U nif (0, 1) < exp
(cid:16) L(Gi)−L(Gi−1)
(cid:17)
ti
then
swap the chosen edges, producing Gi
else
reject Gi
end if
end if
ti+1 ← update(ti)
end for
Appendix J: Datasets
1. Weddell Sea Food Web
The food web of the Antarctic Weddell Sea [4]
rela-
consists of 488 species and 15885 consumer
tions.
For each of the nodes in this network we
have five categorical attributes: Metabolic Category
{Plant, Ectotherm vertebrate, Endotherm vertebrate, In-
vertebrate}, Feeding Type {Carnivorous/necrovorous,
Herbivorous/detrivorous, Detrivorous, Omnivorous, Pri-
mary producer, Carnivorous}, FeedingMode {Pelagic
predator, Predator/scavenger, Primary producer, Preda-
tor, Deposit-feeder, Grazer, Suspension-feeder}, Mobility
{1, 2, 3, 4}, Environment {Bathydemersal, Land-based,
Resource, Pelagic, Benthopelagic, Benthic, Demersal}.
For scalar attributes we use the mean mass of the species,
mobility (although discrete, the values are ordinal), and
node degree.
2. Facebook 100
The Facebook100 dataset [3] contains an anonymised
snapshot of the friendship connections among 1, 208, 316
users affiliated with the first 100 colleges admitted to
12
FIG. 8. Distributions of the local assortativity by year separated into first years and the rest of the students for each school.
Schools are ordered by increasing proportion of first years that are more assortative than the rest of the students. First year
students are more assortative than the rest for all schools except for one.
FIG. 9. Distributions of the local assortativity by residence (dorm) separated into first years and the rest of the students for
each school. Schools are ordered by increasing proportion of first years that are more assortative than the rest of the students.
In general, first year students are more assortative than the rest, however there are some schools in which the difference between
first year and the rest is negligible. In a few schools we observe that the first year students are less assortative than the rest.
13
TABLE II. List of schools ordered by global assortativity
Johns Hopkins 55
# School
1 Amherst 41
2 Princeton 12
3 Trinity 100
4 Stanford 3
5 Swarthmore 42
6
7 Hamilton 46
8 Bowdoin 47
9 Harvard 1
10 Brown 11
11 Dartmouth 6
12 Wellesley 22
13 Haverford 76
14 Wesleyan 43
15 UConn 91
16 Tufts 18
17 Williams 40
18 Reed 98
19 Columbia 2
20 BC 17
21 Duke 14
22 Virginia 63
23 Oberlin 44
24 Villanova 62
25 Howard 90
26 WashU 32
27 Georgetown 15
28 Colgate 88
29 UF 21
30 BU 10
31 Carnegie 49
32 GWU 54
33 Bingham 82
34 NYU 9
35 UNC 28
36 Simmons 81
37 USF 51
38
JMU 79
39 UCF 52
40 Santa 74
41 Northeastern 19
42 Maine 59
43 Middlebury 45
44 Brandeis 99
45 Bucknell 39
46 MSU 24
47 Pepperdine 86
48 Vermont 70
49 Maryland 58
50 Vanderbilt 48
rglob
0.081
0.087
0.106
0.109
0.109
0.110
0.113
0.118
0.120
0.120
0.126
0.127
0.128
0.128
0.129
0.130
0.133
0.134
0.136
0.136
0.144
0.149
0.151
0.158
0.159
0.162
0.162
0.164
0.165
0.167
0.171
0.171
0.176
0.182
0.185
0.186
0.187
0.187
0.187
0.188
0.190
0.190
0.190
0.193
0.194
0.195
0.198
0.199
0.199
0.201
# School
51 William 77
52 Emory 27
53 UCLA 26
54 Tennessee 95
55 Wake 73
56 MIT 8
57 UMass 92
58 Berkeley 13
59 USC 35
60 Temple 83
61 UVA 16
62 Penn 94
63 Northwestern 25
64 Rutgers 89
65 UPenn 7
66 Michigan 23
67 FSU 53
68 Cornell 5
69 UC 64
70 American 75
71 Notre Dame 57
72 Rochester 38
73 Vassar 85
74 Lehigh 96
75 Texas 80
76 USFCA 72
77 UC 61
78 Syracuse 56
79 Yale 4
80 UCSB 37
81 Cal 65
82 Texas 84
83 UChicago 30
84 Smith 60
85 Mississippi 66
86 Baylor 93
87 UIllinios 20
88 MU 78
89 Tulane 29
90 Mich 67
91 UGA 50
92 Wisconsin 87
93 UCSD 34
94
95 UC 33
96 Auburn 71
97 Oklahoma 97
98 Caltech 36
99 UCSC 68
Indiana 69
100 Rice 31
rglob
0.203
0.205
0.208
0.209
0.212
0.219
0.222
0.222
0.224
0.228
0.230
0.231
0.234
0.235
0.235
0.236
0.238
0.238
0.251
0.253
0.255
0.256
0.256
0.258
0.261
0.263
0.265
0.270
0.273
0.277
0.279
0.291
0.291
0.292
0.297
0.297
0.297
0.306
0.313
0.322
0.336
0.338
0.355
0.356
0.361
0.370
0.397
0.426
0.480
0.504
|
1908.01456 | 1 | 1908 | 2019-08-05T03:45:17 | A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management | [
"cs.SI",
"cs.LG",
"stat.ML"
] | It is a challenging and complex task to acquire information from different regions of a disaster-affected area in a timely fashion. The extensive spread and reach of social media and networks allow people to share information in real-time. However, the processing of social media data and gathering of valuable information require a series of operations such as (1) processing each specific tweet for a text classification, (2) possible location determination of people needing help based on tweets, and (3) priority calculations of rescue tasks based on the classification of tweets. These are three primary challenges in developing an effective rescue scheduling operation using social media data. In this paper, first, we propose a deep learning model combining attention based Bi-directional Long Short-Term Memory (BLSTM) and Convolutional Neural Network (CNN) to classify the tweets under different categories. We use pre-trained crisis word vectors and global vectors for word representation (GLoVe) for capturing semantic meaning from tweets. Next, we perform feature engineering to create an auxiliary feature map which dramatically increases the model accuracy. In our experiments using real data sets from Hurricanes Harvey and Irma, it is observed that our proposed approach performs better compared to other classification methods based on Precision, Recall, F1-score, and Accuracy, and is highly effective to determine the correct priority of a tweet. Furthermore, to evaluate the effectiveness and robustness of the proposed classification model a merged dataset comprises of 4 different datasets from CrisisNLP and another 15 different disasters data from CrisisLex are used. Finally, we develop an adaptive multitask hybrid scheduling algorithm considering resource constraints to perform an effective rescue scheduling operation considering different rescue priorities. | cs.SI | cs | A Deep Learning Approach for Tweet Classification and Rescue
Scheduling for Effective Disaster Management (Industrial)
Md. Yasin Kabir
Department of Computer Science
[email protected]
Sanjay Madria
Department of Computer Science
[email protected]
Missouri University of Science and Technology, USA
Missouri University of Science and Technology, USA
9
1
0
2
g
u
A
5
]
I
S
.
s
c
[
1
v
6
5
4
1
0
.
8
0
9
1
:
v
i
X
r
a
ABSTRACT
Every activity in disaster management such as managing evacu-
ation plan, and running rescue missions demands accurate and
up-to-date information to allow a quick, easy, and cost-effective
response to reduce the possible loss of lives and properties. It is a
challenging and complex task to acquire information from different
regions of a disaster-affected area in a timely fashion. The exten-
sive spread and reach of social media and networks allow people to
share information in real-time. However, the processing of social
media data and gathering of valuable information require a series of
operations such as (1) processing each specific tweet for a text classi-
fication, (2) possible location determination of people needing help
based on tweets, and (3) priority calculations of rescue tasks based
on the classification of tweets. These are three primary challenges
in developing an effective rescue scheduling operation using social
media data. In this paper, first, we propose a deep learning model
combining attention based Bi-directional Long Short-Term Mem-
ory (BLSTM) and Convolutional Neural Network (CNN) to classify
the tweets under different categories. We use pre-trained crisis
word vectors and global vectors for word representation (GLoVe)
for capturing semantic meaning from tweets. Next, we perform
feature engineering to create an auxiliary feature map which dra-
matically increases the model accuracy. In our experiments using
real data sets from Hurricanes Harvey and Irma, it is observed that
our proposed approach performs better compared to other classifi-
cation methods based on Precision, Recall, F1-score, and Accuracy,
and is highly effective to determine the correct priority of a tweet.
Furthermore, to evaluate the effectiveness and robustness of the
proposed classification model a merged dataset comprises of 4 dif-
ferent datasets from CrisisNLP and another 15 different disasters
data from CrisisLex are used. Finally, we develop an adaptive multi-
task hybrid scheduling algorithm considering resource constraints
to perform an effective rescue scheduling operation considering
different rescue priorities.
KEYWORDS
Social Media, Deep Learning, Disaster management, Rescue Sched-
uling
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full citation
on the first page. Copyrights for components of this work owned by others than ACM
must be honored. Abstracting with credit is permitted. To copy otherwise, or republish,
to post on servers or to redistribute to lists, requires prior specific permission and/or a
fee. Request permissions from [email protected].
SIGSPATIAL , November 2019, Chicago, Illinois, USA
© 2019 Association for Computing Machinery.
ACM ISBN 978-x-xxxx-xxxx-x/YY/MM...$15.00
https://doi.org/10.1145/nnnnnnn.nnnnnnn
1 INTRODUCTION
The exponential growth in social media such as Twitter and Face-
book experiencing their mass adaptation in several applications.
The roles of social media extended but not limited to health and
disease analysis and propagation detection [30], Quantifying con-
troversial information [13], and disaster crisis management [6, 39].
Natural disasters frequently disrupt regular communication due
to the damaged infrastructures [34] which lead to an outflow of
information. A report on Hurricane Sandy [9] shows that people
were using social media more frequently to communicate. People
were seeking help quickly and promptly as they strive to contact
friends and family in and out of the disaster area, looking for infor-
mation regarding transport, shelter, and food. Hence, the huge flow
of information over social media can be beneficial in managing a
natural disaster more effectively. During Hurricane Sandy, Twitter
proved its usefulness, and at the time of Hurricane Harvey and
Irma, again Twitter played a crucial role in the rescue, donation,
and recovery. However, while the use of social network seems ap-
pealing, still most of the applications are still lacking features and
fall short in their usability [22].
Figure 1: Examples of rescue requesting tweets
Figure 2: A successful rescue during Hurricane Irma
Figure 1 represents two tweets seeking rescue during Hurricane
Harvey. People also tweeted similarly at the time of Hurricane Irma.
Figure 2 shows a tweet after the successful rescue mission during
Hurricane Irma.
SIGSPATIAL , November 2019, Chicago, Illinois, USA
Md. Yasin Kabir and Sanjay Madria
Institutional and Volunteer rescue efforts save a lot of lives during
a crisis. However, those rescue missions are not well-organized
and structured due to uncertainty. Individual volunteers have time
constraints and lack of resources. Moreover, some rescue missions
might need extra precaution, advanced equipment, and medical
facilities. Besides that, due to the variety of help requesting tweets,
some of those tweets might be out of sight. Hence, an automated
system is essential to understand the context of the tweets, classify
the specific tweets for rescue, prioritize those tweets based on
context, and then schedule rescue missions and allocate necessary
resources accordingly. Our primary contributions in this paper are:
• Developing a multi-headed binary classifier to classify the
tweets into six different classes using deep learning where a
single tweet can belong to multiple classes. We use a unique
machine learning pipeline with a set of punctuation-based
auxiliary features which are specifically correlated with the
disaster-related tweets.
• Evaluating and comparing the proposed model with different
• We formally introduce a method for priority determination of
each rescue request which plays a crucial role in maintaining
fairness in the rescue scheduling.
• We propose a resource constraint and burst time adaptive
rescue scheduling algorithm with multi-tasking and priority
balancing to perform improved rescue operations.
machine learning models and diverse datasets.
2 RELATED WORK
2.1 Social Media Analysis for Disaster
Management
Most of the prior research work research works using social media
and networks for disaster management are focused on assessing
the disaster situation, and a little, if any, is focused on their use
in rescue mission and planning. Authors in [39] proposed a res-
cue scheduling algorithm on Hurricane Harvey which connects
the victims with the scattered volunteers. A heuristic multi-agent
reinforcement learning scheduling algorithm, named as ResQ [27],
utilizes reinforcement learning to coordinates the volunteers and
the victims during a disaster. [40] proposed a system that uses
machine learning mechanism to extract the data that is generated
by Twitter messages during a crisis. Authors in [12] presented a
research showing how social media communication was used dur-
ing the catastrophic Haiti earthquake. They adapted the method of
crowd-sourcing for designing coordination protocols and mecha-
nisms in order to create coordination between the organizations
and their relief activities. [35] analyzed the extensive use of Twitter
data in case of mass convergence or disaster situation such as the
Southern California Wildfire. After several devastating incidents, a
few disaster management applications such as Ushahidi [28] have
been developed.
2.2 Tweets Classification
The basic approach for tweet classification is to extract features
from the text. Naive Bayes classifier[32] is one of the popular classi-
fiers which models the document distribution using probability. An-
other widely used entity in classification is Support Vector Machines
(SVM), which draws a linear separator plane among the classes [7].
To perform the classification, K-Nearest Neighbor Classifier [15]
offers proximity-based classifier, and uses distance measurement
among the words.
The idea of the deep neural network for natural language pro-
cessing first used in [20] uses a multitask learning model using the
neural network. [10] proposed a deep neural network consisting of
29 layers for natural language processing. [18] and [26] showed that
combining with external pre-learned word vectors such as GloVe
[31], a neural network can be trained better for the disaster datasets.
Our proposed deep learning model took inspiration form their work.
However, those works did not consider any auxiliary features or at-
tention layer. As a tweet has character length restriction, attention
layer with domain-specific engineered auxiliary features can be
highly influential. In this work, we create a set of auxiliary features
and use an attention based deep neural network to classify the
tweets into 6 different classes where each class represents a binary
output label, and a single tweet can belong to multiple classes.
2.3 Scheduling Algorithms
The scheduling algorithms intend to optimize the time and the use
of resources among different parties employing certain constraints.
The primary purpose of a scheduling algorithm is to ensure fairness
among the participants while maximizing resource utilization. First-
Come-First-Served (FCFS) algorithm can not provide fairness when
someone cannot wait to use the resource or when someone needs a
priority based on a situation. [33] improved the FCFS using parallel
processing technique. [21] worked with fixed-priority scheduling
to consider the complexity of determining whether a set of periodic
real-time tasks can be scheduled on m > 1. [17] proposed fixed-
priority scheduling using a fixed-relative deadline. After a certain
period of time, a task became suspended upon failure and the re-
source became available. [16] presents a scheduling algorithm for
emergency medical rescue conflict monitoring and dispatch sched-
uling based on the hybrid estimation and intent inference. [38]
took a heuristic approach for solving the rescue unit assignment
and scheduling problem under the resource constraints. In [39],
the authors discuss the utilization of the public resources for disas-
ter rescue with the priority based scheduling policy. The authors
present a discussion about the fairness and importance of priority
based on rescue scheduling. However, there is no formulation to
determine the priority scores of rescue scheduling tasks. In this
paper, we formally define a method to determine the priority score
of rescue tasks and propose a multi-task hybrid scheduling policy
using priority, based on certain criteria to develop an effective and
efficient rescue scheduling algorithm.
3 TWEETS CLASSIFICATION AND
INFORMATION RETRIEVAL
Twitter data from two different natural disasters (Hurricane Harvey
and Hurricane Irma) were collected for this work. We collected
these tweets from August 26 to August 31, 2017 and September 10
to September 17, 2017, respectively. We use Twitter Stream API
to collect the tweets along with various meta-information such as
user information, geo-location, tags, entities, etc. A simple work-
flow for Tweets collection and information retrieval is shown in
A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial)
SIGSPATIAL , November 2019, Chicago, Illinois, USA
Figure 3. The pre-processing step involves discarding non-English
tweets, filtering noises and duplicates, removing special characters,
stop-words, and jargons.
Figure 3: Simple workflow of data collection and informa-
tion extraction
A tweet classifier is developed using the neural network to iden-
tify whether a tweet falls into one or more classes from six different
classes (Rescue needed, DECW, Water needed, Injured, Sick, Flood).
DECW stands for Disabled, Elderly, Children and Women. Accord-
ing to the FEMA [1, 3], WHO [5], and NCDP [4], the "vulnerable
populations" or "at-risk individuals" includes children, senior cit-
izens, pregnant women, disabled, sick or injured persons. Hence,
we labeled and categorized the tweets accordingly. The label "Res-
cue needed" is the base label which identifies if a tweet is seeking
rescue or assistant to evacuate. We use the label "Water Needed" as
a request for drinkable water identified as a vital resource during
any disaster or emergency by the CDC [2]. Finally, we also used
the label "Flood" because flood is common during hurricanes and
should be considered appropriately for determining the priority in
rescuing a victim and preparing the rescue mission with appropriate
resources.
Those six classes help in determining the rescue situation, and
their priorities along with the resources needed or requested in a
tweet. To classify a tweet, the tweet text along with a processed set
of auxiliary features fed into the classification algorithm.
3.1 Deep Neural Network
The proposed deep learning model comprises 7 primary compo-
nents: the Input layer, Embedding layer, BLSTM layer, Attention
layer, Auxiliary features input, Convolution layer, and Output. Fig-
ure 4 depicts the fundamental system architecture of the model.
Input layer: Pre-processed tweets fed to the input layer which
is connected with the embedding layer.
Embedding layer: This layer encodes the input into real-valued
vectors using lookup tables. Pre-trained word embedding is proven
beneficial to understand the semantic meaning of the words and
improve the classification models. In this work, we used a pretrained
word vectors named Crisis [18] and GloVe [31] which generates a
feature word vectors using co-occurrences based statistical model.
Embedding applied to the words aids to map all tokenized words
in every tweet to their respective word vector tables. To unify the
feature vector matrix, appropriate padding is added.
BLSTM layer: The Long-Short Term Memory (LSTM) is a spe-
cialized version of Recurrent Neural Network (RNN) that is capable
of learning long term dependencies. While LSTM can only see and
learn from past input data, Bidirectional LSTM (BLSTM) runs input
in both forward and backward direction. This bidirectional feature
of BLSTM is critical for the various applications involved with un-
derstanding complex language [36] as it can capture both future
Figure 4: System architecture of the proposed model
and past context of the input sequence.
(cid:17)
(cid:16)
it = σ (Wxi xt + Whiht−1 + Wcict−1 + bi)
Wxf xt + Whf ht−1 + Wcf ct−1 + bf
ft = σ
ot = σ (Wxoxt + Whoht−1 + Wcoct + bo)
ct = ft ct−1 + it tanh(Wxc xt + Whcht−1 + bc)
ht = ot tanh(ct)
(1)
(2)
(3)
(4)
(5)
The input gate it , forget gate ft , output gate ot , and cell state
activation ct of the implemented LSTM version in this work can
be defined by the equations (1)-(5) where σ represents the logistic
sigmoid function, h represents the respective hidden vectors, and
W is the weight matrix. A detailed explanation of each equation
and more about LSTM are available on [14].
Attention layer: Every word in a sentence does not contribute
equally to represent the semantic meaning and the primary concept
of attention [24] originated from this observation. We use a word-
level deterministic, differentiable attention mechanism to identify
the words with the closer semantic relationship in a tweet. Equation
6 represents the attention score ei, e of each word t in a sentence i,
where д is an activation function. More information on the attention
mechanism is available on [19].
ei, j = д (W ht c)
(6)
Auxiliary features input: A tweet can only contain 280 char-
acters (previously 140) which forces a user to express emotions
and opinions in a different way compared to a traditional English
sentence. People use extra punctuations and emoticons to intensify
Predicted OutputAuxiliary Features InputConvolution layerCNNCNNCNNSigmoidDense LayerText EmbeddingLSTMLSTMLSTMLSTMLSTMLSTMLSTMLSTMAttention layerInput LayerGloVeCrisisSIGSPATIAL , November 2019, Chicago, Illinois, USA
Md. Yasin Kabir and Sanjay Madria
the meaning of a tweet. We also observed (e.g. Figure 1) greater
use of numeric characters in a rescue seeking tweet due to the fact
that people try to share location in the tweets, which most of the
time essentially contains digits. In this work, we perform feature
engineering to obtain a set of specific auxiliary features that can
assist the classification model to learn better. A list of extracted
auxiliary features that shows noticeable influence during the model
evaluation is given in Table 1. The well-known Natural Language
Toolkit (NLTK) [23] is used to extract those features.
Table 1: Auxiliary Features
polarity, subjectivity, sentiment, wordsVsLength, exclamation-
Marks, questionMarks, digitVsLength, digitVsWord, punctua-
tionVsLength, punctuationVsWords, nounsVsWwords, sadVs-
Words, angryVsWords, capitalsWords, capitalsVsWords, unique-
Words, repeatedWords, numberOfHashtags.
(cid:17)
ci = σ
Convolution layer The convolution layer performs a matrix-
vector operation in the sentence-level representation sequence. Let
us assume that H ∈ Rd∗w be the weight matrix, and the feature
mapping done as c ∈ Rl−w +1. The i-th element of the feature map
can be defined as:
(cid:16)(C [∗, i : i + w] oH) + b
(7)
In sentence-level representation, C[∗, i : i + w] is the i-th to i+w-th
column vector. The word vectors pass through the convolution
layers [37] where all the input information merged together to
produce a features map. The Rectified Linear Unit (ReLU) used as
the activation to deal with the non-linearity in the convolution
layer and generate a rectified feature map. Finally, the dense layers
are activated for generating the outputs.
Output layer The activation function siдmoid is used in the
dense layer as we want to perform multi headed binary classifica-
tion. The model produces binary values for all six target output
classes. Detailed information on model hyperparameters and eval-
uation results is given in section 5.1.
3.2 Location extraction
Due to the privacy policy of Twitter, most of the tweets do not
contain any location information. In those cases, we try to extract
location using user profile meta information and the location in-
formation provided in the tweeted text. Combining the Stanford
Named Entity Recognizer (NER) [11] and Google map API, an ap-
plication is built for extracting location.
4 RESCUE SCHEDULING
4.1 Problem Specification
Let us assume that the number of rescue teams be m with n pending
rescue tasks. Let the processing time of rescue task j by team i be tij,
where 1 ≤ i ≤ m, 1 ≤ j ≤ n. Based on a typical disaster situation,
we consider that the number of rescue tasks is greater than or equal
to the number of rescue teams (n ≥ m). The problem is to organize
and assign the tasks to rescue teams in such a way that the amount
of waiting time for each rescue mission is minimized. However, due
to the inconsistent nature of the rescue tasks and the location of
the incidents, the formulation of this problem faces the following
major challenges.
(1) Every rescue team may not capable of processing each task.
We need to consider specific requirements of each task and
different capabilities of rescue units.
(2) It is difficult to precisely estimate the required time tij for a
task due to the uncertainty of the environment and location
of an incident.
(3) Tasks might have different priorities based on the people
needed to execute them and their physical condition. The
environmental condition of a person such as surrounded by
flood water, or fire should also be taken into account while
determining priority.
Along with the above challenges, we also consider the following
restrictions and conditions to formulate the problem effectively.
• We imposed a time tj for a task j, where tj denotes the
required time for a rescue team i to move from initial rescue
center to the place of incident. The time for moving from the
location of a task j to another task j′ is represented by tj j′.
• Every team requires a preparation time before leaving for a
scheduled rescue job from their respective rescue manage-
ment station. The preparation time is denoted as ti for every
team for a specific task j. Also, after a certain period, every
team might require a resting time of tir before the next task.
Considering the above sequence of times (tij, tj, tj j′, ti, and tir ),
we can estimate a probable time for a rescue mission. Although
the time can be changed based on the situation, we consider some
constant time variable considering the distance of a task location
and the probable situation of the environment around the incident.
4.2 Priority determination
A significant step for the rescue scheduling algorithm is deter-
mining the priority of rescue tasks. We use the output labels of
tweet classifier ( Section 3.1) and assign a weight for each label
to determine the priority of that tweet. Assume that the assigned
weights for different labels of the tweets is represented by a vector
wj = [w1, w2, ...wn]. A feature vector αi = [α1, α2, ...αm] also used
which denotes the weight of other considerable variables such as
the number of victims, real-time environmental conditions and
future weather forecasts of a specific location. The equation 8 rep-
resents the formula to estimate the priority for a rescue task. The
base priority value of a tweet is 1 where the maximum priority
score can be 10.
m
i =1
n
j=1
fp =
αi +
wj
(8)
4.3 Rescue scheduling algorithms
General scheduling algorithms are not applicable in disaster rescue
scenario as those algorithms might be unfair due to different situ-
ations, physical conditions, and the critical importance of human
life. A priority-based scheduling algorithm might provide a better
solution where we need to consider and determine the priority con-
tinuously. In a disaster scenario, priorities can change with time and
environmental conditions. Hence, We develop an effective rescue
scheduling algorithm considering priority, environmental severity,
A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial)
and processing time of every single task. We like to define the terms
which we use to represent our algorithms.
• Tasks: A task is the combination of one or more valid rescue
requests by an individual or multiple people. A list of valid
requests forms a sequence of tasks which demands to be
scheduled appropriately.
• Processors: The number of rescue units which can complete
a given task is the processors. A processor is responsible to
execute a given task, release the resources upon completion,
and get back to the initial state to execute a new task.
• Arrival Time: The time of receiving a valid rescue request
represents the arrival time for a specific task. In our rescue
scheduling system, arrival is the time-stamp of a tweet.
• Burst Time: The probable time required to complete a task
by a processor can be defined as burst time. The burst time
is realistically represents the service time of a processor for
a rescue mission. In a disaster scenario, estimating appropri-
ate burst time is very challenging. Similar tasks might take
different times to complete under separate circumstances.
To address this issue, first, we assume a probable burst time
based on the rescue operations in previous disasters. After
the completion of a few rescue missions, the burst time of
the future mission is determined using the actual comple-
tion time of those missions. To predict the future burst time,
we use the exponential averaging method. Given n tasks
(taskSeq[1...n]) and burst time for tasks ti, the predicted
burst time for the next task taskSeqn + 1 will be:
BTn+1 = αTn + (1 − α)BTn
(9)
In the above equation, α is a constant factor ranging (0 <=
α <= 1). The value that can predict the best possible burst
time will be assigned as α. The variable BTn denotes the pre-
dicted or assumed burst time for the task n, and Tn represents
the actual burst time needed for completing task n.
Three different scheduling algorithms are implemented for the
experiments. All of those algorithms are implemented using multi-
ple processors as it is expected to have more than one rescue unit in
an emergency rescue situation. Although we emphasize on Multi-
task Hybrid Scheduling algorithm, however, we study fundamental
rescue algorithms to understand the limitations of these established
methods. This study also indicates the necessity of a novel adaptive
Hybrid Scheduling algorithm for a disaster scenario.
First-Come-First-Serve (FCFS). In FCFS scheduling system,
4.3.1
the task requests are sequentially processed in the order of the
arrival time. A sequence of tasks list (taskSeq) with the requests
arrival time (arrivalTime) and probable burst time (burstTime) is fed
to the algorithm as input. The algorithm returns the scheduled tasks
sequence with the possible start time. However, estimate burst time
can change and needed to update while the processor is processing
a task. While FCFS is a simplest scheduling algorithm, it has two
major concerns which need some attention.
• In a disaster scenario, every rescue request is not similarly
critical. FCFS fails to consider the tasks which have an ur-
gency of completion.
SIGSPATIAL , November 2019, Chicago, Illinois, USA
• FCFS is a non-preemptive scheduling algorithm which is
responsible for the short jobs to wait longer based on the
sequence order.
4.3.2 Priority Scheduling. In a disaster scenario, conducting rescue
missions based on priority can be crucial. There can be lots of rescue
requests which can wait longer, and might not be as critical as some
other requests. A priority-based scheduling algorithm can be more
appropriate considering those facts. The algorithm executes the
task based on an ordered queue with high to low priority values. A
priority queue based scheduling algorithm is demonstrated in the
Algorithm 1.
taskSeq[1...n],
arrivalTime[at1...atn],
Algorithm 1 Priority scheduling with multi-processors
Input: processorNo,
Output: scheduleSeq[taski ...taskn], startTime[st1...stn],
burstTime[bt1....btn], tasksPriority[1...n];
turnAroundTime, averageWaitingTime, averageTurnAround-
Time;
Initialization: All the processors K are released and ready to
begin a task.
Initialize, scheduleSeq, startTime, and turnAroundTime as list
[]; currentTime = 0, waitingTime = 0, totalTurnAroundTime =
0;
Sort the taskSeq, arrivalTime, burstTime using taskPriority and
assign the tasks in priority queue Pqueue;
1: if (new task request) then
2:
update Pqueue, taskSeq, arrivalTime, burstTime, number of
tasks n;
16:
17:
18:
+
(currentTime-
= waitingTime
end if
startTime.append(currentTime);
waitingTime
arrivalTime[i]);
completionTime = currentTime + burstTime[i];
currentTrunAroundTime = completionTime - arrival-
Time[i];
totalTurnAroundTime = totalTurnAroundTime + current-
TrunAroundTime;
turnAroundTime.append(currentTrunAroundTime);
release K;
else
19:
20:
21:
22:
end if
23:
24: end for
25: calculate averageWaitingTime, averageTurnAroundTime;
return to if
select task i to be processed;
dequeue the root element from Pqueue
scheduleSeq.append(i);
K∗ are the available processors to process task i;
if (K∗ (cid:44) ∅) then
assign current task to K;
if (currentTime<arrivalTime[i]) then
currentTime = arrivalTime[i];
3: end if
4: for i = 1 to n do
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
SIGSPATIAL , November 2019, Chicago, Illinois, USA
Md. Yasin Kabir and Sanjay Madria
4.3.3 Multi-Task Hybrid Scheduling. The incidents at the end of
the priority queue need to wait longer when there is a large scale
disaster because of plenty of rescue requests. Assume there are
some tasks which need to wait longer for rescue due to lower pri-
ority. Suppose some of those tasks are located in an area where the
disaster situation is worsening by time. The severity can increase
fast at those places. A priority balancing scheduling policy might
be helpful in such a scenario. It may need more information and
human input to decide how and when to increase the priority of a
task before it enters into critical condition. To solve this dilemma,
we introduce a priority balancing module which re-calculate the
priority score after the completion of each rescue mission.
Instead of a single rescue task in a mission, a rescue team can
execute multiple tasks depending on available resources. For ex-
ample, in a flood situation, several individuals can be rescued in
the same boat and transferred to a shelter together. We illustrate
this idea along with priority balancing in Algorithm 2. A processor
can be assigned for multiple tasks in a single rescue mission if it
has available resources. We use a 2 miles radius area for this pur-
pose. A processor looks for other available tasks which are within
2 miles radius of the assigned event. It will incorporate multiple
tasks as long as the processor has adequate resources and executes
those tasks sequentially using priorities. Comparative performance
evaluation of the algorithms is present in Section 5.2. In Section
5.3 we describe and demonstrate the Multi-Task Hybrid Scheduling
algorithm using a real-world disaster scenario.
5 EXPERIMENTAL RESULTS
5.1 Tweets Classifier Evaluation
The primary goal of the tweet classification is to identify the peo-
ple who need help and determine a priority score for each tweet
based on the classified labels. To accomplish this goal, 4900 tweets
were manually labeled into six different binary classes from 68,574
preprocessed tweets on Hurricane Harvey and Irma. We evaluate
the proposed classification model on this labeled dataset and com-
pared it with the well-established Logistic Regression (LR), Support
Vector Machine (SVM) and fundamental CNN model. Moreover,
in order to fully understand the effectiveness of our approach, we
evaluate our model on several past disaster datasets obtained from
CrisisNLP [18] and CrisisLex [29]. We use the same datasets and
data settings of Nguyen et al.[26] and compare the output of our
proposed model with the stated results of LR, SVM, and CNN in
the same paper. Further, to evaluate the robustness of our proposed
technique, we merged 15 different disasters data from CrisisLex
[29] and perform a binary classification which identifies the tweets
relevant to a particular disaster.
5.1.1 Model Parameters. A set of optimal parameters is crucial
to achieve desired performance results. We perform rigorous pa-
rameter tuning and select an optimal set that is used in all the
experiments. We use the same parameter for better evaluation and
model reproducibility. Table 2 represents the used parameters for
the model. The popular evaluation metrics such as precision, recall,
F1-score, accuracy , and AUC score is used to validate and compare
the experimental result of the models.
10:
11:
12:
13:
14:
15:
16:
17:
18:
Algorithm 2 Multi-tasks Hybrid Scheduling
Input: processorNo,
taskSeq[1...n],
burstTime[bt1....btn],
tasksPriority[1...n],
tasksloca-
arrivalTime[at1...atn],
tion[1...n], disRadius;
Output: scheduleSeq[taski ...taskn], startTime[st1...stn],
turnAroundTime, averageWaitingTime, averageTurnAround-
Time;
Initialization: All the processors K are released and ready to
begin a task.
Initialize, scheduleSeq, startTime, and turnAroundTime as list
[]; currentTime = 0, waitingTime = 0, totalTurnAroundTime =
0;
Sort the variables in descending order using taskPriority. Re-
sort the values in ascending order using burstTime and arrival-
Time for same taskPriority tasks. Assign the tasks in priority
queue Pqueue;
1: if (new task request) then
2:
update Pqueue, and resort taskSeq, arrivalTime, burstTime,
number of tasks n;
3: end if
4: for i = 1 to n do
5:
6:
7:
8:
9:
select task i to be processed;
dequeue the root element from Pqueue
scheduleSeq.append(i);
K∗ are the available processors to process task i;
if (K∗ (cid:44) ∅ and available K is capable of addressing task i)
then
assign current task to K;
for m = i + 1 to n do
calculate the distance d of taskSeq[m] from current task
using tasksLocation[m];
if (d<disRadius and K has the extra resources to com-
plete taskSeq[m] after current task) then
add taskSeq[m] with the current task queue and cre-
ate a sub-scheduling for those tasks;
dequeue the taskSeq[m] and update Pqueue;
else
end if
end for
estimate startTime, waitingTime, totalTurnAroundTime
following the similar process of algorithm 2.
release K;
return to if
19:
20:
21:
end if
22:
23: end for
24: calculate averageWaitingTime, averageTurnAroundTime;
5.1.2 Evaluation on Hurricane Harvey and Hurricane Irma
data. We use 4900 manually labeled tweets for this evaluation
where 3920 tweets (80%) used for training and the rest of the 20%
tweets used for testing. In the evaluation tables, we denote our
model as CN NAAf , which stands for CNN with Attention and
Auxiliary features. We compare our model (CN NAAf ) with LR,
SVM, and CNN without attention and auxiliary features. Our model
outperformed all other models by more than 5% inaccuracy metrics.
In terms of precision, the proposed model performed surprisingly
well and outperformed the closed result of SVM by around 25%.
A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial)
Table 2: Hyperparameter values
Conv1D Layer
Dense Layer
Hyperparameter Value/Description
Text embedding
BLSTM Layer
Dimension: 300
2 layers; 300 hidden units in each (Forward
and Backward)
3 layers; 300 convolution filters
3 layers; First 2 layers have 150 and 75 units
respectively and the last one is output (Dense)
Word Embedding: 0.3; Dense layer: 0.2 each;
Drop-out rate
Conv1D, BLSTM, Dense: ReLU; Output Dense
Activation func-
layer: Sigmoid;
tion
Adam optimizer
Learning rate = 0.0001; beta1=0.9;
Epochs and batch Epochs = 10 to 25; batch size = 128;
Table 3 represents the full evaluation results for the different
classifiers. Table 4 represents the evaluation metrics for individual
classes (Hurricane Harvey and Irma) using CN NAAf model. The
distributions of the six classes in the data are Help - 29.1%, Flood -
26.3%, Water Needed - 4.9%, DCEW - 4.1%, Injured - 0.3%, Sick - 0.3%.
However, we discarded labels Injured and Sick due to lack of enough
data instances for training and testing so that it cannot influence the
metrics of the model. As there are few true positive instances, those
two labels achieve a higher rate of Accuracy although the model is
not identifying true positive instances. We can also observe a better
precision and accuracy for labels Water Needed and DCEW. This is
happening as there are also a few true positive instances. However,
still, the model has performed well for the recall and F1-score as the
words found in the tweets for those labels have fewer variations.
Table 3: Classifier evaluation (Hurricane Harvery and Irma)
Model
F1-score Accuracy
LR
SVM
CNN
CN NAAf
Precision Recall
93.0
85.4
90.8
93.4
69.7
73.9
73.4
87.2
55.8
65.1
61.6
81.7
84.5
88.5
87.5
93.7
Table 4: Evaluation metrics for individual classes (Hurricane
Harvery and Irma) using CN NAAf model
Class
Help
Flood
Water Needed
DCEW
Weighted Avg
Precision Recall
97.7
94.1
71.4
73.2
93.4
F1-score Accuracy
91.2
85.3
78.7
82.3
87.2
87.9
78.2
87.5
93.7
81.7
94.9
91.3
98.0
98.5
93.7
5.1.3 Evaluation on CrisisNLP and CrisisLex datasets. We
use the same datasets and class distributions consisting of Nepal
Earthquake, California Earthquake, Typhoon Hagupit, and Cyclone
PAM which is described in [18]. In that paper, the authors evaluate
the models on event data, out-of-event data and a combination
of both datasets. In table 5, we represent the results on the com-
bination of both datasets. Clearly, our proposed CN NAAf model
outperformed all other models in term of AUC score which the
SIGSPATIAL , November 2019, Chicago, Illinois, USA
authors also used in the referenced paper. Auxiliary features have
a high impact to better understand the semantic meaning of the
tweets which is reflected on the AUC score.
Table 5: Classifier evaluation AUC scores (CrisisNLP)
LR SVM CN NI CN NAAf
82.6
75.5
75.9
90.6
Disaster Name
Nepal Earthquake
California Earthquake
Typhoon Hagupit
Cyclone PAM
83.6
74.7
77.64
90.74
87.5
83.6
88.3
92.6
84.8
78.3
85.8
92.6
Table 6: Used Datasets from CrisisLex
2012 Colorado wildfires, 2012 Costa Rica earthquake, 2012
Guatemala earthquake, 2012 Italy earthquakes, 2012 Philipinnes
floods, 2012 Typhoon Pablo, 2012 Venezuela refinery, 2013 Al-
berta floods, 2013 Australia bushfire, 2013 Bohol earthquake,
2013 Colorado floods, 2013 Manila floods, 2013 Queensland
floods, 2013 Sardinia floods, and 2013 Typhoon Yolanda.
We consider 15 different natural disaster datasets from CrisisLex
[29] is presented in table 6. After removing null values and prepro-
cessing the merged datasets contains 13738 data instances. We use
around 75% data for training (9268) and validation (1030) and 25%
data for testing (3440). The comparative evaluation result using
sklearn metrics is presented in table 7. It is observable that the
domain-specific auxiliary features along with attention layer is
highly beneficial for understanding and identifying crisis tweets.
Our proposed approach can be used on a diverse set of datasets
with good outcome and this might play a crucial role to develop
quick response application on the disaster domain.
Table 7: Classifier evaluation (CrisisLex)
Model
LR
SVM
CNN
CN NAAf
Precision Recall
71.1
74.7
76.3
93.7
85.8
90.9
93.4
93.6
77.8
82.1
84.2
93.4
85.8
73.2
76.4
93.6
F1-score Accuracy
5.2 Computational experiment on scheduling
algorithms
A computational experiment has been performed on the proposed
algorithm in Section 4. For the purpose of evaluation and compar-
ison, a data-set consisting of hurricane Harvey tweets between
27th August 2017 and 31st August 2017 have been used. To iden-
tify the rescue seeking tweets, the proposed tweet classification
model is used. We processed the identified tweets to extract and
determine the required information for the scheduling algorithm
such as location, possible service time (burst time), and priority
using the described process in Section 3. The priority of each tweet
was determined on a scale of 10 using four classes (Flood, Water
Needed, DCEW, and Sick or Injured), labeled by the classifier fol-
lowing Equation 8. The weights for those classes were assigned
SIGSPATIAL , November 2019, Chicago, Illinois, USA
Md. Yasin Kabir and Sanjay Madria
as 1.5, 1.5, 2 and 2.5, respectively. For the environmental feature
vector, we use a random distribution between 0.5 to 2.5. However,
automatic weight determination still remains an open problem for
the research. Next, the probable service time was estimated for each
of the rescue tasks. We use the normal distribution of average ser-
vice time as 54 minutes which is described in [39]. Finally, after all
the processing, 174 rescue seeking tweets were found from around
72 hours data frame. This sample size is relatively small and dis-
tributed over a longer period which is depicted in Figure 5. Hence,
we performed upsampling using resample and linear interpolation
methods from python pandas library [25] and created a dataset
containing 550 rescue tasks to evaluate the rescue algorithms.
Figure 5: Distribution of rescue seeking tweets per hour
The algorithms were implemented using the multiprocessing
system. We use the number of rescue units (processors) as 10 and
20 to evaluate the performance of the scheduling algorithms. In
Multi-task hybrid scheduling algorithm, the traveling time from one
rescue location to another also considered while combining multiple
tasks. Eventually, this estimation reduces the processing time for
those tasks. Table 8 describes the summary of the three algorithms.
In the table, 10p and 20p represent the number of processors used to
execute those algorithms. The average waiting times are lowest in
case of Multi-task hybrid scheduling algorithm. The average waiting
time (hours) with the number of processed tasks is represented in
Figure 6. The experimental results can be summarized as follows.
Table 8: Average waiting time summary
Algorithms
FCFS
Priority
Multi-tasks Hybrid
Max avg WT Mean avg WT
10p
4.74
5.54
4.47
20p
1.61
1.63
1.31
20p
3.73
3.85
3.02
10p
2.53
2.81
2.24
• FCFS scheduling algorithm performs better comparing to
Priority scheduling algorithm. However, in a disaster sce-
nario, FCFS is not a fair policy to distribute the resources
and rescue mission. Priority scheduling has a longer average
waiting time because the lower priority tasks are waiting
longer in the queue.
Figure 6: Average waiting time using 10 and 20 processors
• Multi-tasks hybrid scheduling beats all other algorithm with
respect to average waiting time. This algorithm is more prac-
tical for effective rescue scheduling and resource allocation
as it consider resource constraints. It allows completing small
tasks together of a nearest distance. Furthermore, it can be
utilized to transfer the required resources (such as water,
medicine) to the different locations while optimizing the
average waiting time. However, the maximum average wait-
ing time for this algorithm can be high for a task with less
priority and larger processing time. It can happen when the
location of a mission is far away with a low priority score.
5.3 Experimental analysis on real-world
disaster scenario
A sample data-set is processed from the tweets during Hurricane
Harvey to demonstrate Multi-task Hybrid Scheduling algorithm.
An area of 20 square miles radius at Port Arthur, Texas has been
selected for performing rescue operations. Figure 7 represents the
geographical locations of the victims and the hyphothetical rescue
operation base in the Port Arthur, Texas during hurricane Harvey.
The ArcGIS javascript API [8] is used to create Figure 7 and 8.
To demonstrate the algorithm, we assume that there is a rescue
operation base at Tyrrell Elementary School, Port Arthur, TX. We
simulate the rescue operations using 2 and 4 rescue units. The
experimental process can be summarized by the following steps:
• First, We have selected the rescue seeking tweets and ex-
tracted the location using the Stanford Named Entity Recog-
nizer (NER) [11] and Google map API.
• Second, we extracted 10 tweets which were arrived first and
located around 20 miles radius of the rescue operation base
after 12pm of 30th August 2017.
• Third, the priority score, probable burst time and distance
metrics have been calculated for each of the 10 rescue tasks.
• Finally, the Multi-task Hybrid Scheduling algorithm created
the rescue schedule. We have simulated the experiment using
2 and 4 rescue units and two different distributions of the
possible burst time. First, we assumed the required burst
time to be 54 minutes for each task based on the paper on
hurricane Harvey rescue by Yang et al. [39]. Further, we use
a random completion time for the first 5 tasks and predict
the burst time of future rescue missions using equation 9.
A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial)
SIGSPATIAL , November 2019, Chicago, Illinois, USA
Table 10: Environmental features example
id
Forecast
Current
Storm Road Damaged Storm Flood
1
2
3
4
5
0
0
0
0
1
1
0
1
1
0
1
1
0
0
0
0
0
1
0
0
Burst
Time
Priority
Score
Distance
from Base
Table 11: Real-world data sample for simulation
taskSeq Arrival
Time
12:13
12:45
12:58
14:07
14:46
15:23
16:10
16:52
17:30
18:05
5.1
5.0
6.9
7.0
3.9
4.5
1.9
7.7
1.8
2.0
1
2
3
4
5
6
7
8
9
10
54
54
54
54
54
75
70
30
35
45
7
2
5
5
1
2
8
7
5
6
The Multi-task Hybrid Scheduling algorithm can be demon-
strated on the data in the table 11 as follows. We use 2 rescue
units to illustrate the algorithm.
(1) The Start time of the rescue operation is 14:00. So, there will
be 3 tasks in the queue at the time of the first iteration. The
algorithm will first sort the tasks based on the priority score.
Hence, the sorted sequence will be 1 >= 3 >= 2.
(2) The location of the highest priority task (taskSeq 1) will be
the point of interest. The algorithm will consider a perimeter
of 2 square miles of that point and check if any other rescue
task is there which can be combined. We can observe that
taskSeq 1,2, and 3 are within 2 miles radius. If a rescue unit
contains enough resource for running those 3 operations se-
quentially, it will combine those tasks and rescue the people
in a single go without coming back and forth to the base.
(3) The algorithm will further create a sub-schedule of 3 tasks
assigned to rescue unit 1. Task 1 has the highest priority
score and hence, the rescue unit will first go to location 1.
From Figure 8, we can observe that tasks 1 and 3 are in a
close distance. However, task 2 has a higher priority. As
the algorithm emphasizes the priority score most, it will
schedule task 2 before task 3. The rescue unit will assist the
people in location 2 and then come back to location 3. Finally,
it will come back to the base after the completion of all 3
tasks.
(4) If there are multiple tasks with the high priority (priority >=
7), separate rescue unit will be assigned despite of there oc-
currence in a close proximity. In our experimental setup if
two tasks with high priority are within 2 miles radius, the
algorithm assigns two separate units for those two tasks.
However, if there is only one rescue unit available, the algo-
rithm will follow the above approach. Multiple tasks with
Figure 7: The geographical positions of the victims (Red
icons) and hypothetical rescue operation base (Home icon).
Tables 9 and 10 represent example data sample of tweet labels
and environmental features for priority calculation using Equation
8. We have used demo weights for the labels and environmental
features as (Flood - 1.5, Water Needed - 1.5, DCEW - 2, Sick or
Injured - 2.5, Storm - 1, Road Damaged - 1, forecasted storm - 0.5,
forecasted flood - 0.5) respectively. We used experimental weights
because determining the weights for those labels and features re-
quires domain expert and extensive study. An appropriate authority
or domain expert will be able to input precise weight values for the
labels and environmental features considering the situation during
an actual disaster. In the tables, id represent the respective tweet
which is later refers to the same numbered taskSeq in Table 11. The
calculated priorities also presented in Table 11 as Priority Score.
Table 9: Classified tweet labels for priority determination
Needed DCEW Sick or
Injured
id Flood Water
1
2
3
4
5
1
1
0
1
0
1
0
1
0
0
0
0
1
0
0
1
0
0
1
0
Table 11 represents some columns of the processed sample data
set of Port Arthur for the rescue scheduling. In the table, the burst-
Time is represented in minutes and distanceFromBase is measured
in miles. To use Multi-task Hybrid Scheduling algorithm on the
data, we need to assume some parameters. We consider the starting
time of rescue mission as 14:00, the speed of the used vehicles or
boats to rescue is 20MPH, and after the completion of each rescue
mission a rescue unit requires 30 minutes as a preparation time
before next task.
SIGSPATIAL , November 2019, Chicago, Illinois, USA
Md. Yasin Kabir and Sanjay Madria
the same priority will be sorted based on burst time and
arrival time, respectively. Multiple tasks with same priority
and burst time will be sorted using arrival time.
(5) Based on the conditions, taskSeq 1, 2 and 3 will be assigned to
rescue unit 1. Rescue Unit 2 will take care of taskSeq 4 which
arrives at 14:07. The algorithm will wait until the completion
of a task, after which a rescue unit became available.
(6) The taskSeq 4 will complete first and rescue unit 2 will be-
come available around 16:13. The algorithm will iterate again
and sort the remaining tasks. At this point, the queue con-
tains 3 tasks (taskSeq 5,6 and 7).
(7) Employing the conditions, the sorted order for the tasks will
be 7 >= 6 >= 5. The taskSeq 7 has a high priority and there
are no other victims nearby. Hence, rescue unit 2 will be
assigned to complete task 7.
(8) Rescue unit 1 will be available again at 17:55. The algorithm
will continue iterating until all of the 10 tasks are completed.
Route
Distance
Route
Duration
Table 12: Rescue scheduling output table of Multi-tasks Hy-
brid Scheduling algorithm using 2 rescue units
taskSeq Start
Time
14:00
15:09
16:09
14:07
16:13
17:55
18:05
19:32
19:41
20:49
TAround
Time Unit
1
176
1
191
1
265
75
2
2
79
1
116
2
51
2
163
347
1
2
429
Waiting
Time
122
137
211
21
09
86
06
128
272
375
5.1
2.0
2.2
7.0
1.9
7.7
2.0
1.8
4.5
3.9
1
3
2
4
7
8
10
9
6
5
15
06
07
21
06
23
06
06
14
12
Table 12 represents some output values and rescue schedule for
the data illustrated in Table 11. The column StartTime represents
the scheduled time for the respective task. RouteDistance denotes
the actual one-way path that a rescue unit needs to travel for a par-
ticular rescue mission. When multiple tasks are group together for
a single mission the RouteDistance became the path between previ-
ous task and current task. For example, in Table 11, the distance of
rescue location of taskSeq 3 from base is 6.9 miles. However, as tasks
1,2 and 3 grouped together the distance between the previous task
1 and task 3 became 2 miles. RouteDuration is the rounded time
in minutes to travel the specific RouteDistance. In our experiment,
we assume that a rescue unit needs 3 minutes to travel a mile.
W aitinдTime is the subtraction of StartTime and ArrivalTime
with the addition of required travel time (RouteDuration) for a res-
cue location. The turnaround time is represented by T AroundTime
in the table which is the summation ofW aitinдTime and BurstTime.
The rightmost column in the table represents the assigned rescue
unit for a task. After returning from a rescue mission to the base, a
rescue unit requires a preparation time to become available for the
next mission. In the experiment above, the rescue unit 1 reached at
the base at 17:25 after completing the first rescue mission of task 1,2
and 3. However, it became available at 17:55 after taking necessary
preparations.
Figure 8: Route of Rescue Unit 1 by rescue order
The routes of the rescue missions assigned to rescue unit 1 pre-
sented in table 12 are illustrated in Figure 8. The red pentagon
shadow area denotes the rescue operation base. The black shad-
owed rectangular shapes represent the rescue mission. Location
points 1, 2, 3, 5 and 7 denote the taskSeq 1,3, 2, 8 and 6, respectively.
Pointers 1,2, and 3 are inscribed in the same box as those tasks
were combined together and performed in a single mission. The
rescue unit 1 will start from the base (0) and travel to point 1, 2
and 3 to rescue victims and complete the tasks 1,3 and 2 in the first
rescue mission. It will return back to base which is denoted by blue
pointer (4) below the red pointer indicating 8. The unit will again
travel to location 5, return to the base (6) and complete the taskSeq
8. Finally, the location of the third rescue mission pointed by 7 and
the missions will be completed by rescue unit 1 after reaching to
the base (point 8).
We have also conducted the same experiment with 4 rescue units.
The average waiting time and turnaround time reduced dramatically
in this scenario. In the first experiment with 2 rescue units, the
average waiting time and turnaround time is around 137 minutes
and 189 minutes respectively. With 4 rescue units, waiting time and
turnaround time came down to 49 minutes and 102 minutes. With
the low number of rescue units, the tasks with low priority need to
wait longer which increase the average waiting time. From table 11
and table 12, we can observe that taskSeq 5 arrived at 14:46 with a
priority score of 1. Due to the very low priority, task 5 scheduled
last at time 20:49 with a waiting time of 375 minutes. However,
tasks with higher priority such as 1, 7 and 8 had to wait a fairly
lower amount of time.
6 CONCLUSION AND FUTURE WORK
In this paper, we utilized social media (Twitter) for disaster manage-
ment applications such as categorizing, identifying, and prioritizing
users who need help and developed an algorithm for rescue sched-
uling. We introduced a novel approach for an effective rescue sched-
uling algorithm. First, we developed a tweet classifier using deep
learning with attention layer and auxiliary features. The classifier
labels every tweet into six different classes. Those labels allow us to
identify the necessary information to assist the person/people in the
A Deep Learning Approach for Tweet Classification and Rescue Scheduling for Effective Disaster Management (Industrial)
SIGSPATIAL , November 2019, Chicago, Illinois, USA
European Chapter of the Association for Computational Linguistics: Volume 1, Long
Papers, Vol. 1.
[21] Joseph Y-T Leung and Jennifer Whitehead. 1982. On the complexity of fixed-
priority scheduling of periodic, real-time tasks. Performance evaluation 2, 4 (1982),
237 -- 250.
[22] Bruce R Lindsay. 2011. Social media and disasters: Current uses, future options,
[23] Edward Loper and Steven Bird. 2002. NLTK: the natural language toolkit. arXiv
and policy considerations. (2011).
preprint cs/0205028 (2002).
[24] Minh-Thang Luong, Hieu Pham, and Christopher D Manning. 2015. Effec-
tive approaches to attention-based neural machine translation. arXiv preprint
arXiv:1508.04025 (2015).
[25] W McKinney. 2014. Pandas, python data analysis library. 2015. Reference Source
(2014).
[26] Dat Tien Nguyen, Kamela Ali Al Mannai, Shafiq Joty, Hassan Sajjad, Muham-
mad Imran, and Prasenjit Mitra. 2016. Rapid classification of crisis-related
data on social networks using convolutional neural networks. arXiv preprint
arXiv:1608.03902 (2016).
[27] Long Nguyen, Zhou Yang, Jiazhen Zhu, Jia Li, and Fang Jin. 2018. Coordinating
Disaster Emergency Response with Heuristic Reinforcement Learning. arXiv
preprint arXiv:1811.05010 (2018).
[28] Ory Okolloh. 2009. Ushahidi, or "testimony": Web 2.0 tools for crowdsourcing
crisis information. Participatory learning and action 59, 1 (2009), 65 -- 70.
[29] Alexandra Olteanu, Sarah Vieweg, and Carlos Castillo. 2015. What to expect
when the unexpected happens: Social media communications across crises. In
Proceedings of the 18th ACM conference on computer supported cooperative work &
social computing. ACM, 994 -- 1009.
[30] Mina Park, Yao Sun, and Margaret L McLaughlin. 2017. Social media propagation
of content promoting risky health behavior. Cyberpsychology, Behavior, and Social
Networking 20, 5 (2017), 278 -- 285.
[31] Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove:
Global vectors for word representation. In Proceedings of the 2014 conference on
empirical methods in natural language processing (EMNLP). 1532 -- 1543.
[32] Irina Rish et al. 2001. An empirical study of the naive Bayes classifier. In IJCAI
2001 workshop on empirical methods in artificial intelligence, Vol. 3. IBM New
York, 41 -- 46.
[33] Uwe Schwiegeishohn and Ramin Yahyapour. 1998. Improving first-come-first-
serve job scheduling by gang scheduling. In Workshop on Job Scheduling Strategies
for Parallel Processing. Springer, 180 -- 198.
[34] Irina Shklovski, Moira Burke, Sara Kiesler, and Robert Kraut. 2010. Technology
adoption and use in the aftermath of Hurricane Katrina in New Orleans. american
Behavioral scientist 53, 8 (2010), 1228 -- 1246.
[35] Kate Starbird and Leysia Palen. 2010. Pass it on?: Retweeting in mass emergency.
International Community on Information Systems for Crisis Response and âĂę.
[36] Shuohang Wang and Jing Jiang. 2015. Learning natural language inference with
LSTM. arXiv preprint arXiv:1512.08849 (2015).
[37] Xingyou Wang, Weijie Jiang, and Zhiyong Luo. 2016. Combination of convo-
lutional and recurrent neural network for sentiment analysis of short texts. In
Proceedings of COLING 2016, the 26th International Conference on Computational
Linguistics: Technical Papers. 2428 -- 2437.
[38] Felix Wex, Guido Schryen, Stefan Feuerriegel, and Dirk Neumann. 2014. Emer-
gency response in natural disaster management: Allocation and scheduling of
rescue units. European Journal of Operational Research 235, 3 (2014), 697 -- 708.
[39] Zhou Yang, Long Hoang Nguyen, Joshua Stuve, Guofeng Cao, and Fang Jin.
2017. Harvey flooding rescue in social media. In Big Data (Big Data), 2017 IEEE
International Conference on. IEEE, 2177 -- 2185.
[40] Jie Yin, Sarvnaz Karimi, Andrew Lampert, Mark Cameron, Bella Robinson, and
Robert Power. 2015. Using social media to enhance emergency situation aware-
ness. In Twenty-Fourth International Joint Conference on Artificial Intelligence.
tweet and estimate a priority score for that task. Second, we devel-
oped a multi-task hybrid scheduling algorithm and conducted the
experiments using real disasters data for evaluating the efficiency
of the algorithm. In the future, we would like to work on precise
location determination and optimal estimation of the required time
for a rescue mission. In addition, we are developing a fully-featured
web application for deploying on the real-time disaster to evaluate
the effectiveness of our work in disaster management.
ACKNOWLEDGMENTS
This research has been partially supported by a grant from NSF
CNS-1461914.
REFERENCES
[1] [n. d.].
Fact Sheet: Not all Disaster Preparedness Plans Are the
([n. d.]).
https://www.fema.gov/news-release/2019/05/17/
Same.
fact-sheet-not-all-disaster-preparedness-plans-are-same
[2] [n. d.]. Food and Water: Preparing for a Disaster Natural Disasters and Severe
Weather CDC. ([n. d.]). https://www.cdc.gov/disasters/foodwater/prepare.html
[3] [n. d.]. IS-0368 - Including People With Disabilities and Others With Access
and Functional Needs in Disaster Operations. ([n. d.]). https://emilms.fema.gov/
IS0368/DIS01summary.htm
[4] [n. d.]. Vulnerable Populations - National Center for Disaster Preparedness. ([n.
d.]). https://ncdp.columbia.edu/research/vulnerable-populations/
[5] 2012. Vulnerable groups.
(Aug 2012). https://www.who.int/environmental_
health_emergencies/vulnerable_groups/en/
[6] David E Alexander. 2014. Social media in disaster risk reduction and crisis
management. Science and engineering ethics 20, 3 (2014), 717 -- 733.
[7] Mehdi Allahyari, Seyedamin Pouriyeh, Mehdi Assefi, Saied Safaei, Elizabeth D
Trippe, Juan B Gutierrez, and Krys Kochut. 2017. A brief survey of text
mining: Classification, clustering and extraction techniques. arXiv preprint
arXiv:1707.02919 (2017).
[8] ArcGIS. 2019. ArcGIS for Developers. (mar 2019). Retrieved March 7, 2019 from
https://developers.arcgis.com/javascript/
[9] Drake Baer. 2012. As Sandy became# Sandy, emergency services got social. Fast
Company 9 (2012).
[10] Alexis Conneau, Holger Schwenk, Loïc Barrault, and Yann Lecun. 2016. Very deep
convolutional networks for text classification. arXiv preprint arXiv:1606.01781
(2016).
[11] Jenny Rose Finkel, Trond Grenager, and Christopher Manning. 2005. Incorporat-
ing non-local information into information extraction systems by gibbs sampling.
In Proceedings of the 43rd annual meeting on association for computational linguis-
tics. Association for Computational Linguistics, 363 -- 370.
[12] Huiji Gao, Geoffrey Barbier, Rebecca Goolsby, and Daniel Zeng. 2011. Harnessing
the crowdsourcing power of social media for disaster relief. Technical Report.
Arizona State Univ Tempe.
[13] Kiran Garimella, Gianmarco De Francisci Morales, Aristides Gionis, and Michael
Mathioudakis. 2018. Quantifying controversy on social media. ACM Transactions
on Social Computing 1, 1 (2018), 3.
[14] Alex Graves, Abdel-rahman Mohamed, and Geoffrey Hinton. 2013. Speech
recognition with deep recurrent neural networks. In 2013 IEEE international
conference on acoustics, speech and signal processing. IEEE, 6645 -- 6649.
[15] Eui-Hong Sam Han, George Karypis, and Vipin Kumar. 2001. Text categorization
using weight adjusted k-nearest neighbor classification. In Pacific-asia conference
on knowledge discovery and data mining. Springer, 53 -- 65.
[16] Bin Hu, Fang Pan, and Lei Wang. 2019. A scheduling algorithm for medical
emergency rescue aircraft trajectory based on hybrid estimation and intent
inference. Journal of Combinatorial Optimization 37, 1 (2019), 40 -- 61.
[17] Wen-Hung Huang and Jian-Jia Chen. 2016. Self-suspension real-time tasks under
fixed-relative-deadline fixed-priority scheduling. In Design, Automation & Test in
Europe Conference & Exhibition (DATE), 2016. IEEE, 1078 -- 1083.
[18] Muhammad Imran, Prasenjit Mitra, and Carlos Castillo. 2016. Twitter as a lifeline:
Human-annotated twitter corpora for NLP of crisis-related messages. arXiv
preprint arXiv:1605.05894 (2016).
[19] Akshi Kumar, Saurabh Raj Sangwan, Anshika Arora, Anand Nayyar, Mohamed
Abdel-Basset, et al. 2019. Sarcasm Detection Using Soft Attention-Based Bidirec-
tional Long Short-Term Memory Model With Convolution Network. IEEE Access
7 (2019), 23319 -- 23328.
[20] Mirella Lapata, Phil Blunsom, and Alexander Koller. 2017. Proceedings of the
15th Conference of the European Chapter of the Association for Computational
Linguistics: Volume 1, Long Papers. In Proceedings of the 15th Conference of the
|
1205.3856 | 2 | 1205 | 2012-12-07T22:53:22 | Social Turing Tests: Crowdsourcing Sybil Detection | [
"cs.SI",
"physics.soc-ph"
] | As popular tools for spreading spam and malware, Sybils (or fake accounts) pose a serious threat to online communities such as Online Social Networks (OSNs). Today, sophisticated attackers are creating realistic Sybils that effectively befriend legitimate users, rendering most automated Sybil detection techniques ineffective. In this paper, we explore the feasibility of a crowdsourced Sybil detection system for OSNs. We conduct a large user study on the ability of humans to detect today's Sybil accounts, using a large corpus of ground-truth Sybil accounts from the Facebook and Renren networks. We analyze detection accuracy by both "experts" and "turkers" under a variety of conditions, and find that while turkers vary significantly in their effectiveness, experts consistently produce near-optimal results. We use these results to drive the design of a multi-tier crowdsourcing Sybil detection system. Using our user study data, we show that this system is scalable, and can be highly effective either as a standalone system or as a complementary technique to current tools. | cs.SI | cs |
Social Turing Tests: Crowdsourcing Sybil Detection
Gang Wang, Manish Mohanlal, Christo Wilson, Xiao Wang‡ ,
Miriam Metzger† , Haitao Zheng and Ben Y. Zhao
Department of Computer Science, U. C. Santa Barbara, CA USA
†Department of Communications, U. C. Santa Barbara, CA USA
‡Renren Inc., Beijing, China
Abstract
As popular tools for spreading spam and malware, Sybils
(or fake accounts) pose a serious threat to online communi-
ties such as Online Social Networks (OSNs). Today, sophis-
ticated attackers are creating realistic Sybils that effectively
befriend legitimate users, rendering most automated Sybil
detection techniques ineffective. In this paper, we explore
the feasibility of a crowdsourced Sybil detection system for
OSNs. We conduct a large user study on the ability of hu-
mans to detect today’s Sybil accounts, using a large cor-
pus of ground-truth Sybil accounts from the Facebook and
Renren networks. We analyze detection accuracy by both
“experts” and “turkers” under a variety of conditions, and
find that while turkers vary significantly in their effective
-
ness, experts consistently produce near-optimal results. We
use these results to drive the design of a multi-tier crowd-
sourcing Sybil detection system. Using our user study data,
we show that this system is scalable, and can be highly ef-
fective either as a standalone system or as a complementary
technique to current tools.
1 Introduction
The rapid growth of Sybil accounts is threatening the sta-
bility and security of online communities, particularly on-
line social networks (OSNs). Sybil accounts represent fake
identities that are often controlled by a small number of real
users, and are increasingly used in coordinated campaigns
to spread spam and malware [6, 30]. In fact, measurement
studies have detected hundreds of thousands of Sybil ac-
counts in different OSNs around the world [3, 31]. Recently,
Facebook revealed that up to 83 million of its users may be
fake1 , up significantly from 54 million earlier 2 .
1 http://www.bbc.com/news/technology- 19093078
2 http://www.bbc.com/news/technology- 18813237
The research community has produced a substantial
number of techniques for automated detection of Sybils [4,
32, 33]. However, with the exception of SybilRank [3], few
have been successfully deployed. The majority of these
techniques rely on the assumption that Sybil accounts have
difficulty friending legitimate users, and thus tend to form
their own communities, making them visible to community
detection techniques applied to the social graph [29].
Unfortunately, the success of these detection schemes is
likely to decrease over time as Sybils adopt more sophis-
ticated strategies to ensnare legitimate users. First, early
user studies on OSNs such as Facebook show that users are
often careless about who they accept friendship requests
from [2]. Second, despite the discovery of Sybil commu-
nities in Tuenti [3], not all Sybils band together to form
connected components. For example, a recent study of
half a million Sybils on the Renren network [14] showed
that Sybils rarely created links to other Sybils, and in-
stead intentionally try to in filtrate communities of legiti mate
users [31]. Thus, these Sybils rarely connect to each other,
and do not form communities. Finally, there is evidence that
creators of Sybil accounts are using advanced techniques
to create more realistic pro files, either by copying pro file
data from existing accounts, or by recruiting real users to
customize them [30]. Malicious parties are willing to pay
for these authentic-looking accounts to better befriend real
users.
These observations motivate us to search for a new ap-
proach to detecting Sybil accounts. Our insight is that while
attackers are creating more “human ” Sybil accounts, fool-
ing intelligent users, i.e. passing a “social Turing test,” is
still a very difficult task. Careful users can apply intuitio n
to detect even small inconsistencies or discrepancies in the
details of a user pro file. Most online communities already
have mechanisms for users to “
flag ” questionable users or
content, and social networks often employ specialists dedi-
cated to identifying malicious content and users [3]. While
these mechanisms are ad hoc and costly, our goal is to ex-
plore a scalable and systematic approach of applying human
effort, i.e. crowdsourcing, as a tool to detect Sybil accounts.
Designing a successful crowdsourced Sybil detection re-
quires that we first answer fundamental questions on issues
of accuracy, cost, and scale. One key question is, how accu-
rate are users at detecting fake accounts? More specifically ,
how is accuracy impacted by factors such as the user’s ex-
perience with social networks, user motivation, fatigue, and
language and cultural barriers? Second, how much would
it cost to crowdsource authenticity checks for all suspicious
pro files? Finally, how can we design a crowdsourced Sybil
detection system that scales to millions of pro files?
In this paper, we describe the results of a large user study
into the feasibility of crowdsourced Sybil detection. We
gather ground-truth data on Sybil accounts from three so-
cial network populations: Renren [14], the largest social
network in China, Facebook-US, with pro files of English
speaking users, and Facebook-India, with pro files of users
who reside in India. The security team at Renren Inc. pro-
vided us with Renren Sybil account data, and we obtained
Facebook (US and India) Sybil accounts by crawling highly
suspicious pro files weeks before they were banned by Face-
book. Using this data, we perform user studies analyzing
the effectiveness of Sybil detection by three user popula-
tions: motivated and experienced “experts”; crowdsourced
workers from China, US, and India; and a group of UCSB
undergraduates from the Department of Communications.
Our study makes three key contributions. First, we an-
alyze detection accuracy across different datasets, as well
as the impact of different factors such as demographics,
survey fatigue, and OSN experience. We found that well-
motivated experts and undergraduate students produced ex-
ceptionally good detection rates with near-zero false posi-
tives. Not surprisingly, crowdsourced workers missed more
Sybil accounts, but still produced near zero false positives.
We observe that as testers examine more and more suspi-
cious pro files, the time spent examining each pro file de-
creases. However, experts maintained their accuracy over
time while crowdworkers made more mistakes with addi-
tional pro files. Second, we performed detailed analysis
on individual testers and account pro files. We found that
while it was easy to identify a subset of consistently accu-
rate testers, there were very few “chameleon pro files” that
were undetectable by all test groups. Finally, we propose a
scalable crowdsourced Sybil detection system based on our
results, and use trace-driven data to show that it achieves
both accuracy and scalability with reasonable costs.
By all measures, Sybil identities and fake accounts are
growing rapidly on today’s OSNs. Attackers continue to in-
novate and find better ways of mass-producing fake pro files,
and detection systems must keep up both in terms of accu-
racy and scale. This work is the first to propose crowdsourc-
ing Sybil detection, and our user study results are extremely
positive. We hope this will pave the way towards testing
and deployment of crowdsourced Sybil detection systems
by large social networks.
2 Background and Motivation
Our goal is to motivate and design a crowdsourced Sybil
detection system for OSNs. First, we brie fly introduce the
concept of crowdsourcing and de fine key terms. Next, we
review the current state of social Sybil detection, and high-
light ongoing challenges in this area. Finally, we introduce
our proposal for crowdsourced Sybil detection, and enumer-
ate the key challenges to our approach.
2.1 Crowdsourcing
Crowdsourcing is a process where work is outsourced to
an unde fined group of people. The web greatly simplifies
the task of gathering virtual groups of workers, as demon-
strated by successful projects such as Wikipedia. Crowd-
sourcing works for any job that can be decomposed into
short, simple tasks, and brings significant bene fits to tasks
not easily performed by automated algorithms or systems.
First, by harnessing small amounts of work from many peo-
ple, no individual is overburdened. Second, the group of
workers can change dynamically, which alleviates the need
for a dedicated workforce. Third, workers can be recruited
quickly and on-demand, enabling elasticity. Finally and
most importantly, by leveraging human intelligence, crowd-
sourcing can solve problems that automated techniques can-
not.
In recent years, crowdsourcing websites have emerged
that allow anyone to post small jobs to the web and have
them be solved by crowdworkers for a small fee. The pi-
oneer in the area is Amazon’s Mechanical Turk, or MTurk
for short. On MTurk, anyone can post jobs called Human
Intelligence tasks, or HITs. Crowdworkers on MTurk, or
turkers, complete HITs and collect the associated fees. To-
day, there are around 100,000 HITs available on MTurk at
any time, with 90% paying ≤$0.10 each [11, 24]. There are
over 400,000 registered turkers on MTurk, with 56% from
the US, and 36% from India [24].
Social networks have started to leverage crowdsourcing
to augment their workforce. For example, Facebook crowd-
sources content moderation tasks, including filtering porn o-
graphic and violent pictures and videos [10]. However,
to date we know of no OSN that crowdsources the iden-
tification of fake accounts.
Instead, OSNs like Facebook
and Tuenti maintain dedicated, in-house staff for this pur-
pose [3, 10].
Unfortunately, attackers have also begun to leverage
crowdsourcing. Two recent studies have uncovered crowd-
sourcing websites where malicious users pay crowdworkers
to create Sybil accounts on OSNs and generate spam [21,
30]. These Sybils are particularly dangerous because they
are created and managed by real human beings, and thus ap-
pear more authentic than those created by automated scripts.
Crowdsourced Sybils can also bypass traditional security
mechanisms, such as CAPTCHAs, that are designed to de-
fend against automated attacks.
2.2 Sybil Detection
The research community has produced many systems de-
signed to detect Sybils on OSNs. However, each one re-
lies on specific assumptions about Sybil behavior and graph
structure in order to function. Thus, none of these systems
is general enough to perform well on all OSNs, or against
Sybils using different attack strategies.
The majority of social Sybil detectors from the literature
rely on two key assumptions. First, they assume that Sybils
have trouble friending legitimate users. Second, they as-
sume that Sybil accounts create many edges amongst them-
selves. This leads to the formation of well-de fined Sybil
communities that have a small quotient-cut from the hon-
est region of the graph [4, 28, 29, 32, 33]. Although similar
Sybil community detectors have been shown to work well
on the Tuenti OSN [3], other studies have demonstrated lim-
itations of this approach. For example, a study by Yang
et al. showed that Sybils on the Renren OSN do not form
connected components at all [31]. Similarly, a meta-study
of multiple OSN graphs revealed that many are not fast-
mixing, which is a necessary precondition for Sybil com-
munity detectors to perform well [20].
Other researchers have focused on feature-based Sybil
detectors. Yang et al. detect Sybils by looking for ac-
counts that send many friend requests that are rejected by
the recipient. This detection technique works well on Ren-
ren because Sybils must first attempt to friend many users
before they can begin effectively spamming [31]. However,
this technique does not generalize. For example, Sybils on
Twitter do not need to create social connections, and instead
send spam directly to any user using “@” messages.
Current Sybil detectors rely on Sybil behavior assump-
tions that make them vulnerable to sophisticated attack
strategies. For example, Irani et al. demonstrate that “hon -
eypot” Sybils are capable of passively gathering legitimat e
friends and penetrating the social graph [13]. Similarly,
some attackers pay users to create fake pro files that bypass
current detection methods [30]. As Sybil creators adopt
more sophisticated strategies, current techniques are likely
to become less effective.
2.3 Crowdsourcing Sybil Detection
In this study, we propose a crowdsourced Sybil detec-
tion system. We believe this approach is promising for
first, humans can make overall judgments
three reasons:
about OSN pro files that are too complex for automated al-
gorithms. For example, humans can evaluate the sincer-
ity of photographs and understand subtle conversational nu-
ances. Second, social-Turing tests are resilient to changing
attacker strategies, because they are not reliant on specifi c
features. Third, crowdsourcing is much cheaper than hir-
ing full-time content moderators [9, 25]. However, there
are several questions that we must answer to verify that this
system will work in practice:
• How accurate are users at distinguishing between real
and fake pro files? Trained content moderators can per-
form this task, but can crowdworkers achieve compara-
ble results?
• Are there demographic factors that affect detection ac-
curacy? Factors like age, education level, and OSN ex-
perience may impact the accuracy of crowdworkers.
• Does survey fatigue impact detection accuracy?
In
many instances, people’s accuracy at a task decline over
time as they become tired and bored.
• Is crowdsourced Sybil detection cost effective? Can the
system be scaled to handle OSNs with hundreds of mil-
lions of users?
We answer these questions in the following sections.
Then, in Section 6, we describe the design of our crowd-
sourced Sybil detection system, and use our user data to
validate its effectiveness.
3 Experimental Methodology
In this section, we present the design of our user stud-
ies to validate the feasibility of crowdsourced Sybil detec-
tion. First, we introduce the three datasets used in our
experiments: Renren, Facebook US, and Facebook India.
We describe how each dataset was gathered, and how the
ground-truth classification of Sybil and legitimate pro file
s
was achieved. Next, we describe the high-level design of
our user study and its website implementation. Finally, we
introduce the seven groups of test subjects. Test subjects
are grouped into experts, turkers from crowdsourcing web-
sites, and university undergraduates. We use different test
groups from China, the US, and India that correspond to our
three datasets. All of our data collection and experimental
methodology was evaluated and received IRB approval be-
fore we commenced our study.
3.1 Ground-truth Data Collection
Our experimental datasets are collected from two large
OSNs: Facebook and Renren. Facebook is the most popu-
lar OSN in the world and has more than 1 billion users [8].
Renren is the largest OSN in China, with more than 220
Facebook
Unknown
Pro(cid:127)les
Suspicious
Pro(cid:127)les
Dataset
Google Image
Search
Friends of Suspicious Pro(cid:127)les
Figure 1. Facebook crawling methodology.
million users [14]. Both sites use similar visual layouts and
offer user pro files with similar features, including space f or
basic information, message “walls,” and photo albums. Ba-
sic information in a pro file includes items like name, gen-
der, a pro file image, total number of friends, interests, etc.
Each dataset is composed of three types of user pro-
files: con firmed
Sybils, con firmed legitimate users, and sus-
picious pro files that are likely to be Sybils. Con firmed
Sybil pro files are known to be fake because they have been
banned by the OSN in question, and manually verified by
us. Suspicious pro files exhibit characteristics that are hi ghly
indicative of a Sybil, but have not been banned by the OSN.
Legitimate pro files have been hand selected and verified by
us to ensure their integrity. We now describe the details of
our data collection process on Facebook and Renren.
Facebook. We collect data from Facebook using a cus-
tom web crawler. Because Facebook caters to an interna-
tional audience, we specifically targeted two regional ar-
eas for study: the US and India. We chose these two re-
gions because they have large, Internet enabled populations,
and both countries have active marketplaces for crowdwork-
ers [24]. Our Facebook crawls were conducted between De-
cember 2011 and January 2012.
The legitimate pro files for our study were randomly se-
lected from a pool of 86K pro files. To gather this pool of
pro files, we seeded our crawler with 8 Facebook pro files be-
longing to members of our lab (4 in the US, and 4 in India).
The crawler then visited each seed’s friends-of-friends, i.e.
the users two-hops away on the social graph. Studies have
shown that trust on social networks is often transitive [18],
and thus the friends-of-friends of our trusted seeds are likely
to be trustworthy as well. From the 86K total friends-of-
friends in this set, the crawler sampled 100 pro files (50 from
the US, 50 from India) that had Facebook’s default, permis-
sive privacy settings. We manually examined all 100 pro-
files to make sure they were 1) actually legitimate users,
and 2) we did not know any of them personally (to prevent
bias in our study).
To facilitate collection of Sybils on Facebook, we make
one assumptions about Sybil behavior: we assume that
Sybils use widely available photographs from the web as
pro file images. Intuitively, Sybils need realistic pro file i m-
ages in order to appear legitimate. Hence, Sybils must resort
to using publicly available images from around the web. Al-
though all Sybils on Facebook may not obey this assump-
tion, we will show that enough do to form a sufficiently
large sample for our user study.
To gather suspicious pro files, we seeded our crawler with
the pro files of known Sybils on Facebook [1]. The crawler
then snowball crawled outward from the initial seeds. We
leveraged Google Search by Image to locate pro files us-
ing widely available photographs as pro file images. Fig-
ure 1 illustrates this process. For each pro file visited by th e
crawler, all of its pro file images were sent to Google Search
by Image (Facebook maintains a photo album for each user
that includes their current pro file image, as well as all prio r
images). If Google Search by Image indexed ≥90% of the
pro file images on sites other than Facebook, then we con-
sider the account to be suspicious. The crawler recorded the
basic information, wall, and photo albums from each sus-
picious pro file. We terminated the crawl after a sufficient
number of suspicious pro files had been located.
We search for all of a user’s pro file images rather than
just the current image because legitimate users sometimes
use stock photographs on their pro file ( e.g. a picture of their
favorite movie star). We eliminate these false positives by
setting minimum thresholds for suspicion: we only consider
pro files with ≥2 pro file images, and if ≥90% are available
on the web, then the pro file is considered suspicious.
In total, our crawler was able to locate 8779 suspicious
Facebook pro files. Informal, manual inspection of the pro-
file images used by these accounts reveals that most use pic-
tures of ordinary (usually attractive) people. Only a small
number of accounts use images of recognizable celebrities
or non-people (e.g. sports cars). Thus, the majority of pro-
file images in our dataset are not suspicious at first-glance.
Only by using external information from Google does it be-
come apparent that these photographs have been misappro-
priated from around the web.
At this point, we don’t have ground-truth about these
pro files,
i.e. are they really Sybils? To determine ground-
truth, we use the methodology pioneered by Thomas et al.
to locate fake Twitter accounts [27]. We monitored the sus-
picious Facebook pro files for 6 weeks, and observed 573
became inaccessible. Attempting to browse these pro files
results in the message “The page you requested was not
found,” indicating that the pro file was either removed by
Facebook or by the owner. Although we cannot ascer-
tain the specific reason that these accounts were removed,
the use of widely available photographs as pro file images
makes it highly likely that these 573 pro files are fakes.
The sole limitation of our Facebook data is that it only
includes data from public pro files. It is unknown if the char-
acteristics of private accounts (legitimate and Sybil) differ
from public ones. This limitation is shared by all studies
that rely on crawled OSN data.
Renren.
We obtained ground-truth data on Sybil and
Dataset
# of Profiles
Sybil Legit.
Renren
100
100
Facebook
US
Facebook
IN
32
50
50
50
Test Group
CN Expert
CN Turker
US Expert
US Turker
US Social
IN Expert
IN Turker
# of
Profiles
Testers per Tester
100
24
10
418
50
40
12
299
198
25
100
20
342
12
Table 1. Datasets, test groups, and pro files
per tester.
Dataset
Category
Renren
Facebook
US
Facebook
IN
Legit.
Sybil
Legit.
Sybil
Legit.
Sybil
News-
Feed
165
30
55.62
60.15
55
31.6
Photos
302
22
184.78
10.22
53.37
10.28
Profile
Images
10
1.5
32.86
4.03
7.27
4.44
Censored
Images
0
0.06
0
1.81
0
0.08
Table 2. Ground-truth data statistics (average
number per pro file).
legitimate pro files on Renren directly from Renren Inc. The
security team at Renren gave us complete information on
1082 banned Sybil pro files, from which we randomly se-
lected 100 for our user study. Details on how Renren bans
Sybil accounts can be found in [31]. We collected legitimate
Renren pro files using the same methodology as for Face-
book. We seeded a crawler with 4 trustworthy pro files from
people in the lab, crawled 100K friends-of-friends, and then
sampled 100 public pro files. We forwarded these pro files to
Renren’s security team and they verified that the pro files
belonged to real users.
Summary and Data Sanitization.
Table 1 lists the final
statistics for our three datasets. Since the Renren data was
provided directly by Renren Inc., all pro files are con firmed
as either Sybils or legitimate users. For Facebook US and
India, pro files that were banned by Facebook are con firmed
Sybils, and the remaining uncon firmed suspicious pro files
are not listed.
During our manual inspection of pro files, we noticed that
some include images of pornography or graphic violence.
We determined that it was not appropriate for us to use
these images as part of our user study. Thus, we manually
replaced objectionable images with a grey image contain-
ing the words “Pornographic or violent image removed.”
This change protects our test subjects from viewing objec-
tionable images, while still allowing them to get a sense of
the original content that was included in the pro file. Out
of 45,096 total images in our dataset, 58 are filtered from
Facebook US, 4 from Facebook India, and 6 from Renren.
All objectionable images are found on Sybil pro files; none
are found on legitimate pro files.
Finally, we show the basic statistics of ground-truth pro-
files in Table 2. Legitimate users have more photo albums
and pro file photos, while Sybils have more censored pho-
tos. The “News-Feed ” column shows the average number of
items in the first 5 chronological pages of each user’s news-
feed. On Facebook, the news-feed includes many types of
items, including wall posts, status updates, photo tags, etc.
On Renren, the feed only includes wall posts from friends.
3.2 Experiment Design
Using the datasets in Table 1, our goal is to assess the
ability of humans to discriminate between Sybil and legiti-
mate user pro files. To test this, we perform a simple, con-
trolled study: we show a human test subject (or simply a
tester) a pro file from our dataset, and ask them to classify
it as real or fake. The tester is allowed to view the pro file’s
basic information, wall, photo albums, and individual pho-
tos before making their judgment. If the tester classifies th e
pro file as fake, they are asked what pro file elements (basic
information, wall, or photos) led them to this determination.
Each tester in our study is asked to evaluate several pro-
files from our dataset, one at a time. Each tester is given
roughly equal number of Sybil pro files and legitimate pro-
files. The pro files from each group are randomized for each
tester, and the order the pro files are shown in is also ran-
domized.
Implementation. We implement our study as a website.
When a tester begins the study, they are presented with a
webpage that includes a consent form and details about our
study. After the tester agrees, they are directed to the first
pro file for them to evaluate. Figure 2 shows a screenshot of
our evaluation page. At the top are links to the all of the
pro files the tester will evaluate. Testers may use these link s
to go back and change their earlier answers if they wish.
Below the numbered links is a box where testers can
record their evaluation for the given pro file: real or fake,
and if fake, what pro file elements are suspicious (pro file,
wall, and/or photos)? When the tester is done evaluating the
given pro file, they click the “Save Changes” button, which
automatically directs their browser to the next pro file, or t he
end of the survey if all pro files have been evaluated.
Below the evaluation box are three buttons that allow the
tester to view the given pro file’s basic information (shown
by default), wall, and photo albums. The basic information
and wall are presented as JPEG images, in order to preserve
the exact look of Facebook/Renren, while also preventing
the tester from clicking any (potentially malicious) embed-
ded links. Testers may click on each photo album to view
the individual photos contained within.
and each pro file was evaluated by multiple testers from each
group. This allows us to examine the overall detection ac-
curacy of the group (e.g. the crowd), versus the accuracy
of each individual tester. We now introduce the three test
groups, and explain how we administered our study to them.
Experts.
experts.
The first group of test subjects are
This group contains Computer Science professors and grad-
uate students that were carefully selected by us. The expert
group represents the practical upper-bound on achievable
Sybil detection accuracy.
The expert group is subdivided into three regional
groups: US, Indian, and Chinese experts. Each expert group
was evaluated on the corresponding regional dataset. We
approached experts in person, via email, or via social me-
dia and directed them to our study website to take the test.
Table 1 lists the number of expert testers in each regional
group. Expert tests were conducted in February, 2012.
As shown in Table 1, each Chinese and Indian expert
evaluated 100 pro files from our dataset, while US experts
evaluated 50 pro files. This is significantly more pro files per
tester than we gave to any other test group. However, since
experts are dedicated professionals, we assume that their ac-
curacy will not be impacted by survey fatigue. We evaluate
this assumption in Section 5.
Turkers.
The second group of test subjects are turkers
recruited from crowdsourcing websites. Unlike the expert
group, the background and education level of turkers cannot
be experimentally controlled. Thus, the detection accuracy
of the turker group provides a lower-bound on the efficacy
of a crowdsourced Sybil detection system.
Like the expert group, the turker group is subdivided into
three regional groups. US and Indian turkers were recruited
from MTurk. HITs on MTurk may have qualifications as-
sociated with them. We used this feature to ensure that only
US based turkers took the Facebook US test, and Indian
turkers took the Facebook India test. We also required that
turkers have ≥90% approval rate for their HITs, to filter
out unreliable workers. We recruited Chinese turkers from
Zhubajie, the largest crowdsourcing site in China. Table 1
lists the number of turkers who completed our study in each
region. Turker tests were conducted in February, 2012.
Unlike the expert groups, turkers have an incentive to
sacrifice accuracy in favor of finishing tasks quickly. Be-
cause turkers work for pay, the faster they complete HITs,
the more HITs they can do. Thus, of all our test groups, we
gave turkers the fewest number of pro files to evaluate, since
turkers are most likely to be effected by survey fatigue. As
shown in Table 1, Chinese turkers each evaluated 10 pro-
files, while US and Indian turkers evaluated 12.
We priced each Zhubajie HIT at $0.15 ($0.015 per pro-
file), and each MTurk HIT at $0.10 ($0.0083 per pro file).
These prices are in line with the prevailing rates on crowd-
Figure 2. Screenshot of the English version
of our user study website.
At the end of the survey, the tester is asked to answer a
short questionnaire of demographic information. Questions
include age, gender, country of residence, education level,
and years of OSN experience. There is also a free-form
comment box where tester can leave feedback.
On the server-side, we record all of the classifications
and questionnaire answers made by each tester. We also
collect additional information such as the time spent by the
tester on each page, and total session time per tester.
Because our datasets are in two different languages, we
construct two versions of our study website. Figure 2 shows
the English version of our site, which is used to evaluate
Facebook pro files. We also constructed a Chinese version
of our site to evaluate Renren pro files.
Limitations.
The methodology of our user study has
two minor limitations. First, we give testers full pro files t o
evaluate, including basic info, wall, and photos. It is not
clear how accurate testers would be if given different infor-
mation, or a restricted subset of this information. Second,
we assume that there are no malicious testers participating
in our user study. Although attackers might want to in fil-
trate and disrupt a real crowdsourced Sybil detector, there
is little for them to gain by disrupting our study. Related
work on detecting crowdsourcing abuse may be helpful in
mitigating this problem in the future [7].
3.3 Test Subjects
In order to thoroughly investigate how accurate different
types of users are at detecting Sybils, we ran user studies
on three different groups of test subjects. Each individual
tester was asked to evaluate ≥10 pro files from our dataset,
CN
IN
US
s
r
e
t
s
e
T
f
o
%
100
80
60
40
20
0
Graduate
Bachelors
High
Primary
s
r
e
t
s
e
T
f
o
%
100
80
60
40
20
0
CN
IN
US
5-10 Years
2-5 Years
0-2 Years
Never
s
r
e
t
s
e
T
f
o
%
100
80
60
40
20
0
CN
IN
US
Female
Male
T
T
T
E
E
E
u
u
x
x
x
u
o
r
r
r
ci
p
p
p
k
k
k
e
e
e
a
e
e
e
rt
rt
rt
l
r
r
r
S
T
T
T
E
E
E
x
x
u
u
u
x
o
r
r
r
p
p
ci
p
k
k
k
e
e
e
a
e
e
e
rt
rt
rt
l
r
r
r
S
(b) OSN Usage Experience
(a) Education Level
Figure 3. Demographics of participants in our user study.
T
T
T
E
E
E
u
u
u
x
x
x
o
r
r
r
p
p
p
ci
k
k
k
e
e
e
a
e
e
e
rt
rt
rt
l
r
r
r
S
(c) Gender
sourcing websites [11]. Although we could have paid more,
prior work has shown that paying more money does not
yield higher quality results on crowdsourcing sites [19].
Sociology Undergraduates.
The final group of test
subjects are undergraduate students from the Department of
Communications at UCSB (Social Science major). These
students were asked to take our study in exchange for course
credit. This group adds additional perspective to our study,
apart from Computer Science oriented experts and the un-
controlled turker population.
The social science students are listed in Table 1 as “US
social.” We only asked the students to evaluate our Face-
book US dataset, since cultural and language barriers pre-
vent them from effectively evaluating Chinese and Indian
pro files. 198 total students completed our study in March,
2012. Each student was asked to evaluate 25 pro files, mid-
way between what we asked of experts and turkers.
Summary.
We conduct experiments with 7 groups of
testers: experts from US, India, and China; turkers from
US, India, and China, and social science students from the
US. Table 1 lists the number of testers in each group and the
number of pro files evaluated by each tester.
4 User Study Results
In this section, we present the high level results of our
user study. We start by introducing the demographics of the
test subjects. Next, we address one of our core questions:
how accurate are people at identifying Sybils? We com-
pare the accuracy of individual testers to the accuracy of
the group to assess whether the “wisdom of the crowd ” can
overcome individual classification errors. Finally, we exa m-
ine the reasons testers cited in classified pro files as Sybils
.
4.1 Demographics
At the end of each survey, testers were asked to answer
demographic questions about themselves. Figure 3 shows
the results that were self-reported by testers.
Education.
As shown in Figure 3(a), most of our experts
are enrolled in or have received graduate level degrees. This
is by design, since we only asked Computer Science grad-
uate students, undergrads enrolled in graduate courses, and
professors to take part in our expert experiments. Similarly,
the social science testers are drawn from the undergraduate
population at UCSB, which is re flected in the results.
The education levels reported by turkers are surprisingly
high. The majority of turkers in the US and China report
enrollment or receipt of bachelors-level degrees [24]. Sur-
prisingly, over 50% of Indian turkers report graduate level
educations. This result for Indian turkers stems from cul-
tural differences in how education levels are denoted. Un-
like in the US and China, in India “graduate school” refers
to “graduated from college,” not receipt of a post-graduate
degree (e.g. Masters or Doctorate). Thus, most “graduate ”
level turkers in India are actually bachelors level.
OSN Usage Experience.
As shown in Figure 3(b),
the vast majority of testers report extensive experience with
OSNs. US experts, Chinese experts, and social science un-
dergrads almost uniformly report ≥2 years of OSN expe-
rience. Indian experts, Indian turkers, and Chinese turkers
have the greatest fractions of users with <2 years of OSN
experience. US turkers report levels of OSN experience
very similar to our most experienced expert groups.
Gender.
As shown in Figure 3(c), the vast majority
of our testers are male. The only group which exhibits a
female majority is the social science undergrads, a demo-
graphic bias of the communications major. Turker groups
show varying levels of gender bias: Chinese and Indian
turkers are predominantly male [24], while the US group
is evenly divided.
4.2 Individual Accuracy
We now address one of the core questions of the paper:
how accurate are people at identifying Sybils? To achieve
100% accuracy, a tester needs to correctly classify all Sybil
and legitimate pro files they were shown during the test. Fig-
ure 4 shows the accuracy of testers in 5 of our test groups.
Chinese experts are the most accurate, with half achieving
≥90% accuracy. The US and Indian (not shown) experts
also achieved high accuracy. However, the turker groups do
)
%
(
F
D
C
100
80
60
40
20
0
CN Turker
US Turker
US Social
US Expert
CN Expert
Experts
Turkers
100
80
60
40
20
)
%
(
F
D
C
Experts
Turkers
Social
100
80
60
40
20
)
%
(
F
D
C
0
20
80
60
40
Accuracy per Tester (%)
100
0
0.2
0.8
0.6
0.4
Average Jaccard Coefficient
1
0
0.2
0.8
0.6
0.4
Average Jaccard Coefficient
1
Figure 4. Tester accuracy.
(a) Renren
(b) Facebook US
Figure 5. Jaccard similarity coef ficient of reasons.
)
%
(
F
D
C
100
80
60
40
20
0
0
Expert FP
Turker FP
Expert FN
Turker FN
40
80
60
20
Error Rate per Tester (%)
100
)
%
(
F
D
C
100
80
60
40
20
0
0
Expert FP
Turker FP
Expert FN
Turker FN
40
80
60
20
Error Rate per Tester (%)
100
)
%
(
F
D
C
100
80
60
40
20
0
0
Expert FP
Turker FP
Expert FN
Turker FN
40
80
60
20
Error Rate per Tester (%)
100
(a) Renren
(c) Facebook India
(b) Facebook US
Figure 6. False positive (FP) and false negative (FN) rates for testers.
not perform as well as the experts. The Chinese and Indian
(not shown) turkers perform the worst, with half achieving
≤65% accuracy. The accuracy of US turkers and social sci-
ence students falls in-between the other groups.
To better understand tester accuracy, Figure 6 separates
the results into false positives and false negatives. A false
positive corresponds to misclassifying a legitimate pro fil e
as a Sybil, while a false negative means failing to identify a
Sybil. Figure 6 focuses on our expert and turker test groups;
social science students perform similarly to US turkers, and
the results are omitted for brevity.
Figure 6 reveals similar trends across all test groups.
First, false positives are uniformly lower than false nega-
tives, i.e. testers are more likely to misclassify Sybils as le-
gitimate, than vice versa. Second, in absolute terms, the
false positive rates are quite low: <20% for 90% of testers.
Finally, as in Figure 4, error rates for turkers tend to be sig-
nificantly higher than those of experts.
In summary, our results reveal that people can identify
differences between Sybil and legitimate pro files, but most
individual testers are not accurate enough to be reliable.
4.3 Accuracy of the Crowd
We can leverage “the wisdom of the crowd ” to amor-
tize away errors made by individuals. Many studies on
crowdsourcing have demonstrated that experimental error
can be controlled by having multiple turkers vote on the
answer, and then using the majority opinion as the final an-
swer [17, 25]. As long as errors by turkers are uncorrelated,
this approach generates very accurate results.
We now examine whether this methodology can be used
to improve the classification accuracy of our results. This
question is of vital importance, since a voting scheme would
be an essential component of a crowdsourced Sybil detector.
To compute the “
final” classification for each pro file in our
dataset, we aggregate all the votes for that pro file by tester s
in each group. If ≥50% of the testers vote for fake, then we
classify that pro file as a Sybil.
Table 3 shows the percentage of false positive and neg-
ative classifications for each test group after we aggregate
votes. The results are mixed: on one hand, false positive
rates are uniformly low across all test groups. In the worst
case, US turkers and social science students only misclas-
sify 1 out of 50 legitimate pro files. Practically, this means
that crowds can successfully identify real OSN pro files.
On the other hand, false negative rates vary widely across
test groups. Experts in China, in the US, and the social
science students all perform well, with false negative rates
<10%. Indian experts also outperform the turker groups,
but only by a 2.7% margin. The Chinese and Indian turker
groups perform worst, with ≥50% false negatives.
From these results, we can conclude three things. First,
using aggregate votes to classify Sybils does improve over-
all accuracy significantly. Compared to the results for indi -
vidual testers in Figure 6, both false positive and negative
rates are much lower after aggregation. Second, the uni-
formly low false positive rates are a very good result. This
means that running a crowdsourced Sybil detection system
will not harm legitimate social network users. Finally, even
with aggregate voting, turkers are still not as accurate as ex-
Dataset
Renren
Facebook US
Facebook IN
Tester
CN Expert
CN Turker
US Expert
US Turker
US Social
IN Expert
IN Turker
FP Rate
0%
0%
0%
2%
2%
0%
0%
FN Rate
3%
63%
9.4%
18.7%
6.25%
16%
50%
Table 3. Error rates after aggregating votes.
Dataset
Renren
Facebook US
Facebook IN
Tester
CN Expert
CN Turker
US Expert
US Turker
US Social
IN Expert
IN Turker
Info Wall
18% 57%
31% 31%
37% 30%
35% 32%
30% 31%
39% 28%
39% 27%
Photos
25%
38%
33%
33%
39%
33%
34%
Table 4. Reasons why pro files are suspicious.
perts. In the next section, we look more deeply into factors
that may negatively in fluence turkers accuracy, and tech-
niques that can mitigate these issues.
4.4 Reasons for Suspicion
During our user study, testers were asked to give reasons
for why they classified pro files as Sybils. Testers were given
the option of reporting the pro file’s basic information, wal l,
and/or photos as suspicious. Testers could select as many
options as they liked.
In this section, we compare and contrast the reasons re-
ported by different test groups. Table 4 shows percentage
of votes for each reasons across our seven test groups. The
US and Indian expert and turker groups are very consistent:
they all slightly favor basic information. The bias may be
due to the way our study presented information, since each
pro file’s basic information was shown first, by default. The
social science students are the only group that slightly fa-
vors photos.
In contrast to the US and Indian groups, Chinese experts
and turkers often disagree on their reasons for suspicion.
The majority of experts rely on wall messages, while turk-
ers slightly favor photos. As shown in Figure 4, Chinese
turkers have lower accuracy than Chinese experts. One pos-
sible reason for this result is that turkers did not pay enough
attention to the wall. As previously mentioned, there is
a comment box at the end of our survey for testers to of-
fer feedback and suggestions. Several Chinese experts left
comments saying they observed wall messages asking ques-
tions like “do I know you?,” and “why did you send me a
friend request?,” which they relied on to identify Sybil pro -
files.
Consistency of Reasons.
There is no way to objec-
tively evaluate the correctness of tester’s reasons for classi-
fication, since there is no algorithm that can pick out suspi-
cious pieces of information from an OSN pro file. Instead,
what we can do is examine how consistent the reasons are
for each pro file across our test groups. If all the testers agr ee
on the reasons why a given pro file is suspicious, then that is
a strong indication that those reasons are correct.
To calculate consistency, we use the following proce-
dure.
In each test group, each Sybil is classified by N
testers. For all pairs of users in each group that classified
a particular Sybil pro file, we calculate the Jaccard similar -
ity coefficient to look at overlap in their reasons, giving us
N ∗ (N − 1)/2 unique coefficients. We then compute the
average of these coefficients for each pro file. By computing
the average Jaccard coefficient for each Sybil, we arrive at
a distribution of consistency scores for all Sybils for a given
test group.
Figure 5 shows the consistency distributions of the China
and US test groups. The results for the Indian test groups
are similar to US testers, and are omitted for brevity. The
Chinese turkers show the most disagreement: for 50% of
Sybils the average Jaccard coefficient is ≤0.4. Chinese ex-
perts and all three US groups exhibit similar levels of agree-
ment: 50% of Sybils have coefficients ≤0.5. The fraction of
Sybils receiving near complete disagreement (0.0) or agree-
ment (1.0) is negligibly small across all test groups.
Based on these results, we conclude that testers identify
Sybils for inconsistent reasons. Even though Table 4 shows
that each of the three available reasons receives a roughly
equal portion of votes overall, the reasons are assigned ran-
domly across Sybils in our dataset. This indicates that no
single pro file feature is a consistent indicator of Sybil act iv-
ity, and that testers bene fit from having a large, diverse set
of information when making classifications. Note that this
provides further support that automated mechanisms based
on individual features are less likely to succeed, and also
explains the success of human subjects in detecting Sybils.
Answer Revisions. While taking our survey, testers had
the option of going back and changing classifications that
they have previously made. However, few took advantage
of this feature. This is not unexpected, especially for turk-
ers. Since turkers earn more if they work faster, there is
a negative incentive to go back and revise work. In total,
there were only 28 revisions by testers: 16 from incorrect to
correct, and 12 from correct to incorrect.
)
%
(
e
t
a
R
e
v
i
t
a
g
e
N
e
s
l
a
F
100
80
60
40
20
0
OSN Experience Education
Gender
)
%
(
e
t
a
R
e
v
i
t
a
g
e
N
e
s
l
a
F
100
80
60
40
20
0
OSN Experience Education
Gender
)
%
(
e
t
a
R
e
v
i
t
a
g
e
N
e
s
l
a
F
100
80
60
40
20
0
OSN Experience Education
Gender
Never
0-2 Years
2-5 Years
5-10 Years
Primary School
High School
Bachelors
Graduate
Female
Male
(a) US Turker
(c) Chinese Turker
(b) India Turker
Figure 7. False positive rates for turkers, broken down by demographic.
)
S
(
e
l
i
f
o
r
P
r
e
P
e
m
i
T
100
80
60
40
20
0
Accuracy
Time
100
80
60
40
20
0
20 40 60 80 100
Profile Order
)
%
(
y
c
a
r
u
c
c
A
(a) Renren Expert
)
S
(
e
l
i
f
o
r
P
r
e
P
e
m
i
T
100
80
60
40
20
0
100
80
60
40
Accuracy
20
Time
0
1 2 3 4 5 6 7 8 9 10
Profile Order
)
%
(
y
c
a
r
u
c
c
A
)
S
(
e
l
i
f
o
r
P
r
e
P
e
m
i
T
100
80
60
40
20
0
Accuracy
Time
100
80
60
40
20
0
10 20 30 40 50
Profile Order
)
%
(
y
c
a
r
u
c
c
A
(c) Facebook US Expert
(b) Renren Turker
Figure 8. Accuracy and time on the nth pro file.
)
S
(
e
l
i
f
o
r
P
r
e
P
e
m
i
T
100
80
60
40
20
0
Accuracy
Time
100
80
60
40
20
0
2 4 6 8 10 12
Profile Order
)
%
(
y
c
a
r
u
c
c
A
(d) Facebook US Turker
5 Turker Accuracy Analysis
5.2 Temporal Factors and Survey Fatigue
The end goal of our work is to create a crowdsourced
Sybil detection system. However, in Section 4 we observed
that turkers are not as accurate as experts. In this section,
we examine factors that may impact the accuracy of turk-
ers, and investigate ways to improve our Sybil detection
system. We start by looking at demographic factors. Next,
we examine pro file evaluation time to understand if turkers
are adversely affected by survey fatigue. Next, we examine
issues of turker selection. Will adding more turkers to the
crowd improve accuracy? What if we set a threshold and fil-
ter out turkers that consistently perform poorly? Finally, we
calculate the per pro file accuracy of testers to detect “stea
lth
Sybils” that are undetectable by both experts and turkers.
5.1 Demographic Factors
First, we explore the impact of demographic factors on
the turker’s accuracy. We focus on false negative rates of
turkers, since their false positive rates are close to zero. Fig-
ure 7 shows the average false negative rate and standard de-
viation of turkers from China, US and India, broken down
by different demographics. Education has a clear impact on
false negatives: higher education level correlates with in-
creased ability to identify Sybils. The impact of OSN usage
experience is less clear. Chinese and US turker’s false neg-
ative rates decline as OSN experience increases, which is
expected. However, for Indian turkers there is no correla-
tion. Gender does not appear to impact false negatives in a
meaningful way. The results in Figure 7 indicate that turker
accuracy could be improved by filtering out workers with
few years of OSN experience and low education level.
It is known that turkers try to finish tasks as quickly as
possible in order to earn more money in a limited amount
of time [16]. This leads to our next question: do turkers
spend less time evaluating pro files than experts, and does
this lead to lower accuracy? The issue of time is also related
to survey fatigue: does the accuracy of each tester decrease
over time due to fatigue and boredom?
To understand these temporal factors, we plot Figure 8,
which shows the average evaluation time and accuracy per
pro file “slot” for Chinese and US experts and turkers. The
x-axis of each sub figure denotes the logical order in which
testers evaluated pro files, e.g. “Pro file Order ”
n is the nth
pro file evaluated by each tester. Note that pro files are pre-
sented to each tester in random order, so each tester evalu-
ated a different pro file within each slot. Within each slot, w e
calculate the average pro file evaluation time and accuracy
across all testers. 100% accuracy corresponds to all testers
correctly classifying the nth pro file they were shown. Al-
though experts evaluated >10 pro files each, we only show
the first 10 to present a fair comparison versus the turkers.
The results for the Indian test groups are similar to the US
groups, and are omitted for brevity.
The first important result from Figure 8 is that absolute
pro file evaluation time is not a good indicator of accuracy.
The Chinese experts exhibit the fastest evaluation times, av-
eraging one pro file every 23 seconds. However, they are
more accurate than Chinese turkers who spend more time
on each pro file. This pattern is reversed on Facebook: ex-
perts spend more time and are more accurate than turkers.
Next, we look for indications of survey fatigue. In all 4
sub figures of Figure 8, the evaluation time per pro file de-
creases over time. This shows that testers speed up as they
progress through the survey. As shown in the expert Fig-
ures 8(a) and 8(c), this speedup does not affect accuracy.
These trends continue through the evaluation of additional
pro files (10-50 for Chinese experts, 10-100 for US experts)
that are not shown here. However, for turkers, accuracy
does tend to decrease over time, as shown in Figures 8(b)
and 8(d). This demonstrates that turkers are subject to sur-
vey fatigue. The up-tick in Chinese turker accuracy around
pro file 10 is a statistical anomaly, and is not significant.
5.3 Turker Selection
As demonstrated in Section 4.3, we can mitigate the clas-
sification errors of individuals by aggregating their votes to-
gether. This raises our next question: can we continue to
improve the overall accuracy of turkers by simply adding
more of them?
To evaluate this, we conducted simulations using the data
from our user study. Let C be the list of classifications re-
ceived by a given pro file in our dataset (either a Sybil or
legitimate pro file) by a given group of turkers (China, US,
or India). To conduct our simulation, we randomize the or-
der of C , then calculate what the overall false positive and
negative rates would be as we include progressively more
votes from the list. For each pro file, we randomize the list
and conduct the simulation 100 times, then average the rates
for each number of votes. Intuitively, what this process re-
veals is how the accuracy of the turker group changes as
we increase the number of votes, irrespective of the specific
order that the votes arrive in.
The results of our simulations demonstrate that there are
limits to how much accuracy can be improved by adding
more turkers to the group, as shown in Figure 9. Each line
plots the average accuracy over all Sybil and legitimate pro-
files for a given group of turkers. For false positives, the
trend is very clear: after 4 votes, there are diminishing re-
turns on additional votes. For false negatives, the trend is
either flat (US turkers), or it grows slightly worse with more
votes (China and India).
Filtering Inaccurate Turkers.
Since adding more turk-
ers does not significantly increase accuracy, we now inves-
tigate the opposite approach: eliminating turkers that are
consistently inaccurate. Many deployed crowdsourcing sys-
tems already use this approach [22]. Turkers are first asked
to complete a pre-screening test, and only those who per-
form sufficiently well are allowed to work on the actual job.
In our scenario, turkers could be pre-screened by asking
them to classify accounts from our ground-truth datasets.
Only those that correctly classify x accounts, where x is
some con figurable threshold, would be permitted to work
on actual jobs classifying suspicious accounts.
To gauge whether this approach improves Sybil detec-
tion accuracy, we conduct another simulation. We vary the
accuracy threshold x, and at each level we select all turkers
that have overall accuracy ≥ x. We then plot the false neg-
ative rate of the selected turkers in Figure 10. Intuitively,
this simulates turkers taking two surveys: one to pre-screen
them for high accuracy, and a second where they classify
unknown, suspicious accounts.
Figure 10 demonstrates that the false negative rate of the
turker group can be reduced to the same level as experts by
eliminating inaccurate turkers. The false negative rates are
stable until the threshold grows >40% because, as shown
in Figure 4, almost all the turkers have accuracy >40%. By
70% threshold, all three test groups have false negative rates
≤10%, which is on par with experts. We do not increase
the threshold beyond 70% because it leaves too few turkers
to cover all the Sybil pro files in our dataset. At the 70%
threshold, there are 156 Chinese, 137 Indian, and 223 US
turkers available for work.
5.4 Pro file Difficulty
The last question we examine in this section is the fol-
lowing: are there extremely difficult “stealth ” Sybils that
re-
sist classification by both turkers and experts? As we show
in Table 3, neither experts nor turkers have 0% false nega-
tives when classifying Sybils. What is unknown is if there
is correlation between the false negatives of the two groups.
To answer this question, we plot Figure 11. Each scatter
plot shows the average classification accuracy of the Sybils
from a particular region. The x-axes are presented in as-
cending order by turker accuracy. This is why the points for
the turkers in each sub figure appear to form a line.
Figure 11 reveals that, in general, experts can correctly
classify the vast majority of Sybils that turkers cannot (e.g.
turker accuracy <50%). There are a select few, extremely
difficult Sybils that evade both the turkers and experts.
These “stealth ” Sybils represent the pinnacle of difficulty
and blur the line between real and fake user pro files. There
is only one case, shown in Figure 11(a), where turkers cor-
rectly identify a Sybil that the experts missed.
One important takeaway from Figure 11 is that “stealth ”
Sybils are a very rare phenomenon. Even if a crowdsourced
Sybil detector was unable to identify the them, the overall
detection accuracy is so high that most Sybils will be caught
and banned. This attrition will drive up costs for attackers,
deterring future Sybil attacks.
Turker Accuracy and Luck.
Another takeaway from
Figure 11 is that some pro files are difficult for turkers to
classify. This leads to a new question: are the most accu-
rate turkers actually better workers, or were they just lucky
during the survey? Hypothetically, if a turker was randomly
shown all “easy ” Sybils, then they would appear to be accu-
rate, when in fact they were just lucky.
Close examination of our survey results reveals that ac-
curate turkers were not lucky. The 75 Chinese turkers who
,
)
%
(
e
t
a
R
r
o
r
r
E
70
60
50
40
30
20
10
0
FN (CN)
FN (IN)
FN (US)
FP (CN,IN,US)
2 4 6 8 10 12 14 16 18 20 22
Number of Votes per Profile
)
%
(
e
t
a
R
e
v
i
t
a
g
e
N
e
l
a
F
80
70
60
50
40
30
20
10
0
CN
IN
US
0
10 20 30 40 50 60 70
Turker Accuracy Threshold (%)
Figure 9. Votes per pro file versus the FP and
FN rate.
Figure 10. Accuracy threshold versus the
false negatives.
)
%
(
l
i
b
y
S
r
e
P
y
c
a
r
u
c
c
A
100
80
60
40
20
0
Turkers
Experts
10 20 30 40 50 60 70 80 90 100
Sybils Ordered by Turker Accuracy
)
%
(
l
i
b
y
S
r
e
P
y
c
a
r
u
c
c
A
100
80
60
40
20
0
Turkers
Experts
20
5
30
25
15
10
Sybils Ordered by Turker Accuracy
)
%
(
l
i
b
y
S
r
e
P
y
c
a
r
u
c
c
A
100
80
60
40
20
0
Turkers
Experts
5 10 15 20 25 30 35 40 45 50
Sybils Ordered by Turker Accuracy
(a) Renren
(c) Facebook India
(b) Facebook US
Figure 11. Scatter plots of average accuracy per Sybil pro fil e.
achieved ≥90% accuracy were collectively shown 97% of
Renren Sybils during the survey. Similarly, the 124 US
turkers with ≥90% accuracy were also shown 97% of the
Facebook US Sybils. Thus, the high accuracy turkers ex-
hibit almost complete coverage of the Sybils in our dataset,
not just the “easy ” ones.
6 A Practical System
In this section, we design a crowdsourced Sybil detection
system based on the lessons learned from our experiments.
We focus on practical issues such as scalability, accuracy,
and privacy. We first describe our system architecture that
enables crowdsourced Sybil detection at large scale. Sec-
ond, we use trace-driven simulations to examine the trade-
off between accuracy and cost in such a system. Finally, we
discuss how to preserve user privacy when distributing user
pro file data to turkers.
6.1 System Design and Scalability
The first challenge we address is scalability. Today’s so-
cial networks include hundreds of millions of users, most
of whom are legitimate. How do we build a system that
can focus the efforts of turkers on the subset of accounts
that are suspicious? To address this challenge, we propose
a hierarchical Sybil detection system that leverages both au-
tomated techniques and crowdsourced human intelligence.
As shown in Figure 12, the system contains two main lay-
ers: the filtering layer and the crowdsourcing layer.
.
Filtering Layer.
In the first layer, we use an ensemble
of filters to locate suspicious pro files in the social network
These filters can be automated using techniques from prior
work, such as Sybil community detection [3] and feature
based selection [31]. Filters can also be based on existing
“user report” systems that allow OSN users to “report” or
flag ” suspicious pro files. These tools are already imple-
mented in social networks such as Facebook and Renren,
and help to dramatically reduce the number of target pro-
files studied by our crowdsourcing layer.
Crowdsourcing Layer.
The output of the filtering layer
is a set of suspicious pro files that require further validati on
(Figure 12). These pro files are taken as input by the crowd-
sourcing layer, where a group of turkers classify them as
legitimate or fake. OSNs can take further action by either
banning fake accounts, or using additional CAPTCHAs to
limit potentially damaging behavior.
We begin with two techniques to increase the accuracy of
the turker group. First, we use majority voting by a group
of workers to classify each suspicious pro file. Our earlier
results in Table 3 show that the accuracy of the crowd is
significantly better than the accuracy of individual turker s.
The second mechanism is a “turker selection ” module
that filters out inaccurate turkers. Figure 10 shows that
eliminating inaccurate turkers drastically reduces the false
negative rate. As shown in Figure 12, we can implement
turker selection by randomly mixing in “ground-truth pro-
files” that have been verified by social network exployees
with the larger set of suspicious pro files. By examining a
“
All Turkers
Crowdsourcing
Employees
Very Accurate
Turkers
Threshold
L (Lower Layer, Accurate Turkers)
U (Upper Layer, Very Accurate Turkers)
70% 80% 90%
5
5
5
3
3
2
Turker
Selection
Accurate
Turkers
Sybils
Table 5. Optimal # of votes per pro file in each
layer in order to keep the false positives <1%.
Social
Networks
User Reports
Auto Filters
Filtering
?
Suspicious
Pro!les
Figure 12. Crowdsourced Sybil detector.
tester’s answers on the ground-truth pro files, we can gauge
the evaluation accuracy of each worker. This accuracy test
is performed continuously over time, so that any significant
deviation in the quality of turker’s work will be detected.
This protects against malicious attackers who go “under-
cover ” as one of our testers, only to turn malicious and gen-
erate bad results when presented with real test pro files.
6.2 System Simulations and Accuracy
In this section, we examine the tradeoff between accu-
racy and cost in our system. The overall goal of the system
is to minimize false positives and negatives, while also min-
imizing the number of votes needed per pro file (since each
vote from a turker costs money). There is a clear tradeoff
between these two goals: as shown in Figure 9, more votes
reduces false positives.
Simulation Methodology. We use trace-driven simula-
tions to examine these tradeoffs. We simulate 2000 suspi-
cious pro files (1000 Sybil, 1000 legitimate) that need to be
evaluated. We vary the number of votes per pro file, V , and
calculate the false positive and false negative rates of the
system. Thus, each pro file is evaluated by V random turk-
ers, and each turker’s probability of being correct is based
on their results from our user study. In keeping with our sys-
tem design, all turkers with <60% accuracy are eliminated
before the simulation by our “turker selection ” module.
We consider two different ways to organize turkers in
our simulations. The first is simple: all turkers are grouped
together. We refer to this as one-layer organization. We
also consider two-layer organization:
turkers are divided
into two groups, based on an accuracy threshold T . Turkers
with accuracy > T are placed in the upper layer, otherwise
they go into the lower layer.
In the two-layer scheme, pro files are first evaluated by
turkers in the lower layer.
If there is strong consensus
among the lower layer that the pro file is Sybil or legitimate,
then the classification stands. However, if the pro file is
con-
troversial, then it is sent to the more accurate, upper layer
turkers for reevaluation. Each pro file receives B votes in
the lower layer and U votes in the upper layer. Intuitively,
the two-layer system tries to maximize the utility of the very
accurate turkers by only having them evaluate difficult pro-
files. Figure 12 depicts the two-layer version of our system.
In our design, we cap the maximum acceptable false pos-
itive rate at 1%. Our motivation is obvious: social network
providers will not deploy a security system that has a non-
negligible negative impact on legitimate users. We con-
ducted simulations on all our turker groups, with consistent
results across groups. For brevity, we limit our discussion
here to results for the Chinese turkers. As shown in Fig-
ure 6, the Chinese turkers have the worst overall accuracy
of our turker groups. Thus, they represent the worst-case
scenario for our system. The US and Indian groups both
exhibit better performance in terms of cost and accuracy
during simulations of our system.
Votes per Pro file.
In the one-layer simulations, the only
variable is votes per pro file V . Given our constraint on false
positives <1%, we use multiple simulations to compute the
minimum value of V . The simulations reveal that the mini-
mum number of votes for the Chinese pro files is 3; we use
this value in the remainder of our analysis.
Calculating the votes per pro file in the two-layer case is
more complicated, but still tractable. The two-layer sce-
nario includes four variables: votes per pro file ( U upper
and L lower), the accuracy threshold between the layers
T , and the controversial range R in which pro files are for-
warded from the lower to upper layer. To calculate L and U
we use the same methodology as in Figure 9. Turkers are
divided into upper and lower layers for a given threshold
T ∈ [70%, 90%], then we incrementally increase the votes
per pro file in each layer until the false positive rate is <1%.
The false positive rate of each layer is independent (i.e. the
number of votes in the lower layer does not impact votes
in the upper layer), which simplifies the calculations. The
controversial range only effects the false negative rate, and
is ignored from these calculations.
Table 5 shows the minimum number of votes per pro file
needed in the upper and lower layers as T is varied. We use
these values in the remainder of our analysis.
Figure 13 shows the average votes per pro file in our sim-
ulations. Three of the lines represent two-layer simulations
with different R values. For example, R = [0.2, 0.9] means
that if between 20% and 90% of the turkers classify the pro-
file as a Sybil, then the pro file is considered controversial.
Although we simulated many R ranges, only three repre-
e
l
i
f
o
r
P
r
e
P
s
e
t
o
V
.
g
v
A
10
8
6
4
2
0
70
[0.2, 0.9]
[0.2, 0.5]
[0.5, 0.7]
One-Layer
75
80
Threshold (%)
85
90
)
%
(
e
t
a
R
e
v
i
t
a
g
e
N
e
s
l
a
F
100
80
60
40
20
0
70
[0.5, 0.7]
One-Layer
[0.2, 0.9]
[0.2, 0.5]
75
80
Threshold (%)
85
90
)
%
(
e
t
a
R
e
v
i
t
a
g
e
N
e
s
l
a
F
35
30
25
20
15
10
5
0
1%
0.1%
0 1 2 3 4 5 6 7 8 9 10
Avg. Votes Per Profile
Figure 13. Threshold versus
average votes per pro files.
Figure 14. Threshold versus
false negative rate.
Figure 15. Tradeoff between
votes per pro file and desired
accuracy.
sentative ranges are shown for clarity. The number of votes
for the one-layer scheme is also shown.
The results in Figure 13 show that the number of votes
needed in the various two-layer scenarios are relatively sta-
ble. As R varies, the number of pro files that must be evalu-
ated by both layers changes. Thus, average votes per pro file
fluctuates, although the average is always ≤ L + U from
Table 5. Overall, these fluctuations are minor, with average
votes only changing by ≈1.
False Negatives.
Judging by the results in Figure 13,
the one-layer scheme appears best because it requires the
fewest votes per pro file (and is thus less costly). However,
there is a significant tradeoff for lowering the cost of the
system: more false negatives.
Figure 14 shows the false negative rates for our simu-
lations. The results for the two-layer scheme are superior:
for certain values of R and thresholds ≥80%, two-layers
can achieve false negative rates <10%. The parameters that
yield the lowest false negatives (0.7%) and the fewest aver-
age votes per pro file (6) are R = [0.2, 0.5] and T = 90%.
We use these parameters for the remainder of our analysis.
The results in Figures 13 and 14 capture the power of
our crowdsourced Sybil detection system. Using only an
average of 6 votes per pro file, the system products results
with false positive and negative rates both below 1%.
Reducing False Positives.
In some situations, a so-
cial network may want to achieve a false positive rate sig-
nificantly lower than 1%. In order to evaluate how much
this change would affect costs, we re-ran all our simulations
with the target false positive rate set to <0.1%. Figure 15
plots the number of votes per pro file versus false negatives
as the target false positive rate is varied. Each point in the
scatter is a different combination of R and T values. The
conclusion from Figure 15 is straightforward: to get <0.1%
false positives, you need two additional votes per turker.
This tradeoff is fairly reasonable: costs increase 33%, but
false positives reduce by an order of magnitude.
Parameterization.
Since our system parameters were
optimized using actual user test results, they may not be
ideal for every system or user population. The key takeaway
is that given a user population, the system can be calibrated
to provide high accuracy and scalability. We do not have
sufficient data to make conjectures about how often or when
systems require re-calibration, but it is likely that a deployed
system might periodically recalibrate parameters such as V
and T for continued accuracy.
6.3 The Costs of a Turker Workforce
Using the parameters derived in the previous section, we
can estimate how many turkers would be needed to deploy
our system. Using the parameters for Renren, each pro-
file requires 6 votes on average, and turkers can evaluate
one pro file every 20 seconds (see Figure 8). Thus, a turker
working a standard 8-hour day (or several turkers working
an equivalent amount of time) can examine 1440 pro files.
Data from a real OSN indicates that the number of turk-
ers needed for our system is reasonable. According to [3],
Tuenti, a Spanish online social network, has a user-base of
11 million and averages 12,000 user reports per day. Our
system would require 50 full-time turkers to handle this
load. If we scale the population size and reports per day up
by a factor of 10, we can estimate the load for a large OSN
like Facebook. In this case, our system requires 500 turkers.
Our own experience showed that recruiting this many turk-
ers is not difficult (Table 1). In fact, following our crowd-
sourcing experiments on this and other projects [30], we
received numerous messages from crowd requesting more
tasks to perform.
Finally, we estimate the monetary cost of our system.
Facebook pays turkers from oDesk $1 per hour to mod-
erate images [10].
If we assume the same cost per hour
per turker for our system, then the daily cost for deploy-
ment on Tuenti (i.e. 12,000 reports per day) would only be
$400. This compares favorably with Tuenti’s existing prac-
tices: Tuenti pays 14 full-time employees to moderate con-
tent [3]. The estimated annual salary for Tuenti employees
are roughly e30,0003, which is about $20 per hour. So the
Tuenti’s moderation cost is $2240 per day, which is signif-
icantly more than the estimated costs of our turker work-
force.
6.4 Privacy
Protecting user privacy is a challenge for crowdsourced
Sybil detection. How do you let turkers evaluate user pro-
files without violating the privacy of those users? This issu e
does not impact our experiments, since all pro files are from
public accounts. However, in a real deployment, the system
needs to handle users with strict privacy settings.
One possible solution is to only show turkers the public
portions of users’ pro files. However, this approach is prob-
lematic because Sybils could hinder the detection system by
setting their pro files to private. Setting the pro file to priv
ate
may make it more difficult for Sybils to friend other users,
but it also cripples the discriminatory abilities of turkers.
A better solution to the privacy problem is to leverage the
OSNs existing “report”
filter. Suppose Alice reports Bob’s
pro file as malicious. The turker would be shown Bob’s pro-
file as it appears to Alice. Intuitively, this gives the turker
access to the same information that Alice used to make her
determination. If Alice and Bob are friends, then the turker
would also be able to access friend-only information. On
the other hand, if Alice and Bob are strangers, then the
turker would only have access to Bob’s public information.
This scheme prevents users from abusing the report system
to leak the information of random strangers.
7 Related Work
The success of crowdsourcing platforms on the web has
generated a great deal of interest from researchers. Sev-
eral studies have measured aspects of Amazon’s Mechani-
cal Turk, including worker demographics [12, 24] and task
pricing [5, 11, 19]. There are studies that explore the pros
and cons to use MTurk for user study [16].
Many studies address the problem of how to maximize
accuracy from inherently unreliable turkers. The most com-
mon approach is to use majority voting [17, 25], although
this scheme is vulnerable to collusion attacks by malicious
turkers [26]. Another approach is to pre-screen turkers with
a questionnaire to filter out less reliable workers [22]. Fi-
nally, [26] proposes using a tournament algorithm to deter-
mine the correct answer for difficult tasks.
In this study, we propose using crowdsourcing to solve
a challenging OSN security problem. However, many stud-
ies have demonstrated how crowdsourcing can be used by
attackers for malicious ends. Studies have observed ma-
licious HITs asking turkers to send social spam [30], per-
form search engine optimization (SEO) [21], write fake re-
views [23], and even install malware on their systems [15].
8 Conclusion and Open Questions
Sybil accounts challenge the stability and security of to-
day’s online social networks. Despite significant efforts
from researchers and industry, malicious users are creat-
ing increasingly realistic Sybil accounts that blend into the
legitimate user population. To address the problem today,
social networks rely on ad hoc solutions such as manual in-
spection by employees.
Our user study takes the first step towards the develop-
ment of a scalable and accurate crowdsourced Sybil detec-
tion system. Our results show that by using experts to cal-
ibrate ground truth filters, we can eliminate low accuracy
turkers, and also separate the most accurate turkers from
the crowd. Simulations show that a hierarchical two-tiered
system can both be accurate and scalable in terms of total
costs.
Ground-truth.
Our system evaluation is constrained by
the ground-truth Sybils used in our user study, i.e. it is possi-
ble that there are additional Sybils that were not caught and
included in our data. Thus, our results are a lower bound
on detection accuracy. Sybils that can bypass Facebook or
Renren’s existing detection mechanisms could potentially
be caught by our system.
Deployment.
Effective deployment of crowdsourced
Sybil detection mechanisms remains an open question. We
envision that the crowdsourcing system will be used to com-
plement existing techniques such as content- filtering and
statistical models. For example, output from accurate turk-
ers can teach automated tools which fields of the data can
most easily identify fake accounts. Social networks can fur-
ther lower the costs of running this system by utilizing their
own users as crowdworkers. The social network can replace
monetary payments with in-system virtual currency, e.g.
Facebook Credits, Zynga Cash, or Renren Beans. We are
currently discussing internal testing and deployment possi-
bilities with collaborators at Renren and LinkedIn.
Countermeasures.
An effective solution must take into
account possible countermeasures by attackers. For exam-
ple, ground-truth pro files must be randomly mixed with test
pro files in order to detect malicious turkers that attempt to
poison the system by submitting intentionally inaccurate re-
sults. The ground-truth pro files must be refreshed periodi-
cally to avoid detection. In addition, it is possible for attack-
ers to in filtrate the system in order to learn how to improve
fake pro files to avoid detection. Dealing with these “under-
cover ” attackers remains an open question.
3 http://www.glassdoor.com/Salary/Tuenti- Salaries- E245751.htm
References
-
[1] Thousands of fake profiles on facebook identi fied. Weekly
Blitz.net, June 2011.
[2] Y. Boshmaf et al. The socialbot network: When bots social-
ize for fame and money. In Proc. of ACSAC, 2011.
[3] Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding
the detection of fake accounts in large scale social online
services. In Proc. of NSDI, 2012.
[4] G. Danezis and P. Mittal. Sybilinfer: Detecting sybil nodes
using social networks. In Proc. of NDSS, 2009.
[5] S. Faridani, B. Hartmann, and P. G. Ipeirotis. What’s the
right price? pricing tasks for finishing on time. In Proc. of
AAAI Workshop on Human Computation, 2011.
[6] H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao.
Detecting and characterizing social spam campaigns.
In
Proc. of IMC, 2010.
[7] A. Ghosh, S. Kale, and P. McAfee. Who moderates the mod-
erators? crowdsourcing abuse detection in user-generated
content. In Proc. of EC, 2011.
[8] D. Goldman.
Facebook tops 900 million users. CNN
Money, 2012.
[9] J. Heer and M. Bostock. Crowdsourcing graphical percep-
tion: using mechanical turk to assess visualization design.
In Proc. of CHI, 2010.
[10] I. Hollingshead and E. Barnett. The dark side of facebook.
Telegraph, March 2012.
[11] P. G. Ipeirotis. Analyzing the amazon mechanical turk mar-
ketplace. XRDS, 17:16–21, Dec. 2010.
[12] P. G. Ipeirotis. Demographics of mechanical turk. NYU
Working Paper, 2010.
[13] D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu.
Reverse social engineering attacks in online social networks.
In Proc. of DIMVA, 2011.
[14] J. Jiang et al. Understanding latent interactions in online
social networks. In Proc. of IMC, 2010.
[15] C. Kanich, S. Checkoway, and K. Mowery. Putting out a hit:
Crowdsourcing malware installs. In Proc. of WOOT, 2011.
[16] A. Kittur, H. Chi, and B. Suh. Crowdsourcing user studies
with mechanical turk. In Proc. of CHI, 2008.
[17] J. Le, A. Edmonds, V. Hester, and L. Biewald. Ensuring
quality in crowdsourced search relevance evaluation.
In
Workshop on Crowdsourcing for Search Evaluation, 2010.
[18] G. Liu, Y. Wang, and M. Orgun. Trust transitivity in complex
social networks. In Proc. of AAAI Conference on Arti ficial
Intelligence, 2011.
[19] W. Mason and D. J. Watts. Financial Incentives and the “P er-
formance of Crowds”. In Proc. of KDD-HCOMP, 2009.
[20] A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing
Time of Social Graphs. In Proc. of IMC, 2010.
[21] M. Motoyama et al. Dirty jobs: The role of freelance labor
in web service abuse. In Proc. of Usenix Security, 2011.
[22] D. Oleson et al. Programmatic gold: Targeted and scal-
able quality assurance in crowdsourcing. In Proc. of Human
Computation, 2011.
[23] M. Ott, Y. Choi, C. Cardie, and J. T. Hancock. Finding de-
ceptive opinion spam by any stretch of the imagination. In
Proc. of ACL, 2011.
[24] J. Ross et al. Who are the crowdworkers?: Shifting demo-
graphics in amazon mechanical turk. In Proc. of CHI, 2010.
[25] R. Snow, B. O’Connor, D. Jurafsky, and A. Y. Ng. Cheap
and fast —but is it good?: evaluating non-expert annotation s
for natural language tasks. In Proc. of EMNLP, 2008.
[26] Y.-A. Sun, S. Roy, and G. Little. Beyond independent agree-
ment: A tournament selection approach for quality assur-
ance of human computation tasks. In Proc. of Human Com-
putation, 2011.
[27] K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended
accounts in retrospect: An analysis of twitter spam. In Proc.
of IMC, 2011.
[28] N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-resilient
online content voting. In Proc. of NSDI, 2009.
[29] B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An
analysis of social network-based sybil defenses. In Proc. of
SIGCOMM, 2010.
[30] G. Wang, C. Wilson, X. Zhao, Y. Zhu, M. Mohanlal,
H. Zheng, and B. Y. Zhao. Serf and turf: Crowdtur fing for
fun and profit. In Proc. of WWW, 2012.
[31] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and
Y. Dai. Uncovering social network sybils in the wild.
In
Proc. of IMC, 2011.
[32] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit:
A near-optimal social network defense against sybil attacks.
In Proc. of IEEE S&P, 2008.
[33] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybil-
guard: defending against sybil attacks via social networks.
In Proc. of SIGCOMM, 2006.
|
1111.1053 | 1 | 1111 | 2011-11-04T06:31:55 | Modelling and Performance analysis of a Network of Chemical Sensors with Dynamic Collaboration | [
"cs.SI",
"physics.soc-ph"
] | The problem of environmental monitoring using a wireless network of chemical sensors with a limited energy supply is considered. Since the conventional chemical sensors in active mode consume vast amounts of energy, an optimisation problem arises in the context of a balance between the energy consumption and the detection capabilities of such a network. A protocol based on "dynamic sensor collaboration" is employed: in the absence of any pollutant, majority of sensors are in the sleep (passive) mode; a sensor is invoked (activated) by wake-up messages from its neighbors only when more information is required. The paper proposes a mathematical model of a network of chemical sensors using this protocol. The model provides valuable insights into the network behavior and near optimal capacity design (energy consumption against detection). An analytical model of the environment, using turbulent mixing to capture chaotic fluctuations, intermittency and non-homogeneity of the pollutant distribution, is employed in the study. A binary model of a chemical sensor is assumed (a device with threshold detection). The outcome of the study is a set of simple analytical tools for sensor network design, optimisation, and performance analysis. | cs.SI | cs |
Modelling and Performance analysis of a Network of Chemical
Sensors with Dynamic Collaboration
HPP Division, Defence Science and Technology Organisation, 506 Lorimer Street, Fishermans Bend,
Alex Skvortsov
Vic 3207, Australia
Branko Ristic
ISR Division, Defence Science and Technology Organisation, 506 Lorimer Street, Fishermans Bend,
Vic 3207, Australia
Abstract
The problem of environmental monitoring using a wireless network of chemical sensors
with a limited energy supply is considered. Since the conventional chemical sensors in ac-
tive mode consume vast amounts of energy, an optimisation problem arises in the context
of a balance between the energy consumption and the detection capabilities of such a net-
work. A protocol based on "dynamic sensor collaboration" is employed: in the absence
of any pollutant, majority of sensors are in the sleep (passive) mode; a sensor is invoked
(activated) by wake-up messages from its neighbors only when more information is re-
quired. The paper proposes a mathematical model of a network of chemical sensors using
this protocol. The model provides valuable insights into the network behavior and near
optimal capacity design (energy consumption against detection). An analytical model of
the environment, using turbulent mixing to capture chaotic fluctuations, intermittency
and non-homogeneity of the pollutant distribution, is employed in the study. A binary
model of a chemical sensor is assumed (a device with threshold detection). The outcome
of the study is a set of simple analytical tools for sensor network design, optimisation,
and performance analysis.
1. Introduction
Development of wireless sensor network (WSN) for a particular operation scenario
is a complex scientific and technical problem [1], [2]. Very often this complexity resides
Preprint submitted to International Journal of Distributed Sensor Networks
January 23, 2018
in establishing a balance between the peak performances of the WSN prescribed by the
operational requirements (e.g. minimal detection threshold, size of surveillance region,
detection time, rate of false negatives, etc) and various resource constrains (e.g. limited
energy supply, limited number of sensors, limited communication range, fixed detection
threshold of individual sensors, limited budget for the cost of hardware, maintenance,
etc). The issue of resource constraints becomes even more relevant for a network of
chemical sensors that are used for the continuous environmental monitoring (air and
water pollution, hazardous releases, smoke etc). The reason is that a modern chemical
sensor is usually equipped with a sampling unit (a fan for air and a pump for water),
which turns on when the sensor is active. The sampling unit usually requires a significant
amount of energy to operate as well as frequent replacement of some consumable items
(i.e. cartridges, filters). This leads to the critical requirement in the design of a WSN to
reduce the active (i.e. sampling) time of its individual sensors.
One attractive way to achieve an optimal balance between the peak performance
of the WSN and its constraints in resources, mentioned above is to exploit the idea of
Dynamic Sensor Collaboration (DSC) [3], [4]. The DSC implies that a sensor in the
network should be invoked (or activated) only when the network will gain information
by its activation [4]. For each individual sensor this information gain can be evaluated
against other performance criteria of the sensor system, such as the detection delay or
detection threshold, to find an optimal solution in the given circumstances.
While the DSC-based approach is a convenient framework for the development of
algorithms for optimal scheduling of constrained sensing resources, the DSC-based al-
gorithms involve continuous estimation of the state of each sensor in the network and
usually require extensive computer simulations [3], [4]. These simulations may become
unpractical as the number of sensors in the network increases (e.g. "smart dust" sensors).
Even when feasible, the simulations can provide only the numerical values for optimal
network parameters, which are specific for an analysed scenario, but without any an-
alytical framework for their consistent interpretation and generalisation. For instance,
the scaling properties of a network (the functional relationship between the network
parameters) still remain undetermined, which prevents any comprehensive optimisation
study.
2
This motivates the development of another, perhaps less rigorous, but certainly sim-
pler approach to the problem of network analysis and design. The main idea is to
phenomenologically employ the so-called bio-inspired (epidemiology, population dynam-
ics) or physics inspired (percolation and graph theory) models of DSC in the sensor
network in order to describe the dynamics of collaboration as a single entity [5], [6], [7],
[9], [10],[11]. Since the theoretical framework for the bio- or physics- inspired models is
already well established, we are in the position to make significant progress in the ana-
lytical treatment of these models of DSC (including their optimisation). From a formal
point of view the derived equations are ones of the "mean-field" theory, meaning that
instead of working with dynamic equations for each individual sensor we only have a
small number of equations for the "averaged" sensor state (i.e. passive, active, faulty
etc), regardless of the number of the sensors in the system. A reveling example of the
efficiency of this approach is the celebrated SIR model in epidemiology [12]. For any size
of population, the SIR model describes the spread of an infection by using only three
equations, corresponding to three "infectious" classes of the population: susceptible,
infectious and recovered.
The analytic or "equation-based" approach, often leads to valuable insights into the
performance of the proposed sensor network system by providing simple analytical expres-
sions to calculate the vital network parameters, such as detection threshold, robustness,
responsiveness and stability and their functional relationships.
In the current paper we develop a simple model of a wireless network of chemical
sensors, where dynamic sensor collaboration is driven by the level of concentration of
a pollutant (referred to as the "external challenge") at each individual sensor. Our
approach is based on the known analogy [11] between the information spread in a sensor
network and the epidemics propagation across a population. In this analogy, the infection
transmission process corresponds to message passing among the sensors. A chain reaction
in transmission of an infection is called the epidemic. In the context of a sensor network,
a chain reaction will trigger the network (as a whole) to move from the "no pollutant"
state to the "pollutant present" state, which will indicate the presence of an external
challenge.
The paper shows that the adopted epidemics or population inspired approach can
3
provide a reliable description of the dynamics of such a sensor network. The simple ana-
lytical formulas (scaling laws) derived from the model express the relationships between
the parameters of the network (e.g. number of sensors, their density, sensing time etc),
the network performance (probability of detection, response time of a network) and the
parameters of the external challenge (environment, pollutant). As an example of appli-
cation of the proposed framework we performed a simple optimisation study. Numerical
simulations are carried out and presented in the paper in support of analytic expressions.
Although the model presented in this paper is specific to a network of chemical
sensors, the underlying analytical approach can be easily adapted to other applications
and other types of networks by a simple change of the model of environment and sensor.
2. The Model of Environment
The external challenges are modeled by a random time series which mimics the tur-
bulent fluctuation of concentration at each sensor of the network. In this approach the
fluctuations in concentration C are modeled by the probability density function (pdf) of
C with the mean C0 as a parameter (i.e. C0 is a mean concentration of the tracer in the
area) [13] :
f (CC0) = (1 − ω)δ(C) +
ω2
C0
(γ − 2)(cid:18)1 +
(γ − 1)
ω
(γ − 2)
C
C0(cid:19)−γ
.
(1)
Here the value γ = 26/3 can be chosen to make it compliant with the theory of tracer
dispersion in Kolmogorov turbulence (see [13]), but it may vary with the meteorological
conditions. The parameter ω, which models the tracer intermittency in the turbulent
flow, can be in the range [0, 1], with ω = 1 corresponding to the non-intermittent case.
In general it also depends on a sensor position within a chemical plume, thus ω is in the
range 0.95 − 0.98 near the plume centroid and may drop to 0.3 − 0.5 near the plume
edge. For ω 6= 0, the pdf f of (1) has a delta impulse in zero, meaning that the measured
concentration in the presence of intermittency can be zero on some occasions. It can be
easily shown that the pdf of (1) integrates to unity, so it is appropriately normalized.
The measured concentration time series can be generated by drawing random samples
from the probability density function given in (1) at each time step. The random number
4
200
150
.
)
.
u
a
(
y
100
50
1.06
1.04
1.02
1
0.98
0.96
0.94
50
100
x (a.u.)
150
200
Figure 1: Example for concentration realisation for a plume-like flow (left) and the selected area of the
flow with higher resolution (right).
generator is implemented using the inverse transform method based on the following
steps [8] :
1. Draw a sample u from the standard uniform distribution: u ∼ U [0, 1].
2. Compute the value of C that satisfies F (C) = u, where F (·) is the cumulative
distribution function (cdf) of the distribution of interest.
3. The value of C computed in the previous step is a random sample drawn from the
desired probability distribution.
The cdf F (·) needed for inverse transform sampling is obtained by integrating the pdf
in (1), and is given by:
F (CC0) = 1 − ω(cid:20)1 +(cid:18) 2
γ − 2(cid:19) C
C0(cid:21)1−γ
.
(2)
The use of this cdf in the inverse transform sampling procedure generates the value of
concentration:
C0(cid:0) γ−2
ω (cid:1)h(cid:0) 1−u
ω (cid:1)−
0,
1
γ−1 − 1i , u ≥ 1 − ω
u < 1 − ω,
(3)
C =
where u is again the standard uniform distribution u ∼ U [0, 1].
In order to produce spatial correlations that compline with the well-known scaling
properties of turbulent dispersion a special 'swapping' algorithms was implement. This
recursive algorithm mimic the chaotic fluctuations occurring in the real turbulent flows
(for details, see [16]).
The proposed framework allows to implement a reasonably realistic model of the con-
taminated environment (i.e to generate the concentration realisation at each sensor over
5
time), see Fig 1. Due to a universal nature of turbulence it can be used to simulate
performance of WSN in detection of either airborne and waterborne releases. The pa-
rameters γ and ω are typically estimated from geophysical observation (meteorological
and organological) and will be assumed known.
The geometrical complexity of the turbulent flow can be incorporated in the theo-
retical framework (2) by assuming a temporal and spatial variability of the mean con-
centration filed C0 ≡ C0(r, t). This way we can simulate various morphologies of the
flow (jet, wake, boundary layer, compartment flow, etc) as well as various scenarios of
hazardous release (plume, puff ), for details see [8] , [17]. For the sake of simplicity in
the current paper we consider only case C0 = const. This assumption corresponds to the
approximation when the size of WSN is less that the width of hazardous plume (see Fig
1), or to an important practical case of a 'highly distributed' source of pollutant (traffic,
extended industrial site or urban area [18]).
3. The Model of a Chemical Sensor
We adopt a simple binary (or "threshold") model of a sensor, with the sensor reading
V given by:
We emphasize that threshold C∗ is an internal characteristic of the sensor, unrelated to
1, C ≥ C∗
0, C < C∗.
(4)
V =
C0 in (1). This threshold is another important parameter of our model. A chemical sensor
with bar readings, which includes many subsequent levels for concentration thresholds
mapped into a discrete sensor output, is an evident generalisation of (4).
Using (3) and (4) it is straightforward to derive the probability of detection for an
individual sensor embedded in the environment characterised by (2):
p = 1 − F (C∗C0).
(5)
This aggregated parameter links the characteristics of a specific sensor C∗, the parameter
of the external challenge C0 and the environment (F (·), γ, ω).
6
4. Modeling and Analysis of Network Performance
Our focus is a wireless network of chemical sensors with dynamic collaboration. We
assume that N identical sensors (i.e with the same detection threshold C∗ and sampling
time τ∗) are uniformly distributed over the surveillance domain of area S with density
ρ = N/S.
We will model the following network protocol for dynamic collaboration. Each sensor
can be only in one of the two states: active or passive. The sensor can be activated
only by a message it receives from another sensor. Once activated, the sensor remains
in the active state during an interval of time τ∗; then it returns to the passive (sleep)
state. While being in the active state, the sensor senses the environment and if the
chemical tracer is detected (binary detection), it broadcasts a (single) message. If a sensor
receives an activation message while it is in the active state, it will ignore this message.
The broadcast capability of the sensor is characterized by its communication range r∗,
which is another important parameter of the model. The described protocol assumes
that certain sensors of the network are permanently active. The number of permanently
active sensors in the network is fixed but the actual permanently active sensors vary over
time in order to equally distribute the energy consumption of individual sensors.
The WSN following this protocol can be considered as a system of agents, interacting
with each other (by means of message exchange) and with the stochastic environment
(by means of sampling and probing). The interactions can change the state of agents
(active and passive). From this perspective this WSN is similar to the epidemic SIS
(susceptible-infected-susceptible) model [12], in which an individual can be in only two
states (susceptible or infected), and the change of state is a result of interaction (mixing)
between the individuals (which corresponds to the exchange of messages in our case).
Thus a dynamic (population) model for our system [12] is as follows:
dN+
dt
dN−
dt
= αN+N− −
= −αN+N− +
,
N+
τ∗
N+
τ∗
,
(6)
(7)
where N+, N− denote the number of active and passive sensors, respectively. The nonlin-
ear terms on the RHS of (6) and (7) are responsible for the interaction between individuals
7
(i.e. sensors), with the parameter α being a measure of this interaction. The population
size (i.e. the number of sensors) is conserved, that is N+ + N− = N = const.
The next step is to express α in terms of the parameters of our system by invok-
ing physics based arguments used in population dynamics [12] . It is well-known that
parameter α in (6) describes the intensity (contact rate) of social interaction between
individuals in the community, so we can propose (see [12], [15])
mp
N τ∗
,
α ∝
(8)
where m is the number of contacts made by an "infected" sensor during the infectious
period τ∗ (i.e the number of sensors receiving a message from an alerting sensor). In our
case we have m = πr2
∗ρ. Then using N = Sρ we can write
α = G
∗
πr2
τ∗S
p,
(9)
where G is a constant calibration factor, being of order unity (it must be estimated during
the network calibration); p was defined by (5). In order to simplify notation, from now
on we will assume that G is absorbed in the definition of r∗.
It is worth noting that by introducing non-dimensional variables n+ = N+/N, n− =
N−/N, τ = t/τ∗ the system (6)-(7) can be rewritten in a compact non-dimensional form
dn+
dτ
= R0n+n− − n+, n− = 1 − n+,
with only one non-dimensional parameter
R0 = ατ∗N.
(10)
(11)
The parameter R0 is well-known in epidemiology where it has the meaning of a basic
reproductive number [12].
The system (6)-(7) combined with the condition N+ + N− = N can be reduced to
one equation for y = N+
where
dy
dt
= αy(N − y) −
y
τ∗
= y(b − αy),
b = αN − 1/τ∗ = (R0 − 1)/τ∗.
8
(12)
(13)
By simple change of variables z = αy/b this equation can be reduced to the standard
logistic equation
which has the well-known solution
dz
dt
= bz(1 − z),
z(t) =
z0
(1 − z0) exp(−bt) + z0
,
(14)
(15)
where z0 = z(0).
We can see that if b < 0 then z → 0 as t → ∞ for any z0, so any individual sensor
activation in the network will "die out", that is the network will not be able to detect
the external challenge. The same is valid for b = 0 when z = z0 = const (no response
to external challenges). Only if the condition b > 0 is satisfied, then z → 1 as t → ∞
(independently of z0). In this case, after a certain transition interval, the network will
reach a new steady state with
N+
N
= 1 − θ,
N−
N
= θ, θ =
1
ατ∗N ≡
1
R0
.
(16)
A fraction of active sensors N+ at this new state is a measure of the network (positive)
response to the event of chemical contamination. From (15) it is clear that the time scale
for the network to reach the new state can be estimated from the condition e−bt ≪ 1, so
(17)
τ∗
.
1
b
=
τ ≥
R0 − 1
This equation provides the relationship between the scale of activation time and param-
eter R0. One can see that this scale decreases as R0 increases.
From (14), (17) it follows that an "epidemic threshold" for the sensor network is
simply ατ∗N > 1 or in terms of the 'basic reproductive number' (11)
R0 = ατ∗N = pN
∗
πr2
S
> 1.
(18)
Observe that sensor sampling time τ∗ has disappeared from the expression for R0. This
means that it is possible to create an information epidemic (i.e. detect a chemical pol-
lutant) for any value of τ∗, provided this time is long enough for a sensor to detect the
chemical tracer. But according to (17), the responsiveness of the whole network to the
external challenges (i.e. the time constant of detection) is, indeed, strongly dependent
on the sensor sampling time τ = τ∗/(R0 − 1).
9
The expressions (16), (17) and (18) are the main analytical results of the paper. For a
given level of external challenges (i.e. C0) and meteorological conditions (i.e. γ, ω), these
expressions provide a simple yet rigorous way to estimate how a change in the network
and sensor parameters (i.e. N, C∗, τ∗) will affect the network performance (i.e. N+, τ ).
We can also see that for a given external challenge the network of chemical sensors will
respond in the most effective way when its parameters are selected in the combination
which meets the criterion for 'information epidemic" (18).
The final analytical expressions enable us to maximize the network information gain
and optimize other parameters. For example, from (16), we can readily infer the impor-
tant scaling properties of the network performance:
N−
N ∼
1
r2
∗
,
N−
N ∼
1
N
,
N−
N ∼
1
p
.
(19)
For instance, if we double the communication range of an individual sensor r∗, the fraction
of inactive sensors in the network will drop four times. Likewise, if we need to reach a
specified fraction of active sensors (1 − N−/N ) to be able to reliably detect a given
level of pollutant concentration, these formulas describe all possible ways of changing
the parameters of the model in order to achieve this goal.
5. Information Gain of Collaboration
We have explained earlier that the concept of DSC is important for a network with
limited energy/material resources. But the question remains will a network with DSC
be inferior (in terms of detection performance) in comparison with a benchmark network
where all sensors operate independently of each other and only report their (positive)
detections of chemical pollution to the central processor for decision making? Clearly,
such a benchmark network would be very expensive to run (all sensors would have to be
active all the time), but could provide excellent detection performance.
In this section we show that, under a certain condition, the network with DSC can
provide superior detection performance compared to the benchmark network. Let us
assume that we have δN senors continuously operating (0 ≤ δ ≤ 1). For a benchmark
network, on average, we have pδN sensors detecting pollutant. For the network with DSC
the same quantity can be estimated as p(1 − θ)N (since as we have seen the saturation
10
level of N+ does not depend on initial conditions). From here we can then deduce that
the network with DSC will provide more information (for detection of chemical pollution)
than the benchmark network if the following condition is satisfied:
θ =
1
ατ∗N ≤ (1 − δ),
(20)
which is eventually reduced to the condition of "epidemic threshold"(18) for the small
value of δ.
The value of the parameter δ can be also estimated based on the following arguments.
Let us assume that our aim is to detect a level concentration C0 associated with a
hazardous release within the time T (the constraint on time is driven by the requirement
to mitigate the toxic effect of the release). Then we can write a simple condition for the
information 'epidemic' in the WSN to occur during time T :
δpN T /τ∗ ≥ 1,
(21)
where p is given by (5), i.e. p = 1− F (C∗C0). Evidently, for information epidemic to be
observable, the number of continuously active sensors should be less that the number of
sensors activated due to the hazardous release. Thus from (20) we can write the following
'consistency' condition for the minimum value of δ
δmin ≈
τ∗
pN T ≤ (1 −
1
ατ∗N
),
or by re-writing it in terms of R0, see (16),
δmin ≈
τ∗
pN T ≤ (1 −
1
R0
).
(22)
(23)
It can be seen, that with other conditions being equal the fraction of 'stand-by' sensors
δmin can be made however small (since R0 ≥ 1). It implies that only a small fraction
of WSN will be active most of the time and is a clear demonstration of the energy
consumption gain associated with the 'epidemic' protocol.
Another important criteria for epidemic protocol can be derived by comparison of
amplitude of "detectable events" for the same number of sensors in the network with
DSC with the system of N independent sensors. For the network with DSC it is (1− θ)N
(since we use N+ to retrieve information about the environment) and for the system of
11
the same independent sensors it is still pN (since N+ is simply equal to N ). Then instead
of (20) we can write
θ < (1 − p)
(24)
Under this condition more detectable events will occur in the presence of chemical pol-
lution by the described network with DSC (activation messages) then in a network of
stand alone sensors (signals of positive detection). This leads to the interesting threshold
condition on the number of sensors in the network
N >
S
πr2
∗
1
p(1 − p)
.
(25)
The last term in RHS (p(1− p))−1 has an obvious minimum 4 corresponding to p = 1/2,
so finally we arrive at the simple universal condition
N > N∗ =
4
π
S
r2
∗
.
(26)
This condition reads that if the number of sensors in the system is greater than N∗ then
networking with DSC can provide an information gain over the benchmark network. Un-
der this condition, the network with DSC in not only desirable from the aspect of energy
conservation, but also provides better detection performance through the information
gain.
The condition p = 1/2 minimizing RHS of (25) can be considered as a criterion for an
"optimal" sensor for a given network with DSC and for a given concentration of pollutant
to be detected. Namely, from the equation F (C∗C0) = 1/2 and using (2) we can write
C∗ = C0(cid:18) γ − 2
2 (cid:19)"(cid:18) 1
2ω(cid:19)1/(1−γ)
− 1# .
(27)
Given environmental parameters (γ, ω) and given the level of concentration to be de-
tected (C0), formula (27) also specifies a simple condition on detection threshold for an
individual sensor to maximize an information gain by being networked.
6. Numerical Simulations
In support of analytical derivations presented above, a network of chemical sensors
operating according to the adopted protocol for dynamic collaboration was implemented
12
in MATLAB. A comprehensive report with numerical simulations result will be published
elsewhere; here we present only some illustrative examples.
For consistency, a 1000m × 1000m surveillance region populated by N = 400 sensors
In each run, chemical
with a uniformly random placement was assumed in all tests.
pollution with concentration C0 = 150 is applied, and the simulation starts when a single
randomly selected sensor (which has detected the presence of chemical contamination in
its vicinity) starts broadcasting. Due to this random initiation and the fact that the
probability of detection of individual sensors is less than unity (p < 1), each run of
the computer program results in a slightly different outcome. Figs.2,3 show the average
evolution of the ratio N+/N in the network over time. The curves were obtained by
using the following parameters: ω = 0.98, γ = 26/3. Fig.2 demonstrates the changes in
dynamics of the WSN for different values of communication range r∗ and Fig.3 depicts
the similar plots for changes of the detection threshold of individual sensor C∗. For all
plots in Fig.2, Fig.3 the initial number of active sensors N+(t = 0) = 10.
Overall we found that the simulation output is much more sensitive to the changes
of communication range, than to the threshold of an individual sensor (see range of
parameters depicted in Figs.2,3). In all cases we observed the transition of N+ from the
initial steady state (where N+ is very small indicating the absence of the pollutant) to
the new steady state (high value of N+), so information "epidemic" in the network of
chemical sensors does occur. By direct substitution into (18) it was also validated that in
all cases presented in Figs.2,3 the condition for an information "epidemic" was satisfied.
In general, the saturation value of N+ derived from these plots were in an agreement with
theoretical prediction (16), but the estimated standard deviation of N+ (not shown in
Fig.2) could be very high (up to 30%) for some combination of parameters. The relative
standard deviation (normalized by mean value N+) usually gradually decreased over time
and quite rapidly decays with the increase of communication range r∗. The occasional
high variability of the output of the sensor network is undesirable and motivates further
analysis. We also used the data from the plots in Figs. 2, 3 to calibrate our model.
The calibration was performed by extracting the steady-sate (or saturation) values of
N+ from the plots and by adjusting the "free" constant G in the analytical expressions
(16) to achieve the best match between the analytical predictions and simulations. The
13
1
0.8
0.6
0.4
0.2
N
/
+
N
0
0
20
40
60
80
100
t/τ
*
Figure 2: Results of numerical simulations: The fraction of active sensors in the network over time for
the different communication range r∗: ♦ − r∗ = 40m, (cid:3) − r∗ = 30m, ▽ −r∗ = 27m, (cid:13) −r∗ = 20m;
C∗/C0 = 1.03, N+(t = 0) = 10. The dashed red line corresponds to the analytical predictions (15). It
is clearly seen that in the case r∗ = 20m the information epidemic in WSN dies off.
value G ≈ 0.7 seems to provide an optimal agreement with the presented simulations.
In order to validate our simple model for parameter α we performed the following
study. For each simulation we derived value of αs from (16) and then compared it
with the value αt calculated from the theoretical expression (9) using the calibration
value G ≈ 0.7. The results of this study are presented in Fig.4. The red dashed line
corresponds to the perfect agreement between the theory and simulations. Considering
the high variability of N+ and a rather simple model for α, the agreement between the
theory and simulations is acceptable.
To validate further the alignment between the computer simulations and the proposed
mathematical model, we numerically estimated some scaling properties of the network
system (i.e. (9), (19)). Firstly we derived the scaling properties from computer simula-
tions and then compared them to the theoretical predictions. In general we found that
all trends of the derived scaling do agree with theoretical expressions in (19), but the
quantitative agrement may significantly vary from case to case. As an illustration, in
14
N
/
+
N
1
0.8
0.6
0.4
0.2
0
0
20
40
t/τ
*
60
80
100
Figure 3: Results of numerical simulations: The fraction of active sensors in the network over time for the
different threshold of individual sensor C∗: (cid:3) − C∗/C0 = 1.05, ▽ −C∗/C0 = 1.02, (cid:13) −C∗/C0 = 1.00;
r∗ = 40m, N+(t = 0) = 10. The dashed red line corresponds to the analytical predictions (15). It is
clearly seen that in the case C∗/C0 = 1.00 the information epidemic in WSN dies off.
0.1
0.09
0.08
0.07
0.06
0.05
0.04
0.03
0.02
0.01
t
α
0
0
0.01
0.02
0.03
0.04
0.06
0.07
0.08
0.09
0.1
0.05
α
s
Figure 4: Simulation and theoretical predictions of parameter α : αt is the theoretical value (9), αs is
the results of simulations. The red dashed line corresponds to the perfect agreement.
15
1.2
1
0.8
0.6
0.4
0.2
0
α
−0.2
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
p
Figure 5: Parameter α as a function of p extracted from numerical simulations in log-log scale. The
dashed line corresponds to the power-law fit α ∝ pq, q = 1.27, theoretical prediction corresponds to
q = 1, see (8).
Fig.5 we present the plot of dependency of α against p in log-log scale. The extracted
exponent corresponds to α ∝ pq, where q = 1.27 while the theoretical value according to
(8) is q = 1. This indicates that while our analytical model is very simple and fast to
compute, for higher accuracy it may need further refinements as discussed below.
The results of numerical simulations presented above serve to verify that the 'infor-
mation epidemic' does occur in the wireless network of chemical senors. This also implies
that the proposed theoretical framework may lead to a gain in the energy consumption,
that may result in the significant advantages in operational deployment of such systems.
More detailed analysis of the optimal values of parameters satisfying threshold conditions
(18), (23), (26) and lead to the optimal performance of WSN will be reported in separate
publications.
7. Refinements of the model
The disagreement described above is due to the implicit assumption of "homogeneous
mixing" which we made in equations (6)-(7). The homogeneous mixing manifests itself in
the bilinear form of the interaction terms on the RHS of (6)-(7). This bi-linearity means
that the number of new "infected" sensors is proportional to the product of the number
which is currently "infected" and the number which is currently "susceptible". Effectively
16
it means that all passive sensors are equally likely to be activated. This assumption holds
only if the majority of activated ("infected") sensors are far away from each other (i.e.
at the distances ≫ r∗). At some stage of the sensor "epidemic" this assumption can be
violated, because the secondary "infected" sensors will be at the shorter distances from
the "infectious" parents (see Fig.6). The broadcasted messages in overlapping areas
become duplicated and the rate of new "infections" will be no longer proportional to the
number of their parents. The fraction of "infected" sensors in the overlapping areas will
depend on the new equilibrium state of the sensor system (i.e. N+/N as t → ∞) and
may not be small for some scenarios. To overcome this restriction we again invoke an
approach successfully implemented in epidemiology (see [15]). Instead of (6)-(7) we now
write
dN+
dt
= αN ν
+N− −
N+
τ∗
,
dN−
dt
= −αN ν
+N− +
N+
τ∗
,
(28)
where a new parameter 0 ≤ ν ≤ 1 depends on the packing density of "infected" sensors (or
on the ratio N+/N ). For a "sparse" network configuration we have ν ≈ 1 (no overlapping
areas) and for an extremely "dense" network ν ≈ 0 (all sensors are located around the
same point), see Fig. 6. In general ν can be used as a fitting parameter of the model
[9] or estimated based on the mathematical theory of packing. For a specific network
configuration a value ν = 1/2 was derived in [7] based on some simplified assumptions. By
employing new parameter ν we can significantly improve agreement between analytical
model and simulation at the initial stage of information epidemic, since here we can
assume N− ≈ N = const, so dN+
Fig.7.
+. An example of improved fitting is presented in
dt ∝ N ν
A
B
Figure 6: Examples of dense (A) and sparse (B) wireless sensor networks.
17
1
0.8
0.6
0.4
0.2
N
/
N
+
0
0
10
20
30
40
50
t/τ
*
Figure 7: Effect of parameter ν in the model (28) on the simulation data fit: dashed line ν = 1, solid
line ν = 0.7.
Similarly to the epidemiological models (see [12]), incorporation of the spatial inho-
mogeneity can be achieved by adding the appropriate diffusion terms on the LHS of (6)
and (7):
∂N+
∂t − D△N+ = αN+N− −
∂N−
∂t − D△N− = −αN+N− +
N+
τ∗
,
N+
τ∗
,
(29)
(30)
where D is diffusivity in the sensor system which can be estimated as D ≈ r2
the same time the inhomogeneity of pollutant distribution can be easily incorporated in
∗/τ∗. At
α(r) with non-uniform C0(r) (see (2), (5), (8)).
An important property of the system (29), (30) is the existence of analytical solutions
in the form of traveling waves, propagating with the velocity v0 ∼ √αD [12]. In our case
these waves correspond to the switching fronts between active and passive sensors. If
pollutant is advected by the wind flow with a characteristic velocity v∗, then a simple
synchronisation condition v0 ≥ v∗ or α ≥ v2
network optimisation.
∗ provides an important criteria for
∗τ∗/r2
18
Another interesting extension of the proposed model is the introduction of the con-
cept of a faulty sensor, a sensor which is no longer available for sensing and networking.
This state of a sensor would correspond to the removed population segment in the epi-
demiological framework and can be attributed to any kind of faults (flat battery, software
malfunction, hardware defects etc). As in the celebrated SIR epidemiological model [12],
a new state results in the third equation for N0 in the system (6)-(7) with a new temporal
parameter - an average operational time (the lifespan) of a sensor. The total number
of sensors will be still conserved: N = N+ + N− + N0 = const. This model provides a
more realistic representation of an operational sensor systems and allows us to estimate
such important parameters as the operational lifetime of the network and the reliability
of the network.
8. Conclusions
We developed a "bio-inspired" model of a network of chemical sensors with dynamic
collaboration for the purpose of energy conservation and information gain. The proposed
model leverages on the existing theoretical discoveries from epidemiology resulting in a
simple analytical model for the analysis of network dynamics. The analytical model
enabled us to formulate analytically the conditions for the network performance. Thus
we found an optimal configuration which, within the underlying assumptions, yields a
balance between the number of sensors, detected concentration, the sampling time and
the communication range. The findings are partly supported by numerical simulations.
Further work is required to address the model refinements and generalisations.
9. Acknowledgement
The authors would like to thank Ralph Gailis, Ajith Gunatilaka and Chris Woodruff
for helpful technical discussions and Champake Mendis for his assistance in the software
implementation of the proposed model.
References
[1] C. S. Raghavendra, K. M. Sivalingam, Taieb Znati. (2005) Wireless Sensor Networks. Springer,
USA, 2005.
19
[2] P. E. Bieringer, A. Wyszogrodzki, J. Weil and G. Bieberbach. An Evaluation of Propylene Sampler
Grid Designs for the FFT07 Field Program(2006), Tech. Report, National Center for Atmospheric
Research, Boulder, USA.
[3] E. Ertin, J. W. Fisher, L. C. Potter.(2003) Maximum Mutual Information Principle for Dynamic
Sensor Query Problems. Lecture Notes in Computer Science: Information Processing in Sensor
Networks, 2003 2634, pp. 91-104.
[4] F. Zhao, J. Shin, J. Reich. (2002) Information-Driven Dynamic Sensor Collaboration for Tracking
Applications. IEEE Signal Processing Magazine, 2002, 19, 2, pp. 61 -- 72.
[5] J. Mathieu, G. Hwang, J. Dunyak (2006). The State of the Art and the State of the Practice:
Transferring Insights from Complex Biological Systems to the Exploitation of Netted Sensors in
Command and Control Enterprises, 2006 MITRE Technichal Papers, July, 2006, MITRE Corpo-
ration, USA.
[6] A. Khelil, C. Becker, J. Tian, K. Rothermel.(2002) An Epidemic Model for Information Diffusion
in MANETs.In MSWiM 2002: Proceedings of the 5th ACM international workshop on Modeling
analysis and simulation of wireless and mobile systems, Atlanta, Georgia, USA, 2002, pp. 54 -- 60.
[7] P. De, Y. Liu, S. K. Das. (2007) An Epidemic Theoretic Framework for Evaluating Broadcast Pro-
tocols in Wireless Sensor Networks. In MASS 2007: Proceedings of IEEE Internatonal Conference
on Mobile Adhoc and Sensor Systems, Pisa, Italy, 2007, pp 1 -- 9.
[8] A. Gunatilaka, B.Ristic, A.Skvortsov, M. Morelande. (2008) Parameter Estimation of a Continuous
Chemical Plume Source. in Fusion 2008: 11th International Conference on Information Fusion,
Cologne, Germany, 2008, pp. 1-8.
[9] B.Ristic, A.Skvortsov, M.Morelande. (2009) Predicting the Progress and the Peak of an Epidemics.
in ICASSP 2009: Proceedings of 2009 IEEE International Conference on Acoustics, Speech and
Signal Processing, Taiwan, April, 2009.
[10] A.Dekker, A.Skvortsov. (2009) Topological Issues in Sensor Networks. in MODSIM 2009: 2009
MSSANZ International Congress on Modelling and Simulation, Cairns, Australia, 2009.
[11] S. Eubank, V. S. Anil Kumar, M. Marathe. (2008) Epidemiology and Wireless Communication:
Tight Analogy or Loose Metaphor? Lecture Notes in Computer Science: Bio-Inspired Computing
and Communication, 2008, 5151, pp. 91-104.
[12] J. D. Murray.(2002) Mathematical Biology, Springer, USA, v 1,2. 2002
[13] V. Bisignanesi, M.S. Borgas (2007). Models for integrated pest management with chemicals in
atmospheric surface layers. Ecological modelling, 2007, 201, 1, pp. 2 -- 10.
[14] P. D. Stroud, S. J. Sydoriak, J. M. Riese, J. P. Smith, S. M. Mniszewski, and P. R. Romero.
(2006) Semi-empirical Power-law Scaling of New Infection Rate to Model Epidemic dynamics with
Inhomogeneous Mixing, Mathematical Biosciences, 203, pp. 301 -- 318.
[15] A.T. Skvortsov, R.B.Connell, P.D. Dawson, R.M. Gailis. (2007) Epidemic Spread Modeling: Align-
ment of Agent-Based Simulation with a Simple Mathematical Model. in BIOCOMP 2007: Proceed-
ings of International Conference on Bioinformatics and Computational Biology, Las Vegas Nevada,
USA, CSREA Press, 2007, 2, pp 487 -- 490.
20
[16] A. Gunatilaka, A. Skvortsov, and R. Gailis. (2008) Progress in DSTO CBR simulation environment
development, Land Warfare Conference (LWC2008), Brisbane, 2008, pp. 62 -- 68.
[17] A.Skvortsov, E.Yee. Scaling laws of peripheral mixing of passive scalar in a wall-shear layer (2008).
Phys. Rev. E 83, 036303 -- 11.
[18] M. Jamriska, T. C. DuBois, A. Skvortsov Statistical characterisation of bio-aerosol background in
an urban environment (2011), http://www.arxiv.org/pdf/1110.4184
21
|
1210.8182 | 3 | 1210 | 2013-01-10T20:53:32 | Discovering Social Circles in Ego Networks | [
"cs.SI",
"physics.soc-ph"
] | People's personal social networks are big and cluttered, and currently there is no good way to automatically organize them. Social networking sites allow users to manually categorize their friends into social circles (e.g. 'circles' on Google+, and 'lists' on Facebook and Twitter), however they are laborious to construct and must be updated whenever a user's network grows. In this paper, we study the novel task of automatically identifying users' social circles. We pose this task as a multi-membership node clustering problem on a user's ego-network, a network of connections between her friends. We develop a model for detecting circles that combines network structure as well as user profile information. For each circle we learn its members and the circle-specific user profile similarity metric. Modeling node membership to multiple circles allows us to detect overlapping as well as hierarchically nested circles. Experiments show that our model accurately identifies circles on a diverse set of data from Facebook, Google+, and Twitter, for all of which we obtain hand-labeled ground-truth. | cs.SI | cs |
Discovering Social Circles in Ego Networks
Julian McAuley and Jure Leskovec
Stanford
[email protected], [email protected]
May 3, 2014
Abstract
People’s personal social networks are big and cluttered, and currently there is no
good way to automatically organize them. Social networking sites allow users to man-
ually categorize their friends into social circles (e.g. ‘circles’ on Google+, and ‘lists’ on
Facebook and Twitter), however they are laborious to construct and must be updated
whenever a user’s network grows.
In this paper, we study the novel task of auto-
matically identifying users’ social circles. We pose this task as a multi-membership
node clustering problem on a user’s ego-network, a network of connections between her
friends. We develop a model for detecting circles that combines network structure as
well as user profile information. For each circle we learn its members and the circle-
specific user profile similarity metric. Modeling node membership to multiple circles
allows us to detect overlapping as well as hierarchically nested circles. Experiments
show that our model accurately identifies circles on a diverse set of data from Facebook,
Google+, and Twitter, for all of which we obtain hand-labeled ground-truth.
1
Introduction
Online social networks allow us to follow streams of posts generated by hundreds of our
friends and acquaintances. The people we follow generate overwhelming volumes of infor-
mation and to cope with the ‘information overload’ we need to organize our personal social
networks (Agarwal et al., 2008; Chen and Karger, 2006; El-Arini et al., 2009). One of the
main mechanisms for users of social networking sites to organize their networks and the
content generated by them is to categorize their friends into what we refer to as social cir-
cles. Practically all major social networks provide such functionality, for example, ‘circles’
on Google+, and ‘lists’ on Facebook and Twitter. Once a user creates her circles, they can
be used for content filtering, for privacy, and for sharing groups of users that others may
wish to follow.
Examples of circles from a user’s personal social network are shown in Figure 1. The
‘owner’ of such a network (the ‘ego’) may form circles based on common bonds and at-
tributes between themselves and the users whom they follow.
In this example, the ego
may wish to share their latest TKDD article only with their friends from the computer
science department, while their baby photos should be shared only with their immediate
family; similarly, they may wish to limit the amount of content generated by their high-
school friends. These are precisely the types of functionality that circles are intended to
facilitate.
1
Figure 1: An ego-network with labeled circles. The central user, the ‘ego’, is friends with
all other users (the ‘alters’) in the network. Alters may belong to any number of circles,
including none. We aim to discover circle memberships and to find common properties
around which circles form. This network shows typical behavior that we observe in our data:
Approximately 25% of our ground-truth circles (from Facebook) are contained completely
within another circle, 50% overlap with another circle, and 25% of the circles have no
members in common with any other circle.
Currently, users in Facebook, Google+ and Twitter identify their circles either man-
ually, or in a naıve fashion by identifying friends sharing a common feature. Neither
approach is particularly satisfactory: the former is time consuming and does not update
automatically as a user adds more friends, while the latter fails to capture individual as-
pects of users’ communities, and may function poorly when profile information is missing
or withheld.
In this paper we study the problem of automatically discovering users’ social circles.
In particular, given a single user with her personal social network, our goal is to identify
her circles, each of which is a subset of her friends.
Circles are user-specific as each user organizes her personal network of friends indepen-
dently of all other users to whom she is not connected. This means that we can formulate
the problem of circle detection as a clustering problem on her ego-network, the network of
friendships between her friends. In practice, circles may overlap (a circle of friends from
the same hometown may overlap with a circle from the same college), or be hierarchically
nested (among friends from the same college there may be a denser circle from the same
degree program). We design our model with both types of behavior in mind.
In Figure 1 we are given a single user u and we form a network between her friends vi.
We refer to the user u as the ego and to the nodes vi as alters. The task is then to identify
the circles to which each alter vi belongs, as in Figure 1. In other words, the goal is to find
communities/clusters in u’s ego-network.
Generally, there are two useful sources of data that help with this task. The first is the
2
set of edges of the ego-network. We expect that circles are formed by densely-connected
sets of alters (Newman, 2006). However, different circles overlap heavily, i.e., alters belong
to multiple circles simultaneously (Ahn et al., 2010; Palla et al., 2005), and many circles
are hierarchically nested in larger ones (as in Figure 1). Thus it is important to model an
alter’s memberships to multiple circles. Secondly, we expect that each circle is not only
densely connected but that its members also share common properties or traits (Mislove
et al., 2010). Thus we need to explicitly model the different dimensions of user profiles
along which each circle emerges.
We model circle affiliations as latent variables, and similarity between alters as a func-
tion of common profile information. We propose an unsupervised method to learn which
dimensions of profile similarity lead to densely linked circles. After developing a model
for this problem, we then study the related problems of updating a user’s circles once new
friends are added to the network, and using weak supervision from the user in the form
of ‘seed nodes’ to improve classification. For the former problem, we show that given an
already-defined set of a users’ circles, we can accurately predict to which circles a new user
should be assigned. For the latter problem, we show that classification accuracy improves
for each seed node that a user provides, though substantial improvements in accuracy are
already obtained even with 2-3 seeds.
Our model has two innovations: First, in contrast to mixed-membership models (Airoldi
et al., 2008) we predict hard assignment of a node to multiple circles, which proves critical
for good performance (Gregory, 2010b). Second, by proposing a parameterized definition
of profile similarity, we learn the dimensions of similarity along which links emerge (Feld,
1981; Simmel, 1964). This extends the notion of homophily (Lazarsfeld and Merton, 1954;
McPherson et al., 2001) by allowing different circles to form along different social dimen-
sions, an idea related to the concept of Blau spaces (McPherson, 1983). We achieve this
by allowing each circle to have a different definition of profile similarity, so that one circle
might form around friends from the same school, and another around friends from the
same location. We learn the model by simultaneously choosing node circle memberships
and profile similarity functions so as to best explain the observed data.
We introduce a dataset of 1,143 ego-networks from Facebook, Google+, and Twitter,
for which we obtain hand-labeled ground-truth from 5,636 circles. Experimental results
show that by simultaneously considering social network structure as well as user profile
information our method performs significantly better than natural alternatives and the
current state-of-the-art. Besides being more accurate our method also allows us to generate
automatic explanations of why certain nodes belong to common communities. Our method
is completely unsupervised, and is able to automatically determine both the number of
circles as well as the circles themselves. We show that the same model can be adapted to
deal with weak supervision, and to update already-complete circles as new users arrive.
A preliminary version of this article appeared in McAuley and Leskovec (2012).
1.1 Further Related Work
Although a ‘circle’ is not precisely the same as a ‘community’, our work broadly falls un-
der the umbrella of community detection (Lancichinetti and Fortunato, 2009a; Schaeffer,
2007; Leskovec et al., 2010; Porter et al., 2009; Newman, 2004). While ‘classical’ cluster-
ing algorithms assume disjoint communities (Schaeffer, 2007), many authors have made
3
the observation that communities in real-world networks may overlap (Lancichinetti and
Fortunato, 2009b; Gregory, 2010a; Lancichinetti et al., 2009; Yang and Leskovec, 2012), or
have hierarchical structure (Ravasz and Barab´asi, 2003).
Topic-modeling techniques have been used to uncover ‘mixed-memberships’ of nodes
to multiple groups, and extensions allow entities to be attributed with text information.
Airoldi et al. (2008) modeled node attributes as latent variables drawn from a Dirichlet
distribution, so that each attribute can be thought of as a partial membership to a com-
munity. Other authors extended this idea to allow for side-information associated with the
nodes and edges (Balasubramanyan and Cohen, 2011; Chang and Blei, 2009; Liu et al.,
2009). A related line of work by Hoff et al. (2002) also used latent node attributes to
model edge formation between ‘similar’ users, which they adapted to clustering problems
in Handcock et al. (2007b) and Krivitsky et al. (2009).
Classical clustering algorithms tend to identify communities based on node features
(Johnson, 1967) or graph structure (Ahn et al., 2010; Palla et al., 2005), but rarely use both
in concert. Our work is related to Yoshida (2010) in the sense that it performs clustering
on social-network data, and Frank et al. (2012), which models memberships to multiple
communities. Another work closely related to ours is Yang and Leskovec (2012), which
explicitly models hard memberships of nodes to multiple overlapping communities, though
it does so purely based on network information rather than node features. Our inference
procedure is also similar to that of Hastings (2006), which treats nodes’ assignments to
communities as a Maximum a Posteriori inference problem between a set of interdependent
variables.
Finally, Chang et al. (2009); Menon and Elkan (2011, 2010) and Vu et al. (2011) model
network data similar to ours; like our own work, they model the probability that two nodes
will form an edge, though the underlying models do not form communities, so they are not
immediately applicable to the problem of circle detection.
The rest of this paper is organized as follows. We propose a generative model for the
formation of edges within communities in Section 2. In Section 3 we derive an efficient
model parameter learning strategy. In Section 4 we describe extensions to our model that
allow it to be used in semi-supervised settings, in order to help users update and maintain
their circles. We describe the datasets that we construct in Section 5. We give two schemes
for automatically constructing parameterized user similarity function from profile data in
Section 6. In Section 7 we show how to scale the model to large ego-networks. Finally in
Section 8 we describe our evaluation and experimental results.
2 A Generative Model for Friendships in Social Circles
We desire a model of circle formation with the following properties:
1. Nodes within circles should have common properties, or ‘aspects’.
2. Different circles should be formed by different aspects, e.g. one circle might be formed
by family members, and another by students who attended the same university.
3. Circles should be allowed to overlap, and ‘stronger’ circles should be allowed to form
within ‘weaker’ ones, e.g. a circle of friends from the same degree program may form
within a circle from the same university, as in Figure 1.
4
4. We would like to leverage both profile information and network structure in order to
identify circles.
5. Ideally we would like to be able to pinpoint which aspects of a profile caused a circle
to form, so that the model is interpretable by the user.
The input to our model is an ego-network G = (V, E), along with ‘profiles’ for each
user v ∈ V . The ‘center’ node u of the ego-network (the ‘ego’) is not included in G, but
rather G consists only of u’s friends (the ‘alters’). We define the ego-network in this way
precisely because creators of circles do not themselves appear in their own circles. For each
ego-network, our goal is to predict a set of circles C = {C1 . . . CK}, Ck ⊆ V , and associated
parameter vectors θk that encode how each circle emerged. We encode ‘user profiles’ into
pairwise features φ(x, y) that in some way capture what properties the users x and y have in
common. We first describe our model, which can be applied using arbitrary feature vectors
φ(x, y), and in Section 6 we develop several ways to construct feature vectors φ(x, y) that
are suited to our particular application.
We describe a model of social circles that treats circle memberships as latent variables.
Nodes within a common circle are given an opportunity to form an edge, which naturally
leads to hierarchical and overlapping circles. We will then devise an unsupervised algorithm
to jointly optimize the latent variables and the profile similarity parameters so as to best
explain the observed network data.
Our model of social circles is defined as follows. Given an ego-network G and a set of
K circles C = {C1 . . . CK}, we model the probability that a pair of nodes (x, y) ∈ V × V
form an edge as
p((x, y) ∈ E) ∝ exp
(cid:40) (cid:88)
(cid:124)
Ck⊇{x,y}
(cid:104)φ(x, y), θk(cid:105)
(cid:125)
(cid:123)(cid:122)
− (cid:88)
(cid:124)
Ck(cid:43){x,y}
(cid:41)
αk (cid:104)φ(x, y), θk(cid:105)
(cid:125)
(cid:123)(cid:122)
.
(1)
circles containing both nodes
all other circles
For each circle Ck, θk is the profile similarity parameter that we will learn. The idea is
that (cid:104)φ(x, y), θk(cid:105) is high if both nodes belong to Ck, and low if either of them do not. The
parameter αk trades-off these two effects, i.e., it trades-off the influence of edges within Ck
compared to edges outside of (or crossing) Ck. Since the feature vector φ(x, y) encodes the
similarity between the profiles of two users x and y, the parameter vector θk encodes which
dimensions of profile similarity caused the circle to form, so that nodes within a circle Ck
should ‘look similar’ according to θk. Note that the pair (x, y) should be treated as an
unordered pair in the case of an undirected network (e.g. Facebook), but should be treated
as an ordered pair for directed networks (e.g. Google+ and Twitter).
Considering that edges e = (x, y) are generated independently, we can write the prob-
ability of G as
PΘ(G;C) =
p(e /∈ E),
(2)
(cid:89)
e∈E
p(e ∈ E) ×(cid:89)
e(cid:54)∈E
where Θ = {(θk, αk)}k=1...K is our set of model parameters. Defining the shorthand nota-
tion
dk(e) = δ(e ∈ Ck) − αkδ(e /∈ Ck), Φ(e) =
dk(e)(cid:104)φ(e), θk(cid:105)
(cid:88)
Ck∈C
5
allows us to write the log-likelihood of G:
lΘ(G;C) =
(cid:88)
e∈E
Φ(e) − (cid:88)
(cid:16)
1 + eΦ(e)(cid:17)
,
log
(3)
e∈V ×V
where Z = (1 + eΦ(e)) is a normalization constant.
Next, we describe how to optimize node circle memberships C as well as the parameters
of the user profile similarity functions Θ = {(θk, αk)} (k = 1 . . . K) given a graph G and
user profiles.
3 Unsupervised Learning of Model Parameters
Treating circles C as latent variables, we aim to find Θ = {θ, α} so as to maximize the
regularized log-likelihood of (eq. 3), i.e.,
Θ, C = argmax
Θ,C
lΘ(G;C) − λΩ(θ).
We solve this problem using coordinate ascent on Θ and C (MacKay, 2003):
Ct = argmaxC
Θt+1 = argmax
Θ
lΘt(G;C)
lΘ(G;Ct) − λΩ(θ).
(4)
(5)
(6)
We optimize (eq. 6) using L-BFGS, a standard quasi-Newton procedure to optimize smooth
functions of many variables (Nocedal, 1980). Partial derivatives are given by
(cid:88)
(cid:88)
e∈V ×V
e∈V ×V
∂l
∂θk
∂l
∂αk
=
=
eΦ(e)
−de(k)φ(e)k
1 + eΦ(e)
δ(e /∈ Ck)(cid:104)φ(e), θk(cid:105)
(cid:88)
+
e∈E
eΦ(e)
1 + eΦ(e)
−(cid:88)
e∈E
dk(e)φ(e)k − ∂Ω
∂θk
δ(e /∈ Ck)(cid:104)φ(e), θk(cid:105) .
(7)
(8)
For fixed C \ Ci we note that solving argmaxCi lΘ(G;C \ Ci) can be expressed as
pseudo-boolean optimization in a pairwise graphical model (Boros and Hammer, 2002).
‘Pseudo-boolean optimization’ refers to problems defined over boolean variables (in this
case, whether or not a node is assigned to a particular community), where the variables
being optimized are interdependent (in this case, relationships are defined over edges in a
graph). In short, our optimization problem can be written in the form
(x,y)(δ(x ∈ C), δ(y ∈ C)).
Ek
(9)
(cid:88)
Ck = argmax
C
(x,y)∈V ×V
Although this problem class is NP-hard in general, efficient approximation algorithms are
readily available (Rother et al., 2007).
In our setting, we want edges with high weight
(under θk) to appear in Ck, and edges with low weight to appear outside of Ck. Defining
ok(e) =
Ck∈C\Ci
dk(e)(cid:104)φ(e), θk(cid:105)
(cid:88)
6
the energy Ek
e of (eq. 9) is
Ek
e (0, 0) = Ek
e (0, 1) = Ek
e (1, 0) =
Ek
e (1, 1) =
(cid:26) ok(e) − αk (cid:104)φ(e), θk(cid:105) − log(1 + eok(e)−αk(cid:104)φ(e),θk(cid:105)),
(cid:26) ok(e) + (cid:104)φ(e), θk(cid:105) − log(1 + eok(e)+(cid:104)φ(e),θk(cid:105)),
− log(1 + eok(e)−αk(cid:104)φ(e),θk(cid:105)),
− log(1 + eok(e)+(cid:104)φ(e),θk(cid:105)),
e ∈ E
e /∈ E
.
e ∈ E
e /∈ E
By expressing the problem in this form we can draw upon existing work on pseudo-boolean
optimization. We use the publicly-available ‘QPBO’ software described in Rother et al.
(2007), which implements algorithms described in Hammer et al. (1984) and Kohli and
Torr (2005), and is able to accurately approximate problems of the form shown in (eq. 9).
Essentially, problems of the type shown in (eq. 9) are reduced to maximum flow, where
boolean labels for each node are recovered from their assignments to ‘source’ and ‘sink’ sets.
Such algorithms have worst-case complexity O(N3), though the average case running-time
is far better (Kolmogorov and Rother, 2007). We solve (eq. 9) for each Ck in a random
order.
The two optimization steps of (eq. 5) and (eq. 6) are repeated until convergence, i.e.,
until Ct+1 = Ct. The entire procedure is presented in Algorithm 1. We regularize (eq. 4)
using the (cid:96)1 norm, i.e.,
K(cid:88)
θk(cid:88)
θki,
Ω(θ) =
k=1
i=1
which leads to sparse (and readily interpretable) parameters. Our algorithm can readily
handle all but the largest problem sizes typically observed in ego-networks: in the case of
Facebook, the average ego-network has around 190 nodes (Ugander et al., 2011), while the
largest network we encountered has 4,964 nodes. Later, in Section 7, we will exploit the
fact that our features are binary, and that many nodes share similar features, to develop
more efficient algorithms based on Markov Chain Monte Carlo inference. Note that since
the method is unsupervised, inference is performed independently for each ego-network.
This means that our method could be run on the full Facebook graph (for example), as
circles are independently detected for each user, and the ego-networks typically contain
only hundreds of nodes. In Section 4 we describe extensions that allow our model to be
used in semi-supervised settings.
3.1 Hyperparameter Estimation
To choose the optimal number of circles, we choose K so as to minimize an approximation
to the Bayesian Information Criterion (BIC), an idea seen in several works on probabilistic
clustering (Airoldi et al., 2008; Handcock et al., 2007a; Volinsky and Raftery, 2000). In
this context, the Bayesian Information Criterion is defined as
BIC (K; ΘK) (cid:39) −2lΘK (G;C) + ΘK log E,
(10)
where ΘK is the set of parameters predicted when there are K circles, and ΘK is the
number of parameters (which increases linearly as K increases). We then choose K so as
to minimize this objective:
K = argmin
BIC (K; ΘK).
(11)
K
7
ALGORITHM 1: Predict complete circles with hyperparameters λ, K.
Data: ego-network G = (V, E), edge features φ(e) : E → RF , hyperparameters λ, K
Result: parameters Θ := {(θk, αk)}k=1...K, communities C
initialize θ0
repeat
k := 1, Ck := ∅, t := 0;
k ∈ {0, 1}F , α0
(cid:80)
for k ∈ {1 . . . K} do
Ct
k := argmaxC
// using QPBO, see (eq. 9)
(x,y)∈V ×VEk
(x,y)(δ(x ∈ C), δ(y ∈ C));
end
Θt+1 := argmaxΘ lΘ(G;Ct) − λΩ(θ);
// using L-BFGS, see (eqs. 7 and 8)
t := t + 1;
until C t+1 = Ct;
In other words, an additional circle will only be added to the model if doing so has a
‘significant’ impact on the log-likelihood.
The regularization parameter λ ∈ {0, 1, 10, 100} was determined using leave-one-out
cross validation, though in our experience did not significantly impact performance.
4 Extensions
So far, we have considered the ‘cold-start’ problem of predicting complete sets of circles
using nothing but node attributes and edge information. In other words, we have treated
circle prediction as an unsupervised task. This setting is realistic if users construct their
circles only after their ego-networks have already been defined. On the other hand, in
settings where users build their circles incrementally, it is less likely that we would wish
to predict complete circles ‘from scratch’. We note that both settings occur in the three
social networks that we consider.
In this section, we describe techniques to exploit partially observed circle information
to help users update and maintain their circles. In other words, we would like to apply
our model to users’ personal networks as they change and evolve (Backstrom et al., 2006).
Since our model is probabilistic, it is straightforward to adapt it to make use of partially
observed data, by conditioning on the assignments of some of the latent variables in our
model. In this way, we adapt our model for semi-supervised settings in which a user labels
some or all of the members of their circles. Later, in Section 7, we describe modifications
of our model that allow it to be applied to extremely large networks, by exploiting the fact
that many users assigned to common circles also have common features.
4.1 Circle Maintenance
First we deal with the problem of a user adding new friends to an established ego-network,
whose circles have already been defined. Thus, given a complete set of circles, our goal
is to predict community memberships for a new node, based on that node’s features, and
their patterns of connectivity to existing nodes in the ego-network.
Since circles in this setting are fully-observed, we simply fit the model parameters that
8
best explain the ground-truth circles ¯C provided by the user:
lΘ(G; ¯C) − λΩ(θ).
Θ = argmax
Θ
(12)
As with (eq. 6) this is solved using L-BFGS, though optimization is significantly faster in
this case as there are no longer latent community memberships to infer, and thus coordinate
ascent is not required.
Next, we must predict to which of the K ground-truth circles a new user u belongs.
That is, we must predict cu ∈ {0, 1}K, where each cu
k is a binary variable indicating whether
the user u should belong to the circle Ck. In practice, for the sake of evaluation, we shall
suppress a single user from G and ¯C, and try to recover their memberships.
This can be done by choosing the assignment cu that maximizes the log-likelihood of
C once u is added to the graph. We define the augmented community memberships as
C+ = {C+
k }k=1...K, where
(cid:26) ¯Ck ∪ {u},
¯Ck,
C+
k =
cu
k = 1
cu
k = 0
.
(13)
(14)
The updated community memberships are then chosen according to
C+ = argmax
cu
l Θ(G ∪ {u};C+).
The above expression can be computed efficiently for different values of cu by noting that
the log-likelihood only changes for terms including u, meaning that we need to compute
p((x, y) ∈ E) only if x = u or y = u. In other words, we only need to consider how the
new user relates to existing users, rather than considering how existing users relate to each
other; thus computing the log-likelihood requires linear (rather than quadratic) time. To
find the optimal cu we can simply enumerate all 2K possibilities, which is feasible so long
as the user has no more than K (cid:39) 20 circles. For users with more circles we must resort
to an iterative update scheme as we did in Section 3.
4.2 Semi-Supervised Circle Prediction
Next, we consider the problem of using weak supervision in the form of ‘seed nodes’ to
assist in circle prediction (Andersen and Lang, 2006). In this setting, the user manually
labels a few users from each of the circles they want to create, say {s1 . . . sK}. Our goal
is then to predict K circles C = {C1 . . . CK} subject to the constraint that sk ⊆ Ck for all
k ∈ {1 . . . K}.
Again, since our model is probabilistic, this can be done by conditioning on the as-
signments of some of the latent variables. That is, we simply optimize lΘ(G;C) subject
to the constraint that sk ⊆ Ck for all k ∈ {1 . . . K}. In the parlance of graphical models,
this means that rather than treating the seed nodes as latent variables to be predicted, we
treat them as evidence on which we condition. We could also include negative evidence
(i.e., the user could provide labels for users who do not belong to each circle), or we could
have users provide additional labels interactively, though the setting described is the most
similar to what is used in practice.
9
Figure 2: Histogram of overlap between circles (on Facebook). A value of zero indicates
that the circle does not intersect with any of the user’s other circles, whereas a value of one
indicates that a circle is entirely contained within another. Approximately 25% of circles
exhibit the latter behavior.
5 Dataset Description
Our goal is to evaluate our method on ground-truth data. We expended significant time,
effort, and resources to obtain high quality hand-labeled data, which we have made available
online.1 We were able to obtain ego-networks and ground-truth from three major social
networking sites: Facebook, Google+, and Twitter.
From Facebook we obtained profile and network data from 10 ego-networks, consisting
of 193 circles and 4,039 users. To obtain circle information we developed our own Facebook
application and conducted a survey of ten users, who were asked to manually identify all
of the circles to which their friends belonged. It took each user between 2 and 3 hours
to label their entire network. On average, users identified 19 circles in their ego-networks,
with an average circle size of 22 friends. Examples of circles we obtained include students
of common universities and classes, sports teams, relatives, etc.
Figure 2 shows the extent to which our 193 user-labeled circles in 10 ego networks from
Facebook overlap (intersect) with each other. Around one quarter of the identified circles
are independent of any other circle, though a similar fraction are completely contained
within another circle (e.g. friends who studied under the same adviser may be a subset
of friends from the same university). The remaining 50% of communities overlap to some
extent with another circle.
For the other two datasets we obtained publicly accessible data. From Google+ we
obtained data from 133 ego-networks, consisting of 479 circles and 106,674 users. The 133
ego-networks represent all 133 Google+ users who had shared at least two circles, and
whose network information was publicly accessible at the time of our crawl. The Google+
circles are quite different to those from Facebook, in the sense that their creators have
chosen to release them publicly, and because Google+ is a directed network (note that our
model can very naturally be applied to both to directed and undirected networks). For
example, one circle contains candidates from the 2012 republican primary, who presumably
do not follow their followers, nor each other. Finally, from Twitter we obtained data from
1,000 ego-networks, consisting of 4,869 circles (or ‘lists’ (Kim et al., 2010; Nasirifard and
1http://snap.stanford.edu/data/
10
01fractionofoverlapwithmostsimilarcommunity01020304050frequencyHayes, 2011; Wu et al., 2011; Zhao, 2011)) and 81,362 users. The ego-networks we obtained
range in size from 10 to 4,964 nodes.
Taken together our data contains 1,143 different ego-networks, 5,541 circles, and 192,075
users. The size differences between these datasets simply reflects the availability of data
from each of the three sources. Our Facebook data is fully labeled, in the sense that we
obtain every circle that a user considers to be a cohesive community, whereas our Google+
and Twitter data is only partially labeled, in the sense that we only have access to public
circles. We design our evaluation procedure in Section 8 so that partial labels cause no
issues.
6 Constructing Features from User Profiles
Profile information in all of our datasets can be represented as a tree where each level
encodes increasingly specific information (Figure 3, left). In other words, user profiles are
organized into increasingly specific categories. For example, a user’s profile might have a
education category, which would be further separated into categories such as name, location,
and type. The leaves of the tree are then specific values in these categories, e.g. Princeton,
Cambridge, and Graduate School. Several works deal with automatically building features
from tree-structured data (Haussler, 1999; Vishwanathan and Smola, 2002), but in order
to understand the relationship between circles and user profile information, we shall design
our own feature representation scheme.
We propose two hypotheses for how users organize their social circles: either they may
form circles around users who share some common property with each other, or they may
form circles around users who share some common property with themselves. For example,
if a user has many friends who attended Stanford, then they may form a ‘Stanford’ circle.
On the other hand, if they themselves did not attend Stanford, they may not consider
attendance to Stanford to be a salient feature. The feature construction schemes we propose
allow us to assess which of these hypotheses better represents the data we obtain.
From Google+ we collect data from six categories (gender, last name, job titles, insti-
tutions, universities, and places lived). From Facebook we collect data from 26 categories,
including users’ hometowns, birthdays, colleagues, political and religious affiliations, etc.
As a proxy for profile data, from Twitter we collect data from two categories, namely
the set of hashtags and mentions used by each user during two-weeks’ worth of tweets.
‘Categories’ correspond to parents of leaf nodes in a profile tree, as shown in Figure 3.
We first propose a difference vector to encode the relationship between two profiles.
A non-technical description is given in Figure 3. Essentially, we want to encode those
dimensions where two users are the same (e.g. Alan and Dilly went to the same graduate
school), and those where they are different (e.g. they do not have the same surname).
Suppose that users v ∈ V each have an associated profile tree Tv, and that l ∈ Tv is a leaf
in that tree. We define the difference vector σx,y between two users x and y as a binary
indicator encoding the profile aspects where users x and y differ (Figure 3, bottom left):
σx,y[l] = δ((l ∈ Tx) (cid:54)= (l ∈ Ty)).
(15)
Note that feature descriptors are defined per ego-network : while many thousands of high
schools (for example) exist among all Facebook users, only a small number appear among
any particular user’s friends.
11
Although the above difference vector has the advantage that it encodes profile infor-
mation at a fine granularity, it has the disadvantage that it is high-dimensional (up to
4,122 dimensions in the data we considered). One way to address this is to form difference
vectors based on the parents of leaf nodes: this way, we encode what profile categories two
users have in common, but disregard specific values (Figure 3, bottom right). For example,
we encode how many hashtags two users tweeted in common, but discard which hashtags
they tweeted:
l∈children(p)σx,y[l].
(16)
x,y[p] =(cid:80)
(cid:48)
σ
This scheme has the advantage that it requires a constant number of dimensions, regardless
of the size of the ego-network (26 for Facebook, 6 for Google+, 2 for Twitter, as described
above).
Based on the difference vectors σx,y (and σ(cid:48)
x,y) we now describe how to construct edge
features φ(x, y). The first property we wish to model is that members of circles should
have common relationships with each other:
φ1(x, y) = (1;−σx,y).
(17)
The second property we wish to model is that members of circles should have common
relationships to the ego of the ego-network. In this case, we consider the profile tree Tu
from the ego user u. We then define our features in terms of that user:
φ2(x, y) = (1;−(cid:12)(cid:12)σx,u − σy,u
(cid:12)(cid:12))
(18)
(σx,u − σy,u is taken elementwise). These two parameterizations allow us to assess which
mechanism better captures users’ subjective definition of a circle. In both cases, we include
a constant feature (‘1’), which controls the probability that edges form within circles, or
equivalently it measures the extent to which circles are made up of friends. Importantly,
this allows us to predict memberships even for users who have no profile information, simply
due to their patterns of connectivity.
Similarly, for the ‘compressed’ difference vector σ(cid:48)
ψ1(x, y) = (1;−σ
x,y), ψ2(x, y) = (1;−(cid:12)(cid:12)σ
x,y, we define
x,u − σ
(cid:48)
(cid:48)
(cid:48)
y,u
(cid:12)(cid:12)).
(19)
To summarize, we have identified four ways of representing the compatibility between dif-
ferent aspects of profiles for two users. We considered two ways of constructing a difference
vector (σx,y vs. σ(cid:48)
x,y) and two ways of capturing the compatibility between a pair of profiles
(φ(x, y) vs. ψ(x, y)). The features are designed to model the following behavior:
1. Ego users build circles around common relationships between their friends (φ1, ψ1)
2. Ego users build circles around common relationships between their friends and them-
selves (φ2, ψ2)
In our experiments we assess which of these assumptions is more realistic in practice.
12
7 Fast Inference in Large Ego-Networks
Although our algorithm is able to handle the problem sizes typically encountered in ego-
networks (i.e., fewer than 1,000 friends), scalability to larger networks presents an issue,
as we require quadratic memory to encode the compatibility between every pair of nodes
(an issue we note is also present in the existing approaches we consider in Section 8). In
this section, we propose a more scalable alternative that makes use of the fact that many
nodes belonging to common communities also share common features.
Noting that features φ1 and φ2 described in Section 6 are binary valued, as are com-
munity memberships, if there are K communities and F -dimensional features, there can
be at most 2K+F ‘types’ of node. In other words, every node’s community membership is
drawn from {0, 1}K, and every node’s feature vector is drawn from {0, 1}F , so there are
at most 2K+F distinct community/feature combinations. Of course the number of distinct
node types is also bounded by V , the number of nodes in the graph.
In practice, however, the number of distinct node ‘types’ is much smaller, as nodes
belonging to common communities tend to have common features. Community member-
ships are also not independent:
in Figure 2 we observed both disjoint and hierarchically
nested communities, which means that of the 2K possible community memberships, only
a fraction of them occur in practice.
In this section, we propose a Markov-Chain Monte Carlo (MCMC) sampler (Newman
and Barkema, 1999) which efficiently updates node-community memberships by ‘collapsing’
nodes that have common features and community memberships. Note that the adaptations
to be described can be applied to any types of feature (i.e., not just binary features), all
we require is that many users share the same features; we assume binary features merely
for the sake of presentation.
We start by representing each node using binary strings that encode both its community
memberships and its features. Each node’s community memberships are represented using
S : V → ΣK, such that
S(x)[k] =
.
(20)
(cid:26) 1,
if x ∈ Ck
0, otherwise
Similarly, each node’s features are represented using the binary string Q, which, since our
features are already binary, is simply the concatenation of the feature dimensions.
We now say that the ‘type’ of a node x is the concatenation of its community string
and its feature string, (S(x); Q(x)), and we build a (sparse) table types : ΣK × ΣF → N
that counts how many nodes exist of each type.
In our setting, MCMC consists of repeatedly updating the (binary) label of each node
in a particular community. Specifically, if the marginal (log) probability that a node x
belongs to a community k is given by (cid:96)k
x, then the node’s new label is chosen by sampling
z ← U(0, 1), and updating
(cid:26) 1,
S(x)[k] =
0, otherwise
if z < exp{ 1
T ((cid:96)k
x(1) − (cid:96)k
x(0))}
,
(21)
where T is a temperature parameter that decreases at each iteration, so that we are more
likely to choose the label with higher probability as the model ‘cools’.
x(1) (the probability that node x takes the label 0 or 1 in
community k) requires computing p((x, y) ∈ E) for all y ∈ V . However, we note that if
Computing (cid:96)k
x(0) and (cid:96)k
13
two nodes y and y(cid:48) have the same type (i.e., they belong to the same communities and
have the same features), then p((x, y) ∈ E) = p((x, y(cid:48)) ∈ E). In order to maximize the log-
likelihood of the observed data, we must also consider whether (x, y) and (x, y(cid:48)) are actually
edges in the graph. To do so, we first compute (cid:96)k
x(1) under the assumption that
no edges are incident on x, after which we correct for those edges incident on x. Thus the
running time of a single update is linear in the number of distinct node types, plus the
average node degree, both of which are bounded by the number of nodes.
x(0) and (cid:96)k
The entire procedure is demonstrated in Algorithm 2.
ALGORITHM 2: Update memberships node x and circle k.
Data: node x whose membership to circle Ck is to be updated
Result: updated membership for node x
initialize (cid:96)k
construct a dummy node x0 with the communities and features of x but with x /∈ Ck;
construct a dummy node x1 with the communities and features of x but with x ∈ Ck;
for (c, f ) ∈ dom(types) do
x(0) := 0, (cid:96)k
x(1) := 0;
// c = community string, f = feature string
n := types(c, f );
// n = number of nodes of this type
if S(x) = c ∧ Q(x) = f then
// avoid including a self-loop on x
n := n − 1;
end
construct a dummy node y with community memberships c and features f ;
// first compute probabilities assuming all pairs (x, y) are non-edges
x(0) := (cid:96)k
(cid:96)k
x(1) := (cid:96)k
(cid:96)k
x(0) + n log p((x0, y) /∈ E);
x(1) + n log p((x1, y) /∈ E);
end
for (x, y) ∈ E do
// correct for edges incident on x
x(0) := (cid:96)k
(cid:96)k
x(1) := (cid:96)k
(cid:96)k
x(0) − log p((x0, y) /∈ E) + log p((x0, y) ∈ E);
x(1) − log p((x1, y) /∈ E) + log p((x1, y) ∈ E);
end
// update membership to circle k
types(S(x), Q(x)) := types(S(x), Q(x)) − 1;
z ← U(0, 1);
if z < exp{T ((cid:96)k
S(x)[k] := 1
x(0))} then
x(1) − (cid:96)k
else
S(x)[k] := 0
end
types(S(x), Q(x)) := types(S(x), Q(x)) + 1;
We also exploit the same observation when computing partial derivatives of the log-
likelihood, that is we first efficiently compute derivatives under the assumption that the
graph contains no edges, and then correct the result by summing over all edges in E.
14
8 Experiments
We first describe the evaluation metrics to be used in Sections 8.1 and 8.2, before de-
scribing the baselines to be evaluated in Section 8.3. We describe the performance of our
(unsupervised) algorithm in Section 8.4, and extensions in Sections 8.6, 8.7, and 8.8.
8.1 Evaluation metrics
Although our method is unsupervised, we can evaluate it on ground-truth data by ex-
amining the maximum-likelihood assignments of the latent circles C = {C1 . . . CK} after
convergence. Our goal is that for a properly regularized model, the latent circles will align
closely with the human labeled ground-truth circles ¯C = { ¯C1 . . . ¯C ¯K}.
To measure the alignment between a predicted circle C and a ground-truth circle ¯C, we
compute the Balanced Error Rate (BER) between the two circles (Chen and Lin, 2006),
(cid:18)C \ ¯C
C +
(cid:19)
¯C \ C
¯C
BER(C, ¯C) =
1
2
.
(22)
This measure assigns equal importance to false positives and false negatives, so that trivial
or random predictions incur an error of 0.5 on average. Such a measure is preferable to the
0/1 loss (for example), which assigns extremely low error to trivial predictions. We also
report the F1 score, which we find produces qualitatively similar results.
8.2 Aligning predicted and ground-truth circles
Since we do not know the correspondence between circles in C and ¯C, we compute the
optimal match via linear assignment by maximizing:
(1 − BER(C, f (C))),
(23)
(cid:88)
max
f :C→ ¯C
1
f
C∈dom(f )
where f is a (partial) correspondence between C and ¯C. That is, if the number of predicted
circles C is less than the number of ground-truth circles ¯C, then every circle C ∈ C
must have a match ¯C ∈ ¯C, but if C > ¯C, we do not incur a penalty for additional
predictions that could have been circles but were not included in the ground-truth. We
use established techniques to estimate the number of circles, so that none of the baselines
suffers a disadvantage by mispredicting K = C.
In the case of Facebook (where we have ‘complete’ ground-truth, in the sense that
survey participants ostensibly label every circle), our method ought to penalize predicted
circles that do not appear in the ground-truth. A simple penalty would be to assign an
error of 0.5 (i.e., that of a random prediction) to additional circles in the case of Facebook.
However, in our experience, our method did not overpredict the number of circles in the case
of Facebook: on average, users identified 19 circles, whereas using the Bayesian Information
Criterion described in Section 3.1, our method never predicted K > 10. In practice this
means that in the case of Facebook, we always penalize all predictions. Again we note that
the process of choosing the number of circles using the BIC is a standard procedure from
the literature (Airoldi et al., 2008; Handcock et al., 2007a; Volinsky and Raftery, 2000),
whose merit we do not assess in this paper.
15
Network Modularity. Although for our algorithm, and other probabilistic baselines,
we shall choose the number of communities using the Bayesian Information Criterion as
described in Section 3.1, another standard criterion used to determine the number of com-
munities in a network is the modularity (Newman, 2006).
The Bayesian Information Criterion has the advantage that it allows for overlapping
communities, whereas the modularity does not (i.e., it assumes all communities are dis-
joint); it is for this reason that we chose the BIC to choose K for our algorithm. On
the other hand, the Bayesian Information Criterion can only be computed for probabilistic
models (i.e., models that associate a likelihood with each prediction), whereas the modu-
larity has no such restriction. For this reason, we shall use the modularity to choose K for
non-probabilistic baselines.
The modularity essentially measures the extent to which clusters in a network have
dense internal, but sparse external, connections (Newman, 2003). If eij is the fraction of
edges in the network that connect vertices in Ci to vertices in Cj, then the modularity is
defined as
eii − K(cid:88)
j=1
K(cid:88)
i=1
.
eij
Q(K) =
(24)
We then choose K so that the modularity is maximized.
8.3 Baselines
We considered a wide number of baseline methods, including those that consider only
network structure, those that consider only profile information, and those that consider
both.
Mixed Membership Stochastic Block Models. (Airoldi et al., 2008). This method
detects communities based only on graph structure; the output is a stochastic vector for
each node encoding partial memberships to each community. The optimal number of
communities K is determined using the Bayesian Information Criterion as described in
(eq. 11). This model is similar to those of (Liu et al., 2009) and (Chang and Blei, 2009), the
latter of which includes the implementation of MMSB that we used. Since we require ‘hard’
memberships for evaluation, we assign a node to a community if its partial membership to
that community is positive.
Block-LDA. (Balasubramanyan and Cohen, 2011). This method is similar MMSB, except
that it allows nodes to be augmented with side information in the form of ‘documents’.
For our purposes, we generate ‘documents’ by treating aspects of user profiles as words in
a bag-of-words model.
K-means clustering. (MacKay, 2003). Just as MMSB uses only the graph structure, K-
means clustering ignores the graph structure and uses only node features (for node features
we again use a bag-of-words model). Here, we choose K so as to maximize the modularity
of C, as defined in (eq. 24).
Hierarchical Clustering. (Johnson, 1967). This method builds a hierarchy of clusters.
Like K-means, this method form clusters based only on node profiles, but ignores the
network.
Link Clustering. (Ahn et al., 2010). Conversely, this method uses network structure,
but ignores node features to construct hierarchical communities in networks.
16
Table 1: Baselines
Algorithm
network
structure?
Yes
MMSB
Yes
Block-LDA
No
K-means
No
Hierarchical Clustering
Yes
Link Clustering
Yes
Clique Percolation
Low-Rank Embedding
Yes
Multi-Assignment Clustering No
Our algorithm
Yes
node/edge
features?
No
Yes
Yes
Yes
No
No
Yes
Yes
Yes
overlapping
communities?
Yes
Yes
No
Yes
No
Yes
No
Yes
Yes
hard member-
ships?
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Clique Percolation. (Palla et al., 2005). This method also uses only network structure,
and builds communities from the union of small, densely-connected sub-communities.
Low-Rank Embedding. (Yoshida, 2010). Uses both graph structure and node similarity
information, but does not perform any learning. We adapt an algorithm described by
(Yoshida, 2010), where node similarities are based on the cosine distance between profile
bags-of-words. After our features are embedded into a low-dimensional space, we again
use K-means clustering to detect communities, again choosing K so as to maximize the
modularity.
Multi-Assignment Clustering. (Frank et al., 2012). Like ours, this method predicts
hard assignments to multiple clusters, though it does so without using the network struc-
ture.
The above methods (and our own) are summarized in Table 1. Of the eight baselines
highlighted above we report the three whose overall performance was the best, namely
Block-LDA (Balasubramanyan and Cohen, 2011) (which slightly outperformed mixed mem-
bership stochastic block models (Airoldi et al., 2008)), Low-Rank Embedding (Yoshida,
2010), and Multi-Assignment Clustering (Frank et al., 2012).
8.4 Performance on Facebook, Google+, and Twitter Data
Figure 4 shows results on our Facebook, Google+, and Twitter data. The largest circles
from Google+ were excluded as they exhausted the memory requirements of many of the
baseline algorithms. Circles were aligned as described in (eq. 23), with the number of circles
K determined as described in Section 3. For non-probabilistic baselines, we chose K so
as to maximize the modularity, as described in (eq. 24). In terms of absolute performance
our best model φ1 achieves BER scores of 0.84 on Facebook, 0.72 on Google+ and 0.70 on
Twitter (F1 scores are 0.59, 0.38, and 0.34, respectively). The lower F1 scores on Google+
and Twitter are explained by the fact that many circles have not been maintained since
they were initially created: we achieve high recall (we recover the friends in each circle), but
at low precision (we recover additional friends who appeared after the circle was created).
Comparing our method to baselines we notice that we outperform all baselines on all
datasets by a statistically significant margin. Compared to the nearest competitors, our
best performing features φ1 improve on the BER by 43% on Facebook, 26% on Google+,
17
and 16% on Twitter (improvements in terms of the F1 score are similar). Regarding the
performance of the baseline methods, we note that good performance seems to depend
critically on predicting hard memberships to multiple circles, using a combination of node
and edge information; none of the baselines from Table 1 exhibit precisely this combination,
a shortcoming our model addresses.
Both of the features we propose (friend-to-friend features φ1 and friend-to-user features
φ2) perform similarly, revealing that both schemes ultimately encode similar information,
which is not surprising, since users and their friends have similar profiles. Using the ‘com-
pressed’ features ψ1 and ψ2 does not significantly impact performance, which is promising
since they have far lower dimension than the full features; what this reveals is that it is
sufficient to model categories of attributes that users have in common (e.g. same school,
same town), rather than the attribute values themselves.
We found that all algorithms perform significantly better on Facebook than on Google+
or Twitter. There are a few explanations: Firstly, our Facebook data is complete, in the
sense that survey participants manually labeled every circle in their ego-networks, whereas
in other datasets we only observe publicly-visible circles, which may not be up-to-date.
Secondly, the 26 profile categories available from Facebook are more informative than the
6 categories from Google+, or the tweet-based profiles we built from Twitter. A more basic
difference lies in the nature of the networks themselves: edges in Facebook encode mutual
ties, whereas edges in Google+ and Twitter encode follower relationships, which changes
the role that circles serve (Wu et al., 2011). The latter two points explain why algorithms
that use either edge or profile information in isolation are unlikely to perform well on this
data.
8.5 Qualitative Analysis
Next we examine the output of our model in greater detail. Figure 5 shows results of our
unsupervised method on example ego-networks from Facebook and Google+. Different
colors indicate true-, false- positives and negatives. Our method is correctly able to identify
overlapping circles as well as sub-circles (circles within circles).
Figure 6 shows parameter vectors learned for four circles for a particular Facebook
user. Positive weights indicate properties that users in a particular circle have in common.
Notice how the model naturally learns the social dimensions that lead to a social circle.
Moreover, the first parameter that corresponds to a constant feature ‘1’ has the highest
weight; this reveals that membership to the same community provides the strongest signal
that edges will form, while profile data provides a weaker (but still relevant) signal.
8.6 Circle Maintenance
Next we examine the problem of adding new users to already-defined ego-networks, in
which complete circles have already been provided. For evaluation, we suppress a single
user u from a user’s ego-network, and learn the model parameters Θ that best fit G \ {u}
and C\{u}. Our goal is then to recover the set of communities to which the node u belongs,
as described in Section 4.1. Again we report the Balanced Error Rate and F1 score between
the ground-truth and the predicted set of community memberships for u. We use all of
each users’ circles for training, up to a maximum of fifteen circles. This experiment is
18
repeated for 10 random choices of the user u for each ego-network in our dataset.
As a baseline we compare the performance of our algorithm to that of a fully-supervised
Support Vector Machine (SVM) model. For each community Ck, we train a binary classi-
fier that discriminates members from non-members based on their node features. Binary
classifications are then made for each community independently.
Performance on this task is shown in Figure 7. On Facebook, Google+, and Twitter
our best performing features φ1 achieve Balanced Error Rates of 0.30, 0.34, and 0.34
(respectively), and F1 scores of 0.38, 0.59, and 0.54. The SVM model achieves better
accuracy when rich node features are available (which is the case for Facebook), though it
fails to make use of edge information, and does not account for interdependencies between
circles. This proves critical in the case of Google+ and Twitter, where node information
alone proves uninformative.
8.7 Semi-Supervised Circle Prediction
Our next task is to identify circles using a form of weak supervision provided by the user,
in the form of seed nodes as described in Section 4.2. In this setting, the user provides S
seed nodes for each of K circles that they wish to identify. For evaluation, we select the K
circles to be identified and the S seed nodes uniformly at random.
Without seed nodes (as in our initial experiments), the circles that are automatically
identified by our algorithm may be quite different from those identified once seed nodes are
added. Similarly, there may be many circles containing the same seed nodes, meaning that
different solutions may be chosen for different values of S. Thus it is difficult to compare
the loss of (eq. 23) with and without seed nodes. To address this, we modify the matching
objective of (eq. 23) so that the K circles randomly selected for seeding must be the same
as those matched when evaluating the loss. Thus the loss is always evaluated on the same
K circles for every number of seed nodes S ∈ {0 . . . 10}. Note also that for each value of K,
performance is only evaluated on those ego-networks with at least K ground-truth circles.
Figure 8 shows the performance of our algorithm for different numbers of seed nodes
S ∈ {0 . . . 10} and different numbers of circles K ∈ {1 . . . 5}. The same results in terms
of the F1 score are qualitatively similar and are omitted for brevity. We find that for all
values of K, adding seed nodes increases the accuracy significantly, though the effect is
most pronounced when the number of circles that the user wishes to identify is small.
Curiously, we find that while larger values of K lead to better prediction when there
are no seeds, the opposite is true when there are many seeds. The former behavior may be
explained by the simple fact that larger values of K are better able to fit the data, though
the latter behavior is more enigmatic. Pleasingly, assuming that a user wishes to identify
only a small number of circles at a time, then they can do so with very few seeds: for small
K, most of the benefit is gained once only two or three seeds are provided.
8.8 Scalability Analysis
Figure 9 examines how our algorithm scales with the size of an ego-network. Here we use
the Markov-Chain Monte-Carlo (MCMC) version of our algorithm described in Section 7.
Figure 9 shows the total time taken to predict different numbers of circles in differently
sized ego-networks. Since the performance of our MCMC algorithm is a function of the
19
number of circles K and the feature dimensionality F , we fix the feature dimensionality
at F = 10 for all ego-networks, using the ten most common features that appear in each
ego-network using the ‘friend-to-friend’ features φ1.
For comparison, Figure 9 shows the running time of inference using QPBO as described
in Section 3. Although the two algorithms are competitive for up to a few hundred nodes,
the QPBO algorithm becomes intractable for networks of around 1000 nodes, since it
requires us to optimize a probability distribution defined on complete graphs (in practice,
in order to apply the QPBO algorithm in the previous experiments, we did not construct
complete graphs, but rather included only those edges whose influence on the likelihood
was maximal).
Although this version of the algorithm is not particularly efficient for small networks
(identifying K = 10 circles on an ego network with 1000 nodes requires around one hour),
it has the advantage that it is easily able to scale to the largest ego-networks that are ever
encountered. For very large networks, the algorithm is able to take advantage of the fact
that many nodes with the same features and community memberships can be ‘collapsed’, so
that the running time increases only modestly between 2500 and 5000 node ego-networks.
Figure 10 shows the accuracy of our MCMC algorithm in terms of the Balanced Error
Rate and F1 score. We note that the best performance of our algorithm is obtained on
reasonably small ego-networks, though in practice small networks account for the vast
majority of our data. Note that the results for any particular value of K are slightly worse
than those reported in Figure 4, since we are not selecting K using the BIC described in
Section 3.1. Although performance clearly degrades for large ego-networks, it remains an
open question whether this is due to the difficulty of optimization on large networks, or
simply due to the fact that our model assumptions become increasingly violated as large
networks become less ‘community-like’.
9 Discussion and Future Work
We have modeled circle detection as a problem that can be solved independently for each
user.
In practice this assumption is advantageous, as it allows us to deal with several
small problems independently, using sophisticated models that could not easily scale to
networks with millions of nodes. However, it is possible that circles could be more ac-
curately predicted by exploiting relationships between the circles of multiple users. For
example, if a user has a ‘Stanford’ circle in their ego-network, it is highly likely that users
belonging to that circle will also have Stanford circles within their own ego-networks. Al-
ternately, if a Stanford community could be detected across the entire Facebook, Google+,
or Twitter network, then a user’s ‘Stanford’ circle might simply be the intersection of their
ego-network with that community. Although studying such models is an appealing avenue
for future work, it is unfortunately not possible using our data, where we do not have
access to complete network information.
Although we developed algorithms that scale to the largest ego-networks that we en-
countered, we find that the best performance occurs on ego-networks with up to a few
hundred nodes, but degrades significantly for networks with more than 1000. It remains to
be seen whether this is a shortcoming of our algorithm (due to the fact that optimization
is more difficult for large networks), or whether the assumptions of our model simply break
20
down at large scales. Our fundamental assumption that circles will be made up of close-
knit groups of friends with common properties seems like a better fit to networks with at
most a few hundred nodes.
We also found that performance on even the largest Facebook networks (i.e., over 1000
friends) was better than that obtained on small networks from Google+ and Twitter. This
suggests that it is not merely the size of the networks that causes our model assumptions to
become violated, but rather the very nature of the networks themselves (in addition to the
differences in the ground-truth already mentioned). Naturally, a circle containing members
of the same squash team (as we find on Facebook) is fundamentally different from a circle
containing presidential candidates (as we find on Google+). It remains to design a circle
detection algorithm that is tailored for networks with asymmetric following relationships.
10 Conclusion
‘Circles’ allow us to organize the overwhelming volumes of data generated by our personal
social networks, though they are laborious to construct manually. We have designed an
algorithm to automatically detect circles in ego-networks, which we evaluated on a dataset
of 1,143 ego-networks and 5,541 ground-truth circles obtained from Facebook, Google+,
and Twitter. We find in such data circles that are disjoint, overlapping, and hierarchically
nested, and design our model with such behavior in mind. Our model is unsupervised, but
can also make use of weakly-labeled data that may be available in practice. Experiments
reveal that social circles can be accurately detected using a combination of both network
and profile information.
Acknowledgements
This research has been supported in part by NSF IIS-1016909, CNS-1010921, CAREER
IIS-1149837, IIS-1159679, AFRL FA8650-10-C-7058, DARPA XDATA, DARPA GRAPHS,
Albert Yu & Mary Bechmann Foundation, Boeing, Allyes, Samsung, Intel, Alfred P. Sloan
Fellowship and the Microsoft Faculty Fellowship.
The U.S. Government is authorized to reproduce and distribute reprints for Governmen-
tal purposes notwithstanding any copyright annotation thereon.
[Disclaimer] The views
and conclusions contained herein are those of the authors and should not be interpreted as
necessarily representing the official policies or endorsements, either expressed or implied,
of IARPA, AFRL, or the U.S. Government.
References
D. Agarwal, B.-C. Chen, P. Elango, N. Motgi, S.-T. Park, R. Ramakrishnan, S. Roy, and
J. Zachariah. Online models for content optimization. In Neural Information Processing
Systems, 2008.
Y.-Y. Ahn, J. Bagrow, and S. Lehmann. Link communities reveal multiscale complexity
in networks. Nature, 2010.
21
E. Airoldi, D. Blei, S. Fienberg, and E. Xing. Mixed membership stochastic blockmodels.
Journal of Machine Learning Research, 2008.
R. Andersen and K. Lang. Communities from seed sets. In WWW, 2006.
L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social
networks: membership, growth, and evolution. In Proceedings of the 12th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, 2006.
R. Balasubramanyan and W. Cohen. Block-LDA: Jointly modeling entity-annotated text
and entity-entity links. In SIAM International Conference on Data Mining, 2011.
E. Boros and P. Hammer. Pseudo-boolean optimization. Discrete Applied Mathematics,
2002.
J. Chang and D. Blei. Relational topic models for document networks. In International
Conference on Artificial Intelligence and Statistics, 2009.
J. Chang, J. Boyd-Graber, and D. Blei. Connections between the lines: augmenting social
networks with text. In Knowledge Discovery and Data Mining, 2009.
H. Chen and R. Karger. Less is more: Probabilistic models for retrieving fewer relevant
documents. In Special Interest Group on Information Retrieval, 2006.
Y. Chen and C. Lin. Combining SVMs with various feature selection strategies. Springer,
2006.
K. El-Arini, G. Veda, D. Shahaf, and C. Guestrin. Turning down the noise in the blogo-
sphere. In Knowledge Discovery and Data Mining, 2009.
Scott L. Feld. The focused organization of social ties. American Journal of Sociology, 1981.
Mario Frank, Andreas P. Streich, David Basin, and Joachim M. Buhmann. Multi-
assignment clustering for Boolean data. Journal of Machine Learning Research, 2012.
Steve Gregory. Finding overlapping communities in networks by label propagation. New
Journal of Physics, 2010a.
Steve Gregory. Fuzzy overlapping communities in networks. CoRR, abs/1010.1523, 2010b.
P. Hammer, P. Hansen, and B. Simeone. Roof duality, complementation and persistency
in quadratic 0-1 optimization. Mathematical Programming, 1984.
M. Handcock, A. Raftery, and J. Tantrum. Model-based clustering for social networks.
Journal of the Royal Statistical Society Series A, 2007a.
Mark S. Handcock, Adrian E. Raftery, and Jeremy M. Tantrum. Model-based clustering
for social networks. Journal of the Royal Statistical Society, 2007b.
M. B. Hastings. Community detection as an inference problem. Physical Review E, 2006.
David Haussler. Convolution kernels on discrete structures. Technical report, University
of California at Santa Cruz, 1999.
22
Peter D. Hoff, Adrian E. Raftery, and Mark S. Handcock. Latent space approaches to
social network analysis. Journal of the American Statistical Association, 2002.
S. Johnson. Hierarchical clustering schemes. Psychometrika, 1967.
D. Kim, Y. Jo, L.-C. Moon, and A. Oh. Analysis of twitter lists as a potential source for
discovering latent characteristics of users. In CHI, 2010.
P. Kohli and P. Torr. Efficiently solving dynamic Markov random fields using graph cuts.
In International Conference on Computer Vision, 2005.
Vladimir Kolmogorov and Carsten Rother. Minimizing nonsubmodular functions with
graph cuts-a review. IEEE Transactions on Pattern Analysis and Machine Intelligence,
2007.
P. Krivitsky, M. Handcock, A. Raftery, and P. Hoff. Representing degree distributions,
clustering, and homophily in social networks with latent cluster random effects models.
Social Networks, 2009.
A. Lancichinetti and S. Fortunato. Community detection algorithms: a comparative anal-
ysis. arXiv:0908.1062, 2009a.
Andrea Lancichinetti and Santo Fortunato. Benchmarks for testing community detection
algorithms on directed and weighted graphs with overlapping communities. Physical
Review E, 2009b.
Andrea Lancichinetti, Santo Fortunato, and Janos Kertesz. Detecting the overlapping and
hierarchical community structure in complex networks. New Journal of Physics, 2009.
P. Lazarsfeld and R. Merton. Friendship as a social process: A substantive and method-
ological analysis. In Freedom and Control in Modern Society. 1954.
J. Leskovec, K. Lang, and M. Mahoney. Empirical comparison of algorithms for network
community detection. In WWW, 2010.
Y. Liu, A. Niculescu-Mizil, and W. Gryc. Topic-link LDA: joint models of topic and author
community. In International Conference on Machine Learning, 2009.
D. MacKay. Information Theory, Inference and Learning Algorithms. Cambrdige Univer-
sity Press, 2003.
J. McAuley and J. Leskovec. Learning to discover social circles in ego networks. In Neural
Information Processing Systems, 2012.
M. McPherson. An ecology of affiliation. American Sociological Review, 1983.
Miller McPherson, Lynn Smith-Lovin, and James M. Cook. Birds of a feather: Homophily
in social networks. Annual Review of Sociology, 2001.
A. Menon and C. Elkan. Link prediction via matrix factorization. In European Conference
on Machine Learning and Principles and Practice of Knowledge Discovery in Databases,
2011.
23
Aditya Menon and Charles Elkan. A log-linear model with latent features for dyadic
prediction. In International Conference on Data Mining, 2010.
A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel. You are who you know: Inferring
user profiles in online social networks. In International Conference on Web Search and
Data Mining, 2010.
P. Nasirifard and C. Hayes. Tadvise: A twitter assistant based on twitter lists. In SocInfo,
2011.
M. Newman. Modularity and community structure in networks. Proceedings of the National
Academy of Sciences, 2006.
M. E. J. Newman. Fast algorithm for detecting community structure in networks. Physical
Review E, 2003.
M. E. J. Newman. Detecting community structure in networks. The European Physical
Journal B, 2004.
M. E. J. Newman and G. T. Barkema. Monte Carlo Methods in Statistical Physics. Oxford
University Press, 1999.
Jorge Nocedal. Updating quasi-Newton matrices with limited storage. Mathematics of
Computation, 1980.
G. Palla, I. Derenyi, I. Farkas, and T. Vicsek. Uncovering the overlapping community
structure of complex networks in nature and society. Nature, 2005.
M. A. Porter, J.-P. Onnela, and P. J. Mucha. Communities in networks. February 2009.
E. Ravasz and A.-L. Barab´asi. Hierarchical organization in complex networks. Physical
Review E, 2003.
C. Rother, V. Kolmogorov, V. Lempitsky, and M. Szummer. Optimizing binary MRFs via
extended roof duality. In Computer Vision and Pattern Recognition, 2007.
S.E. Schaeffer. Graph clustering. Computer Science Review, 2007.
Georg Simmel. Conflict and the web of group affiliations. Simon and Schuster, 1964.
J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The anatomy of the Facebook social
graph. preprint, 2011.
S. V. N. Vishwanathan and Alexander J. Smola. Fast kernels for string and tree matching.
In Neural Information Processing Systems, 2002.
C. Volinsky and A. Raftery. Bayesian information criterion for censored survival models.
Biometrics, 2000.
D. Vu, A. Asuncion, D. Hunter, and P. Smyth. Dynamic egocentric models for citation
networks. In International Conference on Machine Learning, 2011.
24
S. Wu, J. Hofman, W. Mason, and D. Watts. Who says what to whom on twitter. In
WWW, 2011.
J. Yang and J. Leskovec. Community-affiliation graph model for overlapping community
detection. In International Conference on Data Mining, 2012.
T. Yoshida. Toward finding hidden communities based on user profiles. In ICDM Work-
shops, 2010.
J. Zhao. Examining the evolution of networks based on lists in twitter. In International
Conference on Internet Multimedia System Architectures and Applications, 2011.
25
0
0
0
0
1
1
0
1
1
0
0
first name : Dilly
last name : Knox
first name : Alan
last name : Turing
work : position : Cryptanalyst
work : location : GC &CS
work : location : Royal Navy
education : name : Cambridge
education : type : College
education : name : Princeton
education : type : Graduate School
1 − σx,y =
0
0
1
1
1
1
1 − σ(cid:48)
x,y =
first name
last name
work : position
work : location
education : name
education : type
Figure 3: Feature construction. Profiles are tree-structured, and we construct features by
comparing paths in those trees. Examples of trees for two users x (blue) and y (pink) are
shown at top. Two schemes for constructing feature vectors from these profiles are shown at
bottom: (1) (bottom left) we construct binary indicators measuring the difference between
‘work→position→Cryptanalyst’ appears in both trees. (2)
leaves in the two trees, e.g.
(bottom right) we sum over the leaf nodes in the first scheme, maintaining the fact that
the two users worked at the same institution, but discarding the identity of that institution.
26
first namelast nameworkAlanTuringpositionCryptanalystcompanyGC&CSeducationnameCambridgetypeCollegenamePrincetontypeGraduate Schoolfirst namelast nameworkDillyKnoxpositionCryptanalystcompanyGC&CSeducationpositionCryptanalystcompanyRoyal NavynameCambridgetypeCollegeFigure 4: Performance on Facebook, Google+, and Twitter, in terms of the Balanced Error
Rate (top), and the F1 score (bottom). Higher is better. Error bars show standard error.
The improvement of our best features φ1 compared to the nearest competitor are significant
at the 1% level or better.
Facebook:
Google+:
Figure 5: Top: Three detected circles on a small ego-network from Facebook, compared to
three ground-truth circles (BER (cid:39) 0.81). Blue nodes: true positives. Grey: true negatives.
Red: false positives. Yellow: false negatives. Our method correctly identifies the largest
circle (left), a sub-circle contained within it (center), and a third circle that significantly
overlaps with it (right). Bottom: Four detected circles on ego-networks from Google+
(BER (cid:39) 0.73). Green nodes in the two right networks show additional detected circles,
whose accuracy cannot be evaluated as we only observed two circles in the ground-truth.
27
FacebookGoogle+Twitter0.51.0Accuracy(1-BER).77.72.70.84.72.70Accuracyondetectedcommunities(1-BalancedErrorRate,higherisbetter)multi-assignmentclustering(Streich,Frank,etal.)low-rankembedding(Yoshida)block-LDA(BalasubramanyanandCohen)ourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19)FacebookGoogle+Twitter0.01.0Accuracy(F1score).40.38.34.59.38.34Accuracyondetectedcommunities(F1score,higherisbetter)multi-assignmentclustering(Streich,Frank,etal.)low-rankembedding(Yoshida)block-LDA(BalasubramanyanandCohen)ourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19)Figure 6: Parameter vectors of four communities for a particular Facebook user. The
top four plots show ‘complete’ features φ1, while the bottom four plots show ‘compressed’
features ψ1 (in both cases, BER (cid:39) 0.78). For example the former features encode the fact
that members of a particular community tend to speak German, while the latter features
encode the fact that they speak the same language. (Personally identifiable annotations
have been suppressed.)
Figure 7: Accuracy of assigning a new node to already-existing circles. Although a fully-
supervised Support Vector Machine gives accurate results on Facebook (where node fea-
tures are highly informative), our model yields far better results on Google+ and Twitter
data.
28
featureindexforφ1i1weightθ1,ipeoplewithPhDslivinginS.F.orStanfordfeatureindexforφ1i1weightθ2,iGermanswhowenttoschoolin1997featureindexforφ1i1weightθ3,iAmericansfeatureindexforφ1i1weightθ4,icollegeeducatedpeopleworkingataparticularinstitutefeatureindexforψ1i1weightθ1,istudiedthesamedegreespeakthesamelanguagesfeatureindexforψ1i1weightθ2,istudiedthesamedegreefeatureindexforψ1i1weightθ3,isamelevelofeducationfeatureindexforψ1i1weightθ4,iworkedforthesameemployeratthesametimeFacebookGoogle+Twitter0.51.0Accuracy(1-BER).66.60.66.70.66.65Accuracyofcirclemaintenance(1-BalancedErrorRate,higherisbetter)SupportVectorMachineourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19)FacebookGoogle+Twitter0.01.0Accuracy(F1score).32.52.56.38.59.54Accuracyofcirclemaintenance(F1score,higherisbetter)SupportVectorMachineourmodel(friend-to-friendfeaturesφ1,eq.17)ourmodel(friend-to-userfeaturesφ2,eq.18)ourmodel(compressedfeaturesψ1,eq.19)ourmodel(compressedfeaturesψ2,eq.19)friend-to-friend
features φ1
friend-to-user
features φ2
compressed
features ψ1
compressed
features ψ2
Facebook:
Google+:
Twitter:
Figure 8: Number of seeds versus accuracy (1 - Balanced Error Rate) for different numbers
of circles K. For each of the K circles being identified, the user provides the same number
of seeds. Although providing additional seeds is generally beneficial to performance for all
K, the benefit is most pronounced when the number of circles to be identified is small.
Results in terms of the F1 score are qualitatively similar and are omitted for brevity.
Figure 9: Running time of our Markov Chain Monte Carlo (MCMC) algorithm for different
ego-network sizes and different values of K (the number of circles to be detected). For
comparison, our previously described inference algorithm (based on QPBO (Rother et al.,
2007)) is shown for K = 10.
29
010numberofseeds0.550.881-BER010numberofseeds0.550.881-BER010numberofseeds0.550.881-BER010numberofseeds0.560.881-BER010numberofseeds0.570.751-BER010numberofseeds0.570.761-BER010numberofseeds0.570.751-BER010numberofseeds0.580.761-BERK=1K=2K=3K=4K=5010numberofseeds0.550.831-BER010numberofseeds0.550.831-BER010numberofseeds0.550.831-BER010numberofseeds0.550.831-BER010002000300040005000numberoffriends100101102103104105walltimeEgo-networksizevs.timeQPBO,K=10K=2K=4K=6K=8K=10Figure 10: Accuracy of our Markov Chain Monte Carlo (MCMC) algorithm, in terms of
the Balanced Error Rate (top), and the F1 score (bottom).
30
010002000300040005000numberoffriends0.40.7Accuracy(1-BER)Accuracyondetectedcommunities(1-BalancedErrorRate,higherisbetter)K=2K=4K=6K=8K=10010002000300040005000numberoffriends0.00.7Accuracy(F1score)Accuracyondetectedcommunities(F1score,higherisbetter)K=2K=4K=6K=8K=10 |
1911.12285 | 1 | 1911 | 2019-11-27T17:01:07 | ComHapDet: A Spatial Community Detection Algorithm for Haplotype Assembly | [
"cs.SI",
"cs.IT",
"cs.LG",
"cs.IT",
"q-bio.GN"
] | Background: Haplotypes, the ordered lists of single nucleotide variations that distinguish chromosomal sequences from their homologous pairs, may reveal an individual's susceptibility to hereditary and complex diseases and affect how our bodies respond to therapeutic drugs. Reconstructing haplotypes of an individual from short sequencing reads is an NP-hard problem that becomes even more challenging in the case of polyploids. While increasing lengths of sequencing reads and insert sizes {\color{black} helps improve accuracy of reconstruction}, it also exacerbates computational complexity of the haplotype assembly task. This has motivated the pursuit of algorithmic frameworks capable of accurate yet efficient assembly of haplotypes from high-throughput sequencing data.
Results: We propose a novel graphical representation of sequencing reads and pose the haplotype assembly problem as an instance of community detection on a spatial random graph. To this end, we construct a graph where each read is a node with an unknown community label associating the read with the haplotype it samples. Haplotype reconstruction can then be thought of as a two-step procedure: first, one recovers the community labels on the nodes (i.e., the reads), and then uses the estimated labels to assemble the haplotypes. Based on this observation, we propose ComHapDet - a novel assembly algorithm for diploid and ployploid haplotypes which allows both bialleleic and multi-allelic variants.
Conclusions: Performance of the proposed algorithm is benchmarked on simulated as well as experimental data obtained by sequencing Chromosome $5$ of tetraploid biallelic \emph{Solanum-Tuberosum} (Potato). The results demonstrate the efficacy of the proposed method and that it compares favorably with the existing techniques. | cs.SI | cs |
ComHapDet: A Spatial Community Detection Algorithm for
Haplotype Assembly
Abishek Sankararaman ∗, Haris Vikalo †, Fran¸cois Baccelli, ‡
Abstract
Background: Haplotypes, the ordered lists of single nucleotide variations that distinguish
chromosomal sequences from their homologous pairs, may reveal an individual's susceptibility
to hereditary and complex diseases and affect how our bodies respond to therapeutic drugs.
Reconstructing haplotypes of an individual from short sequencing reads is an NP-hard prob-
lem that becomes even more challenging in the case of polyploids. While increasing lengths
of sequencing reads and insert sizes helps improve accuracy of reconstruction, it also exacer-
bates computational complexity of the haplotype assembly task. This has motivated the pursuit
of algorithmic frameworks capable of accurate yet efficient assembly of haplotypes from high-
throughput sequencing data.
Results: We propose a novel graphical representation of sequencing reads and pose the hap-
lotype assembly problem as an instance of community detection on a spatial random graph.
To this end, we construct a graph where each read is a node with an unknown community
label associating the read with the haplotype it samples. Haplotype reconstruction can then
be thought of as a two-step procedure: first, one recovers the community labels on the nodes
(i.e., the reads), and then uses the estimated labels to assemble the haplotypes. Based on this
observation, we propose ComHapDet -- a novel assembly algorithm for diploid and ployploid hap-
lotypes which allows both bialleleic and multi-allelic variants.
Conclusions: Performance of the proposed algorithm is benchmarked on simulated as well
as experimental data obtained by sequencing Chromosome 5 of tetraploid biallelic Solanum-
Tuberosum (Potato). The results demonstrate the efficacy of the proposed method and that it
compares favorably with the existing techniques.
1
Introduction and Background
Technological advancements in DNA sequencing have enabled unprecedented studies of genetic
blueprints and variations between individual genomes. An individual genome of a eukaryotic or-
ganism is organized in K-tuples of homologous chromosomes; diploids (K = 2), including humans,
have genomes organized in pairs of homologous chromosomes where the chromosomes in a pair
differ from each other at a small fraction of positions. The ordered lists of such variants -- the
so-called single nucleotide polymorphisms (SNPs) -- are referred to as haplotypes. Many plants
are polyploid, i.e., have genomes organized in K-tuples, K > 2, of homologous chromosomes; for
∗Electrical and Computer Engineering, The University of Texas at Austin. Email - [email protected]
†Electrical and Computer Engineering, The University of Texas at Austin. Email - [email protected]
‡Dept of Mathematics and Electrical and Computer Engineering, The University of Texas at Austin. Email -
[email protected]
1
instance, the most commonly grown potato crop (Solanum Tubersoum) is a tetraploid organism
with a total of 48 chromosomes (i.e., 12 distinct quadruplets). Haplotype information of an indi-
vidual is useful in a wide range of applications. For instance, in humans, the haplotype information
contains indicators to the individual's susceptibility to diseases and expected responses to certain
classes of drugs [1]. Haplotype sequences are also used to infer recombination patterns and identify
genes under positive section [2].
In the case of agricultural crops such as the tuber family, the
haplotypes provide insight into developing disease and pest resistant variety of crops [3]. Thus, fast
and accurate algorithms for both polyploid and diploid haplotype reconstruction (or also known as
phasing) from high throughput sequencing reads are highly desirable.
Recent advancements in DNA sequencing technologies have dramatically improved affordability
and speed of sequencing; the most widely used are high-throughput sequencing devices (e.g., the
Illumina's platforms). Information provided by such platforms typically comes in form of paired-
end reads, each consisting of two short contiguous samples of the chromosome (separated by a
few hundred bases). Typical reference-guided data processing pipeline starts by determining the
relative ordering of the reads via mapping them to a reference genome; this step is followed by the
detection of variant positions and SNP calling. To perform haplotype assembly, existing methods
typically retain only the reads that cover variant positions; parts of the retained reads that cover
homozygous sites are also discarded. Then the remaining information needs to be used to identify
K distinct haplotype sequences S1,··· , SK, of same length. From the previous discussion, it is clear
that there is no position in these K strings where all the alleles are identical (such a position would
be homozygous and therefore discarded in the pre-processing step). While the relative positions of
reads are revealed by mapping them onto a reference, their origin remains unknown, i.e., it is not
known which among the K chromosomes a given read samples. In the absence of sequencing errors,
grouping reads according to their origin is rather straightforward and based on the disagreement re-
garding the allele information that the reads provide for each variant site. Unfortunately, however,
sequencing is erroneous with state-of-the-art sequencing platforms achieving sequencing errors in
the range of 10−3 − 10−2. In the presence of errors, it is no longer obvious how to decide whether
a read originates from a particular haplotype; to this end, one needs to rely on a computational
framework for haplotype assembly -- the central focus of the present paper.
Existing work formulates haplotype assembly as a combinatorial optimization problem where one
seeks to reconstruct the haplotype sequence by judiciously making as few modifications of the
data as possible in order to remove read membership ambiguities arising due to sequencing errors.
This has led to optimization criteria such as minimal fragment removal, minimum SNP removal
[4], maximum fragments cut [5] and minimum error correction (MEC) [6]. Motivated by the
observation that the MEC score optimization is NP-hard [4, 7], a considerable amount of recent
work studied relaxations of the underlying combinatorial optimization problem [8, 9, 10, 7].
In
a pioneering work, [11] proposed a greedy algorithm aimed at assembling most-likely haplotype
sequences given the observations. This line of thought of using Bayesian methods to reconstruct
the most likely haplotype sequence was carried out further in [12] and [13] using MCMC and
Gibbs sampling, respectively. However, these methods are usually slow as the associated Markov
chains have large mixing times, thereby making their practical applicability limited. HapCUT [14]
makes a connection between haplotype assembly and graph-clustering, and solves it by identifying
a maximum cut in an appropriately constructed graph. This method was shown to be superior to
2
[11] and is widely used in benchmarking. HapCUT algorithm was then significantly outperformed
by HapCompass [15]. However, apart from HapCompass, all of these methods are restricted to the
diploid case. To address both the diploid and polyploid scenarios, SDhaP [16] relaxes the MEC
minimization problem to a convex optimization program and solves it efficiently by exploiting the
underlying data structure. More recently, AltHap [17] casts haplotype assembly as a low-rank tensor
factorization problem and solves it via fast alternating optimization heuristics. The connection to
matrix factorization was previously exploited in [18] and [19], but those methods were incapable of
handling polyploids or polyallelic assembly problem. Prior to the current paper, AltHap [17] is the
only algorithm capable of solving the assembly problem in the polyploids/polyallelic scenario.
Main Contributions
In this paper, we propose a novel formulation of haplotype assembly as a spatial graph clustering
problem. This formulation is based on spatial point process representation of paired-end reads; in
particular, we argue that assigning to each paired-end read spatial coordinates corresponding to
the starting indices of the reads in the pair represents valuable augmentation of the information.
Equipped with such a representation of the data, we construct a graph whose nodes represent
the reads, and place a weighted edge between two reads if they overlap in at least one position.
The edge weights are formed using the scoring function adopted from [16]; this weighting mecha-
nism ensures that if two reads belong to the same haplotype, then the edge connecting them will
likely be assigned a large positive weight, while if they belong to different haplotypes, then the
edge between them will likely be assigned a large negative weight. We then cast the haplotype
assembly problem as an Euclidean community detection problem [20], where the community label
of a node (i.e., a read) indicates the haplotype it comes from. We find in our experiments that
such a 'spatial' embedding of the problem greatly improves both the accuracy and the run time
complexity of polyploid phasing. The improvement in accuracy stems from the fact that our al-
gorithm naturally enforces a regularizing constraint that the underlying sampling process is in a
sense uniformly distributed in space. In other words, we know that in every 'location' of space,
the total number reads covering the given SNP location belonging to the various haplotypes are
identical. Having a spatial representation of the data allows one to incorporate this prior knowledge
about the sampling process and leads to dramatically higher accuracy, especially in the polyploid
case. The spatial representation is also crucial in reducing run times, as this exposes the problem's
inherent 'locality' condition in space. More precisely, observe that if two reads are 'far away' in this
embedding (i.e, they do not overlap), there will be no edge connecting them in the corresponding
graph. This allows us to naturally 'decompose' the haplotype assembly problem using a divide-
and-conquer paradigm, where we can perform assembly on smaller spatially localized sets of reads
-- which is computationally very efficient -- and then perform a synchronization step to combine the
local haplotype assemblies into a single global solution. This algorithmic framework is robust to
inaccuracies in the individual local instances of phasing since the synchronization or the combining
step has a natural error-correction mechanism due to a single location being phased in multiple
local instances. Thus, we can employ faster but less accurate local phasing methods while still
achieving high global accuracy and good run-time performance. Further technical aspects of these
ideas are elaborated in Section 3.
3
Figure 1: A pictorial description of a paired end read on an example with m = 9.
Figure 2: A pictorial description of a connected block of sites. There are 4 reads in the figure
corresponding to the green bars. They set of sites covered by them are {1, 2}, {2, 3}, {3, 4, 5, 6}
and {6, 7, 8, 9} respectively. The bottom figure is the graph Q on m = 9 vertices constructed by
the 4 reads.
2 Problem Formulation
Setup and Notation
Let m and n denote the length of the haplotype sequences and the total number of paired-end read
measurements, respectively. Let k denote the ploidy, i.e., the number of haplotype sequences and a
be the cardinality of the alphabet set. If the variant sites are polyallelic, then a = 4 (i.e., all 4 alleles
A, C, G, T are possible); in diploid and polyploid bi-allelic case, a = 2. The haplotype sequences
are denoted by sl[i], where for each i ∈ {1,··· , m} and l ∈ {1,··· , k}, we have sl[i] ∈ {1,··· , a}.
As an example, in the poly-allelic case, we have sl[i] ∈ {A, C, G, T}. In the rest of the paper, we
refer to the haplotype positions {1,··· , m} as sites.
Each read ru, u ∈ {1,··· , n}, is formed by first sampling a haplotype indexed by vu ∈ {1,··· , k}
and then sampling a sequence of alleles {s(u)[i]}i∈Iu at sites Iu ⊂ {1,··· , m}, where for each i ∈ Iu,
s(u)[i] ∈ {A, C, G, T} is a "noisy" (due to sequencing errors) version of the underlying ground truth
svu[i]. For each measurement u ∈ {1,··· , n}, we observe the set of positions Iu and the noisy values
{s(u)[i]}i∈Iu but not the index vu of the haplotype from which the read originates. Thus, using the
above notation, the total dataset is denoted as ({s(u)[i]}i∈Iu)u∈{1,··· ,n}. The goal of assembly is to
infer origins of the reads and recover haplotype sequences.
In this paper, we consider the case where the data is in form of paired-ended reads. Formally, this
implies that each measurement u ∈ {1,··· , n} is such that the set of sites covered by read u has
two contiguous blocks. More precisely, we assume that each read u ∈ {1,··· , n} is such that there
2 ∈ {1,··· , m}, such that the set of sites covered by u, which was denoted
(u)
exists i
2 , j
2 }. See Figure 1 for
by Iu satisfies, Iu = {i
(u)
1 , i
an illustration.
2 + 1,··· , i
1 + 1,··· , i
(u)
1 } ∪ {i
(u)
1 , j
(u)
1 , i
(u)
(u)
2 , i
(u)
2 + j
(u)
(u)
(u)
(u)
1 + j
4
A Paired-End Read123456789Sitesi(u)1<latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit><latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit><latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit><latexit sha1_base64="KEmGjF6wTEVDrVC67+qUmXk9TJ0=">AAAB8HicbVDLSgNBEOz1GeMr6tHLYBDiJeyKoMegF48RzEOSNcxOZpMh81hmZoWw5Cu8eFDEq5/jzb9xkuxBEwsaiqpuuruihDNjff/bW1ldW9/YLGwVt3d29/ZLB4dNo1JNaIMornQ7woZyJmnDMstpO9EUi4jTVjS6mfqtJ6oNU/LejhMaCjyQLGYEWyc9sF7wmFXSs0mvVPar/gxomQQ5KUOOeq/01e0rkgoqLeHYmE7gJzbMsLaMcDopdlNDE0xGeEA7jkosqAmz2cETdOqUPoqVdiUtmqm/JzIsjBmLyHUKbIdm0ZuK/3md1MZXYcZkkloqyXxRnHJkFZp+j/pMU2L52BFMNHO3IjLEGhPrMiq6EILFl5dJ87wa+NXg7qJcu87jKMAxnEAFAriEGtxCHRpAQMAzvMKbp70X7937mLeuePnMEfyB9/kDEDOP6Q==</latexit>i(u)2<latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit><latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit><latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit><latexit sha1_base64="t8Jya7UK1UilYWNR2qgRW6hDUjY=">AAAB8HicbVBNSwMxEJ2tX7V+VT16CRahXspuEfRY9OKxgv2Qdi3ZNNuGJtklyQpl6a/w4kERr/4cb/4bs+0etPXBwOO9GWbmBTFn2rjut1NYW9/Y3Cpul3Z29/YPyodHbR0litAWiXikugHWlDNJW4YZTruxolgEnHaCyU3md56o0iyS92YaU1/gkWQhI9hY6YEN6o9pNTmfDcoVt+bOgVaJl5MK5GgOyl/9YUQSQaUhHGvd89zY+ClWhhFOZ6V+ommMyQSPaM9SiQXVfjo/eIbOrDJEYaRsSYPm6u+JFAutpyKwnQKbsV72MvE/r5eY8MpPmYwTQyVZLAoTjkyEsu/RkClKDJ9agoli9lZExlhhYmxGJRuCt/zyKmnXa55b8+4uKo3rPI4inMApVMGDS2jALTShBQQEPMMrvDnKeXHenY9Fa8HJZ47hD5zPHxG9j+o=</latexit>i(u)2+j(u)2<latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit><latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit><latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit><latexit sha1_base64="oWOOHOvF/Eskdy7/rgWnTlFvDP4=">AAAB/nicbZDLSsNAFIZP6q3WW1RcuRksQkUoSRF0WXTjsoK9QBvDZDptx04mYWYilFDwVdy4UMStz+HOt3HaRtDWHwY+/nMO58wfxJwp7ThfVm5peWV1Lb9e2Njc2t6xd/caKkokoXUS8Ui2AqwoZ4LWNdOctmJJcRhw2gyGV5N684FKxSJxq0cx9ULcF6zHCNbG8u0D5lfu0lJyMkan6P6HfbvolJ2p0CK4GRQhU823PzvdiCQhFZpwrFTbdWLtpVhqRjgdFzqJojEmQ9ynbYMCh1R56fT8MTo2Thf1Imme0Gjq/p5IcajUKAxMZ4j1QM3XJuZ/tXaiexdeykScaCrIbFEv4UhHaJIF6jJJieYjA5hIZm5FZIAlJtokVjAhuPNfXoRGpew6ZffmrFi9zOLIwyEcQQlcOIcqXEMN6kAghSd4gVfr0Xq23qz3WWvOymb24Y+sj2/NKZQV</latexit>i(u)1+j(u)1<latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit><latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit><latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit><latexit sha1_base64="Pacig2ll59k1YukqJaYZ7YdgrTw=">AAAB/nicbZDLSsNAFIZPvNZ6i4orN4NFqAglEUGXRTcuK9gLtDFMppN27GQSZiZCCQVfxY0LRdz6HO58G6dtBG39YeDjP+dwzvxBwpnSjvNlLSwuLa+sFtaK6xubW9v2zm5DxakktE5iHstWgBXlTNC6ZprTViIpjgJOm8HgalxvPlCpWCxu9TChXoR7goWMYG0s395nvnuXldPjETpB9z/s2yWn4kyE5sHNoQS5ar792enGJI2o0IRjpdquk2gvw1Izwumo2EkVTTAZ4B5tGxQ4osrLJueP0JFxuiiMpXlCo4n7eyLDkVLDKDCdEdZ9NVsbm//V2qkOL7yMiSTVVJDpojDlSMdonAXqMkmJ5kMDmEhmbkWkjyUm2iRWNCG4s1+eh8ZpxXUq7s1ZqXqZx1GAAziEMrhwDlW4hhrUgUAGT/ACr9aj9Wy9We/T1gUrn9mDP7I+vgHKCZQT</latexit>Reads123456789SitesWe further assume that the set of m sites and n reads forms a single connected component. In
particular, if we draw a graph Q on the vertex set {1,··· , m}, where for any two a, b ∈ {1,··· , n},
there is an edge in Q if and only if there is a read u ∈ {1,··· , n}, that covers both sites a and
b. We say that our data set consisting of the m sites and n reads is connected, if the graph Q
has a single connected component. Refer to Figure 2 for an illustration. Notice that since the
problem definition is agnostic to how we label the strings from {1,··· , k}, any haplotype phasing
algorithm can only hope to recover the k strings up to a permutation of the string label (which
takes values in {1,··· , k}). For two disjoint blocks of a haplotype that are not bridged by a read,
there is no way to ascertain how to phase fragments of the k haplotypes locally recovered inside the
blocks. For this reason (and without the loss of generality of the proposed assembly framework),
we assume that the set of haplotypes form a contiguous block of reads. If this were not the case, we
could pre-process the reads and split the problem into many smaller instances, where each instance
consists of a single contiguous haplotype block that needs to be assembled independently of other
blocks.
Recovery Goals and Performance Metrics
In this subsection, we formalize the main performance metrics used to benchmark haplotype as-
sembly algorithms, namely the Correct Phasing Rate (CPR) and the Minimum Error Correction
(MEC) score (see eg. ([21], [22], [23])). The CPR measures the discrepancy between the recon-
structed haplotypes s1,··· , sk and the ground truth s1,··· , sk,
1sl[i]=sπ(l)[i],
(1)
where Sk is the set of all permutations of {1,··· , k}. Note that this is a more demanding notion
of recovery compared to that used in [17] and [24]; the metric used there, so-called Reconstruction
Rate, we for convenience denote by M-CPR (abbreviating "Modified CPR"). This metric is defined
as
m(cid:88)
i=1
k(cid:89)
l=1
CPR =
1
m
max
π∈Sk
M-CPR = max
π∈Sk
1
mk
m(cid:88)
k(cid:88)
i=1
l=1
1sl[i]=sπ(l)[i].
(2)
j=1 1Xj ≤(cid:80)k
since for all sets X1,··· , Xk,(cid:81)k
In the case of assembly of diploid haplotypes (i.e., k = 2), CPR and M-CPR are identical. However,
in the polyploid case where the size of the alphabet is generally 4, it holds that CPR ≤ M-CPR
j=1 1Xj . We adopt CPR in equation (1) since it reflects
the fraction of sites where the haplotype phasing algorithm correctly recovers all the haplotypes.
Unfortunately, the design of algorithms for direct minimization of this objective is infeasible since
the ground truth is unknown. A commonly used proxy metric in practice is the MEC which can
be computed directly from the observed data and the reconstructed output. The MEC score is
defined as
n(cid:88)
u=1
m(cid:88)
i=1
MEC =
min
l∈{1,··· ,k}
1Read u covers site i1s(u)[i](cid:54)=sl[j].
A number of existing haplotype assembly schemes such as [17], [14], attempt to directly minimize
the MEC score by solving relaxations of the underlying combinatorial optimization problem that is
5
known to be NP-hard [4], [7]. Contrary to this common approach, in this paper we do not attempt
to directly minimize the MEC but rather leverage inherent structural properties of the data and
the fact that the noise in measurements is introduced randomly, rather than by an adversarial
source, to design a randomized assembly algorithm. Specifically, we rely on the above observations
to provide a solution to haplotype assembly by posing it as a clustering problem on a random graph.
The key parameters that impact the performance of assembly are coverage, error rate and effective
read length. Formally, effective read-length R is defined to be the average of j
(l)
1 and j
(l)
2 , i.e.,
n(cid:88)
u=1
R =
1
2n
(j
(u)
1 + j
(u)
2 ).
We define the coverage C as the average number of reads that cover a single base in a haplotype, i.e.,
C = 2nR
km . Since there are n reads, each covering on average 2R haplotype alleles, the total average
number of bases being read is 2nr. The error-rate p is the average error rate of the data acquisition
process, i.e., the fraction of alleles incorrectly represented by the reads; this rate is aggregate of
the sequencing and SNP calling errors. We adopt the standard practice of characterizing and
benchmarking the performance of haplotype assembly algorithms using either the achieved MEC
in practical settings where the ground truth is unknown, and the CPR in simulation studies where
the ground truth is known. We will characterize the performance of our algorithm in settings with
varied ploidy, alphabet size, coverage, read-lengths and error-rates.
3 The Haplotype Assembly Algorithm
The algorithm we propose is based on identifying a simple connection between the aforementioned
haplotype reconstruction problem and Euclidean community detection. Although such a connection
was previously noted in the special case of single-ended reads and the diploid haplotype phasing
problem [25], no prior work explored this connection in the case of paired-end reads and phasing
polyploids. For the first time, we provide a unified framework based on Euclidean community
detection (e.g., [20],[26]) for both diploid and polyploid haplotype phasing problems.
Pre-Processing the Data
In order to invoke a connection to spatial community detection, we pre-process the n paired-end
reads into a graph G with n nodes, where each node represents a paired-end read. This pre-
processing has two steps - (i) Constructing weights between pairs of nodes (reads), (ii) Placing
labels on the nodes.
1. Weights between nodes - For any two reads u, v ∈ [n] with u (cid:54)= v, denote the intersection of
sites at which the two measurements occur by Iu ∩ Iv := {l1,··· , lq}, where q = 0 implies empty
set. More precisely, each li, for i ∈ {1,··· , q}, is a position along the haplotype covered by both u
and v. If q = 0, reads u and v cover disjoint set of sites; in this case, there is no edge between u
and v in the graph G. If on the other hand q > 0, then we place an edge between them and assign
it weight wuv given by
(1s(u)[lh]=s(v)[lh] − 1s(u)[lh](cid:54)=s(v)[lh]).
(3)
q(cid:88)
wuv :=
1
q
h=1
6
Figure 3: An illustration of our pre-processing the set of reads into a spatial random graph. The
starting indices of the two contiguous blocks of a read forms its spatial coordinate and the weight
is computed using Equation 3. In this example, the shaded sites contribute to the weight wuv.
In words, the weight of an edge between any two overlapping reads u and v is the difference between
the number of positions (sites) where u and v agree and the number where they disagree, divided
by the total number of sites in common. Observe in the definition that the weights wuv ∈ [−1, 1]
for all u, v ∈ [n]. Such a weighting scheme ensures that if wuv is positive and large, then it is likely
that the reads u and v are generated from the same string, while if wuv is negative and large in
magnitude, then it is likely that the reads u and v are generated from different strings. This bias
in the weights wuv can be understood by examining the typical structure of the polyploid phasing
problem. Note that if the SNP positions were called accurately, i.e., all of the m haplotypes to be
phased were 'true', then it would hold that in any location i ∈ {1,··· , m}, not all strings s1,··· , sk
have identical bases, i.e., the set of locations {i ∈ {1,··· , m} : s1[i] = ··· = sk[i]} = ∅. Since
sequencing errors are 'typically' small, it is thus the case that if two reads covering the same site
have different values, then it is likely that they come from different haplotypes.
2. Node Labels - To each node u ∈ [Nn] of the graph we assign two labels: (i) - a community
label Zu ∈ [k] and (ii) - a spatial label Xu ∈ [m]2. The community label of a node indicates origin
of the corresponding read (i.e., which haplotype the read samples), while the spatial label of a node
u ∈ [n] is (i
(u)
2 ), i.e., the locations along the haplotype where the two contiguous substrings
of the paired-end read start. See Figure 3 for an illustration of the data pre-processing. This
definition of spatial labels assumes that the reads consist of precisely two contiguous substrings;
however, experimental data show that this may be violated due to various practicalities in base-
calling, read mapping and variant calling steps (e.g., due to omitting bases with confidence scores
below a threshold); consequently, in practice a read (more precisely, the parts of a read covering
heterogeneous variant positions that are being used in haplotype assembly) may consist of either a
single or more than 2 contiguous fragments. If a read is only a single contiguous string of alleles,
the spatial location of that read is placed on the diagonal in [n]2, i.e., the spatial label assigned to
the read is a pair of identical numbers (each being the starting position of the single read). If a
read happens to consist of more than 2 contiguous fragments, there are several possibilities when
it comes to assigning it a spatial label. For instance, we may split the read into multiple reads
such that each one has at most two contiguous fragments; alternatively, we may choose two of the
multiple starting contiguous points in a suitable fashion to form the spatial label. Further details
regarding assignment of spatial labels are discussed in Section 4.2.
(u)
1 , i
7
1i(u)1<latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit>i(u)2<latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit>i(v)2<latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit>i(v)1<latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit>i(v)1<latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit><latexit sha1_base64="zpdWA0nH7rLmdr/lTaEYWr5wpEw=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2FXBD0GvXiMYB6YrGF20kmGzM4uM7OBsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glhwbVz328mtrW9sbuW3Czu7e/sHxcOjho4SxbDOIhGpVkA1Ci6xbrgR2IoV0jAQ2AxGtzO/OUaleSQfzCRGP6QDyfucUWOlR971ntLy+HxKusWSW3HnIKvEy0gJMtS6xa9OL2JJiNIwQbVue25s/JQqw5nAaaGTaIwpG9EBti2VNETtp/OLp+TMKj3Sj5Qtachc/T2R0lDrSRjYzpCaoV72ZuJ/Xjsx/Ws/5TJODEq2WNRPBDERmb1PelwhM2JiCWWK21sJG1JFmbEhFWwI3vLLq6RxUfHcind/WareZHHk4QROoQweXEEV7qAGdWAg4Rle4c3Rzovz7nwsWnNONnMMf+B8/gBqQ5AU</latexit>i(u)1<latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit><latexit sha1_base64="cn/V+qkpFt1uRuH/QOv7dnn1Nfs=">AAAB8XicbVBNS8NAEJ34WetX1aOXxSLUS0lE0GPRi8cK9gPbWDbbTbt0swm7E6GE/gsvHhTx6r/x5r9x2+agrQ8GHu/NMDMvSKQw6Lrfzsrq2vrGZmGruL2zu7dfOjhsmjjVjDdYLGPdDqjhUijeQIGStxPNaRRI3gpGN1O/9cS1EbG6x3HC/YgOlAgFo2ilB9HzHrNKejYhvVLZrbozkGXi5aQMOeq90le3H7M04gqZpMZ0PDdBP6MaBZN8UuymhieUjeiAdyxVNOLGz2YXT8ipVfokjLUthWSm/p7IaGTMOApsZ0RxaBa9qfif10kxvPIzoZIUuWLzRWEqCcZk+j7pC80ZyrEllGlhbyVsSDVlaEMq2hC8xZeXSfO86rlV7+6iXLvO4yjAMZxABTy4hBrcQh0awEDBM7zCm2OcF+fd+Zi3rjj5zBH8gfP5A2i8kBM=</latexit>i(v)2<latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit><latexit sha1_base64="bfvgt23wdUPSyRnC8ZH7Knp+58A=">AAAB8XicbVDLSgNBEOz1GeMr6tHLYBDiJewGQY9BLx4jmAcma5idTJIhs7PLTG8gLPkLLx4U8erfePNvnCR70MSChqKqm+6uIJbCoOt+O2vrG5tb27md/O7e/sFh4ei4YaJEM15nkYx0K6CGS6F4HQVK3oo1p2EgeTMY3c785phrIyL1gJOY+yEdKNEXjKKVHkW38pSWxhdT0i0U3bI7B1klXkaKkKHWLXx1ehFLQq6QSWpM23Nj9FOqUTDJp/lOYnhM2YgOeNtSRUNu/HR+8ZScW6VH+pG2pZDM1d8TKQ2NmYSB7QwpDs2yNxP/89oJ9q/9VKg4Qa7YYlE/kQQjMnuf9ITmDOXEEsq0sLcSNqSaMrQh5W0I3vLLq6RRKXtu2bu/LFZvsjhycApnUAIPrqAKd1CDOjBQ8Ayv8OYY58V5dz4WrWtONnMCf+B8/gBrzpAV</latexit>i(u)2<latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit><latexit sha1_base64="B9cN/MdbF0a2Mx9Iabz4p5GB4aQ=">AAAB8XicbVDLSgNBEOyNrxhfUY9eBoMQL2E3CHoMevEYwTwwWcPsZJIMmZ1dZnqFsOQvvHhQxKt/482/cZLsQRMLGoqqbrq7glgKg6777eTW1jc2t/LbhZ3dvf2D4uFR00SJZrzBIhnpdkANl0LxBgqUvB1rTsNA8lYwvpn5rSeujYjUPU5i7od0qMRAMIpWehC96mNaTs6npFcsuRV3DrJKvIyUIEO9V/zq9iOWhFwhk9SYjufG6KdUo2CSTwvdxPCYsjEd8o6liobc+On84ik5s0qfDCJtSyGZq78nUhoaMwkD2xlSHJllbyb+53USHFz5qVBxglyxxaJBIglGZPY+6QvNGcqJJZRpYW8lbEQ1ZWhDKtgQvOWXV0mzWvHcind3UapdZ3Hk4QROoQweXEINbqEODWCg4Ble4c0xzovz7nwsWnNONnMMf+B8/gBqR5AU</latexit>wuv<latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit><latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit><latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit><latexit sha1_base64="zW44W02VJzYd0MaGY3Ct85ahnJA=">AAAB7XicbVBNSwMxEJ3Ur1q/qh69BIvgqeyKoMeiF48V7Ae0S8mm2TY2myxJtlKW/gcvHhTx6v/x5r8xbfegrQ8GHu/NMDMvTAQ31vO+UWFtfWNzq7hd2tnd2z8oHx41jUo1ZQ2qhNLtkBgmuGQNy61g7UQzEoeCtcLR7cxvjZk2XMkHO0lYEJOB5BGnxDqp+dTL0vG0V654VW8OvEr8nFQgR71X/ur2FU1jJi0VxJiO7yU2yIi2nAo2LXVTwxJCR2TAOo5KEjMTZPNrp/jMKX0cKe1KWjxXf09kJDZmEoeuMyZ2aJa9mfif10ltdB1kXCapZZIuFkWpwFbh2eu4zzWjVkwcIVRzdyumQ6IJtS6gkgvBX355lTQvqr5X9e8vK7WbPI4inMApnIMPV1CDO6hDAyg8wjO8whtS6AW9o49FawHlM8fwB+jzBxAwj28=</latexit>m......Summary of the Algorithmic Pipeline
Our algorithm takes the spatial graph G as input, and produces the reconstructed haplotypes. After
pre-processing the sequencing data, we may form the graph G and assign spatial labels (Xu)u∈[n] to
its nodes. However, the community labels (Zu)u∈[n] are unknown at this point. We defer a detailed
discussion of the computational complexity involved in the pre-processing needed to construct G
to the end of this section, where we show that one can exploit the structure in the data to reduce
complexity of this pre-processing step from the naive O(n2) to roughly O(n). Given the represen-
tation of the data by the graph G, and having assigned spatial labeling to its nodes, our algorithm
has two main components - (i) - a community detection on G to discover origin of each read and
thus effectively group the reads into k different clusters and (ii) - Subsequently, for all i ∈ [m] and
l ∈ [k], we estimate sl[i] by a simple majority rule as described in the sequel.
1. Euclidean Community Detection - This part of the algorithm is where we take as input the
(cid:98)Zu ∈ [k], denoting which of the k haplotype, a read is likely originating from. We summarize the
graph G along with the spatial labels (Xu)u∈[n] and estimate for each u ∈ [n], a community label
key steps in this task. The formal pseudo code is given in Algorithm 1.
1. We first tessellate the grid [n]2 into smaller overlapping boxes, denoted by (Bx,y)1≤x≤n,1≤y≤n.
Here n < n is a parameter which we choose and each Bx,y ⊂ [n]2. The tessellation is such
that each grid point u ∈ [n]2 belongs to multiple boxes Bx,y since the boxes overlap.
2. For each box Bx,y, let Hx,y denote the subgraph of G containing nodes whose spatial locations
lie in Bx,y. The nodes of Hx,y are all clustered independently into k communities.
3. The community estimates in different boxes are synchronized to obtain a global clustering
estimate from spatially-local clustering estimates. Since each grid point is present in multiple
boxes, a read gets many estimates for its community, each of which adds an 'evidence' to
the label of the node. This scheme has a natural 'error-correcting' mechanism, since it is less
likely for a node to be misclassified in the majority of the boxes it lies in, as opposed to any
one particular box.
it originates ((cid:98)Zu)u∈[n], we reconstruct the haplotypes by a simple majority vote. For all j ∈ [k] and
2. Reduce by Majority - After estimating for each node (read), the likely haplotype from which
i ∈ [m], we estimate sj[i] to be the majority among the 4 letters in the alphabet as indicated by
the reads that cover site i and are estimated to belong to string j in the above clustering step.
Intuition behind the Algorithm
Observe that for any two reads u and v that overlap, if the weight wuv is positive and large, then
they are likely from the same haplotype while if negative and large, they are likely from different
haplotypes. Consider a subset of reads such that the absolute value of the weights on the edges
that connect them in graph G are 'large'. This subset of reads can readily be grouped into up to k
different clusters using standard techniques such as the spectral method. Such simple schemes will
be successful in this scenario since the 'signal' for clustering in the subgraph is high due to strong
interaction between the corresponding reads, i.e., the adjacency matrix of the subgraph is dense.
8
Figure 4: An instance with three strings (haplotypes) of length 1000 where spectral clustering on
G fails. The coverage is 10, the effective read lengths r = 2 and R = 250. The error probability
p = 0.05. The figure on the left is the union of the three figures on the right. The three colored
plots are the spatial locations of the recovered communities by the spectral algorithm applied on G.
The density of the recovered blue estimates is 0.0995, while that of red is 0.33 and of green is 0.57.
The total overlap achieved by the spectral method is 0.1. Note that in the ground truth all three
colors are equal in intensity, which is not captured by the spectral method. However, our correctly
algorithm predicts approximately equal-sized communities, achieves an overlap of 0.98 and runs 4
times faster.
However, the entire set of reads does not posses the aforementioned property -- in particular, it
has a large diameter (of order n). Thus, standard spectral methods applied to graph G are both
computationally impractical as well as statistically sub-optimal for recovery. The computational
impracticality is easy to observe; indeed, any clustering scheme will be super-linear in the num-
ber of nodes Nn, which renders them extremely slow on large problem instances that are typical
in practice. Furthermore, even the pre-processing of reads to construct graph G is of order N 2
n,
which makes it computationally challenging in practical settings. The statistical sub-optimality
is more subtle and stems from the fluctuations in the density of reads in space; in many problem
instances, the density of reads varies across space due to randomness in the read generation process.
For instance, in Figure 4, we see an example where the density of reads captured by the spectral
algorithm is highly imbalanced due to the fluctuations of the nodes in space. However, in the
ground truth set, the statistical distribution of reads across space is the same for all communities.
Therefore, to improve performance, one would need an additional 'constraint' in the reconstruction
algorithm to enforce the fact that the spatial distribution of reads across all communities is the same.
Our strategy in this paper is to first partition the set of reads into subsets wherein the reads interact
strongly. Since the reads have spatial locality, we partition the set of reads into boxes as illustrated
in Figure 5. In each box, we consider the subgraph of G with nodes having spatial labels lying in
that box and then cluster this sub-graph independently of other subgraphs in other boxes. The
partition of space into boxes is fixed a priori and is data independent. The box size and how much
they overlap are hyper-parameters that can be tuned. In each box, we run a clustering algorithm
and then combine the estimates from different boxes to form a final global partitioning of the nodes
of G. The partitioning based on spatial locality automatically ensures that the spatial density
of the estimated communities are roughly identical. The intuition for this stems from the fact
that the reads will be roughly uniformly distributed within a box since the box is 'small' in size.
More importantly, by requiring that the boxes overlap, a single read will be present in multiple
boxes. This further boosts statistical accuracy of clustering by embedding natural error-correction
9
scheme; since a single read is processed multiple times, there are multiple instances of 'evidence'
for the community label of a node. From a computational complexity viewpoint, partitioning
the set of nodes and clustering smaller instances dramatically reduces run-time as a majority of
clustering algorithms are super-linear in the number of data points and hence reducing the sizes
of the graphs to be clustered has a significant beneficial impact. Therefore, our algorithm is both
computationally feasible on large instances and is statistically superior compared to standard graph
clustering algorithms directly applied on G.
3.1 Pseudo Code
Let us start by introducing the notation needed to formalize the algorithm. The algorithm has
hyper-parameters A, B, iter, M ∈ N and α ∈ [0, 1]. For x, y ∈ [(cid:100) n
A(cid:101)], we define Bx,y ⊂ [n]2 as
Bx,y := [Ax, min(Ax + B, n)] × [Ay, min(Ay + B, n)], the box indexed by (x, y). Thus, the param-
eters A and B dictate how large a box is and how many boxes cover a read. In the course of the
algorithm, we maintain a dictionary of lists C, where for each node u ∈ [Nn], C[u] denotes the list
of community estimates for node u. Each node has more than one estimate as it belongs to more
than one box. The estimates from clustering in each box are added as 'evidence' of the community
estimate for the nodes in the box. Having multiple estimates for a node helps in combating clus-
tering errors in certain boxes.
Main Routine - We now describe the algorithm in detail. The first step consists of partitioning the
space [n]2 into multiple overlapping boxes as shown in Figure 5. Recall that the hyper-parameters
A and B allow one to tune both the size of a box and the number of boxes that will cover a given
location of [n]2. In each box indexed by (x, y) for x, y ∈ [(cid:100) n
A(cid:101)], we identify the nodes of G having
their spatial label in that box; let us denote the collection of such nodes by Hx,y. If the number of
nodes in Hx,y is small (e.g., smaller than a certain hyper-parameter M ), then we do not attempt to
cluster these nodes. We need to set such a minimum size of Hx,y or the output of clustering may
turn out to be noisy and non-informative. In addition, if more than an α < 1 fraction of nodes in
Hx,y have at least one community estimate, then again we do not cluster Hx,y. The reason for doing
so is to decrease the running time by ensuring we only perform the clustering step when there are
sufficiently many new unexplored nodes. In each remaining box (x, y) (i.e., each box with at least
M nodes where at most an α fraction of them have prior estimates) we apply a fast and simple
local clustering algorithm. In particular, we generate an approximate clustering of the nodes in
Hx,y by directly running a standard k-means algorithm [27] on the adjacency matrix of Hx,y. We
then iteratively improve upon this initial guess by reassigning each node to the most likely cluster
while keeping the assignment of other nodes fixed. This iterative update rule is reminiscent of the
class of Expectation Maximization algorithms, although our method is fast and non-parametric.
We run the iterative clean-up procedure for iter number of iterations. Once the nodes of Hx,y
are clustered, we append the result to the dictionary of lists C after appropriately synchronizing
the community estimates of each node. Once we have iterated over all boxes, we assign a single
community estimate to each node based on the majority in the list of estimates in C. The algorithm
is formalized as the following pseudo-code.
Local Clustering Step - This step is described in Algorithm 2. We follow a two step-procedure.
In the first step, we get an approximate clustering of the graph H by applying the standard k-
means algorithm on the adjacency matrix H. We then one-hot encode this clustering result. One
10
Figure 5: This is an example with n = 7. The parameters A = 1 and B = 3. The red and green
boxes are examples of Bx,y.
Algorithm 1 Main Routine
1: procedure Main(G, k, (Xi)i∈[1,Nn], A, B, iter, M )
for i ∈ {1,··· , n} do
2:
end for
C[i] ← []
for 1 ≤ x ≤(cid:2)(cid:100) n
A(cid:101)(cid:3) do
A(cid:101)(cid:3) do
for 1 ≤ y ≤(cid:2)(cid:100) n
(cid:46) A, B, iter, M, α are hyper-parameters
(cid:46) For every node(read)
(cid:46) Initialize to empty
Bx,y ← [Ax, min(Ax + B, n)] × [Ay, min(Ay + B, n)]
Hx,y ← Subgraph of G with spatial labels in Bx,y
f ← {l∈Hx,y:C[l]>0
if Hx,y ≥ M AND f ≥ 1 − α then
Hx,y
e ← LOCAL-CLUSTER(Hx,y, k, iter)
C ←SYNCHRONIZE(C, e)
(cid:46) Fraction of nodes with a community estimate
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
end if
end for
end for
16: return REDUCE-BY-MAJORITY(C)
17: end procedure
hot encoding is one where for each read we associate a k×1 vector in which all entries re 0 except for
a single entry corresponding to the estimated community label of that read to be 1. More formally,
if r denotes the number of nodes of H, then the one-hot encoding result is a matrix e0 of size r× k.
Each entry of e0 is either 0 or 1; the entry in the ith row and jth column being 1 implies that the
ith node is classified as belonging to community j. Thus, each row of e0 contains exactly one 1
while the rest of the entries are all 0. We then run a 'clean-up' procedure by iteratively updating
the estimate as follows.
et+1 = T (Het).
(4)
The function T is applied row-wise; for matrix A, it sets the ith row and jth column of T (A) to 1
if j = arg max A[i], else the ith row and jth column of T (A) is set to 0. If a row has more than one
column where the maximum is attained, the first column where the maximum occurs is assigned
value 1 while the other columns are assigned value 0. Hence the dimensions of A and T (A) are the
same. Furthermore, for any matrix A, the matrix T (A) is such that its entries are either 0 or 1,
with each row having exactly one entry valued 1.
11
Algorithm 2 Small Graph Clustering
1: procedure Local-Cluster(H, k, iter)
2:
e := k-means-cluster(H, k)
e0 = One-Hot-Encoding(e).
for 1 ≤ i ≤ iter do
3:
4:
5:
(cid:46) k-means Algorithm of [27]
ei = arg max Hei−1
(cid:46) row wise argmax
end for
6:
7: return eiter.
8: end procedure
The iterative update is based on the following intuition. Let the clustering be encoded by matrix
et for some t ∈ N, and consider a tagged node u ∈ [n]. The new updated value of the community
label of node u is then the 'most-likely' label given the estimates of the community labels of the
rest of the nodes. More precisely, the 'weight' that a node u is in a community l ∈ [k] is the sum
of the weights along the edges connecting u to v ∈ [n] in G such that the estimate of node v is l.
The new community label of node u is the one having the largest weight. By performing this op-
eration simultaneously for all nodes, one obtains the representation in Equation (4). The intuition
for reassigning the node to the community with the maximum weight stems from the observation
that if a weight along an edge is positive and large, then it is likely that the end nodes of the
edge share the origin, i.e., the corresponding reads sample the same haplotype. Likewise, if the
weight along an edge is negative and large, then it is likely that the end nodes represent reads that
sample different haplotypes. Therefore, for the iterative update to perform well, the initial estimate
e0 must be 'good enough'; we achieve this by applying the k-means clustering algorithm on the
adjacency matrix H. In principle, one can obtain somewhat better initial guess for e0 by applying
the k-means algorithm to the eigenvectors of H, but the marginal gains in statistical accuracy does
not warrant the enormous increase in computation needed to perform such a spectral clustering.
The clean-up method, at first glance, seems to bear similarities to other dynamical algorithms such
as expectation maximization, Belief Propagation (BP) and tensor factorization based methods of
[17]. Unlike BP, however, we do not iterate the beliefs or probabilities of a node belonging to vari-
ous communities; instead, we make a hard assignment at each update step. While for standard BP
algorithms it is desirable that a graph is tree-structured, our graph contains a lot of triangles and
loops due to the spatial embeddings. Therefore, it would be insufficient to keep track of the node
marginals -- instead, BP would need the entire joint distribution which is not tractable. Despite
the undesirable properties of G, benchmarking results demonstrate that our algorithm performs
community detection on the graph very well.
Synchronization Step - The main routine in Algorithm 1 considers the boxes sequentially and
performs local clustering steps. Once the local clustering is performed, a key component is to
synchronize the estimates of the current box with the estimates of the boxes that are already clus-
tered. The synchronization is essential since the problem is a permutation invariant to the labels.
Formally, the statistical distribution of the data remains unchanged if the true underlying labels of
the [k] strings are permuted. Hence, the best hope for any recovery algorithm is to reconstruct the
k strings upto a permutation of labels. Thus, if any clustering algorithm is run on two different
12
(cid:46) The identity permutation
(cid:80)
j∈C[i] 1π(σ[i])=C[i][j]
j∈C[i] 1
Algorithm 3 Synchronization Step
1: procedure Synchronize(C, e)
(cid:99)W ← 0
(cid:98)π ← id
for All permutations π of [k] do
(cid:80)
i∈Nx,y
end for
1C[i](cid:54)=empty
local-weight ← 0
for All nodes in e do
Wπ ←(cid:80)
if Wπ >(cid:99)W then
(cid:99)W ← Wπ
(cid:98)π ← π.
Append(cid:98)π(e[nodes]) to C[nodes].
end if
end for
for nodes in e do
16:
end for
17: return C.
18: end procedure
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
4:
5:
6:
7:
9:
subsets of nodes, the corresponding haplotype estimates need to be synchronized to produce a
clustering of the nodes in the union of the sets. We perform this clustering in line 8 of the main
routine Algorithm 1 by invoking the sub-routine 3.
In sub-routine 3, we decide on how to permute the community label output of the local clustering
estimate of Hx,y that best 'synchronizes' with the label estimates of the other nodes of G at that
instance. Observe that at the instant of synchronizing the output of Hx,y, other nodes of G have
either none or multiple label estimates. There is a possibility that more than one label estimate
per node is present in multiple boxes, each adding an 'evidence' for a node's cluster. We select a
permutation of the labels by sequentially going over all permutations of [k] and selecting the one
Algorithm 4 Reduce by Majority
1: procedure Reduce-Majority(C)
C[node] ← Majority(C[node]).
for node in C.keys do
2:
3:
(cid:46) Estimate haplotype by majority
end for
for l ∈ {1,··· , k} do
for i ∈ {1.··· , m} do
(cid:98)sl[i] ← majority of alphabets among reads j with C[j] = l and covering site i.
8:
end for
10: return ((cid:98)sl[i])l∈{1,··· ,k},i∈{1,··· ,m}
end for
11: end procedure
13
that has the highest 'synchronization-weight'. More formally, let Nx,y ⊂ [n] denote the indices of
the nodes in Hx,y; for all u ∈ Nx,y, denote by σ[u] ∈ [k] the label estimates formed by the local
clustering on Hx,y. The synchronization weight for a permutation π of [k] is defined as
(cid:80)
(cid:80)
j∈C[i] 1
(cid:88)
i∈Nx,y
Wπ :=
1C[i](cid:54)=empty
j∈C[i] 1π(σ[i])=C[i][j]
.
In words, we go over all nodes in Hx,y that have at least one prior estimate and sum the fraction
of the previous estimate equaling the label assigned by the local clustering Hx,y after applying the
permutation π to the local clustering's output. Among all permutations, we select the π∗ having
the highest synchronization weight (ties are broken arbitrarily). After doing so, for each node u
of Hx,y we append the label π∗(σ(u)) to the list C[u]. The key feature of the above procedure is
consideration of the fraction, which is a proxy for the 'belief' of the community label of a node,
rather than just a count; this is meaningful because the counts across different nodes can be
significantly skewed by the order in which the boxes are clustered and synchronized.
Computational Complexity
In this section, we discuss the computational complexity of implementing our algorithm and the
effect of various hyper-parameters on runtimes. A naive implementation of the algorithm would
incur a cost of the order n2 just to construct the graph G from the reads. This step itself may
be infeasible in practical scenarios where the number of reads will be on the order of millions.
However, our algorithm only needs the subgraphs Hx,y instead of the full graph G. Therefore, we
pre-process the reads and create a hash-map where for each location in [n]2, we store the list of
reads that have spatial label in that location. This requires one pass through the list of reads, i.e.,
has computational complexity of order n and storage complexity of order n. Now, creating the
adjacency matrix Hx,y is quadratic in only the number of nodes in Hx,y. The synchronization step
requires time complexity of the order of the number of nodes in Hx,y times the number of distinct
permutations of [k].
Choosing the Parameters of our Algorithm
Our algorithm has an inherent trade-off between computational complexity and statistical accuracy
that can be achieved by varying the hyper-parameters. For instance, if we decrease A while keeping
B fixed, the number of boxes and therefore the computational time are increased. However, the
statistical accuracy would improve since each node would now be present in many boxes and
hence the error-correction scheme performs more accurately. Similarly, increasing the parameter
M can reduce the run-time by considering fewer boxes to perform local clustering, while potentially
decreasing statistical accuracy because there is less evidence for determining community label of
each node.
4 Experimental Evaluation
We evaluate the performance of our proposed algorithm on both simulated and experimental data.
We implemented our algorithm in Python. The simulations, as well as the experimental evaluations
were conducted on a single core Intel I5 Processor with 2.3Ghz processor and 8 GB 2133 MHz
LPDDR3 RAM.
14
Cov Err
ComHapDet
t(s)
CPR MEC
662.7
99.2
18.3
1289.1 18.8
98.2
2640
80.5
18.2
923.4
99.9
29.2
1831.1 27.1
99.5
3575.9 27.9
91.9
1382.7 52.1
100
2772.9 56.4
99.9
97.9
5283.6
50
AltHap
σ
0.2
0.4
1.6
0.1
5.3
1.3
0
0.1
0.4
CPR MEC
99.9
960.7
99.8
1871.2
85.9
4844.1
1352.9
99.9
3132.3
98.1
92.8
5231.9
2034.5
100
3989.7
99.9
96.8
7646.3
t(s)
13.4
13.8
13.7
15.43
15.5
24.2
30
39.1
39.2
σ
0
0.1
1.3
0
0.8
1.3
0.1
0
0.6
HPoP
CPR MEC t(s)
3.1
99.8
3.4
99.4
84.8
3.5
1.7
99.9
99.8
3.1
88.3
3.3
100
8
7.3
99.9
96.7
7
961.5
1868.5
3862.7
1354.9
2667.5
5488.2
2022.5
3986.5
7789
σ
0.1
0.3
8.6
0
0.4
11.5
0
0
1.8
0.05
0.1
0.2
0.05
0.1
0.2
0.05
0.1
0.2
Table 1: Simulated diploid biallelic data.
ComHapDet
97
93.7
413.1
Err
CPR MEC
t(s)
0.002 98.6
76.7
93.8
662.1
81.2
0.01
97.1 1504.7
75.5
0.05
0.002 99.8
137.5
99.7
0.01
135.9
99.4 2021.9 139.8
0.05
124.6
99.9
300.4
0.002
611.1
99.9
0.01
307.9
2981.5 297.2
99.9
0.05
σ M-CPR CPR MEC
687
0.9
966.2
10.8
2887.4
1.6
0.17
1215.4
1029.1
0.2
3632.0
0.3
1725
0.1
0.1
1628.6
6721.3
0.2
99.5
97
98.9
99.9
99.9
99.8
99.9
99.9
99.9
89
88.7
80.1
83.7
92.7
92.7
89.9
96
87.4
Table 2: Simulated Triploid Tetraallelic Data.
AltHap
t(s)
295.2
289.8
332.1
593.2
592.7
592.4
708.5
781
713.3
σ M-CPR
14
17.5
20.2
20.7
14.6
14.6
16.1
9.82
20.4
93
92.4
86.3
88.4
95.4
95.4
94
97.6
92.1
AltHap
7
10
15
Cov
7
10
15
Cov
Err
7
10
15
0.002
0.01
0.05
0.002
0.01
0.05
0.002
0.01
0.05
ComHapDet
CPR MEC
80
79.1
68.3
98.9
99.1
98.2
99.8
99.8
99
t(s)
1316.3 143.5
1640.0 118.5
129.7
3722.8
193.1
253.3
585.9
261.8
2727.7 238.6
182.7
487.0
806.5
482.7
4101.4 523.8
σ
20.3
17.8
14
1.4
0.4
0.6
0.2
0.2
298.9
t(s)
M-CPR CPR MEC
521.4
1388.6
1812.8
515.8
3481.9 503.1
594.3
1979.7
1779.4
585
667.5
5331.4
684.5
2614.6
684.1
3973.7
6397.6
682.5
76.1
79.9
83.6
71.9
85.4
78.6
85.2
83.5
95.1
91.8
91.8
87.3
99.6
99.8
99.5
99.9
99.9
99.7
σ M-CPR
20.8
20.5
20.2
15.5
18.5
15.6
18.4
17.4
14.5
87.5
88.1
92
85.6
92.1
89.7
92
92.6
97.4
Table 3: Simulated Tetraploid Tetraallelic Data.
4.1 Performance on Simulated Data
We first test the performance of our algorithm in simulations for both the diploid biallelic case as
well as the more challenging polyploid polyallelic case. Since the ground truth in simulations is
known, we use CPR, MEC and M-CPR as the primary performance benchmarks. The CPR and
15
Cov
Err
10
15
20
0.002
0.01
0.05
0.002
0.01
0.05
0.002
0.01
0.05
ComHapDet
t(s)
CPR MEC
78.9
551.1
2256.6
2250.4
84.1
563.2
526.3
48.8
9578.4
308.2
99.3
1295.6
1528.5 1359.1
97.4
94.7
6554.2 1207.5
382.8
99.5
2097.1
1654.3 2116.5
99.5
99.6
7912.8 2298.9
15.6
14
25.6
0.3
5.4
11.7
0.2
0.2
0.2
σ M-CPR CPR MEC
2022.9
3533.7
7440.7
4960.6
5493.4
13751.6
7095.1
5905.4
23381.8
76
70.4
75.8
70.4
77.7
65.9
77.1
87.3
65.1
94.1
95.8
81.9
99.9
99.4
98.7
99.9
99.9
99.9
AltHap
t(s)
977.9
919.9
1222.1
1780.4
1624.6
2406.3
7561.2
6862.1
8563.4
σ M-CPR
20
19.9
17.9
25.2
23.2
19
19.3
18
24.5
90.6
86.8
90
87.3
89.9
87.2
91.9
96.1
86.9
Table 4: Simulated Hexaploid Tetraallelic Data.
M-CPR are reported as percentages, for ease of presentation. We compare the performance over
a range of problem parameters, namely the ploidy and alphabet size, as well as the measurement
parameters, in particular the coverage, average read length and error rates.
In each case, the
hyper-parameters were set to A = 15 and B = 4. The parameter α = 0.95, for all polyploid cases
and α = 0.85 in the diploid case. Recall that the parameter α allows one to control the trade-off
between the run time and statistical accuracy; specifically, a lower value of α results in faster run
times at the cost of reduced CPR. The column σ displays the standard deviation of CPR (after
being multiplied by 100, for consistency). In each table and metric, the boldfaced entry represents
the algorithm with the best performance for that entry.
Simulated Data - Diploid Bialllelic Case
In the diploid case, we rely on the synthetic paired-end read data used in [17]. The average length
of the effective (i.e., haplotype-informative) paired-end read 4 with an insert gap in a paired end
reads being uniformly sampled between 50 to 150. We use a haplotype length (m in our notation)
of 700 in all case to be consistent with prior literature. As an example [23], which is often used
to benchmark haplotype assembly methods. The results are reported in Table 1. We simulate 15
instances for each configuration of coverage and error probability and report the average in Table
1. We compare our methods against AltHap [17], a sparse tensor factorization method, and HPop
[8], a state-of-the-art dynamic programming approach to haplotype assembly. Since for diplod case
CPR and M-CPR are identical, we only report the CPR. We restrict our attention to these methods
since it is already established in [17], [8], [28], that they are superior, both in terms of accuracy and
run times, as compared to various other approaches including SDHaP [16], an approach inspired by
semi-definite programming relaxations of the max-cut problem, BP [29], a communications system
design inspired belief propagation algorithm, HapTree [30], an algorithm inspired by a Bayesian
reformulation of the problem, and HapCompass [15], an algorithm focused on finding cycle basis
in a graphical representation of the haplotype assembly problem.
Simulated Data - Polyploid Polyallelic Case
We report the results in Tables 2, 3 and 4 for the cases of triploid, tetraploid and hexaploid,
respectively.
In all cases, we considered the tetra-allelic case, i.e., the case of alphabets of size
16
Method
MEC Score
t(secs)
ComHapDet
AltHap
HPoP
HapCompass
HapTree
17738
14580
10596
12497
46617
207
105
102
375
215
Table 5: The performance comparison of the various algorithms on the biallelic tetraploid Potato
dataset
4, and the average length of the effective (i.e., haplotype-informative) paired-end read 4. The
average insert size between the paired end reads was chosen to be 200 with a minimum gap of 50.
The benchmarking algorithm we consider is that of [17], the state-of-the-art algorithm capable of
polyploid polyallelic phasing; all other methods are restricted to biallelic variants. In each case, we
test our algorithm on 10 different problem instances, where in each instance, a haplotype sequence
of length 1000 was phased. We use the same method and the publicly available code from [17] to
generate the synthetic data for the various instances. For the hexaploid case, we do not report
performances on coverage smaller than 10, since the performance of both algorithms are poor.
4.2 Performance on Real Data
Tetraploid Potato Data Set
We test our algorithm on a tetraploid real data set of Chromosome 5 of Potato species Solanum
Tuberosum, whose reference genome is available publicly 1. We considered a set of paired-end
sequence reads reported in experiment SRX3284127 available in the NCBI database 2. We then
mapped the reads to the reference genome using the BWA software of [31]. Subsequently, we use the
FreeBayes software [32] for SNP calling and create the vcf file. We then extracted out connected
components of reads and considered the haplotype assembly on instances that were at-least 20
haplotypes long. The data set of reads after SNP calling is available in the Github link provided in
Abstract. We compare the performance of our algorithm with AltHap, HapCompass [33], HPoP [8]
and HapTree [30], and report the results in Table 5. We use the recommended hyper parameters
of A = 20, B = 5, α = 0.85 and the minimum problem size as 20. We chose these set of parameters
to minimize run time, while at the same time ensuring that all reads in a data set are covered by
at-least one community estimate.
Table 5 compares MEC scores achieved by our method with those achieved by competing techniques.
Note that the true accuracy is captured by the correct phasing rate but the ground truth data in this
set is not available and thus CPR cannot be computed. While being a convenient surrogate metric,
the MEC score may be misleading since e.g. a very low MEC score does not necessarily imply
high CPR (see Table 1 of [17] for an illustrative example). Note that the task of tetraploid phasing
presents a challenge to our scheme because the weight of an edge in the spatial graph (see Equation
(3) is biased towards being positive, even if the reads on the end points of an edge originate from
1 http://ftp.ensemblgenomes.org/pub/plants/release-41/fasta/
solanum tuberosum/dna/
2https://www.ncbi.nlm.nih.gov/Traces/study/?acc=SRP119957
17
different strings; this limits accuracy of assembly schemes that rely on read clustering. Finally,
as illustrated by simulations, our methodology is suitable to settings where sequencing coverage
exceeds ∼ 10× (both in diploid and polyploid setting). At the time of writing this paper we do not
have access to data sets with coverage beyond 10× and thus do not perform further experiments
on real data.
4.3 Results and Discussions
The results indicate that our method is comparable to the state of the art, both in the diploid as
well as the more challenging polyploid polyallelic scenario. In the diploid biallelic case, we see in
Table 1 that our method performs comparable to both AltHap and HPoP in terms of reconstruction
accuracy as measured by CPR and MEC scores. In the polyploid polyallelic scenario however, tables
2, 3 and 4 indicate that our algorithm is superior in terms of both CPR and MEC compared to
the state of art, namely AltHap, which is the only methodology prior to our work that is capable
of handling polyploid polyallelic data. In terms of experiment on a real data ployploid experiment,
we see in Table 5, that our method performs comparably both in terms of reconstruction accuracy
as measured by MEC score and runtime complexity as compared to other state of art methods.
The results demonstrate that our methodology has significantly higher reconstruction at higher
coverages as compared to lower coverages. This is unsurprising, as at higher coverages, there are
more reads and hence more data to recover the haplotypes. Moreover, the runtime complexity of
our method scales very gracefully with increasing coverage, making it attractive for many practical
high coverage scenarios.
5 Conclusions
In this paper, we propose a novel methodology to assemble both diploid and ployploid haplotypes.
The main observation we make is that, by a spatial representation of the paired-end reads, we
can effectively convert the problem about haplotype assembly into a community detection task
on a spatial graph. Our algorithm assigns to each paired end read, a spatial label corresponding
to the starting indices of the two read fragments. We then divide the problem into overlapping
instances, each of which considers the set of reads located nearby in this embedding and performs
a community clustering, where the community label of a read (node) is the haplotype from which
it originates from. Finally, for each read, we take the majority of the estimated communities from
the various instances as the final community estimate of that read. We then use this estimated
community labels for the reads to output the reconstructed haplotype.
Acknowledgements
AS acknowledges numerous discussions with Abolfazel Hashemi and Ziqi Ke on this and related
topics that helped in the conducting the numerical experiments. The authors also thank anonymous
reviewers of ACM CNB MAC 2019, whose comments greatly helped shape the presentation. This
work was funded in part by the NSF grant CCF 1618427 and a grant of the Simons foundation
#197982 to The University of Texas at Austin.
18
References
[1] Clark, A.G.: The role of haplotypes in candidate gene studies. Genetic Epidemiology: The
Official Publication of the International Genetic Epidemiology Society 27(4), 321 -- 333 (2004)
[2] Sabeti, P.C., Reich, D.E., Higgins, J.M., Levine, H.Z., Richter, D.J., Schaffner, S.F., Gabriel,
S.B., Platko, J.V., Patterson, N.J., McDonald, G.J., et al.: Detecting recent positive selection
in the human genome from haplotype structure. Nature 419(6909), 832 (2002)
[3] Consortium, P.G.S., et al.: Genome sequence and analysis of the tuber crop potato. Nature
475(7355), 189 (2011)
[4] Lancia, G., Bafna, V., Istrail, S., Lippert, R., Schwartz, R.: Snps problems, complexity, and
algorithms. In: European Symposium on Algorithms, pp. 182 -- 193 (2001). Springer
[5] Duitama, J., Huebsch, T., McEwen, G., Suk, E.-K., Hoehe, M.R.: Refhap: a reliable and fast
algorithm for single individual haplotyping. In: Proceedings of the First ACM International
Conference on Bioinformatics and Computational Biology, pp. 160 -- 169 (2010). ACM
[6] Lippert, R., Schwartz, R., Lancia, G., Istrail, S.: Algorithmic strategies for the single nucleotide
polymorphism haplotype assembly problem. Briefings in bioinformatics 3(1), 23 -- 31 (2002)
[7] Bonizzoni, P., Dondi, R., Klau, G.W., Pirola, Y., Pisanti, N., Zaccaria, S.: On the minimum
error correction problem for haplotype assembly in diploid and polyploid genomes. Journal of
Computational Biology 23(9), 718 -- 736 (2016)
[8] Xie, M., Wu, Q., Wang, J., Jiang, T.: H-pop and h-popg: Heuristic partitioning algorithms
for single individual haplotyping of polyploids. Bioinformatics 32(24), 3735 -- 3744 (2016)
[9] Pirola, Y., Zaccaria, S., Dondi, R., Klau, G.W., Pisanti, N., Bonizzoni, P.: Hapcol: accurate
and memory-efficient haplotype assembly from long reads. Bioinformatics 32(11), 1610 -- 1617
(2015)
[10] Kuleshov, V.: Probabilistic single-individual haplotyping. Bioinformatics 30(17), 379 -- 385
(2014)
[11] Levy, S., Sutton, G., Ng, P.C., Feuk, L., Halpern, A.L., Walenz, B.P., Axelrod, N., Huang,
J., Kirkness, E.F., Denisov, G., et al.: The diploid genome sequence of an individual human.
PLoS biology 5(10), 254 (2007)
[12] Bansal, V., Halpern, A.L., Axelrod, N., Bafna, V.: An mcmc algorithm for haplotype assembly
from whole-genome sequence data. Genome research 18(8), 1336 -- 1346 (2008)
[13] Kim, J.H., Waterman, M.S., Li, L.M.: Diploid genome reconstruction of ciona intestinalis and
comparative analysis with ciona savignyi. Genome research 17(7), 000 -- 000 (2007)
[14] Bansal, V., Bafna, V.: Hapcut: an efficient and accurate algorithm for the haplotype assembly
problem. Bioinformatics 24(16), 153 -- 159 (2008)
[15] Aguiar, D., Istrail, S.: Hapcompass: a fast cycle basis algorithm for accurate haplotype as-
sembly of sequence data. Journal of Computational Biology 19(6), 577 -- 590 (2012)
19
[16] Das, S., Vikalo, H.: Sdhap: haplotype assembly for diploids and polyploids via semi-definite
programming. BMC genomics 16(1), 260 (2015)
[17] Hashemi, A., Zhu, B., Vikalo, H.: Sparse tensor decomposition for haplotype assembly of
diploids and polyploids. BMC genomics 19(4), 191 (2018)
[18] Cai, C., Sanghavi, S., Vikalo, H.: Structured low-rank matrix factorization for haplotype
assembly. IEEE Journal of Selected Topics in Signal Processing 10(4), 647 -- 657 (2016)
[19] Chaisson, M.J., Mukherjee, S., Kannan, S., Eichler, E.E.: Resolving multicopy duplications
de novo using polyploid phasing. In: International Conference on Research in Computational
Molecular Biology, pp. 117 -- 133 (2017). Springer
[20] Sankararaman, A., Baccelli, F.: Community detection on euclidean random graphs. In: Pro-
ceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, pp.
2181 -- 2200 (2018). SIAM
[21] Chen, Z.-Z., Deng, F., Wang, L.: Exact algorithms for haplotype assembly from whole-genome
sequence data. Bioinformatics 29(16), 1938 -- 1945 (2013)
[22] He, D., Choi, A., Pipatsrisawat, K., Darwiche, A., Eskin, E.: Optimal algorithms for haplotype
assembly from whole-genome sequence data. Bioinformatics 26(12), 183 -- 190 (2010)
[23] Geraci, F.: A comparison of several algorithms for the single individual snp haplotyping re-
construction problem. Bioinformatics 26(18), 2217 -- 2225 (2010)
[24] Motazedi, E., de Ridder, D., Finkers, R., Baldwin, S., Thomson, S., Monaghan, K.,
Maliepaard, C.: Tripoly: haplotype estimation for polyploids using sequencing data of re-
lated individuals. Bioinformatics (2018)
[25] Chen, Y., Kamath, G., Suh, C., Tse, D.: Community recovery in graphs with locality. In:
International Conference on Machine Learning, pp. 689 -- 698 (2016)
[26] Abbe, E., Baccelli, F., Sankararaman, A.: Community detection on euclidean random graphs.
arXiv preprint arXiv:1706.09942 (2017)
[27] Arthur, D., Vassilvitskii, S.: k-means++: The advantages of careful seeding. In: Proceedings
of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 1027 -- 1035
(2007). Society for Industrial and Applied Mathematics
[28] Motazedi, E., Finkers, R., Maliepaard, C., de Ridder, D.: Exploiting next-generation sequenc-
ing to solve the haplotyping puzzle in polyploids: a simulation study. Briefings in bioinformatics
19(3), 387 -- 403 (2017)
[29] Puljiz, Z., Vikalo, H.: Decoding genetic variations: Communications-inspired haplotype assem-
bly. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB) 13(3),
518 -- 530 (2016)
[30] Berger, E., Yorukoglu, D., Peng, J., Berger, B.: Haptree: A novel bayesian framework for
single individual polyplotyping using ngs data. PLoS computational biology 10(3), 1003502
(2014)
20
[31] Li, H.: Aligning sequence reads, clone sequences and assembly contigs with bwa-mem. arXiv
preprint arXiv:1303.3997 (2013)
[32] Garrison, E., Marth, G.: Haplotype-based variant detection from short-read sequencing. arXiv
preprint arXiv:1207.3907 (2012)
[33] Aguiar, D., Istrail, S.: Hapcompass: a fast cycle basis algorithm for accurate haplotype as-
sembly of sequence data. Journal of Computational Biology 19(6), 577 -- 590 (2012)
21
|
1111.2092 | 1 | 1111 | 2011-11-09T03:22:16 | Pushing Your Point of View: Behavioral Measures of Manipulation in Wikipedia | [
"cs.SI",
"cs.LG"
] | As a major source for information on virtually any topic, Wikipedia serves an important role in public dissemination and consumption of knowledge. As a result, it presents tremendous potential for people to promulgate their own points of view; such efforts may be more subtle than typical vandalism. In this paper, we introduce new behavioral metrics to quantify the level of controversy associated with a particular user: a Controversy Score (C-Score) based on the amount of attention the user focuses on controversial pages, and a Clustered Controversy Score (CC-Score) that also takes into account topical clustering. We show that both these measures are useful for identifying people who try to "push" their points of view, by showing that they are good predictors of which editors get blocked. The metrics can be used to triage potential POV pushers. We apply this idea to a dataset of users who requested promotion to administrator status and easily identify some editors who significantly changed their behavior upon becoming administrators. At the same time, such behavior is not rampant. Those who are promoted to administrator status tend to have more stable behavior than comparable groups of prolific editors. This suggests that the Adminship process works well, and that the Wikipedia community is not overwhelmed by users who become administrators to promote their own points of view. | cs.SI | cs |
Pushing Your Point of View: Behavioral Measures of
Manipulation in Wikipedia
Sanmay Das, Allen Lavoie, and Malik Magdon-Ismail
Dept. of Computer Science
Rensselaer Polytechnic Institute
Troy, NY 12180
April 17, 2018
Abstract
As a major source for information on virtually any topic, Wikipedia serves an important
role in public dissemination and consumption of knowledge. As a result, it presents tremen-
dous potential for people to promulgate their own points of view; such efforts may be more
subtle than typical vandalism. In this paper, we introduce new behavioral metrics to quantify
the level of controversy associated with a particular user: a Controversy Score (C-Score) based
on the amount of attention the user focuses on controversial pages, and a Clustered Contro-
versy Score (CC-Score) that also takes into account topical clustering. We show that both these
measures are useful for identifying people who try to "push" their points of view, by showing
that they are good predictors of which editors get blocked. The metrics can be used to triage
potential POV pushers. We apply this idea to a dataset of users who requested promotion to
administrator status and easily identify some editors who significantly changed their behav-
ior upon becoming administrators. At the same time, such behavior is not rampant. Those
who are promoted to administrator status tend to have more stable behavior than comparable
groups of prolific editors. This suggests that the Adminship process works well, and that the
Wikipedia community is not overwhelmed by users who become administrators to promote
their own points of view.
1 Introduction
Wikipedia has become a one-stop source for information on nearly any subject. In aggregate, it
has the power to broadly influence public perceptions. Wikipedia's ubiquity creates strong in-
centives for biased editing, attracting editors with strong opinions on controversial topics. At the
same time, Wikipedia is self-policing, and over time the Wikipedia community has formulated a
comprehensive set of policies to prevent editors from "pushing" their own points of view on the
readership ("POV pushing"). Most policing takes the form of users editing or reverting disputed
content, while persistent violations are brought to the attention of administrators. A responding
administrator has the power to temporarily protect pages from being edited, and to block users
from editing. POV pushing is not considered vandalism on Wikipedia, the latter term being re-
served for blatantly ill-intentioned edits.
1
While there has been a lot of attention paid to the problems of vandalism and maintenance
on Wikipedia, there has been little systematic, quantitative investigation of the phenomenon of
POV pushing. Nevertheless, anecdotal evidence suggests that it is a serious issue. For example,
in April 2008 a pro-Palestinian online publication called Electronic Intifada released messages
from the pro-Israel media watchdog group CAMERA (the Committee for Accuracy in Middle
East Reporting in America) that asked for volunteers to help "keep Israel related entries ... from
becoming tainted by anti-Israel editors." The messages also contained blueprints explaining how
members could become Wikipedia administrators, and then use their power to further the goals of
the organization [1]. In 2006, there was a significant controversy surrounding edits to Wikipedia
pages of prominent U.S. politicians, made by their own staff.1
To further illustrate the importance of the problem, in an interview with Alex Beam of the
Boston Globe, Gilead Ini, who initiated the CAMERA campaign, said "[Wikipedia] may be the most
influential source of information in the world today, and we and many others think it is broken"
[2]. But another quote from Ini highlights the difficulty of confronting these issues, "Wikipedia
is a madhouse. We were making a good-faith effort to ensure accuracy." Indeed, Wikipedia poli-
cies typically assume good faith. The policy on vandalism states "Even if misguided, willfully
against consensus, or disruptive, any good-faith effort to improve the encyclopedia is not vandal-
ism. Edit warring over content is not vandalism."2 In addition to the difficulty of arguing against
good faith when editors may simply be attempting to disseminate strongly held beliefs, even more
subtle forms of manipulation can achieve a similar outcome. For example, a manipulative admin-
istrator may enforce Wikipedia's Neutral Point Of View (NPOV) guidelines selectively, reverting
only edits that take a particular point of view. Hypothetically, a manipulative admin with a con-
servative viewpoint may revert all edits that seem to push a liberal viewpoint, while leaving those
that push a conservative viewpoint untouched (or vice versa for a manipulative liberal admin).
While there is nothing technically "wrong" with this, it can significantly affect the information on
pages.
It is worth noting that even if there is attempted manipulation on sensitive pages, it is restricted
to a relatively small fraction of Wikipedia. Most pages are more "encyclopaedic" in nature (for
example, pages on mathematics or on algorithms), and generate less controversy than pages that
deal with current events or ideologies.
All of this cries out for a useful algorithmic method of detecting potential POV pushing behav-
ior, and quantitative metrics that can provide evidence and allow us to examine the behavior of
such users in more detail. In this paper we present two such metrics and then use them to examine
the behavior of the population of administrators.
The first metric, the Controversy Score ("C-Score"), measures the proportion of energy an ed-
itor spends on controversial pages. It works by first assigning a controversy score to each page.
This score is based on factors that have been identified as well-correlated with controversy, in-
cluding the number of revisions to an article's talk page, the fraction of minor edits on the talk
page, and the number of times it has been protected [8]. It is independent of language or content,
and therefore easily generalizable. An editor's C-Score is then the mean of the controversy scores
of the pages she edits, weighted by the proportion of her editing attention she focuses on those
pages.
While the C-Score is a useful measure, it does not account for the topical clustering of a user's
1http://en.wikipedia.org/wiki/Congressional_Staffer_Edits retrieved 11/4/2011.
2 http://en.wikipedia.org/wiki/Wikipedia:Vandalism retrieved 11/4/2011.
2
edits. This is particularly important when we use these scores to assess the behavior of adminis-
trators, because administrators' responsibilities imply that they will spend more time on contro-
versial pages in general. However, we would expect users who have strong opinions on a topic to
push their POV especially in pages related to that topic, rather than broadly across many different
controversial topics. Consider two editors A and B, with 100 edits each. They each have 25 edits
on the article about the U.S. Republican party. Editor A's remaining edits are about Republican
legislators and Republican sponsored legislation from the past 10 years, while B's are divided be-
tween the IRA, the Catholic Church, and Jimmy Wales. All of B's edits are controversial, but only
some of A's edits are. While B has more controversial edits, we would intuitively consider A to be
more suspicious.
To deal with editors of this form, we introduce the Clustered Controversy Score ("CC-Score"),
which takes into account the similarity among different pages that a user has edited, in addition
to how controversial those pages are. We expect the CC-Score to be particularly useful for triage,
as it is designed to be a high recall measure: it flags potentially manipulative users, who focus
their attention on specific topic areas that include controversial topics. Of course, some users who
have editing patterns of this form may be acting in good faith and just have deep interests in that
topic.
Both the C-Score and the CC-score are behavioral. They do not rely in any way on the specific
text of edits, only on the patterns of editing and interaction between editors. We demonstrate the
validity of the two scores by showing that they have predictive power in discriminating between
heavy editors who were blocked and equally heavy editors who were not. Having validated
them on an exogenous measure, we then apply these measures in order to analyze the behavior
of administrators. We compare the editing patterns of administrators who score highly on the
C-Score and the CC-Score. The CC-Score identifies administrators who would not have been
identified by the simple C-Score, because only some of the major pages on the topics they edit are
highly controversial. These administrators also edit a long tail of related pages, thus influencing
public perception of the topic at large.
Finally, we use the CC-Score to test whether or not admins are behaving in a truly manipulative
manner: first becoming trusted and attaining promotion to admin status, and then using this
trusted status to push their points of view in particular domains. To do so, we look at changes in
CC-score before and after the editor stood for promotion (the Request for Adminship, or "RfA"
process). While we find several instances of potentially suspicious changes of focus, we also note
that the overall behavior of the population of editors who become admins is better than that of
two comparable populations: (1) those who stood for election but failed; and (2) those who edited
prolifically but never stood for election to administrator status. The population behavior is better
in the sense that the variance of changes in the CC-Score pre- and post-RfA is lower, indicating that
those who fail in their RfAs actually change their behavior more significantly. Thus, Wikipedia
admins as a population do not misrepresent themselves in order to gain their trusted status.
1.1 Contributions
We introduce two new behavioral measures that indicate whether or not a user is trying to push
his or her point of view on Wikipedia pages. These measures have predictive power on historical
data: they can determine which users were blocked for disputes related to controversial editing.
We anticipate that these measures can be used for auditing or triage: they can flag potentially
suspicious behavior automatically for more detailed human investigation. The measures are be-
3
havioral and general, and do not rely on specifics of text edited by users, and are thus applicable
beyond Wikipedia.
We then show how these measures can be used to discover interesting changes in behavior, fo-
cusing on the behavioral changes of editors who applied for promotion to administrator status on
Wikipedia. While there are instances of suspicious looking changes in behavior upon promotion
to administrator status, we find that at the population-level, Wikipedia editors are in fact better
behaved than the population of prolific editors, in the sense that their behavior is more stable, and
does not change significantly upon promotion. While there are specific instances that seem suspi-
cious, our evidence suggests that the Wikipedia adminship process works well at the population
level: there is no evidence that editors are in general seeking promotion to adminship so they can
"push" their point of view on the larger population.
2 Related work
There is a large literature on many different aspects of Wikipedia as a collaborative community. It
is now well-established that Wikipedia articles are high quality [5] and very popular on the Web
[12]. The dynamics of how articles become high quality and how information grows in collective
media like Wikipedia have also garnered some attention [14, 4]. While there has not been much
work on how Wikipedia itself influences public opinion on particular topics, it is not hard to draw
the analogy with search engines like Google, which have the power to direct a huge portion of the
focus of public attention to specific pages. Hindman et al discuss how this can lead to a few highly
ranked sites coming to dominate political discussion on the Web [6]. Subsequent research shows
that the combination of what users search for and what Google directs them to may lead to more
of a "Googlocracy" than the "Googlearchy" of Hindman et al [10].
Our work in this paper draws directly on three major streams of literature related to Wikipedia.
These are, work on conflict and controversy, automatic vandalism detection, and the process of
promotion to adminship status on Wikipedia.
There is a significant body of work characterizing conflict on Wikipedia. Kittur et al introduce
new tools for studying conflict and coordination costs in Wikipedia [8]. Vuong et al characterize
controversial pages using both disputes on a page and the relationships between articles and con-
tributors [13]. We use the measures identified by Kittur et al and Vuong et al as a starting point
for measuring the controversy level associated with a page. This then feeds into our user-level
C-Score and CC-Score measures. Our results on the blocked users dataset serve as corroborating
evidence for the usefulness of these previously identified measures.
Automatic vandalism detection has been a topic of interest from both the engineering perspec-
tive (many bots on Wikipedia automatically find and revert vandalism), as well as from a scientific
perspective. Smets et al report that existing bots, while useful, are "far from optimal", and report
on the results of a machine learning approach for attempting to identify vandalism [11]. They
conclude that this is a very difficult problem to solve without incorporating semantic information.
While we touch on vandalism in dealing with blocked users, we are focused on "POV pushing"
by extremely active users who are unlikely to engage in petty vandalism, which is the focus of
most work on automated vandalism detection.
Wikipedia administrator selection is an independently interesting social process. Burke and
Kraut study this process in detail and build a model for which candidates will be successful once
they choose to stand for promotion and go through the Request for Adminship (RfA) process
4
[3]. The dataset of users who stand for promotion is useful because it allows us to compare both
previous and later behavior of users who were successful and became admins and those who did
not.
Finally, we use a similarity metric for articles based on editors which is similar to existing work
on expert-based similarity [9].
3 Methodology
We begin by discussing our methodology in computing the "simple" Controversy Score for each
user, and then describe how we can compute a Clustered Controversy Score that captures editors
who focus on articles related to a single, controversial topic.
All data is from an April 2011 database dump of the English Wikipedia. The term "article"
refers to a page in Wikipedia's article namespace along with any pages in the article talk names-
pace with the same name, unless otherwise specified.
3.1 Controversy Score
We define the C-Score for a user as an edit-proportion-weighted average of the level of controversy
of each page. The controversy of a page (loosely following the article-level conflict model of Kittur
et al [8]) is based on the number of revisions to an article's talk page, the fraction of minor edits
on an article's talk page, and the number of times a page is "protected", where editing by new or
anonymous users is limited.
We scale and shift each of the three quantities above such that their 5th and 95th percentiles
are equal, then take the mean. Next, we transform this number such that the lowest values are
at -5 and 1% of articles have scores above 0. Finally, the scores are transformed using the logistic
function 1/(1 + e−t). This produces a controversy score ck ∈ [0, 1] for each page. One alternative to
manual tuning is logistic regression, where a model is trained on a data set reflecting some notion
of controversy.
Let pk be the fraction of a user's edits on page k. The controversy score for a user is then an
edit-weighted average of the page-level controversy scores:
(cid:88)
C − Score =
pkck
(1)
k
We would expect this measure to be effective at finding users who edit controversial pages.
However, many Wikipedia users dedicate at least part of their time to removing blatant vandalism,
which occurs disproportionally on controversial pages. Thus we turn to a measure that combines
topical clustering with controversy.
3.2 Clustered Controversy Score
We work from the hypothesis that users who concentrate their edits have some vested interest in
those articles. Going back to the example in the Introduction, we would like to be able to detect
users like A, who focuses almost entirely on Republican politics. While A's edits include some
controversial pages, B fights vandalism broadly, and so has exclusively controversial edits. B has
5
the same number of edits to the article on the U.S. Republican Party as A, but the rest of B's edits
are scattered across other topics. A's edits to this article are interesting; they are topically related
to A's other edits. At the same time, edits to this article by editor B are far less interesting.
We would like to incorporate a measure of topical edit concentration into the C-Score. In order
to do so, we could define topics globally, but this is both expensive and sensitive to parameter
changes: what is the correct granularity for a topic? Instead, we focus on a local measure of
topical concentration. Given a similarity metric between articles, we can measure the extent to
which a user's edits are clustered.
Page similarity We base our score on a generalization of the clustering coefficient to weighted
networks with edge weights between 0 and 1 [7]. Several natural measures of page similarity have
values in this rage.
We consider pages which link to (or are linked from) the same pages as similar, pages edited
by the same users as similar, and pages in the same categories as similar. Each page has a set of
incoming links I, outgoing links Θ, users U, and categories Γ associated with it. To determine
how similar two pages are based on one of these sets, we divide the cardinality of the intersection
of the sets from each page by the cardinality of their union (the Jaccard coefficient). To compute
a single similarity score between two pages i and j, we take an average of scores for each type of
set, giving equal weight to links, users, and categories. The similarity score wij is then:
wij =
Ii ∩ Ij
Ii ∪ Ij +
1
6
Θi ∩ Θj
Θi ∪ Θj +
Ui ∩ Uj
Ui ∪ Uj +
1
3
Γi ∩ Γj
Γi ∪ Γj
1
3
1
6
(2)
Computing the CC-Score Consider a set of edits from a user. Let N be the number of unique
pages in this set and wij be the similarity score between pages i and j. We start with a generaliza-
tion of the clustering coefficient [7]. For a page k, define:
(cid:80)N
(cid:80)N
i=1
(cid:80)N
(cid:80)N
i=1
j=1 wkiwkjwij
j=1 wkiwkj
clust(k) =
(3)
The clustering coefficient will be higher when other pages in the edit set are related to k and to
each other. When computing the CC-Score for the entire edit set, there are two other factors we
would like to consider: how much a user concentrated on any given page, and how controversial
that page is. Let pk be the proportion of edits on page k, and ck be some measure of controversy.
Then we have the following coefficient for the edit set:
N(cid:88)
k=1
CC − Score =
Since(cid:80)N
pkckclust(k)
(4)
k=1 pk = 1, (4) is a weighted average. If ck ∈ [0, 1], then so is (4). Pushing raw contro-
versy scores through a sigmoid to produce ck ensures that this condition holds, and also prevents
outliers from unduly affecting the final score.
There is no reason that ck must be a measure of controversy. Instead, it can measure any prop-
erty of a page which is of interest. For example, a ck measuring how much a page relates to global
warming would yield a ranking of editors based on the extent to which their edits concentrate
6
on global warming. The CC-Score is a general tool for ranking single-topic contributors based
on some property of that topic. We also compute a raw Clustering Score where each page has the
same ck – this yields a measure of topical clustering independent of any properties of the particular
pages.
We choose a measure that combines clustering and controversy page-wise rather than user-
wise so that we do not end up with editors who are very topically focused on uncontroversial
pages (say Flamingos), but also spend a significant fraction of their time combating vandalism
broadly across a spectrum of topics. We also note that the only Wikipedia-specific contributions
to the CC-Score are encapsulated in the computation of ck and wij. The same quantities can be
computed for a wide variety of collaborative networks. Consider email messages: wij between
two threads could be based on senders and recipients, and ck based on the length of the thread as
a measure of controversy. These quantities are entirely language independent, although we might
make use of natural language processing to improve estimates of both similarity and controversy.
4 Evaluation
We evaluate our metrics in several different ways. First, to establish their validity, we examine
whether the metrics provide discriminatory power in identifying potentially manipulative users.
In order to do so, we need an independent measure of manipulation, so we focus on users that
were blocked from editing on Wikipedia, and compare them with a similar set who were not
blocked. One of the goals of our work is to provide an objective metric for analyzing adminis-
trators, who have gained significant status in Wikipedia. We present some detail on the editing
habits of the admins who score highest on our metrics. In doing so, we also use our metrics to
provide fresh insight into what is controversial on Wikipedia, by analyzing the topic distribution
of edits amongst admins with high CC-Scores.
A reasonable hypothesis, suggested by the CAMERA messages discussed in Section 1 is that
people who wish to seriously push their points of view on Wikipedia may try to become admins
by editing innocuously, and then changing their behavior once they become admins. In order to
examine this hypothesis, we look at the behavior of admins whose CC-Scores changed signifi-
cantly, as well as at the distribution of changes in the CC-Score.
4.1 Blocked users
Users can be blocked from Wikipedia for a variety of reasons. Reasons for blocks include blatant
vandalism (erasing the content of a page), editorial disputes (repeatedly reverting another user's
edits), threats, and more. Many blocks are of new or anonymous editors for blatant vandalism;
we are not interested in these blocks.
We are interested in blocks stemming from content disputes. While editors are not directly
blocked for contributing to controversial articles, controversy on Wikipedia is often accompanied
by "edit warring", where two or more editors with mutually exclusive goals repeatedly make
changes to a page (e.g., one editor thinks the article on Sean Hannity should be low priority for
WikiProject Conservatism, and another thinks it should be high priority).
We examine a set of users who were active between January 2010 and April 2011. For blocked
users, we use 180 days of data, directly before the block. For the users who were never blocked,
7
Figure 1: ROC curve for CC, Controversy, and Clustering Scores when differentiating between
blocked and not-blocked users, based on 180 days of data. The CC and Controversy Scores effec-
tively discriminate between these classes, whereas the Clustering Score does not.
the 180 days ends on one of their edits chosen randomly.
In order to filter out new or infre-
quent editors, we only consider users with between 500 and 1000 edits during this 180 day period.
The upper bound removes users who do significant amounts of automated editing; it is not un-
common for such accounts to be blocked for misbehaving scripts which have nothing to do with
controversy. By examining only exceptionally active users, we eliminate most petty reasons for
blocks; users who have made hundreds of legitimate contributions are unlikely to start blanking
pages. After the filtering, we are left with 178 blocked users and 236 who were never blocked.
Figure 1 shows the performance of the CC, Controversy, and Clustering Scores when discrim-
inating between the blocked users and users who were never blocked. Both the CC- and C-Scores
show significant discriminative power, while Clustering alone is no better than guessing.
The performance of the CC- and C-Scores on the blocked users data set validates both mea-
sures for detecting users who make controversial contributions to Wikipedia. Many blocks in this
data set involve violations of Wikipedia's "3 Revert Rule", limiting the number of contributions
which an editor can revert on a single page during any 24 hour period, which implies that editors
are not only making controversial changes but are vigorously defending them. This rule is not
automatically enforced and does not apply to blatant vandalism; instead, another user must post
a complaint which is then reviewed by an administrator. It is certainly possible to edit controver-
sial pages while following the rules closely and never getting blocked, and likewise some blocks
of active users have nothing to do with controversy (rogue scripts, for example). All else being
equal, we expect more controversial editors to be blocked more frequently. The discriminative
power of the CC- and C-Scores provides strong evidence that these scores are correctly detecting
8
0.00.20.40.60.81.0FPR0.00.20.40.60.81.0TPRBlock ROCCC (AUC=0.689)Controversy (AUC=0.681)Clustering (AUC=0.492)controversial editors.
4.2 Highest scoring admins
We now turn to examining the behavior of admins through the lens of the Controversy and CC-
Scores. Where do admins focus their attention, and what is controversial on Wikipedia? To explore
this issue, we use human evaluations of the edit history of administrators during the 180 days
after they became an administrator. Without knowing anything about the CC, Controversy, or
Clustering Scores associated with the edit history, a reviewer analyzed the top 50 pages edited by
a user and decided which general category, if any, the edits were in. Results for the top and bottom
100 administrators ranked by each score are presented in Figure 2.
Figure 2 is useful validation for our methodology: for example, administrators with very low
CC-Scores were often classified as not editing in a coherent general category. Conversely, users
with a high CC-Score were much more likely to be topically focused. This effect is even more
apparent for the raw Clustering Score, with 73% of the bottom 100 admins classified as topically
unfocused. This implies that our article similarity metric corresponds with an intuitive notion of
topical similarity.
There are some interesting differences in the topic areas of the 100 admins with the highest
C-Scores and the 100 with the highest CC-Scores. As expected, the C-Score picks up a substantial
chunk of editors with no particular focus, while the CC score does not. These are admins who
are doing their job of "policing" controversy across a broad spectrum of topics. Surprisingly, the
C-Score picks up more politically focused editors while the CC-Score picks up many more who
focus on media and entertainment.
Specific examples help to elucidate this effect. Table 1 shows the top 6 administrators by CC
and C-Score respectively for the 180 day period immediately following their promotion (success-
ful RfA). The CC-Score picks up three media-focused editors while the C-Score does not. These
editors focus on a specific media franchise (a TV show, for example), editing on this topic almost
exclusively. The long tail of edits for media-focused users often includes non-controversial articles
related to the same media franchise, for example articles on minor characters. This comprehensive
long tail means that the page-level clustering score for pages related to the media franchise is very
high, including the main pages related to the franchise; these main pages tend to be quite con-
troversial. This combination of controversy and clustering contributes significantly to the user's
overall CC-Score, while the long tail of less controversial articles moderates the C-Score.
We note that all the users with very high C-Scores also have very high CC-Scores (falling at
least in the 96th and typically in the 99th percentile of CC-Score). However, the converse is not
true, because of the properties of the CC-Score described above. For example Admins 3, 4, and
5 in particular are relatively low in C-Score. Admin 5 is media-focused. Admin 4 has a high
CC-Score despite editing topically unrelated pages; yet the similarity scores between them are
high. This user focuses on disambiguation pages, all of which share common categories, and
many of which are maintained by the same users. Major disambiguation pages also turn out
to be fairly controversial, being of interest to editors contributing to any of the pages they link
to. This combination of a long tail of "related" disambiguation pages with controversial major
disambiguation pages leads to a high CC-Score, just as it did for media. As with media, the CC-
Score highlights a real phenomenon on Wikipedia: WikiProject Disambiguation, of which this user
is a member, consists of users who focus their efforts on disambiguation pages. Thus the CC-Score
9
Figure 2: Human evaluation of the general category of edits (if any) for administrators directly
after their RfA. The 100 highest and 100 lowest scoring administrators for each metric are shown;
because of overlap, 286 administrators are represented in total. Many users with a high CC-Score
are topically focused, and the CC-Score finds many more media-focused users than the C-Score.
10
None20%Geography5%History8%Media8%Politics24%Religion15%Sci.&tech.14%Sports2%Other3%Top controversyNone8%Geography6%History5%Media22%Politics14%Religion15%Sci.&tech.15%Sports4%Other11%Top CCNone26%Geography17%History10%Media11%Politics7%Religion1%Sci.&tech.12%Sports10%Other5%Bottom controversyNone44%Geography12%History9%Media10%Politics3%Religion2%Sci.&tech.5%Sports7%Other7%Bottom CCis finding exactly single-topic editors of controversial pages, even if their topic is rather specific to
Wikipedia.
The story with Admin 3 is similar to Admins 4 and 5, in that this editor also edits a long tail of
uncontroversial articles. Qualitatively, it is useful that the CC-Score is picking up different people
than the simple C-Score, and sometimes turning up surprises – this is exactly the kind of behavior
one would want to pick up on, and it may give the CC-Score an advantage over the simple C-Score
in terms of detecting subtle manipulation.
We note that in this paper we are agnostic to what makes a page or a topic controversial, which
reveals much of interest about Wikipedia, but at the same time our methods are completely gen-
eral – specifically, we expect they would work well with any measure of controversy, and so the
techniques can easily be adapted to domain-specific needs. For example, to focus on more tradi-
tionally controversial single-topic editors, we might consider a modification of the page-level con-
troversy score which ignores controversy on media-related pages. More generally, the page-level
controversy score can give preference to any topic; it does not need to be related to controversy at
all. For example, we could find single-topic editors interested in a specific country.
4.3 Distribution of CC changes
While it is interesting to find editors focused on a single, controversial topic, it is not surprising
that such editors exist; Wikipedia certainly needs domain experts even on controversial topics.
Sudden changes in behavior, especially increases in the topical concentration or the controversial
nature of edits, are more surprising; especially so when some level of community trust is involved,
as with administrators. In particular, an editor changing behavior dramatically shortly after be-
coming an admin is suspicious.
The RfA process Standing for promotion to adminship on Wikipedia is an involved process.3
An editor who stands for, or is nominated for adminship must undergo a week of public scrutiny
which allows the community to build consensus about whether or not the candidate should be
promoted. A special page is set up on which the candidate makes a nomination statement about
why she or he should be promoted, based on detailed evidence from their history of contributions
to Wikipedia. Other users can then weigh in and comment on the case, and typically a large
volume of support (above 75% of commenters) as well as solid supporting statements from other
editors are necessary for high-level Wikipedia "bureaucrats" to approve the application. Burke
and Kraut provide many further details on this process [3]. Wikipedia policies call for nominees
to demonstrate a strong edit history, varied experience, adherence to Wikipedia policies on points
of view and consensus, as well as demonstration of willingness to help with tasks that admins
are expected to do, like building consensus. Burke and Kraut note that the actual value of some
of these may be mixed: participating in seemingly controversial tasks like fighting vandalism or
requesting admin intervention on a page before becoming an admin actually seems to hurt the
chances of success.
Overall, the Wikipedia community devotes significant effort to the RfA process, and there is
a lot of human attention focused on making sure that those who become admins are worthy of
the community's trust. Now we turn to examining some cases where the behavior of an editor
changed significantly right after they became an admin.
3http://en.wikipedia.org/wiki/Wikipedia:Rfa
11
Admin1
Admin2
Admin3
CC 100.0% Clust. 96.4% Cont. 99.9%
CC 99.9% Clust. 97.4% Cont. 95.7%
CC 99.9% Clust. 98.8% Cont. 76.6%
Title
Jehovah's Witnesses
Salt
Tony Blair
Joseph Franklin Ruther-
ford
Robby Gordon
Leet
Jehovah's Witnesses
and
congregational
discipline
Wavelength
biguation)
Charles Taze Russell
(disam-
Admin4
Edit%
Cont.
63.9% 100.0%
6.6%
99.7%
1.6% 100.0%
1.6%
99.7%
1.6%
96.4%
1.6% 100.0%
99.5%
1.6%
1.6%
0.0%
1.6% 100.0%
Title
Sailor Venus
Sailor Moon (character)
Sailor Mercury
List of minor Sailor
Moon characters
List of Sailor Moon
episodes
The Church of
Christ
Saints
Sailor Starlights
Sailor Jupiter
Sailor Moon
Jesus
of Latter-day
Admin5
Edit%
4.2%
4.0%
3.7%
3.1%
Cont.
99.7%
99.9%
99.8%
99.7%
3.0%
99.8%
2.7% 100.0%
99.6%
2.7%
99.6%
2.6%
2.6% 100.0%
CC 99.8% Clust. 99.9% Cont. 37.9%
CC 99.8% Clust. 99.3% Cont. 72.3%
CC 99.7% Clust. 95.1% Cont. 83.5%
Title
Global city
List of school pranks
Scholars for 9/11 Truth
Pi
9/11 Truth movement
Christopher Langan
Hubbert peak theory
Stephen Barrett
Prime number
Cont.
Edit%
99.9%
2.8%
99.7%
2.6%
2.0%
99.9%
1.9% 100.0%
1.8% 100.0%
1.8%
99.9%
1.8% 100.0%
1.6% 100.0%
1.2%
99.9%
Admin6
Title
Big Brother 2007 (UK)
List of Big Brother 2007
housemates (UK)
Ionic bond
Big Brother (UK)
Big Brother 8 (U.S.)
Big Brother X
Big Brother 2006 (UK)
Big Brother (TV series)
Big Brother 2004 (UK)
Edit%
Cont.
17.6% 100.0%
6.7%
98.9%
98.4%
6.1%
3.0%
99.9%
2.4% 100.0%
2.4%
38.8%
2.4% 100.0%
99.8%
2.4%
2.4%
99.6%
Title
1948 Palestinian exodus
Yasser Arafat
Israeli West Bank bar-
rier
Israeli settlement
Hebron
Second Intifada
Gaza Strip
Palestinian territories
Palestinian people
Edit%
Cont.
6.8% 100.0%
6.3% 100.0%
4.9% 100.0%
4.9% 100.0%
4.6% 100.0%
3.2% 100.0%
3.2%
99.9%
2.9% 100.0%
2.9% 100.0%
Title
Yasser Arafat
Estimates of the Pales-
tinian Refugee flight of
1948
Israel
ArabIsraeli conflict
Ariel Sharon
Jews
Antisemitism
Muhammad al-Durrah
incident
Second Intifada
Edit%
Cont.
5.2% 100.0%
99.6%
2.7%
2.2% 100.0%
2.0% 100.0%
1.8% 100.0%
1.8% 100.0%
1.5% 100.0%
1.5% 100.0%
1.5% 100.0%
Admin7
Admin8
Admin9
CC 100.0% Clust. 96.4% Cont. 99.9%
CC 99.6% Clust. 89.6% Cont. 99.8%
CC 99.5% Clust. 87.5% Cont. 99.8%
(disam-
Title
Matrix
Apartheid
biguation)
ETA (disambiguation)
Gemini
Solo
XXX
X Games
FAST
Fame
Edit% Cont.
5.4% 96.5%
3.5% 99.8%
3.5% 99.4%
3.1% 92.8%
3.1% 59.0%
3.1% 96.8%
2.7% 96.9%
2.3% 39.2%
2.3% 74.7%
Title
Jehovah's Witnesses
Salt
Tony Blair
Joseph Franklin Ruther-
ford
Robby Gordon
Leet
Jehovah's Witnesses
and
congregational
discipline
Wavelength
biguation)
Charles Taze Russell
(disam-
Edit%
Cont.
63.9% 100.0%
6.6%
99.7%
1.6% 100.0%
99.7%
1.6%
1.6%
96.4%
1.6% 100.0%
1.6%
99.5%
1.6%
0.0%
1.6% 100.0%
Title
Meet Kevin Johnson
The Other Woman
Lost (season 4)
Lost (season 5)
List of Heroes episodes
Martin Keamy
The Shape of Things to
Come (Lost)
Through the Looking
Glass (Lost)
There's No Place Like
Home
Title
Global warming
Global warming contro-
versy
Electronic voice phe-
nomenon
An Inconvenient Truth
Greenhouse effect
American Enterprise In-
stitute
The
Warming Swindle
List scientists opposing
the mainstream sci-
entific
assessment of
global warming
The Beatles
Global
Great
Title
Rick Reilly
Keith Olbermann
Lara Logan
Treaty of Tripoli
Glenn Greenwald
Eli Whitney, Jr.
Michael J. Fox
Newton's laws of mo-
tion
William Connolley
Edit%
Cont.
10.0%
99.6%
6.4% 100.0%
99.9%
5.5%
99.9%
4.5%
99.9%
3.6%
3.6%
99.3%
99.8%
3.6%
3.6%
99.9%
2.7% 100.0%
Title
Abortion
University of Michigan
Jesus
Islamofascism
NARAL
America
Intelligent design
Saint Joseph
C. S. Lewis
God
Pro-Choice
Edit% Cont.
14.7% 98.8%
10.1% 97.8%
7.2% 99.6%
6.8% 99.3%
6.2% 99.9%
5.3% 96.9%
4.0% 98.3%
1.8% 99.6%
1.7% 98.0%
Edit%
Cont.
9.7% 100.0%
5.6% 100.0%
3.6% 100.0%
3.3% 100.0%
3.0% 100.0%
2.9%
99.8%
2.8% 100.0%
2.8% 100.0%
2.6% 100.0%
Edit%
Cont.
36.6% 100.0%
5.5%
99.9%
3.4% 100.0%
2.8% 100.0%
2.8%
99.0%
2.8% 100.0%
2.1%
99.9%
2.1% 100.0%
1.4% 100.0%
Admin10
Admin11
Admin12
CC 96.3% Clust. 52.1% Cont. 99.7%
CC 96.9% Clust. 59.6% Cont. 99.6%
CC 97.7% Clust. 69.3% Cont. 99.6%
Table 1: The most edited articles by the administrators with the highest CC-Scores (top 6) and high-
est C-Scores (bottom 6) during the 180 days after they became an admin. Each article is annotated
with the percentile of its article-level controversy score and the percentage of the administrator's
edits which were to that article. On top of each table are the percentiles for the CC, Clustering,
and C-Scores of the administrator during the same period.
12
Admin 1: Rank 1
Admin 2: Rank 3
Admin 3: Rank 5
Admin 4: Rank 9
Before RfA
Je-
Wit-
Wit-
Jeho-
Article
Jehovah's
nesses
Eschatology of
hovah's Witnesses
Jehovah's
nesses practices
Organizational
structure of
vah's Witnesses
Criticism of
vah's Witnesses
History
vah's Witnesses
Christianity
re-
Controversies
garding Jehovah's
Witnesses
Beliefs and prac-
tices of
Jehovah's
Witnesses
Jeho-
Jeho-
of
Before RfA
bat-
energy
Article
Rechargeable
tery
Flywheel
storage
Ethanol fuel
Imaginary color
Mensural notation
Noise pollution
Pay it forward
TamilNet
CIE
space
1931
color
Edit%
48.5%
3.8%
2.1%
1.6%
1.5%
1.4%
1.3%
1.1%
0.8%
Edit%
8.0%
6.5%
3.0%
3.0%
2.7%
2.5%
2.1%
1.8%
1.6%
After RfA
and
Wit-
Jeho-
Wit-
the
Article
Jehovah's
nesses
Jehovah's
nesses
United Nations
Criticism of
vah's Witnesses
Salt
Jehovah's
Wit-
nesses and congre-
gational discipline
Eschatology of
hovah's Witnesses
Blue link
Brendan Loy
Charles Taze Rus-
sell
Je-
After RfA
Article
Buddhahood
Sri Lanka and state
terrorism
Premier of the Re-
public of China
Sri Lankan Tamil
militant groups
Outpost for Hope
Sri Lanka Armed
Forces
Liberation Tigers of
Tamil Eelam
Esperanto
List of attacks at-
tributed to the LTTE
Edit%
62.1%
6.8%
4.9%
3.9%
2.9%
1.9%
1.0%
1.0%
1.0%
Edit%
13.2%
3.9%
3.0%
2.8%
2.6%
2.6%
2.1%
1.4%
1.4%
Before RfA
physical
Article
Chiropractic
Extreme
information
Prime number
Normal number
Axiom of choice
Year 10,000 prob-
lem
Difference operator
Kenny
Rogers
Roasters
Selector calculus
Before RfA
Solution
Article
Biman Bangladesh
Airlines
Fatimah
First
Money Transfer
72 Virgins
2007
Bangladesh
cartoon controversy
Ramadan
Royal Bengal Air-
line
Criticism of
Qur'an
Air Sylhet
the
Edit%
6.5%
3.6%
3.4%
3.2%
3.1%
2.2%
2.0%
1.7%
1.7%
Edit%
8.4%
6.3%
3.0%
1.8%
1.3%
1.2%
1.2%
1.2%
1.1%
After RfA
Lan-
for 9/11
Article
Global city
Christopher
gan
Stephen Barrett
Scholars
Truth
List
pranks
The National Coun-
cil Against Health
Fraud
9/11 Truth move-
ment
Quackwatch
Pi
school
of
After RfA
Article
Mawlid
Fatimah
Five Pillars of Islam
Air Sylhet
Ezra
Hajj
Osmani
tional Airport
Biman Bangladesh
Airlines
Eid ul-Fitr
Interna-
Edit%
3.9%
2.3%
2.0%
1.9%
1.8%
1.7%
1.6%
1.6%
1.5%
Edit%
20.0%
11.8%
3.6%
3.0%
2.5%
2.1%
2.0%
1.8%
1.8%
Table 2: Most edited articles for 180 days before and after becoming an administrator. Users were
selected from the top ten CC-Score changes.
Changes in behavior Table 2 shows the article edit history of four administrators for 180 days
before and 180 days after their successful RfA. These users were among the top 10 administrators
ranked by the change in CC-Score between the two periods (Admins 1, 2, 3, and 4 were ranked 1,
3, 5, and 9 respectively in CC-Score change). For two of the administrators shown (Admin 1 and
Admin 4), the change in CC-Score is explained by a change in edit distribution; while the general
category of their edits remains consistent, they concentrated on this category much more heavily
after their respective RfAs.
For Admins 2 and 3 in Table 2, the change in CC Score is the result of a rather dramatic shift in
topic. Admin 2 shifts from mathematics to 9/11 conspiracy theories (several related pages are not
shown in the table), while Admin 3 shifts from relatively unfocused edits to the Sri Lankan Civil
War. Upon further examination of their behavior, neither administrator appears to be violating
Wikipedia policy (instead acting as mediators and enforcing a neutral point of view), and yet the
changes are quite striking. While it may not be the case for these editors, a similar pattern could
reflect subtle manipulation by one-sided enforcement of the NPOV guidelines, for example.
13
(a) Full distribution
(b) Log-log plot of the right hand tail
Figure 3: Distribution of changes in the CC-Score before and after successful and unsuccessful
RfAs, and for users who have never participated in an RfA.
Population-level changes This leads us to a more general question.
Is there evidence of a
population-wide change in Admin behavior after successful RfAs? Figure 3 shows the distri-
bution of CC-Score changes for RfA candidates, both successful and unsuccessful, before and
after their respective RfAs (again 180 days each), and for a group of 1000 active editors who were
never nominated for administrator status. The results clearly show that those who stand for pro-
motion and are successful behave differently at the population-level than those who either stand
for promotion and fail or those who never stand for promotion at all. In fact, they end up stay-
ing closer to their previous behavior than either of the other groups – the variance in CC-Score
changes is higher for the other two groups than it is for editors who had successful RfAs (see
below for details on the data and statistical tests). This implies strongly that there is no serious
problem with people becoming admins on Wikipedia in order to push their own point of view.
There are two reasonable hypotheses that may explain the lower variance in CC-Score changes for
successful RfA candidates. Either some aspect of the RfA process selects for editors who are less
likely to change their behavior, or the very fact of becoming an administrator has a "centralizing"
influence: given their new status, associated with a (real or perceived) higher level of scrutiny,
administrators become less likely to change their behavior.
The hypothesis that the RfA process selects for editors who tend not to change their CC-Scores
is unlikely, as we would then expect this type of user to appear in the population of users who were
never nominated to become administrators. If this were the case, then the non-RfA distribution
would be a mix of the successful and unsuccessful RfA distributions; instead, the unsuccessful
and non-RfA distributions are similar to each other and different from successful RfAs. We run a
second test that provides further evidence for the centralizing hypothesis. We construct a matched
sample of successful and unsuccessful RfA candidates, matching on the estimated probability pi that
editor i's RfA will be successful RfA based on i's pre-RfA behavior. We use the model of Burke
and Kraut to estimate the pis [3]. For each successful RfA j, we find the editor in the unsuccessful
RfA set k with pk closest to pj (throwing out examples that are not within 1 percentage point). We
then compare the population-level behavior of the two sets of editors we are left with. Now that
14
0.04 0.020.000.020.04CC after - CC before020406080100120140Frequency (normalized)CC ChangesSuccessfulUnsuccessfulNon-RfA10-2CC after - CC before10-1100101102Frequency (normalized)CC Changes (log-log)SuccessfulUnsuccessfulNon-RfAwe have controlled for endogenous factors, we expect that the two populations are very similar
in intrinsic qualities: the only difference between them should be that the successful ones actually
became admins and the unsuccessful ones did not. We again find that the population of successful
admins is significantly different, exhibiting more stable behavior than the population of editors
who were unsuccessful in their RfAs (see below for details on statistics). This suggests that some
aspect of actually being an administrator reduces the propensity for significant behavior changes
(incidentally, this makes administrators who do significantly change their editing behavior all the
more interesting).
Data and statistics: For the non-RfA users, we use edits before and after a randomly selected
edit. The distributions of changes for unsuccessful and non-RfA editors have a significantly higher
variance than the distribution for successful RfAs, with the 95% confidence interval on the ratio
of the variance of the successful RfA distribution to the variance among non-RfA users being
[0.22, 0.28]. The 95% confidence interval on the same ratio for unsuccessful and non-RfA users,
on the other hand, is [0.88, 1.11] (est. 0.99). Further, the Kolmogorov-Smirnov Test rules out an
identical distribution for successful and unsuccessful distributions (p = 10−7, D = 0.109), and
between the successful and non-RfA distributions (p = 10−4, D = 0.086). We cannot rule out the
possibility that the non-RfA and unsuccessful distributions are identical (p = 0.25, D = 0.042).
Closer examination of the tails of the distributions does not show any differences not already
explained by the variance. For the matched sample described above, the 95% confidence interval
for the ratio of the variances of successful and unsuccessful RfA distributions is [0.32, 0.43]; the
conclusions of the KS-tests are unchanged.
5 Discussion
This paper contributes to the literature in two different ways: first, we introduce new behavioral
metrics for quantifying controversial editing on Wikipedia. The measures we introduce can be
used (perhaps with domain specific modifications) to triage suspicious behavior for deeper inves-
tigation. Second, these measures allow us to contribute to the study of Wikipedia as an evolving
social system: along with showing that Wikipedia admins behave in a stable manner, we also
identify some intuitively surprising topics of conflict in Wikipedia.
The Controversy Score (C-Score), measures the extent to which an editor is influencing con-
troversial pages. The Clustered Controversy Score (CC-Score) builds on the C-Score, finding
single-topic editors of controversial pages. Both metrics are flexible, since they are language- and
platform- independent, and can work with different measures of controversy.
We validate the C- and CC-Scores as user-level measures of controversy on a set of blocked
users. On a set of administrators, we find several weaknesses of the C-Score: it misses contro-
versial, single-topic editors in the presence of a long tail of related, but less controversial, pages.
Further, the C-Score gives undue weight to unfocused vandalism fighting, a common behavior
among administrators. The CC-Score solves many of these issues, allowing us to find controver-
sial, single-topic editors, and often finds editors who would not show up ranked highly on just the
C-Score measure. The CC-score also enables us to identify interesting Wikipedia-specific phenom-
ena, for example, the substantial levels of controversy associated with some media/entertainment
specific pages as well as with some disambiguation pages.
We also show how the CC-Score can be used to analyze behavior changes, both for single ed-
itors and in aggregate. We find several instances of dramatic shifts in behavior by administrators
15
upon assuming their responsibilities. At the same time, we show that administrators as a group
change their behavior significantly less than any other group of Wikipedians. This consistency
appears to be due to the role of administrator itself, rather than being a selection effect.
Future work While we focus on editors working alone in this paper, an extension of the CC-
Score might highlight groups of editors influencing a single, controversial topic; this presents in-
teresting computational and evaluation challenges. Improvements to the CC-Score to better detect
manipulation might focus on natural language processing, or on non-local aspects of an editor's
behavior. Being platform-independent, the CC-Score is a useful tool for analyzing behavior in
general collective wisdom processes; we are interested in applications of the CC-Score to other
domains.
6 Acknowledgments
The authors would like to thank Mark Goldberg and Al Wallace for helpful discussions. This
research is supported by an NSF CAREER Award (IIS-0952918) to Das. Magdon-Ismail's contri-
butions to this research are continuing through participation in the Network Science Collaborative
Technology Alliance sponsored by the U.S. Army Research Laboratory under Agreement Num-
ber W911NF-09-2-0053. The views and conclusions contained in this document are those of the
authors and should not be interpreted as representing the official policies, either expressed or
implied, of the Army Research Laboratory or the U.S. Government.
References
[1] Candid CAMERA. Harper's Magazine, July 2008.
[2] A. Beam. War of the virtual Wiki-worlds. The Boston Globe, May 3 2008.
[3] M. Burke and R. Kraut. Mopping up: modeling wikipedia promotion decisions. In Proceed-
ings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW '08, pages
27–36, New York, NY, USA, 2008. ACM.
[4] S. Das and M. Magdon-Ismail. Collective wisdom: Information growth in wikis and blogs.
In Proceedings of the ACM Conference on Electronic Commerce, pages 231–240, 2010.
[5] J. Giles. Internet encyclopaedias go head to head. Nature, 438(7070):900–901, December 2005.
[6] M. Hindman, K. Tsioutsiouliklis, and J. Johnson. Googlearchy: How a few heavily-linked
sites dominate politics on the web. In Annual Meeting of the Midwest Political Science Associa-
tion, volume 4, pages 1–33. Citeseer, 2003.
[7] G. Kalna and D. J. Higham. A clustering coefficient for weighted networks, with application
to gene expression data. AI Commun., 20:263–271, December 2007.
[8] A. Kittur, B. Suh, B. A. Pendleton, and E. H. Chi. He says, she says: Conflict and coordination
in Wikipedia. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems,
CHI '07, pages 453–462, New York, NY, USA, 2007. ACM.
16
[9] C. Li, A. Datta, and A. Sun. Mining latent relations in peer-production environments: a case
study with wikipedia article similarity and controversy. Social Network Analysis and Mining,
pages 1–14, 2011. 10.1007/s13278-011-0037-5.
[10] F. Menczer, S. Fortunato, A. Flammini, and A. Vespignani. Googlearchy or Googlocracy?
IEEE Spectrum Online, 2006.
[11] K. Smets, B. Goethals, and B. Verdonk. Automatic vandalism detection in Wikipedia: To-
wards a machine learning approach. In In WikiAI '08: Proceedings of the AAAI Workshop on
Wikipedia and Artificial Intelligence, 2008.
[12] A. Spoerri. What is popular on Wikipedia and why? First Monday, 12(4), April 2007.
[13] B.-Q. Vuong, E.-P. Lim, A. Sun, M.-T. Le, and H. W. Lauw. On ranking controversies in
Wikipedia: Models and evaluation. In Proceedings of the International Conference on Web Search
and Web Data Mining, WSDM '08, pages 171–182, New York, NY, USA, 2008. ACM.
[14] D. M. Wilkinson and B. A. Huberman. Assessing the value of coooperation in Wikipedia.
First Monday, 12(4), Feb 2007.
17
|
1609.03946 | 1 | 1609 | 2016-09-13T17:34:33 | A Holistic Approach for Predicting Links in Coevolving Multilayer Networks | [
"cs.SI"
] | Networks extracted from social media platforms frequently include multiple types of links that dynamically change over time; these links can be used to represent dyadic interactions such as economic transactions, communications, and shared activities. Organizing this data into a dynamic multiplex network, where each layer is composed of a single edge type linking the same underlying vertices, can reveal interesting cross-layer interaction patterns. In coevolving networks, links in one layer result in an increased probability of other types of links forming between the same node pair. Hence we believe that a holistic approach in which all the layers are simultaneously considered can outperform a factored approach in which link prediction is performed separately in each layer. This paper introduces a comprehensive framework, MLP (Multilayer Link Prediction), in which link existence likelihoods for the target layer are learned from the other network layers. These likelihoods are used to reweight the output of a single layer link prediction method that uses rank aggregation to combine a set of topological metrics. Our experiments show that our reweighting procedure outperforms other methods for fusing information across network layers. | cs.SI | cs | A Holistic Approach for Predicting Links in
Coevolving Multilayer Networks
Alireza Hajibagheri
University of Central Florida
[email protected]
Gita Sukthankar
University of Central Florida
[email protected]
Kiran Lakkaraju
Sandia National Labs
[email protected]
Abstract -- Networks extracted from social media platforms
frequently include multiple types of links that dynamically change
over time; these links can be used to represent dyadic interactions
such as economic transactions, communications, and shared
activities. Organizing this data into a dynamic multiplex network,
where each layer is composed of a single edge type linking
the same underlying vertices, can reveal interesting cross-layer
interaction patterns. In coevolving networks, links in one layer
result in an increased probability of other types of links forming
between the same node pair. Hence we believe that a holistic
approach in which all the layers are simultaneously considered
can outperform a factored approach in which link prediction
is performed separately in each layer. This paper introduces a
comprehensive framework, MLP (Multilayer Link Prediction), in
which link existence likelihoods for the target layer are learned
from the other network layers. These likelihoods are used to
reweight the output of a single layer link prediction method that
uses rank aggregation to combine a set of topological metrics. Our
experiments show that our reweighting procedure outperforms
other methods for fusing information across network layers.
I.
INTRODUCTION
As social media platforms offer customers more interac-
tion options, such as friending, following, and recommending,
analyzing the rich tapestry of interdependent user interactions
becomes increasingly complicated. In this paper, we study two
types of online societies: 1) players in a massively multiplayer
online game (Travian) [1] 2) dialogs between Twitter users
before, during, and after an exceptional event [2]. Although
standard social network analysis techniques [3] offer useful
insights about
there is relatively little
theory from the social sciences on how to integrate information
from multiple types of online interactions.
these communities,
6
1
0
2
p
e
S
3
1
]
I
S
.
s
c
[
1
v
6
4
9
3
0
.
9
0
6
1
:
v
i
X
r
a
Rather than organizing this data into social networks
separately chronicling the history of different forms of user
interaction, dynamic multiplex networks [4] offer a richer
formalism for modeling the social fabric of online societies.
A multiplex network is a multilayer network that shares the
same set of vertices across all layers. This network can be
modeled as a graph G =< V, E > where V is the set of
vertices and E is the set of edges present in the graph. The
dynamic graph G = {G0, G1, ..., Gt} represents the state of
the network at different times. The network is then defined as:
t ⊆ V × V , ∀α ∈ {1, ..., M},
Gt =< V, E1
where each set Eα
t corresponds to the edge set of a distinct
layer at time t. Thus a dynamic multiplex network is well
suited for representing diverse user activities over a period of
time.
t > with Eα
t , ..., EM
In this paper, we address the problem of predicting fu-
ture user interactions from the history of past connections.
Assuming the data is represented as a graph, our goal is
to predict the structure of graph Gt using information from
previous snapshots as well as other layers of the network. Link
prediction algorithms [5] -- [8] have been implemented for many
types of online social networks, including massively multi-
player online games and location-based social networks. These
systems offer great value to social networking services due to
their practical applicability for friend recommendations and
social network bootstrapping. Although user profiles can be
mined for additional data, topological approaches 1) perform
well in many networks 2) preserve user privacy since they do
not rely on actor information and 3) can be combined with
node content approaches to enhance prediction performance.
link prediction is a well studied
problem, few link prediction techniques specifically address
the problem of simultaneously predicting links across multiple
networks [9] -- [11]. Basu et al. [12] note that there are many
real-world cases where interdependencies between processes
cause the layers of a multiplex network to coevolve, resulting
in a higher number of overlapping edges between the same
node pair in different network layers. In this paper, we explore
the role of overlapping edges towards improving the perfor-
mance of link prediction; our aim is to leverage the cross-layer
link co-occurrence history to model coevolution in a multiplex
network.
Despite the fact
that
We propose a framework for multilayer link prediction
integrates complementary information sources,
(MLP) that
including topological metrics, network dynamics, and overlap-
ping edges. MLP uses a likelihood based method for learning
cross-layer dependencies and a temporal decay function to
model the network dynamics. Rank aggregation is then em-
ployed to collect information from multiple topological metrics
into one final scoring matrix. In the next section, we present
related work on link prediction. The proposed framework is
described in Section IV. Section V presents a comparison of
our method vs. two other approaches for fusing information
across network layers. We conclude in section VII with a
description of possible directions for future work.
II. RELATED WORK
A variety of computational approaches have been employed
for predicting links in single layer networks, including super-
vised classifiers, statistical relational learning, matrix factoriza-
tion, metric learning, and probabilistic graphical models (see
surveys by [13] -- [15] for a more comprehensive description).
Regardless of the computational framework, topological net-
work measures are commonly used as features to describe node
pairs and can be combined in a supervised or unsupervised
fashion to do link prediction. [6]. In this paper, we aggregate
several of these metrics (listed in the next section), but our
framework can be easily generalized to include other types of
features.
The primary focus of this paper is leveraging cross-layer
information to improve link prediction in multiplex networks,
although we also introduce our own single layer link prediction
technique. This process of using cross-layer information can
be treated as a transfer learning problem where information
is learned from a source network and applied to improve
prediction performance the target network. Tang et al. [9] in-
troduced a transfer-based factor graph (TranFG) model which
incorporates social theories into a semi supervised learning
framework. This model is then used to transfer supervised
information from a source network to infer social ties in the
target network.
Another strategy is to create more general versions of the
topological measures that capture activity patterns in multi-
plex networks. Davis et al. [10] introduced a probabilistically
weighted extension of the Adamic/Adar measure for these
networks. Weights are calculated by doing a triad census to
estimate the probability of different link type combinations.
The extended Adamic/Adar metric is then used, along with
other unsupervised link predictors, as input for a supervised
classifier. Similarly, Hristova et al. [11] extend the definition of
network neighborhood by considering the union of neighbors
across all layers. These multilayer features are then combined
in a supervised model to do link prediction. One weakness with
the above mentioned models is their inability to use temporal
information accrued over many snapshots, rather than relying
on a single previous snapshot. In this paper, we evaluate two
versions of our MLP framework, a version that only uses
topological metrics calculated from one time slice vs. multiple
snapshots.
Conversely, there are a number of approaches that ignore
cross-layer network dependencies, while using the history of
changes between snapshots to predict future network dynam-
ics. We have experimented with two types of techniques: time
series forecasting [5], [16] and decay models [17]. Soares
and Prudencio [16] investigated the use of time series within
both supervised and unsupervised link prediction frameworks.
The core concept of their approach is that it is possible to
predict
the future values of topological metrics with time
series; these values can either be used in an unsupervised
fashion or combined in a supervised way with a classifier.
In previous work, we introduced a rate prediction model [5]
that uses time series to predict the rate of link formation.
Our proposed framework, MLP, both models the rate of link
formation in each layer and uses a decay model to account for
changes in the topological metrics over time. In our results,
we compare the improvements achieved by temporal vs. cross-
layer modeling.
However, incorporating more features is not helpful, with-
out an effective information fusion procedure. Pujari et al. [18]
employed computational social choice algorithms for aggre-
gating multiple topological features. They evaluated the per-
formance of two well-known rank aggregation methods, Borda
and Kemeny, for single layer link prediction. In their method,
weights are learned for each voter participating in the rank
aggregation, where each topological metric is treated as a
voter. These weights are tuned to maximize the identification
of positive examples or minimize negative examples. To extend
their method to multiplex networks [19], the authors compute
topological attributes for each network layer and combine them
using 1) a simple aggregation of these scores across all layers
or 2) an entropy-aggregation of values. These combinations
are then used as a series of features in a decision tree model.
In this paper, we use rank aggregation to fuse our features
and compare our procedure to their aggregation methods.
Another example of a supervised framework that uses rank
aggregation is RankMerging [20]. During a learning phase,
weights are assigned to each unsupervised method using a
training set of node pairs. The contribution of each ranking
to the merged ranking is then computed using sliding indices.
At each step, the aim is to identify the ranking with the
highest number of true predictions in the upcoming steps.
Rank aggregation methods can be highly effective, but the
more complex social choice algorithms can suffer from high
computational complexity, making them less effective for large
datasets. For this reason, we opted to use the Borda rank
aggregation procedure in MLP.
III. NODE SIMILARITY METRICS
This section provides a brief description of the topological
and path-based metrics for encoding node similarity that are
used within our MLP framework to create ranked score lists
for each node pair. These techniques are often used in isolation
as unsupervised methods for link prediction. Note that Γ(x)
stands for the set of neighbors of vertex x while w(x, y)
represents the weight assigned to the interaction between node
x and y.
• Number of Common Neighbors (CN)
The CN measure is defined as the number of nodes
with direct relationships with both evaluated nodes x and
y [21]. For weighted networks, the CN measure is:
CN (x, y) =
w(x, z) + w(y, z)
(1)
(cid:88)
• Jaccard's Coefficient (JC)
z∈Γ(x)∩Γ(y)
The JC measure assumes higher values for pairs of nodes
who share a higher proportion of common neighbors
relative to their total neighbors:
(cid:80)
(cid:80)
a∈Γ(x) w(x, a) +(cid:80)
z∈Γ(x)∩Γ(y) w(x, z) + w(y, z)
b∈Γ(y) w(y, b)
(2)
JC(x, y) =
• Preferential Attachment (PA)
The PA measure assumes that the probability that a new
link originates from node x is proportional to its node
degree. Consequently, nodes that already possess a high
number of relationships tend to create more links [22]:
(cid:88)
w(x, z1) × (cid:88)
z1∈Γ(x)
z2∈Γ(y)
P A(x, y) =
w(y, z2)
(3)
P Rw(x) = α
(cid:88)
node x, and (cid:80)N
k∈Γ(x)
P Rw(x)
L(k)
+ (1− α)
w(x)(cid:80)N
y=1 w(y)
(6)
• Adamic-Adar Coefficient (AA)
This metric [23] is closely related to Jaccard's coeffi-
cient in that it assigns a greater importance to common
neighbors who have fewer neighbors. Hence, it measures
the exclusivity of the relationship between a common
neighbor and the evaluated pair of nodes:
(cid:88)
log(1 +(cid:80)
w(x, z) + w(y, z)
c∈Γ(z) w(z, c))
(4)
AA(x, y) =
z∈Γ(x)∩Γ(y)
• Resource Allocation (RA)
RA was first proposed in [24] and is based on physical
processes of resource allocation:
RA(x, y) =
z∈Γ(x)∩Γ(y)
w(x, z) + w(y, z)
c∈Γ(z) w(z, c)
(5)
(cid:88)
(cid:80)
• Page Rank (PR)
The PageRank algorithm [25] measures the significance
of a node based on the significance of its neighbors. We
use the weighted PageRank algorithm proposed in [26]:
where L(x) is the sum of outgoing link weights from
y=1 w(y) is the total weight across the
whole network.
• Inverse Path Distance (IPD)
The Path Distance measure for unweighted networks
simply counts the number of nodes along the shortest path
between x and y in the graph. Note that P D(x, y) = 1 if
two nodes x and y share at least one common neighbor. In
this article, the Inverse Path Distance is used to measure
the proximity between two nodes, where:
IP D(x, y) =
1
P D(x, y)
(7)
IPD is based on the intuition that nearby nodes are likely
to be connected. In a weighted network, IPD is defined
by the inverse of the shortest weighted distance between
two nodes.
• Product of Clustering Coefficient (PCF)
The clustering coefficient of a vertex v is defined as:
P CF (v) =
3 × # of triangles adjacent to v
# of possible triples adjacent to v
(8)
To compute a score for link prediction between the vertex
x and y, one can multiply the clustering coefficient score
of x and y.
Section V compares MLP vs. unsupervised versions of these
approaches.
as the target layer. To do so, we create a weighted version of
the original target layer where interactions and connections that
exist in other layers receive higher weights. After reweighting
the layer, we employ the collection of node similarity metrics
described in the previous section on the weighted network.
To express the temporal dynamics of the network, we use a
decay model on the time series of similarity metrics to predict
future values. Finally, the Borda rank aggregation method is
employed to combine the ranked lists of node pairs into a
single list that predicts links for the next snapshot of the target
network layer. Each component of the model is explained in
more detail in the following sections.
A. Multilayer Likelihood Assignment and Edge Weighting
This component leverages information about cross-layer
link co-occurrences. During the coevolution process, links may
be engendered due to activity in other network layers. Some
layers may evolve largely independently of the rest of the
network, whereas links in other layers may be highly predictive
of links in the target layer. In our proposed method, a weight
is assigned to each layer based on its influence on the target
layer. Weights are calculated using a likelihood function:
wi = Likelihood(Link in LT argetLink in Li)
(9)
the ith layer and the weight
where Li and wi represent
calculated for it respectively. LT arget indicates the target layer
for which we want to predict future links. The Likelihood
function computes the similarity between the target layer and
the ith layer; to do this, we use the current ratio of overlapping
edges. Next, we calculate weights for every node pair by
checking the link correspondence between two layers using
the likelihood of a link being present
layer
given the existence of the link in the other layer at any other
previous snapshot. This orders other layers in terms of their
relative importance for a specific target layer. The process
assigns higher weights to node pairs which occur in more
than one layer (multiplex edges). The rate of link formation
is incorporated into the model as the first term of the edge
weight. Algorithm 1 shows the process of assigning likelihoods
to layers and reweighting the adjacency matrix.
in the target
Algorithm 1 Likelihood Assignment and Edge Weighting
1: Input: Edge sets (E1, ..., EM ) for M layers where Eα is
the edge set of target layer
2: Output: Eα
w weighted adjacency matrix for layer α (target
wi = Likelihood(Link in LαLink in Li)
layer)
//Calculate weights for the layers
3: for i ∈ {1, 2, ..., M} − {α} do
4:
5: end for
6: for edge e ∈ Eα do
7:
8: end for
we = rate +(cid:80)M
//Weighting target layer
i=1&i(cid:54)=α wi × linkExist(e)
IV. PROPOSED METHOD
MLP is a hybrid architecture that utilizes multiple compo-
nents to address different aspects of the link prediction task.
We seek to extract information from all layers of the network
for the purpose of link prediction within a specific layer known
The term rate is defined as the average value of the source
node's out-degree over previous timesteps. Function linkExist
is used to obtain information about a link's existence in other
layers during previous snapshots. It checks each layer for the
presence of an edge and returns 1 if an edge is present in that
layer.
B. Temporal Link Structure
Given the network history for T time periods, we need to
capture the temporal dependencies of the coevolution process.
To do so, our framework uses a weighted exponentially de-
caying model [27]. Let {Simt(i, j), t = t0 + 1, ..., t0 + T}
be a time series of similarity score matrices generated by a
node similarity metric on a sliding window of T successive
temporal slices. An aggregated weighted similarity matrix is
constructed as follows:
t0+T(cid:88)
Sim(t0+1)∼(t0+T )(i, j) =
θt0+T−tSimt(i, j)
(10)
t=t0+1
where the parameter θ ∈ [0, 1]
is the smoothing weight
for previous time periods. Different values of θ modify the
importance assigned to the most or least recent snapshots
before current time t + 1. This procedure generates a com-
posite temporal score matrix for every node similarity metric.
Sim(t0+1)∼(t0+T ) (shortened to Sim) is used by the algorithm
as a summary of network activity, encapsulating the temporal
evolution of the similarity matrix.
C. Rank Aggregation
Before describing the final step of our approach, let us
briefly discuss existing methods for ranked list aggrega-
tion/rank aggregation. List merging or list aggregation refers
to the process of combining a number of lists with the same
or different numbers of elements in order to get one final list
including all the elements. In rank aggregation, the order or
rank of elements in input lists is also taken into consideration.
The input lists can be categorized as full, partial, or disjoint
lists. Full lists contain exactly the same elements but with a
different ordering, partial lists may have some of the elements
in common but not all, and disjoint lists have completely
different elements. In this case, we are only dealing with full
lists since each similarity metric produces a complete list for
the same set of pairs, differing only in ordering.
Several rank aggregation methods are described in [28],
including Borda's, Markov chain, and median rank methods.
Borda's method is a rank-then-combine method originally
proposed to obtain a consensus from a voting system. Since
it is based on the absolute positioning of the rank elements
and not their relative rankings, it can be considered a truly
positional method. For every element in the lists, a Borda
score is calculated and elements are ranked according to this
score in the aggregated list. For a set of complete ranked lists
L = [L1, L2, L3, ...., Lk], the Borda score for an element i and
a list Lk is given by:
BLk (i) = {count(j)Lk(j) < Lk(i)&j ∈ Lk}
The total Borda score for an element is given as:
k(cid:88)
B(i) =
BLt(i)
(11)
(12)
Fig. 2: Heatmap representing the edge overlap between pairs
of layers for datasets (a) Travian (b) Cannes2013
aggregation to produce an accurate prediction of future links in
a dynamic multilayer network. The Borda function produces
the final output of the MLP framework. Results of the proposed
algorithm are compared with other state-of-the-art techniques
in the next section.
Algorithm 2 Multilayer Link Prediction Framework (MLP)
1: Input: Weighted edge sets of the target layer for T previous
2: Output: Temporal aggregated score matrix S for the target
snapshots
layer
Calculate score matrix Simu
t0+t
for t ∈ {1, ..., T} do
3: for each node similarity metric u do
4:
5:
6:
7:
8: end for
9: Final score matrix S = Borda(Sim1, ..., Simu)
end for
Calculate temporal similarity matrix Simu
V. EXPERIMENTAL STUDY
t=1
Borda's method is computationally cheap, which is a highly
desirable property for link prediction in large networks.
Algorithm 2 shows our proposed framework which incor-
porates edge weighting, the temporal decay model, and rank
This paper evaluates the MLP framework on networks ex-
tracted from two real-world datasets, Travian and Cannes2013.
To investigate the impact of each component of our proposed
method, not only do we compare our results with two other
approaches for fusing cross-layer information, but we also
(a)
(b)
(c)
(d)
(e)
Fig. 1: Log scale box-whisker plots for user interactions in different layers of the network: (a) Travian (Trades) (b) Travian
(Messages) (c) Cannes2013 (Retweets) (d) Cannes2013 (Mentions) (e) Cannes2013 (Replies)
analyze the performance of ablated versions of our method.
The complete method, MLP (Hybrid), is compared with MLP
(Decay Model + Rank Aggregation) and MLP (Weighted +
Rank Aggregation). All of the algorithms were implemented
in Python and executed on a machine with the Intel(R) Core i7
CPU and 24GB of RAM for the purpose of fair comparison.
Our implementation uses Apache Spark to speed the link
prediction process.
A. Datasets
We use two real-world dynamic multilayer networks to
demonstrate the performance of our proposed algorithm. These
networks are considerably disparate in structure and were se-
lected from different domains (a massively multiplayer online
game (MMOG) and an event-based Twitter dataset). Table I
provides the network statistics for each of the datasets:
• Travian MMOG [1] Travian is a browser-based, real-
time strategy game in which the players compete to create
the first civilization capable of constructing a Wonder of
the World. The experiments in this paper were conducted
on a 30 day period in the middle of the Travian game
cycle. In Travian, players can execute different game
actions including: sending messages, trading resources,
joining alliances, and attacking enemy villages. In this
research, we focus on networks created from trades and
messages.
• Twitter Interactions [2] This dataset consists of Twitter
activity before, during, and after an "exceptional" event as
characterized by the volume of communications. Unlike
most Twitter datasets which are built from follower-
followee relationships, links in this multilayer network
correspond to retweeting, mentioning, and replying to
other users. The Cannes2013 dataset was created from
tweets about the Cannes film festival that occurred be-
tween May 6,2013 to June 3, 2013. Each day is treated
as a separate network snapshot.
TABLE I: Dataset Summary: Number of edges, nodes, and
snapshots for each network layer
Dataset
No. of Nodes
No. of Snapshots
Layers/No. of Edges
Travian
2,809
30
87,418
44,956
Cannes2013
438,537
29
496,982
411,338
83,534
Retweet
Mention
Reply
Trades
Messages
varying the decision threshold on probability estimations or
scores. For all of our experiments, we report area under the
ROC curve (AUROC), the scalar measure of the performance
over all thresholds. Since link prediction is highly imbalanced,
straightforward accuracy measures are well known to be mis-
leading; for example, in a sparse network, the trivial classifier
that labels all samples as missing links can have a 99.99%
accuracy.
C. Analysis of Cross-layer Interaction
Figure 1 shows log scale box-whisker plots that depict
the frequency of interactions between users who are con-
nected across multiple layers. We compare the frequency of
interactions in cases where the node pair is connected on all
layers vs. the frequency of being connected in a single layer
(Travian) or less than all layers (for Cannes which has three
layers). As expected, in cases where users are connected on all
layers, the number of interactions (trades, messages, retweets,
mentions and replies) is higher. The heatmap of the number of
overlapping edges between different network layers (Figure 2)
suggests that a noticeable number of edges are shared between
all layers. This clearly indicates the potential value of cross-
layer information for the link prediction task on these datasets.
Our proposed likelihood weighting method effectively captures
the information revealed by our analysis.
B. Evaluation Metrics
D. Performance of Multilayer Link Prediction
For the evaluation, we measure receiver operating charac-
teristic (ROC) curves for the different approaches. The ROC
curve is a plot of the true positive rate (tpr) against the false
positive rate (fpr). These curves show achievable true positive
rates (TP) with respect to all false positive rates (FP) by
For our experiments, we adopted a moving-window ap-
proach to evaluate the performance of our temporal multilayer
link prediction algorithm. Given a specified window size T ,
for each time period t(t > T ), graphs of T previous periods
(GtT , ..., Gt1) (where each graph consists of M layers) are
TABLE II: AUROC performances for a target layer averaged over all snapshots with a sliding time window of T = 3 for
Travian layers and T = 5 for Cannes2013 layers used in the decay model. Variants of our proposed framework are shown at
the top of the table, followed by standard unsupervised methods. The algorithms shown in the bottom half of the table are
techniques for multiplex networks proposed by other research groups. The best performer is marked in bold.
Algorithms / Networks
MLP (Hybrid)
MLP (Likelihood + Rank Aggregation)
MLP (Decay Model + Rank Aggregation)
Likelihood
Rank Aggregation
Common Neighbors
Jaccard Coefficient
Preferential Attachment
Adamic/Adar
Resource Allocation
Page Rank
Inverse Path Distance
Clustering Coefficient
Average Aggregation
Entropy Aggregation
Multilayer Common Neighbors
Multilayer Jaccard Coefficient
Multilayer Preferential Attachment
Multilayer Adamic/Adar
Travian (Trade)
0.8209±0.0016
0.8024±0.0013
0.7226±0.0029
0.7702±0.0332
0.6941±0.0010
0.6565±0.0024
0.6287±0.0023
0.7094±0.0019
0.6354±0.0034
0.6254±0.0052
0.5954±0.0016
0.5723±0.0037
0.5804±0.0023
0.7446±0.0300
0.7310±0.0038
0.7293±0.0040
0.6663±0.0312
0.7226±0.0098
0.6712±0.0104
Travian (Message)
0.8036±0.0023
0.7906±0.0021
0.7310±0.0021
0.7606±0.0410
0.7120±0.0014
0.6671±0.0021
0.6803±0.0031
0.6374±0.0013
0.7002±0.0028
0.6902±0.0028
0.6871±0.0021
0.6506±0.0032
0.6332±0.0025
0.7521±0.0201
0.7630±0.0201
0.6429±0.0130
0.6193±0.0124
0.6459±0.0127
0.6899±0.0310
Cannes2013 (Retweet)
Cannes2013 (Mention)
Cannes2013 (Reply)
0.8116±0.0025
0.8088±0.0027
0.7267±0.0025
0.7524±0.0218
0.7001±0.0020
0.6999±0.0019
0.5944±0.0016
0.5846±0.0019
0.6999±0.0026
0.5973±0.0021
0.6604±0.0024
0.6312±0.0030
0.5702±0.0201
0.7405±0.0026
0.7515±0.0030
0.6723±0.0028
0.5803±0.0031
0.5801±0.0034
0.6709±0.0036
0.8345±0.0035
0.8141±0.0036
0.7283±0.0028
0.7806±0.0517
0.7062±0.0023
0.7050±0.0031
0.7331±0.0016
0.6122±0.0020
0.6419±0.0022
0.6222±0.0019
0.6301±0.0032
0.6410±0.0020
0.6213±0.0105
0.7366±0.0107
0.7584±0.0311
0.7163±0.0027
0.7360±0.0022
0.6403±0.0031
0.6687±0.0026
0.8393±0.0025
0.8160±0.0029
0.7331±0.0018
0.7573±0.0423
0.7004±0.0027
0.6999±0.0012
0.7107±0.0029
0.5869±0.0026
0.5160±0.0028
0.6717±0.0036
0.6131±0.0017
0.5614±0.0036
0.5220±0.0041
0.7611±0.0035
0.7441±0.0022
0.7328±0.0019
0.7219±0.0016
0.6212±0.0028
0.5523±0.0033
used to predict links that occur at the target layer α in the
t ). To assess our proposed framework and
current period (Gα
study the impact of its components, we compare against the
following baselines:
• MLP (Hybrid): incorporates all elements discussed in
the framework section. It utilizes the likelihood assign-
ment and edge weighting procedure to extract cross-layer
information. Node similarity scores are modified using
the temporal decay model and combined with Borda rank
aggregation.
• MLP (Likelihood + Rank Aggregation): This method
only uses the aggregated scores calculated from the
graphs weighted with cross-layer information. It does not
consider the temporal aspects of network coevolution.
• MLP (Decay Model + Rank Aggregation): This method
does not use the cross-layer weighting scheme and relies
on temporal information alone to predict future links.
The final aggregated score matrix is calculated based on
forecast values at time t for each node similarity metric
using the decay model.
• Likelihood: Weights generated by the cross-layer likeli-
hood assignment procedure are treated as scores for every
node pair. We then sort the pairs based on their score and
calculate the AUROC.
• Rank Aggregation: This method is a simple aggregated
version of all unsupervised scoring methods using the
Borda's rank aggregation method applied to node simi-
larity metrics from the target layer.
• Unsupervised Methods: The performance of our pro-
posed framework is compared with eight well-known
unsupervised link prediction methods described in Sec-
tion III. All unsupervised methods are applied to the
binary static graph from time 0 to t−1 in order to predict
links at time t. Only the structure of the target layer is
used.
• Average Aggregation: In order to extend the rank ag-
gregation model to include information from other layers
of the network, we use the idea proposed in [19]. Node
similarity metrics are aggregated across all layers. So for
attribute X (Common Neighbors, Adamic/Adar, etc.) over
M layers the following is defined:
(cid:80)M
X(u, v) =
α=1 X(u, v)α
M
(13)
where X(u, v) is the average score for nodes u and v
across all layers and X(u, v)α is the score at layer α.
Borda's rank aggregation is then applied to the extended
attributes to calculate the final scoring matrix.
• Entropy Aggregation: Entropy aggregation is another
extended rank aggregation model proposed in [19] where
X(u, v) is defined as follows:
X(u, v) = − M(cid:88)
where Xtotal = (cid:80)M
α=1
X(u, v)α
Xtotal
log(
X(u, v)α
Xtotal
)
(14)
α=1 X(u, v)α. The entropy based
attributes are more suitable for capturing the distribution
of the attribute value over all dimensions. A higher value
indicates a uniform distribution of attribute values across
the multiplex layers.
• Multilayer Unsupervised Methods: Finally, using the
definition of core neighborhood proposed in [11], we
extend four unsupervised methods (Common Neigh-
bors, Preferential Attachment, Jaccard Coefficient and
Adamic/Adar) to their multilayer versions.
Table II shows the results of different algorithms on the
Travian and Cannes2013 datasets. With 30 days of data from
Travian and 27 days for Cannes2013, we were able to exten-
sively compare the performance of the proposed methods and
the impact of using different elements. Bold numbers indicate
the best results on each target layer considered; MLP (Hybrid)
is the best performing algorithm in all cases.
VI. DISCUSSION
In this section, we discuss the most interesting findings:
Does rank aggregation improve the performance of
the unsupervised metrics? As shown in Table II, although
the aggregated scores matrix produced by Borda's method
achieves better results than unsupervised methods in some
cases (Travian message, Cannes2013 retweet and mention
networks) and comparable results on others (Travian trade
and Cannes2013 reply networks), it is not able to significantly
outperform all unsupervised methods in any of the networks.
As discussed before, we are using the simple Borda method for
the rank aggregation which does not consider the effect of each
ranker on the final performance. While adding weights to the
rankers or using more complex rank aggregation models such
as Kemeny might achieve better results, it has been shown that
those approaches have high computational complexity which
makes them less suitable for large real-world networks [18],
[20]. Despite the fact that the rank aggregation alone does
not significantly improve the overall performance of the link
prediction task, it enables us to effectively fuse different kinds
of information (edge and node features, nodes similarity, etc.).
On the other hand, the Average and Entropy Aggregation
methods which are designed to consider attribute values from
other layers are able to outperform regular Rank Aggregation
and MLP (Decay Model + Rank Aggregation). However, both
methods use the static structure of all snapshots from time
0 to t − 1, while MLP (Decay Model + Rank Aggregation)
only incorporates the past T snapshots which makes it more
suitable for large networks.
Does the likelihood assignment procedure outperform
the unsupervised scores? To study the ability of our likeli-
hood weighting method to model the link formation process,
we generate results for two methods: using likelihood explicitly
as a scoring method as well as using the values to generate a
weighted version of the networks. First, the Likelihood method
is used in isolation to demonstrate the prediction power of its
weights as a new scoring approach. Table II shows significant
improvements on unsupervised scores as well as the aggregated
version of them. As expected,
the more overlap between
the target layer and predictor layers, the more performance
improvement Likelihood achieves. As an example, Likelihood
achieves ∼ 7% of improvement on Travian (Trade) compared
with ∼ 5% of improvement on Travian (Message). Not only is
there a lower rate of overlapping edges between those layers,
but also the number of interactions is higher than the two
other layers. The same holds true for Cannes2013 (Retweet)
compared with the mention and reply layers.
On the other hand, the method introduced in Algorithm 1
generates a weighted version of input graphs which is used
to generate a weighted version of unsupervised methods to
produce the final scoring matrix. This paired with the rank
aggregation method generates significantly better average AU-
ROC performance compared with other proposed methods.
Also, when temporal information from previous snapshots of
the network is included, MLP (Hybrid) outperforms other
variants of MLP as well as well-known unsupervised methods.
This indicates the power of overlapping links in improving
the performance of link prediction in coevolving multilayer
networks.
Does including temporal information improve AUROC
performance? The importance of incorporating temporal in-
formation into link prediction has been thoroughly discussed
in our previous work [5]. However, here we are interested
in analyzing the impact of this information on improving the
performance of MLP. For that purpose, first, the decay model
is employed in MLP (Decay Model + Rank Aggregation) to
determine whether it improves the results generated by the
aggregated score matrix. The final aggregated score matrix
is calculated based on forecast values at
time t for each
unsupervised method using the decay model. As expected,
this version of MLP is able to achieve up to ∼ 3% of
AUROC improvement using only information from the last
three and five snapshots of the Travian and Cannes2013
networks respectively. On the other hand, we observed the
same pattern when the decay model was added to MLP
(Hybrid) along with likelihood and rank aggregation. Link
prediction using the scores generated by our hybrid method
outperformed all other proposed and existing methods. The
results presented here have been obtained using T = 3 for the
Travian dataset and T = 5 for Cannes2013. These values are
based on experiments performed on both datasets. While for
Travian layers, increasing the value of T tends to improve the
prediction performance slightly until T = 3; higher values of
T may decrease the performance. The same pattern occurs for
Cannes2013 layers when T = 5. Similarly, the value of θ is
set to 0.4 for both datasets.
In summary, MLP (Decay Model + Rank Aggregation) is
able to achieve results comparable to other baseline methods
except Average and Entropy Aggregation since they benefit
from the entire graph structure. Although rank aggregation
by itself is not able to significantly improve the performance
of unsupervised methods, paired with decay models and tak-
ing temporal aspects of the network, it can achieve better
performance. On the other hand, the multilayer versions of
the neighborhood based unsupervised methods are able to
improve average AUROC performance, however the results
are inconsistent and they achieve lower performance in many
cases. Finally, both MLP (Hybrid) and MLP (Likelihood +
Rank Aggregation) achieve higher performance compared with
all other methods illustrating the importance of the cross-layer
information created by the network coevolution process. A
paired two-sample t-test is used to indicate the significance
of the results produced by each method where the p-value is
smaller than 0.0001. It is worth mentioning that, even though
MLP (Hybrid) is able to outperform all other methods, its
[9]
J. Tang, T. Lou, and J. Kleinberg, "Inferring social ties across het-
erogenous networks," in Proceedings of the fifth ACM international
conference on Web search and data mining. ACM, 2012, pp. 743 --
752.
[10] D. Davis, R. Lichtenwalter, and N. V. Chawla, "Supervised methods for
multi-relational link prediction," Social network analysis and mining,
vol. 3, no. 2, pp. 127 -- 141, 2013.
[11] D. Hristova, A. Noulas, C. Brown, M. Musolesi, and C. Mascolo, "A
multilayer approach to multiplexity and link prediction in online geo-
social networks," arXiv preprint arXiv:1508.07876, 2015.
[12] P. Basu, M. Dippel, and R. Sundaram, "Multiplex networks:a generative
model and algorithmic complexity," in IEEE/ACM International Confer-
ence on Advances in Social Networks Analysis and Mining (ASONAM),
2015, pp. 456 -- 463.
[13] L. Lu and T. Zhou, "Link prediction in complex networks: A survey,"
Physica A: Statistical Mechanics and its Applications, vol. 390, no. 6,
pp. 1150 -- 1170, 2011.
[14] M. Al Hasan and M. J. Zaki, "A survey of link prediction in social
networks," in Social network data analytics. Springer, 2011, pp. 243 --
275.
J. Zhang and S. Y. Philip, "Link prediction across heterogeneous social
networks: A survey," 2014.
[15]
[16] P. R. d. S. Soares and R. B. C. Prudencio, "Time series based link
prediction," in Neural Networks (IJCNN), The 2012 International Joint
Conference on.
IEEE, 2012, pp. 1 -- 7.
[17] S. Gao, L. Denoyer, and P. Gallinari, "Temporal link prediction by
integrating content and structure information," in Proceedings of the
20th ACM international conference on Information and knowledge
management. ACM, 2011, pp. 1169 -- 1174.
[18] M. Pujari and R. Kanawati, "Supervised rank aggregation approach
for link prediction in complex networks," in Proceedings of the 21st
international conference companion on world wide web. ACM, 2012,
pp. 1189 -- 1196.
[19] -- -- , "Link prediction in multiplex networks," NHM, vol. 10, no. 1,
pp. 17 -- 35, 2015.
[20] L. Tabourier, D. F. Bernardes, A.-S. Libert, and R. Lambiotte,
"Rankmerging: A supervised learning-to-rank framework to predict
links in large social network," arXiv preprint arXiv:1407.2515, 2014.
[21] M. E. J. Newman, "Clustering and preferential attachment in growing
networks," Phys. Rev. E, 2001.
[22] A.-L. Barab´asi et al., "Scale-free networks: a decade and beyond,"
Science, vol. 325, no. 5939, p. 412, 2009.
[23] L. A. Adamic and E. Adar, "Friends and neighbors on the web," Social
networks, vol. 25, no. 3, pp. 211 -- 230, 2003.
[24] T. Zhou, L. Lu, and Y.-C. Zhang, "Predicting missing links via local
information," The European Physical Journal B, vol. 71, no. 4, pp.
623 -- 630, 2009.
[25] S. Brin and L. Page, "Reprint of: The anatomy of a large-scale
hypertextual web search engine," Computer networks, vol. 56, no. 18,
pp. 3825 -- 3833, 2012.
[26] Y. Ding, "Applying weighted pagerank to author citation networks,"
Journal of the American Society for Information Science and Technol-
ogy, vol. 62, no. 2, pp. 236 -- 245, 2011.
[27] E. Acar, D. M. Dunlavy, and T. G. Kolda, "Link prediction on evolving
data using matrix and tensor factorizations," in Data Mining Workshops,
2009. ICDMW'09. IEEE International Conference on.
IEEE, 2009, pp.
262 -- 269.
[28] D. Sculley, "Rank aggregation for similar items." in SDM.
2007, pp. 587 -- 592.
SIAM,
performance is not significantly better than MLP (Likelihood
+ Rank Aggregation) in the case of Travian (Message) and
Cannes (Retweet).
VII. CONCLUSION AND FUTURE WORK
In this paper, we introduce a new link prediction frame-
work, MLP (Multilayer Link Prediction),
that employs a
holistic approach to accurately predict links in dynamic multi-
plex networks using a collection of topological metrics, the
temporal patterns of link formation, and overlapping edges
created by network coevolution. Our analysis on real-world
networks created by a variety of social processes suggests
that MLP effectively models multiplex network coevolution
in many domains.
The version of Borda's method used in this research
assigns the same weight to all rankers. However, for different
networks, each scoring method might add differing value to the
final scoring matrix. In future work, it would be interesting
to use weighted Borda to calculate final scores. Also, while
using more network features often increases the performance
of a link prediction algorithm, this might not be true for all
networks. Thus it may be useful to employ a feature selection
algorithm to identify the best subset of unsupervised methods
to be used in MLP, based on performance improvements in
early snapshots.
ACKNOWLEDGMENTS
Research at University of Central Florida was supported
by NSF award IIS-0845159. Sandia National Laboratories is
a multi-program laboratory managed and operated by Sandia
Corporation, a wholly owned subsidiary of Lockheed Martin
Corporation, for the U.S. Department of Energy's National
Nuclear Security Administration under contract DE-AC04-
94AL85000.
REFERENCES
[1] A. Hajibagheri, K. Lakkaraju, G. Sukthankar, R. T. Wigand, and
N. Agarwal, "Conflict and communication in massively-multiplayer
online games," in Social Computing, Behavioral-Cultural Modeling, and
Prediction. Springer, 2015, pp. 65 -- 74.
[2] E. Omodei, M. De Domenico, and A. Arenas, "Characterizing inter-
actions in online social networks during exceptional events," arXiv
preprint arXiv:1506.09115, 2015.
J. Scott, Social network analysis. Sage, 2012.
[3]
[4] M. Kivela, A. Arenas, M. Barthelemy, J. Gleeson, Y. Moreno, and
M. Porter, "Multilayer networks," Journal of Complex Networks, vol. 2,
pp. 203 -- 271, 2014.
[5] A. Hajibagheri, G. Sukthankar, and K. Lakkaraju, "Leveraging
improved link prediction," arXiv preprint
network dynamics for
arXiv:1604.03221, 2016.
[6] D. Liben-Nowell and J. Kleinberg, "The link-prediction problem for
the American society for information
social networks," Journal of
science and technology, vol. 58, no. 7, pp. 1019 -- 1031, 2007.
[7] A. K. Menon and C. Elkan, "Link prediction via matrix factorization," in
Machine Learning and Knowledge Discovery in Databases. Springer,
2011, pp. 437 -- 452.
[8] S. Scellato, A. Noulas, and C. Mascolo, "Exploiting place features in
link prediction on location-based social networks," in Proceedings of the
17th ACM SIGKDD international conference on Knowledge discovery
and data mining. ACM, 2011, pp. 1046 -- 1054.
|
1903.00077 | 1 | 1903 | 2019-02-28T21:39:12 | High Degree Vertices and Spread of Infections in Spatially Modelled Social Networks | [
"cs.SI",
"math.CO",
"physics.soc-ph"
] | We examine how the behaviour of high degree vertices in a network affects whether an infection spreads through communities or jumps between them. We study two stochastic susceptible-infected-recovered (SIR) processes and represent our network with a spatial preferential attachment (SPA) network. In one of the two epidemic scenarios we adjust the contagiousness of high degree vertices so that they are less contagious. We show that, for this scenario, the infection travels through communities rather than jumps between them. We conjecture that this is not the case in the other scenario, when contagion is independent of the degree of the originating vertex. Our theoretical results and conjecture are supported by simulations. | cs.SI | cs | High Degree Vertices and Spread of Infections in
Spatially Modelled Social Networks
Joshua Feldman and Jeannette Janssen
Dept. of Mathematics and Statistics, Dalhousie Un.
Halifax, NS, Canada
{Jeannette.Janssen,Joshua.Feldman}@dal.ca
Abstract. We examine how the behaviour of high degree vertices in
a network affects whether an infection spreads through communities
or jumps between them. We study two stochastic susceptible-infected-
recovered (SIR) processes and represent our network with a spatial pref-
erential attachment (SPA) network. In one of the two epidemic scenarios
we adjust the contagiousness of high degree vertices so that they are less
contagious. We show that, for this scenario, the infection travels through
communities rather than jumps between them. We conjecture that this is
not the case in the other scenario, when contagion is independent of the
degree of the originating vertex. Our theoretical results and conjecture
are supported by simulations.
Keywords: Spatial graph model, preferential attachment, infection in
networks, contact process.
1
Introduction
While community structure plays an important role in the spread of infections
[14], there are few analytic results on the topic and it is unclear precisely how
clustering interacts with other network properties. Part of the difficulties in this
area stem from the notion that communities consist of disjoint groups or small
cycles. Recently, however, many have taken an approach to studying community
structure by embedding vertices in a metric space [1,4,6,7,12]. One can interpret
the metric space as a feature space in which nearby vertices have more affinity
than the vertices at a distance and, accordingly, close vertices have a higher
probability of being connected. Since a community is a group of individuals who
share some similarities, we represent communities as geometric clusters. The use
of spatial networks allows for a more nuanced notion of community where groups
can overlap and boundaries are fuzzy. Not only is this approach more realistic,
but it is also easier to analyze. We will exploit the mathematical tractability of
a spatial model to study the interaction between community structure and the
spread of infections.
Specifically, our focus will be how the behaviour of high degree nodes changes
whether an infection spreads through communities or jumps between them. This
9
1
0
2
b
e
F
8
2
]
I
S
.
s
c
[
1
v
7
7
0
0
0
.
3
0
9
1
:
v
i
X
r
a
2
Joshua Feldman and Jeannette Janssen
question is important because understanding who spreads diseases between com-
munities can help guide interventions. For example, as [14] show, vaccinating
hosts who bridge communities can be more effective than vaccinating highly
connected individuals. If high degree vertices connect communities, then these
two strategies amount to the same thing.
We model our infection with a stochastic susceptible-infected-recovered (SIR)
process in discrete time. Susceptible vertices can be infected in the future, in-
fected vertices are currently sick, and recovered vertices have gained immunity
from a previous infection. To control the behaviour of high degree vertices, we
recognize that infections spread through contacts (i.e. sexual contact, airborn
contact, etc.), but a network edge only refers to the potential for contacts. [13]
demonstrate that the number of contacts made with a neighbour has a significant
effect on epidemic dynamics. We consider two scenarios in which the "popular"
vertices behave differently: (A) high degree and low degree vertices make the
same number of total contacts per time step, so highly connected vertices make
fewer contacts with any individual neighbour and (B) the time vertices spend
with all their neighbours per time step is proportionate to their degree, so each
vertex gets an equal amount of time with any individual neighbours. In scenario
A, high degree nodes have many weak connections and, in scenario B, high de-
gree and low degree vertices have connections of equal strength so high degree
vertices should pass on the disease to more neighbours. We note that contacts
are not reciprocal -- two vertices can make a different number of contacts with
one another. To model the relationship between contacts per neighbour per time
step and the probability of infecting a susceptible neighbour in a time step, we
use an STI model developed by Garnett and Anderson in [5].
To model our network, we use the Spatial Preferential Attachment (SPA)
Model proposed in [1]. These networks are sparse power-law graphs with positive
clustering coefficients [1]. It has been shown that the SPA model fits real-life
social networks well [8]. Since we are working with a stochastic process on a
random network, we modify the SPA model to remove some randomness. We
show that, compared to the SPA model, vertices in our modified networks have
the same expected degree and the overall degree distribution has the same power-
law coefficient.
Using techniques developed by [9], we will show that when popular high de-
gree nodes are less infectious (scenario A), the infection will travel slowly through
the metric space and respect the community structure. We also conjecture that
in scenario B, the infection will take long jumps between communities. To sup-
port our result and conjecture, we run simulations on the modified SPA model.
While there are numerical studies exploring the relationship between the be-
haviour of highly connected individuals and the spread of disease with respect
to community structure [14], we believe these are the first analytic results on the
topic.
Our research presents new strategies for understanding communities in net-
works. Networks generated by the modified SPA model display many properties
of real-world systems, and are more tractable than those generated by the origi-
High Degree Vertices and Spread of Infections
3
nal SPA model. More generally, by representing communities with a continuous
feature space rather than with disjoint subsets, we can easily leverage geometric
properties to prove otherwise difficult results. The work presented here develops
techniques for understanding this geometric conception of community structure
in networks.
2 Definitions
Here we present the definitions of the SPA model, the modified SPA model, and
our model of the infection.
2.1 The SPA Model
The SPA model was first proposed in [1]. It is a spatial digraph model where
vertices are embedded in a metric space. The metric space represents the feature
space, which reflects the attributes of the vertices that determine their linking
patterns. The model indirectly incorporates the principle of preferential attach-
ment, first proposed by Barabasi and Albert (BA) [2], through the notion of
spheres of influence around every vertex.
Vertices with a larger in-degree have a sphere of influence with greater vol-
ume, but as time progresses the spheres of influence of all nodes decrease. In the
BA model, the preferential attachment came from a probability of a newcomer
connecting to the old vertices. In the SPA model, we use the sphere of influence
to incorporate the preferential attachment process. If a newcomer falls within
an older vertex's sphere of influence, we connect them.
Specifically, vertices are embedded in a hypercube C of dimension d with
unit volume. We endow the hypercube with the torus metric derived from any
of the Lp norms. The torus metric is used to avoid edge effects. If x and y are
two vertices in C, the distance between them is given by:
d(x, y) = min{(cid:107)x − y + u(cid:107)p : u ∈ {−1, 0, 1}m}
The SPA model has parameters A1 ∈ (0, 1) and A2 ∈ [0,∞). (The original
SPA model also has a parameter p representing the conditional probability that
a vertex which falls into the sphere of influence of vertex, actually links to that
vertex. We here assume this to be 1.)
The model consists of a stochastic sequence of n graphs {Gt = (Vt, Et)}0≤t≤n
with Vt ⊂ C. The index t is interpreted as the t-th time step. At each time t,
the sphere of influence S(v, t) of a vertex v ∈ Vt is the ball centered at v with
volume
(cid:26) A1 deg
−
(cid:27)
S(v, t) = min
(v, t) + A2
t
, 1
(1)
Let G0 be the null graph. Given Gt−1, we define Gt = (Vt, Et) as follows.
Vt = Vt−1 ∪ {vt} where vt is placed uniformly at random in C. The edge set
Et = Et−1 ∪ {(vt, u) vt ∈ S(u, t)}.
4
Joshua Feldman and Jeannette Janssen
We now review the relevant properties of the SPA model. As shown in [1],
the network has a power law degree distribution, with an exponent of 1 + 1
.
A1
The geometric nature of the network implies that there is a high amount of local
clustering [10]. In [3], logarithmic bounds on the directed diameter were given.
In [9] it was shown that the effective undirected diameter is also logarithmically
bounded.
2.2 The Modified SPA Model
While the SPA model generates spatial graphs that fit empirical networks well,
we must modify the model to make it mathematically tractable for our purposes.
Since the behaviour of a vertex during its early life significantly determines
its late time behaviour, working with the preferential attachment model can
be difficult. Instead, we modify the sphere of influence to depend upon the
deterministic expected in-degree, instead of the stochastic actual in-degree. First
we present a theorem from [10] on the expected in-degree of a vertex in the SPA
model.
Theorem 1. Let ω = ω(t) be any function tending to infinity together with t.
The expected in-degree at time t of a vertex vi born at time i ≥ ω is given by
E(deg
−
(vi, t)) = (1 + o(1))
A2
A1
(cid:18) t
i
(cid:19)A1 − A2
A1
A vertex's birth time i and the size of the overall network t determines its
expected in-degree. Furthermore, if the expected degree is larger than log2 n then
the real in-degree is concentrated around its expected in-degree [10]. Hence, the
time a vertex is born can be used as a proxy for its degree, with old nodes being
more highly connected than young nodes.
We modify the SPA model by redefining the sphere of influence to depend on
the vertex's expected in-degree, instead of its actual in-degree. This substitution
makes the size of the sphere of influence a nonrandom object. Precisely, the
modified spatial preferential attachment model is defined as the SPA model, with
the one difference being that the size of the sphere of influence of vertex vi at
time is changed to:
(cid:26) A2
t1−A1iA1
(cid:27)
S(vi, t) = min
, 1
(2)
We derive equation (2) by replacing the actual in-degree in formula (1) for the
original sphere of influence with the expected in-degree and simplifying. We now
state and prove a theorem which shows that the modified SPA model generates
networks with an expected in-degree equivalent to the original model.
Theorem 2. Let Gn be a graph generated by the modified SPA model with n
vertices. The expected in-degree of a vertex vi born at time i is given by
(cid:18)(cid:16) n
(cid:19)
(cid:17)A1 − 1
i
−
E(deg
−
(vi, n)) =
A2
A1
High Degree Vertices and Spread of Infections
5
where < A2
A1
.
Proof. Let vj be a vertex born at time j > i. Let Xj be a random variable
that equals 1 if there is an edge from vj to vi and equals 0 otherwise. By the
definition of the modified SPA model, we place an edge from vj to vi if and only
if vj falls within the sphere of influence of vi. Since vj is placed in the hypercube
uniformly at random, Xj = 1 with probability equal to the volume of vi's sphere
of influence at time j.
By the linearity of expectation,
E(deg
−
(vi, n)) = E
(cid:33)
Xk
(cid:32) n(cid:88)
n(cid:88)
n(cid:88)
k=i+1
k=i+1
k=i+1
E (Xk)
S(vi, k)
=
=
(cid:90) n
A2
x1−A1 iA1
dx −
(cid:18)(cid:16) n
i
(cid:19)
(cid:17)A1 − 1
(cid:90) n
−
S(vi, k) ≤
A2
x1−A1 iA1
i
(cid:90) n+1
We approximate this sum with an integral.
n(cid:88)
S(vi, k) =
k=i+1
i
A2
A1
=
To bound the error, we first recognize that,
(cid:90) n+1
dx ≤ n(cid:88)
k=i+1
A2
x1−A1 iA1
i+1
Hence,
(cid:90) n
i
A2
iA1
A2
iA1
A2
A1
A2
A1
<
=
<
<
<
A2
dx −
x1−A1iA1
((i + 1)A1 − iA1) − ((n + 1)A1 − nA1)
x1−A1iA1
i+1
dx
A2
A1
(i + 1)A1 − iA1
(cid:0)2A1 − 1(cid:1)
A1
dx
(cid:117)(cid:116)
6
Joshua Feldman and Jeannette Janssen
In addition to having equivalent expected in-degrees, we also derive that
both models lead to the same (power law) cumulative in-degree distribution.
The cumulative in-degree distribution ck is defined as the number of vertices
with in-degree j ≤ k divided by the total number of vertices. As stated above,
from [1] we know that a.a.s. the cumulative in-degree distribution of networks
generated by the SPA model follows a power law with exponent 1
. Theorem 3
A1
states that the same is true of networks generated by the modified SPA model.
An event occurs with extreme probability (w.e.p.) if it occurs with probability at
least 1 − e−Θ(log2 n) as n → ∞.
for k > k(cid:48) = log2(n).
−
(vi, n) ≤ f (i) + where =(cid:112)f (i) log n.
Theorem 3. Let Gn be a graph generated by the modified SPA model with n
vertices. The cumulative in-degree distribution ck of Gn is w.e.p. a power law
with exponent 1
A1
Proof. The in-degree of a vertex vi born at time i is the sum of n−i independent
Bernoulli variables Xj with success probability equal to the volume of the sphere
of influence S(vi, j). We let f (i) equal the expected in-degree of a vertex born
at time i in a network of size n. By the generalized Chernoff bound [11], we know
that w.e.p. f (i) − ≤ deg
Using this bound, we determine how many vertices have in-degree greater
than k. If a vertex is born before i− = f−1(k + ), then w.e.p. it has a degree
greater than k. Likewise, if a vertex is born after i+ = f−1(k − ), then w.e.p.
it has a degree less than k. Hence, the number of vertices with degree greater
than k is between i− and i+. By inverting the formula for expected degree and
examining its asymptotic growth, we find
i− = f−1(k + ) = (1 + o(1))f−1(k)
Hence, the number of vertices with degree greater than k is w.e.p. (1+o(1))f−1(k).
This implies that ck = (1 + o(1))(kA1/A2 − 1)−1/A1.
(cid:117)(cid:116)
i+ = f−1(k − ) = (1 + o(1))f−1(k)
2.3 Infectious Processes
Now that we have a workable model of real-world networks, we define a SIR
disease model in discrete time. To begin the infectious process, we pick a node
at random to be the origin node. At time t = 0, we infect the origin node and
denote all other nodes as susceptible. In each time step, the infected nodes infect
each neighbour with probability β. Though the modified SPA model generates
directed graphs, we ignore the orientation of the edges. If a susceptible vertex
has multiple infected neighbours, they each independently attempt to infect the
susceptible vertex. At the end of each time step, all infected nodes recover. This
is a simplification of the typical SIR model because usually the recovery time is
modelled as a stochastic variable. Here we simplify and assume each vertex to
recover in exactly one time step. We run the process until no vertices are infected.
If we run the infection process for t time steps on a network with n vertices, the
infected and recovered vertices together with the edges taken by the infection
(oriented in the direction the infection travelled) form an an acyclic directed
High Degree Vertices and Spread of Infections
7
subgraph of the network. We denote this subgraph, I t
time t.
n, the infection graph at
Suppose that in a given time step vertex v is infected, vertex u is susceptible,
and they are neighbours. The probability β of v infecting u in the time step
depends on κ(v), the average number of contacts v makes with u per time step,
and the probability of transmitting the infection per contact τ . If v makes more
contacts on average with u or if the probability of infection per contact is higher,
the disease will have a greater chance of spreading. Following [5], we set
β = 1 − e−τ κ
To study how the behaviour of high degree nodes changes how a disease
spreads through the network, we consider two different scenarios: scenario A
and scenario B with their own infection probabilities βA and βB, respectively.
In scenario A, we define the average number of contacts a vertex v makes with
a neighbour per time step as
κA(v) =
T
−
E(deg
(v))
−
where T is the average number of contacts v makes with all its neighbours in
the time step. We use E(deg
(v)) as a rough approximation of the degree of v.
Hence, in scenario A, βA(v) = 1 − e−τ κA(v). Since T is constant for all vertices,
high and low degree alike, high degree vertices make fewer contacts with any
single neighbour because their contacts are dispersed over a greater number
vertices. While high degree nodes have many neighbours, these connections may
be weaker than a node with few neighbours.
In scenario B, however, we no longer keep the average number of contacts
a vertex makes with all its neighbours in a time step constant. Instead, we let
T (v) depend on T and the expected in-degree of v. We define
T (v) = T
−
E(deg
(v))
(cid:104)deg
−(cid:105)
−(cid:105) = (1 + o(1)) A2
1−A1
−(cid:105) is the average degree in the graph. From [1], we know a.a.s. that
where (cid:104)deg
(cid:104)deg
in the SPA model, which is asymptotically constant.
Since the total number of edges in the network is the sum of Bernoulli variables,
by the linearity of expectation, it is a simple calculation to show that (cid:104)deg
−(cid:105) is
equivalent in the modified and original SPA models. As in scenario A, we use
E(deg
(v)) to approximate the degree of v. From the average number of contacts
a vertex makes with all its neighbours in a time step, we can define the average
number of contacts a vertex makes with a specific neighbour in a time step as
−
κB(v) =
T (v)
E(deg(v))
=
Hence, in scenario B, βB = 1 − e−τ κB , which is constant. Any infected vertex
v has an equal chance of infecting a neighbour, regardless of the degree of v.
Hence, in scenario B, we expect that high degree vertices will pass the infection
on to more individuals than low degree vertices.
T
(cid:104)deg
−(cid:105)
8
Joshua Feldman and Jeannette Janssen
3 Spatial spread of infections
Our main result states that when highly connected vertices are less infectious,
the infection will not make large jumps through the metric space. Since our
metric space represents a feature space, this means that the infection spreads
through communities rather than jumping between them. To prove this result,
we treat the infection as percolating through the network. We first show that
a.a.s. all vertices in the network will only infect neighbours within a certain
distance. From this result, we conclude that any particular infection will a.a.s.
be bounded by a ball of a relatively small radius after a given number of time
steps.
Theorem 4. Let Gn be a graph with n vertices generated by the modified SPA
model. Let λ = n−φ be such that φ < A1(1−A1)
(A1+2)d . For scenario A, a.a.s. all nodes
in the infection graph at time t will be within tλ of the origin node u.
3.1 Proof of Theorem 4
Before we present the proof, we first adopt some conventions regarding the in-
fection process. Instead of considering the infection spreading through a network
in time, we a priori consider whether any vertex would infect a neighbour given
that they are connected. If we "occupy" each pair of vertices with probability
βA, and restrict our occupied pairs to edges present in our network, we get a
subgraph consisting of where the infection could possibly travel, which we call
the potential infection graph. The infection graph, describing where the infection
actually spread, will be a subset of the potential infection graph.
Formally, let Gn = (Vn, En) be a network of order n generated by the mod-
ified SPA model, where we replace each directed edge by two edges in opposite
directions. We consider ordered pairs of vertices (vi, vj) and (vj, vi) because our
infection model ignores the orientation of the edges in the original network gen-
erated by the modified SPA model. In other words, even though all edges in the
modified SPA model are directed from younger to older vertices, we allow the old
to infect the young. Let u ∈ Vn be the node where the infection originates. With
each ordered pair of vertices (vi, vj) we associate a Bernoulli random variable
Ivi,vj defined as
(cid:40)
Ivi,vj =
1 with probability βA(vi)
0
otherwise
(3)
We define the potential infection graph on Gn as the graph In = (VI , EI ) where
VI = Vn and EI = {(vi, vj){vi, vj} ∈ En and Ivi,vj = 1}. We can recover the
infection graph at time t, I t
n, by taking the subgraph induced by the tth out-
neighbourhood of u in In.
The proof of our main result is based on an analysis of the edges in the
potential infection digraph. Define the length of an edge as the distance between
its two end points. We first establish a lemma stating that there is an asymptotic
bound on the length of edges in the potential infection graph.
High Degree Vertices and Spread of Infections
9
Lemma 1. Let Gn be a graph with n vertices generated by the modified SPA
model and In be a potential infection graph on Gn in scenario A. Let λ = n−φ
such that φ < A1(1−A1)
(A1+2)d . Then a.a.s. In does not contain any edges of length
greater than λ.
Proof. Let L represent the event of there being an edge in In where the distance
between its endpoints is greater than λ. We will call such edges "long" and all
other edges "short". Given two (not necessarily connected) nodes in Vn, vi and
vj, let Lvi,vj represent the event of there being a long edge from vi to vj in In.
Thus, Lvi,vj occurs if vi and vj (the vertices born at time i and j, respectively)
have distance at least λ, there is an edge between vi and vj, and the infection
(cid:0)Lvi,vj ∪ Lvj ,vi
(cid:1), by taking the
can travel from vi to vj. Since L =(cid:83)n−1
n(cid:88)
P(L) ≤ n−1(cid:88)
union bound, we know
(cid:83)n
i=0
j=i+1
P(Lvi,vj ) + P(Lvj ,vi)
i=0
j=i+1
Our proof will show that this double sum goes to 0 as n approaches infinity.
We first need an expression for P(Lvi,vj ) + P(Lvj ,vi ). Since i < j, by the
definition of the potential infection graph, Lvi,vj occurs if and only if three other
events also occur: d(vi, vj) > λ, vj ∈ S(vi, j), and Ivi,vj = 1. In other words, for
there to be a long edge between vi and vj, Ivi,vj must equal 1 and vj must be
far enough away from vi to be considered long, but close enough to be in the
sphere of influence of vi at time j.
Since vj is placed uniformly at random in the hypercube, the distance d(vj, vi)
and the event Ivi,vj = 1 are independent. Therefore, for any specific values for j
and i. i < j, we can write
P(Lvi,vj ) = P(d(vi, vj) > λ, vj ∈ S(vi, j), Ivi,vj = 1)
= P(d(vi, vj) > λ, vj ∈ S(vi, j))P(Ivi,vj = 1)
For the edge oriented in the opposite direction, we can make a similar argu-
ment. Hence, we can write
P(Lvj ,vi) = P(d(vi, vj) > λ, vj ∈ S(vi, j), Ivj ,vi = 1)
= P(d(vi, vj) > λ, vj ∈ S(vi, j))P(Ivj ,vi = 1)
Combining our expressions for P(Lvi,vj ) and P(Lvj ,vi) we find that
P(Lvi,vj )+P(Lvj ,vi) = P(d(vi, vj) > λ, vj ∈ S(vi, j))(P(Ivi,vj = 1)+P(Ivj ,vi = 1))
We know P(Ivi,vj = 1) = βA(vi) and P(Ivj ,vi = 1) = βA(vj) from equation
(3), but we need expressions for P(d(vi, vj) > λ, vj ∈ S(vi, j)) and P(Ivi,vj = 1).
10
Joshua Feldman and Jeannette Janssen
We use a geometric argument to find P(d(vj, vi) > λ, vj ∈ S(vi, j)), which
is the probability of there being a long edge between vi and vj in the original
network. There are three cases. In the first case, the sphere of influence of vi has
radius smaller than λ at its time of birth. Since spheres of influence only shrink,
in this case there will never be a time when vj can both fall within vi's sphere of
influence and be greater than λ away from vi. This case occurs when i exceeds
a critical value m, which is the first time when vertices are born with a sphere
of influence that has radius smaller than λ.
In the second case, i is smaller than the critical value m, but j is larger than
the second critical value mi. This critical value is reached when the radius of
vi's sphere of influence equals λ. Again, since spheres of influence only shrink,
vertices born at times after mi cannot have d(vj, vi) > λ and vj ∈ S(vi, j)). In
these first two cases, P(d(vj, vi) > λ, vj ∈ S(vi, j)) = 0.
A ball of radius λ has volume λdcp where cp depends on our Lp norm. Using
this, we find that
m =
A2
λdcp
mi =
(cid:18) A2
(cid:19) 1
1−A1
iλdcp
In the last case, i < m and j < mi, which means d(vj, vi) > λ and vj ∈
S(vi, j)) is possible. Since vj is placed in the hypercube uniformly at random
and the hypercube has unit volume, P(d(vj, vi) > λ, vj ∈ S(vi, j)) is equal
to the volume of the spherical shell between the sphere of influence and the
ball centred at vi with radius λ which we denote B(vi, λ). Hence, in this case,
P(d(vj, vi) > λ, vj ∈ S(vi, j)) = S(vi, j) − B(vi, λ).
Combining the results from the previous paragraphs,
P(L) ≤ m(cid:88)
mi(cid:88)
i=0
j=i+1
(S(vi, j) − B(vi, λ))(βA(vi) + βA(vj))
Since the oldest vertex will always have the largest sphere of influence, we
know that mi < m1 for all i ∈ [1, m] and that m < m1. Also, A2 = S(v1, 1) >
S(vi, j)−B(vi, λ) for all i, j ∈ [1, m1]. Finally, since vm1 has the lowest expected
degree of all vertices born at or before time m1, βA(vm1) > βA(vi), βA(vj) for
all i, j ∈ [1, m1]. Hence, we can write
P(L) ≤ m1(cid:88)
m1(cid:88)
1 − exp
≤ 2
j=i+1
i=1
−
2A2βA(vm1 )
A2m2
1
(4)
(5)
(cid:18)(cid:16) n
τ T
(cid:19)
(cid:17)A1 − 1
m1
A2
A1
From the formula for m1, we see that m1 ∼ n
γ = τ T , we see that
φd
1−A1 . Setting φ = A1(1−A1)
(A1+2)d and
High Degree Vertices and Spread of Infections
11
1 − exp
(cid:18)
(cid:18)
(cid:18)
1 − exp
1 −
P(L) ≤ 2
∼ 2
∼ 2
γ
−
(cid:18)
A2m2
(cid:19)
(cid:18)(cid:16) n
(cid:17)A1 − 1
(cid:17)(cid:19)(cid:19)
(cid:16) φd
(cid:18)
−γnA1
(cid:17)
(cid:16) φd
A2n
1−A1
−1
2φd
1−A1
(cid:16) φd
m1
1
+ O
n2A1
1−A1
1 − γnA1
−1
1−A1
= o(1)
(cid:17)(cid:19)(cid:19)(cid:19)
−1
2φd
1−A1
A2n
(6)
(7)
(8)
(9)
(cid:117)(cid:116)
Using this lemma, we can now prove our main result, Theorem 4.
Proof. Let B represent the bad event where there is a node v in the infection
digraph at time t, I t
n, where d(v, u) > tλ. If B occurs, then there is a path from
n is the tth neighbourhood of u in In. By
v to u with at most t edges because I t
the triangle inequality, at least one of the edges in the path from v to u has
a length greater than λ and, more generally, there is an edge in the potential
infection graph with a length greater than λ. Let L represent the event of there
being an edge in In where the distance between its endpoints is greater than λ.
Since B ⊂ L, P(B) ≤ P(L), but by the previous lemma, a.a.s. P(L) = 0.
(cid:117)(cid:116)
3.2 Conjecture for Scenario B
We conjecture that in scenario B, the negation of Lemma 1 holds. We know that
the modified SPA model a.a.s. has edges greater than length λ(cid:48) where λ(cid:48) = µn−θ
with θ > 1 − A1
4A1+2 and µ constant. We conjecture that the potential infection
graph will have long edges as well.
Conjecture 1 Let Gn be a graph with n vertices generated by the modified SPA
model and In be a potential infection graph on Gn in scenario B. There exists
φ > 0 such that if we let λ = n−φ, a.a.s. In contains an edge of length greater
than λ.
4 Simulations
Using simulations, we test our theoretic result that the infection in scenario A
will not make long jumps. We also use simulations to provide evidence for our
conjecture that, in scenario B, the infection can make long jumps if we pick the
origin vertex correctly. Recall that in both infection scenarios, we can vary how
easily the infection spreads by altering T , the total number of contacts made
per time step, and τ , the probability of transmission per contact. Also recall
12
Joshua Feldman and Jeannette Janssen
that we denote γ = τ T . For the 2 infection scenarios, we consider 3 levels of
contagiousness: γ = 1, γ = 10 and γ = 100.
We generated 10 networks with the modified SPA network in R1 with A1 =
0.5 and A2 = 1. Our results are highly asymptotic and the bound is lowest in
low dimensions so, due to computational constraints, we choose to simulate in
R1. The 10 networks are of increasing size, beginning at n = 1000 and increasing
by increments of 1000 to a maximum of n = 10000.
For each network, we run each of the 6 infection processes 50 times. We chose
to begin the infections at the oldest vertex because it has the highest likelihood
of having neighbours far away in the metric space. On one hand, we want to give
the infection in scenario B the opportunity to make long jumps and, on the other
hand, we do not want to mistakenly conclude that the infection in scenario A
makes short jumps only because it was never exposed to long edges. While our
main result states that given a number of time steps, a.a.s. the infection remains
within a certain region, this result depends on both the size of the network and
the current time step in the infection process. We thought it would be more
clear to compare Lemma 1 to our simulations, which states that the edge length
taken by the infection in scenario A is bounded. To compare scenario A and B,
we likewise observe the maximum edge length the infection in scenario B takes.
Fig. 1. Longest jump made by the infection vs. network size in scenario A and B
stratified by 3 levels of contagion.
The results of our simulations are shown in Figure 1. We make two conclu-
sions from our simulations. First, we see that in scenario A, when high degree
nodes are less contagious, the infection takes shorter jumps than in scenario B.
As indicated by our asymptotic result, the difference becomes more pronounced
in larger networks. One might notice that in scenario B the infection does not
always make long jumps, which seems to contradict our conclusion. These out-
High Degree Vertices and Spread of Infections
13
liers can be explained by recognizing that the longest edge in the entire network
is a non-clustered random variable. Vertices receive long edges in a brief period
during the early steps of the model and, consequently, whether there are long
edges in the network at all is highly variable. It is not that the infection avoids
the long edges, but rather, that the infection has no long edges to take in the
first place. Second, we see that this difference between scenario A and scenario
B becomes less pronounced when we make the infection more contagious. Again,
this matches our theoretic result, since our bound on the probability of long
infection increases when γ is larger. We expect that if we could generated large
enough networks, eventually we would see the difference between scenario A and
B reemerge, even at high levels of contagion.
Fig. 2. A log-log plot of the longest jump made by the infection vs. network size in
scenario A with γ = 10. The equation for the regression line is log(y)=-0.51log(x)+1.40
(R2 = 0.19).
To compare our analytic bound φ to our simulations, we perform a linear
regression on a log-log plot of longest jump vs. network size for infections in Sce-
nario A with γ = 10 (see Figure 2). The simulations are the same as those
represented in Figure 1. We have added a small amount of noise to the x-
values in order to make the distribution of data more clear. If our result is true,
then we should expect that the slope of the regression line should be less than
− A1(1−A1)
our lemma. Of course, our data is highly variable and this plot only gestures
towards the fact that our bound is valid. We expect that for larger networks,
this variation would decrease.
(A1+2)d = −0.1. We found the slope to be −0.51, which provides support for
To illustrate that the infection spreads slowly through the feature space in
scenario A, we simulate one run of the process on a graph generated by the
modified SPA model in R2 with A1 = 0.5, A2 = 1, γ = 10, and n = 1000.
14
Joshua Feldman and Jeannette Janssen
We present the simulation in Figure 3. The blue vertices were infected earlier
in the process and red vertices later. Since nearby vertices have similar colours
(recall that we are using the torus metric), this simulation provides additional
qualitative evidence for our finding that the infection does not make long jumps
in scenario A.
Fig. 3. A scenario A infection with γ = 10 on a modified SPA network with A1 = 0.5,
A2 = 1, and n = 1000. The gradient from blue to red represents earlier to later
infections.
5 Conclusion
When modelling contagious processes, it is important to take contacts made per
neighbour into account. With analytic and numeric results, we show that if all
High Degree Vertices and Spread of Infections
15
vertices make an equal number of contacts, the infection will spread through
communities rather than jumping between them. High degree vertices are more
likely to have neighbours in distant communities and when these popular individ-
uals are less contagious, the infection is less likely to spread from one community
to another. We also show with simulations that scaling the number of contacts
a vertex makes by its degree results in an epidemic that spreads irrespective of
the communities in the network.
In addition to our conjecture, we identify two areas of future research. First,
since infections in scenario A and scenario B behave differently with respect to
community structure, interventions may benefit from exploiting this distinction.
In other words, if we know a contagious process will spread through communities,
how can we use this fact to control the epidemic? Likewise, how should we
control diseases that jump between communities? The second area of potential
research is studying scenario A infections further. While we find that these types
of contagious processes will be a.a.s. bounded by a ball with a growing radius, we
do not discuss how this may affect the success of an infection spreading through
a network. If a disease does not jump, does community structure prevent the
infection from spreading beyond its original group?
References
1. Aiello, W., Bonato, A., Cooper, C., Janssen, J., Pralat, P.: A Spatial Web Graph
Model with Local Influence Regions. Internet Mathematics 5(12), 173 -- 193 (2007)
2. Barab´asi, A.L., Albert, R.: Emergence of Scaling in Random Networks. Science
286(5439) (1999)
3. Cooper, C., Frieze, A., Pra(cid:32)lat, P.: Some Typical Properties of the Spatial Preferred
Attachment Model. Internet Mathematics 10(1-2), 116 -- 136 (2014)
4. Flaxman, A.D., Frieze, A.M., Vera, J.: A Geometric Preferential Attachment Model
of Networks. Internet Mathematics 3(2), 187 -- 206 (2006)
5. Garnett, G.P., Anderson, R.M.: Sexually Transmitted Diseases and Sexual Behav-
ior: Insights from Mathematical Models. The Journal of Infectious Diseases 174(2),
S150 -- S161 (1996)
6. Hoff, P.D., Raftery, A.E., Handcock, M.S.: Latent Space Approaches to Social
Network Analysis. Journal of the American Statistical Association 97(460), 1090 --
1098 (2002)
7. Jacob, E., Morters, P.: Spatial preferential attachment networks: Power laws and
clustering coefficients. Annals of Applied Probability 25(2), 632 -- 662 (2015)
8. Janssen, J., Hurshman, M., Kalyaniwalla, N.: Model Selection for Social Networks
Using Graphlets. Internet Mathematics 8(4), 338 -- 363 (2012)
9. Janssen, J., Mehrabian, A.: Rumours Spread Slowly in a Small World Spatial
Network. Algorithms and Models for the Web Graph pp. 107 -- 118 (2015)
10. Janssen, J., Pralat, P., Wilson, R.: Geometric graph properties of the spatial pre-
ferred attachment model. Advances in Applied Mathematics 50(2), 243 -- 267 (2013)
11. Lu, L., Chung, F.: Old and new concentration inequalities. In: Complex Graphs
and Networks, chap. 2, pp. 23 -- 56. American Mathematical Society, Providence
(2006)
12. Newman, M.E.J., Peixoto, T.P.: Generalized communities in networks. Physical
Review Letters 115(8) (2015)
16
Joshua Feldman and Jeannette Janssen
13. Nordvik, M.K., Liljeros, F.: Number of Sexual Encounters Involving Intercourse
and the Transmission of Sexually Transmitted Infections. Sexually Transmitted
Diseases 33(6), 342 -- 349 (2006)
14. Salath´e, M., Jones, J.H., May, R., Johnson, A., Auranen, K.: Dynamics and Control
of Diseases in Networks with Community Structure. PLoS Computational Biology
6(4), e1000736 (2010)
|
1805.12512 | 3 | 1805 | 2018-09-22T21:02:03 | On the Origins of Memes by Means of Fringe Web Communities | [
"cs.SI",
"cs.CY"
] | Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2.6B posts gathered from Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, over the course of 13 months. We group the images posted on fringe Web communities (/pol/, Gab, and The_Donald subreddit) into clusters, annotate them using meme metadata obtained from Know Your Meme, and also map images from mainstream communities (Twitter and Reddit) to the clusters.
Our analysis provides an assessment of the popularity and diversity of memes in the context of each community, showing, e.g., that racist memes are extremely common in fringe Web communities. We also find a substantial number of politics-related memes on both mainstream and fringe Web communities, supporting media reports that memes might be used to enhance or harm politicians. Finally, we use Hawkes processes to model the interplay between Web communities and quantify their reciprocal influence, finding that /pol/ substantially influences the meme ecosystem with the number of memes it produces, while \td has a higher success rate in pushing them to other communities. | cs.SI | cs | On the Origins of Memes by Means of Fringe Web Communities∗
Savvas Zannettou(cid:63), Tristan Caulfield‡, Jeremy Blackburn†, Emiliano De Cristofaro‡,
Michael Sirivianos(cid:63), Gianluca Stringhini‡(cid:5), and Guillermo Suarez-Tangil‡+
†University of Alabama at Birmingham, (cid:5)Boston University, +King's College London
(cid:63)Cyprus University of Technology, ‡University College London
[email protected] {t.caulfield,e.decristofaro}@ucl.ac.uk
[email protected], [email protected], [email protected], [email protected]
8
1
0
2
p
e
S
2
2
]
I
S
.
s
c
[
3
v
2
1
5
2
1
.
5
0
8
1
:
v
i
X
r
a
Abstract
Internet memes are increasingly used to sway and manipulate
public opinion. This prompts the need to study their propa-
gation, evolution, and influence across the Web. In this paper,
we detect and measure the propagation of memes across mul-
tiple Web communities, using a processing pipeline based on
perceptual hashing and clustering techniques, and a dataset of
160M images from 2.6B posts gathered from Twitter, Reddit,
4chan's Politically Incorrect board (/pol/), and Gab, over the
course of 13 months. We group the images posted on fringe
Web communities (/pol/, Gab, and The Donald subreddit) into
clusters, annotate them using meme metadata obtained from
Know Your Meme, and also map images from mainstream
communities (Twitter and Reddit) to the clusters.
Our analysis provides an assessment of the popularity and
diversity of memes in the context of each community, showing,
e.g., that racist memes are extremely common in fringe Web
communities. We also find a substantial number of politics-
related memes on both mainstream and fringe Web commu-
nities, supporting media reports that memes might be used to
enhance or harm politicians. Finally, we use Hawkes processes
to model the interplay between Web communities and quantify
their reciprocal influence, finding that /pol/ substantially influ-
ences the meme ecosystem with the number of memes it pro-
duces, while The Donald has a higher success rate in pushing
them to other communities.
Introduction
1
The Web has become one of the most impactful vehicles for
the propagation of ideas and culture. Images, videos, and slo-
gans are created and shared online at an unprecedented pace.
Some of these, commonly referred to as memes, become viral,
evolve, and eventually enter popular culture. The term "meme"
was first coined by Richard Dawkins [12], who framed them
as cultural analogues to genes, as they too self-replicate, mu-
tate, and respond to selective pressures [18]. Numerous memes
have become integral part of Internet culture, with well-known
examples including the Trollface [54], Bad Luck Brian [27],
and Rickroll [49].
While most memes are generally ironic in nature, used with
∗A shorter version of this paper appears in the Proceedings of 18th ACM
Internet Measurement Conference (IMC 2018). This is the full version.
no bad intentions, others have assumed negative and/or hateful
connotations, including outright racist and aggressive under-
tones [84]. These memes, often generated by fringe commu-
nities, are being "weaponized" and even becoming part of po-
litical and ideological propaganda [67]. For example, memes
were adopted by candidates during the 2016 US Presidential
Elections as part of their iconography [19]; in October 2015,
then-candidate Donald Trump retweeted an image depicting
him as Pepe The Frog, a controversial character considered
a hate symbol [58]. In this context, polarized communities
within 4chan and Reddit have been working hard to create
new memes and make them go viral, aiming to increase the
visibility of their ideas -- a phenomenon known as "attention
hacking" [64].
Motivation. Despite their increasingly relevant role, we have
very little measurements and computational tools to under-
stand the origins and the influence of memes. The online in-
formation ecosystem is very complex; social networks do not
operate in a vacuum but rather influence each other as to how
information spreads [86]. However, previous work (see Sec-
tion 6) has mostly focused on social networks in an isolated
manner.
In this paper, we aim to bridge these gaps by identifying
and addressing a few research questions, which are oriented
towards fringe Web communities: 1) How can we character-
ize memes, and how do they evolve and propagate? 2) Can
we track meme propagation across multiple communities and
measure their influence? 3) How can we study variants of
the same meme? 4) Can we characterize Web communities
through the lens of memes?
Our work focuses on four Web communities: Twitter, Red-
dit, Gab, and 4chan's Politically Incorrect board (/pol/), be-
cause of their impact on the information ecosystem [86]
and anecdotal evidence of them disseminating weaponized
memes [73]. We design a processing pipeline and use it over
160M images posted between July 2016 and July 2017. Our
pipeline relies on perceptual hashing (pHash) and clustering
techniques; the former extracts representative feature vectors
from the images encapsulating their visual peculiarities, while
the latter allow us to detect groups of images that are part of the
same meme. We design and implement a custom distance met-
ric, based on both pHash and meme metadata, obtained from
Know Your Meme (KYM), and use it to understand the in-
1
terplay between the different memes. Finally, using Hawkes
processes, we quantify the reciprocal influence of each Web
community with respect to the dissemination of image-based
memes.
Findings. Some of our findings (among others) include:
1. Our influence estimation analysis reveals that /pol/ and
The Donald are influential actors in the meme ecosys-
tem, despite their modest size. We find that /pol/ substan-
tially influences the meme ecosystem by posting a large
number of memes, while The Donald is the most efficient
community in pushing memes to both fringe and main-
stream Web communities.
2. Communities within 4chan, Reddit, and Gab use memes
to share hateful and racist content. For instance, among
the most popular cluster of memes, we find variants of
the anti-semitic "Happy Merchant" meme [36] and the
controversial Pepe the Frog [45].
3. Our custom distance metric effectively reveals the phy-
logenetic relationships of clusters of images. This is evi-
dent from the graph that shows the clusters obtained from
/pol/, Reddit's The Donald subreddit, and Gab available
for exploration at [1].
Contributions. First, we develop a robust processing pipeline
for detecting and tracking memes across multiple Web com-
munities. Based on pHash and clustering algorithms, it sup-
ports large-scale measurements of meme ecosystems, while
minimizing processing power and storage requirements. Sec-
ond, we introduce a custom distance metric, geared to high-
light hidden correlations between memes and better under-
stand the interplay and overlap between them. Third, we pro-
vide a characterization of multiple Web communities (Twitter,
Reddit, Gab, and /pol/) with respect to the memes they share,
and an analysis of their reciprocal influence using the Hawkes
Processes statistical model. Finally, we release our processing
pipeline and datasets1, in the hope to support further measure-
ments in this space.
2 Methodology
In this section, we present our methodology for measuring the
propagation of memes across Web communities.
2.1 Overview
Memes are high-level concepts or ideas that spread within
a culture [12]. In Internet vernacular, a meme usually refers
to variants of a particular image, video, clich´e, etc. that share
a common theme and are disseminated by a large number of
users. In this paper, we focus on their most common incarna-
tion: static images.
To gain an understanding of how memes propagate across
the Web, with a particular focus on discovering the communi-
ties that are most influential in spreading them, our intuition
is to build clusters of visually similar images, allowing us to
track variants of a meme. We then group clusters that belong
to the same meme to study and track the meme itself. In Fig-
ure 1, we provide a visual representation of the Smug Frog
1https://github.com/memespaper/memes pipeline
2
Figure 1: An example of a meme (Smug Frog) that provides an intu-
ition of what an image, a cluster, and a meme is.
meme [52], which includes many variants of the same image
(a "smug" Pepe the Frog) and several clusters of variants. Clus-
ter 1 has variants from a Jurassic Park scene, where one of the
characters is hiding from two velociraptors behind a kitchen
counter: the frogs are stylized to look similar to velociraptors,
and the character hiding varies to express a particular message.
For example, in the image in the top right corner, the two frogs
are searching for an anti-semitic caricature of a Jew (itself a
meme known as the Happy Merchant [36]). Cluster N shows
variants of the smug frog wearing a Nazi officer military cap
with a photograph of the infamous "Arbeit macht frei" slogan
from the distinctive curved gates of Auschwitz in the back-
ground. In particular, the two variants on the right display the
death's head logo of the SS-Totenkopfverbande organization
responsible for running the concentration camps during World
War II. Overall, these clusters represent the branching nature
of memes: as a new variant of a meme becomes prevalent, it
often branches into its own sub-meme, potentially incorporat-
ing imagery from other memes.
2.2 Processing Pipeline
Our processing pipeline is depicted in Figure 2. As dis-
cussed above, our methodology aims at identifying clusters of
similar images and assign them to higher level groups, which
are the actual memes. Note that the proposed pipeline is not
limited to image macros and can be used to identify any image.
We first discuss the types of data sources needed for our ap-
proach, i.e., meme annotation sites and Web communities that
post memes (dotted rounded rectangles in the figure). Then,
we describe each of the operations performed by our pipeline
(Steps 1-7, see regular rectangles).
Data Sources. Our pipeline uses two types of data sources:
1) sites providing meme annotation and 2) Web communi-
ties that disseminate memes. In this paper, we use Know Your
Meme for the former, and Twitter, Reddit, /pol/, and Gab for
the latter. We provide more details about our datasets in Sec-
tion 3. Note that our methodology supports any annotation site
and any Web community, and this is why we add the "Generic"
sites/communities notation in Figure 2.
pHash Extraction (Step 1). We use the Perceptual Hash-
ing (pHash) algorithm [65] to calculate a fingerprint of
each image in such a way that any two images that look
similar to the human eye map to a "similar" hash value.
pHash generates a feature vector of 64 elements that de-
scribe an image, computed from the Discrete Cosine Trans-
form among the different frequency domains of the im-
Cluster 1Cluster NImageSmug Frog Memeage matches a cluster if the distance is less than or equal to
a threshold θ, which we set to 8, as it allows us to capture
the diversity of images that are part of the same meme while
maintaining a low number of false positives.
As the annotation process considers all the images of a
KYM entry's image gallery, it is likely we will get multiple an-
notations for a single cluster. To find the representative KYM
entry for each cluster, we select the one with the largest pro-
portion of matches of KYM images with the cluster medoid.
In case of ties, we select the one with the minimum average
Hamming distance.
As KYM is based on community contributions it is unclear
how good our annotations are. To evaluate KYM entries and
our cluster annotations, three authors of this paper assessed
200 annotated clusters and 162 KYM entries. We find that only
1.85% of the assessed KYM entries were regarded as "bad"
or not sufficient. When it comes to the clustering annotation,
we note that the three annotators had substantial agreement
(Fleis agreement score equal to 0.67) and that the clustering
accuracy, after majority agreement, of the assessed clusters is
89% . We refer to Appendix B for details about the annotation
process and results.
Association of images to memes (Step 6). To associate im-
ages posted on Web communities (e.g., Twitter, Reddit, etc.)
to memes, we compare them with the clusters' medoids, us-
ing the same threshold θ. This is conceptually similar to Step
5, but uses images from Web communities instead of images
from annotation sites. This lets us identify memes posted in
generic Web communities and collect relevant metadata from
the posts (e.g., the timestamp of a tweet). Note that we track
the propagation of memes in generic Web communities (e.g.,
Twitter) using a seed of memes obtained by clustering im-
ages from other (fringe) Web communities. More specifically,
our seeds will be memes generated on three fringe Web com-
munities (/pol/, The Donald subreddit, Gab); nonetheless, our
methodology can be applied to any community.
Analysis and Influence Estimation (Step 7). We analyze all
relevant clusters and the occurrences of memes, aiming to
assess: 1) their popularity and diversity in each community;
2) their temporal evolution; and 3) how communities influence
each other with respect to meme dissemination.
2.3 Distance Metric
To better understand the interplay and connections between
the clusters, we introduce a custom distance metric, which re-
lies on both the visual peculiarities of the images (via pHash)
and data available from annotation sites. The distance metric
supports one of two modes: 1) one for when both clusters are
annotated (full-mode), and 2) another for when one or none of
the clusters is annotated (partial-mode).
Definition. Let c be a cluster of images and F a set of fea-
tures extracted from the clusters. The custom distance metric
between cluster ci and cj is defined as:
wf × rf (ci, cj)
(1)
distance(ci, cj) = 1 −(cid:88)
f∈F
where rf (ci, cj) denotes the similarity between the features
3
Figure 2: High-level overview of our processing pipeline.
age. Thus, visually similar images have minor differences in
their vectors, hence allowing to search for and detect visu-
ally similar images. For example, the string representation
of the pHashes obtained from the images in cluster N (see
Figure 1) are 55352b0b8d8b5b53, 55952b0bb58b5353, and
55952b2b9da58a53, respectively. The algorithm is also robust
against changes in the images, e.g., signal processing opera-
tions and direct manipulation [87], and effectively reduces the
dimensionality of the raw images.
Clustering via pairwise distance calculation (Steps 2-3).
Next, we cluster images from one or more Web Communities
using the pHash values. We perform a pairwise comparison of
all the pHashes using Hamming distance (Step 2). To support
large numbers of images, we implement a highly paralleliz-
able system on top of TensorFlow [3], which uses multiple
GPUs to enhance performance. Images are clustered using a
density-based algorithm (Step 3). Our current implementation
uses DBSCAN [15], mainly because it can discover clusters of
arbitrary shape and performs well over large, noisy datasets.
Nonetheless, our architecture can be easily tweaked to support
any clustering algorithm and distance metric.
We also perform an analysis of the clustering performance
and the rationale for selecting the clustering threshold. We re-
fer to Appendix A for more details.
Screenshots Removal (Step 4). Meme annotation sites like
KYM often include, in their image galleries, screenshots of so-
cial network posts that are not variants of a meme but just com-
ments about it. Hence, we discard social-network screenshots
from the annotation sites data sources using a deep learning
classifier. We refer to Appendix C for details about the model
and the training dataset.
Cluster Annotation (Steps 5). Clustering annotation uses the
medoid of each cluster, i.e., the element with the minimum
square average distance from all images in the cluster. In other
words, the medoid is the image that best represents the clus-
ter. The clusters' medoids are compared with all images from
meme annotation sites, by calculating the Hamming distance
between each pair of pHash vectors. We consider that an im-
3. Clustering 1. pHash Extraction2. pHash-based PairwiseDistance CalculationpHashes of some or all Web communities' imagesClusters of images5. Cluster Annotation Pairwise Comparisons of pHashesannotated images 6. Association ofImages to ClustersAnnotated ClusterspHashes of annotated images pHashes (all Web Communities) 7. Analysis andInfluence EstimationOccurrences of Memes in all Web Communities 4. ScreenshotClassifierannotated images pHashes of non-screenshot annotated images Know Your MemeGenericAnnotationSitesMeme Annotation SitesGeneric WebCommunities4chanTwitterRedditGabWeb Communities posting Memesimagesmj, for ci and cj, respectively). Specifically, for each cate-
gory, we calculate the Jaccard index between the annotations
of both medoids, for memes, cultures, and people, thus acquir-
ing rmeme, rculture, rpeople, respectively.
Modes. Our distance metric measures how similar two clusters
are. If both clusters are annotated, we operate in "full-mode,"
and in "partial-mode" otherwise. For each mode, we use dif-
ferent weights for the features in Eq. 1, which we set empiri-
cally as we lack the ground-truth data needed to automate the
computation of the optimal set of thresholds.
Full-mode. In full-mode, we set weights as follows. 1) The
features from the perceptual and meme categories should have
higher relevance than people and culture, as they are intrin-
sically related to the definition of meme (see Section 2.1).
The last two are non-discriminant features, yet are informative
and should contribute to the metric. Also, 2) rmeme should
not outweigh rperceptual because of the relevance that visual
similarities have on the different variants of a meme. Like-
wise, rperceptual should not dominate over rmeme because
of the branching nature of the memes. Thus, we want these
two categories to play an equally important weight. There-
fore, we choose wperceptual=0.4, wmeme=0.4, wpeople=0.1,
wculture=0.1.
This means that when two clusters belong to the same meme
and their medoids are perceptually similar, the distance be-
tween the clusters will be small. In fact, it will be at most
0.2 = 1 − (0.4 + 0.4) if people and culture do not match,
and 0.0 if they also match. Note that our metric also assigns
small distance values for the following two cases: 1) when two
clusters are part of the same meme variant, and 2) when two
clusters use the same image for different memes.
Partial-mode. In this mode, we associate unannotated images
with any of the known clusters. This is a critical component of
our analysis (Step 6), allowing us to study images from generic
Web communities where annotations are unavailable. In this
case, we rely entirely on the perceptual features. We once again
use Eq. 1, but simply set all weights to 0, except for wperceptual
(which is set to 1). That is, we compare the image we want
to test with the medoid of the cluster and we apply Eq. 2 as
described above.
3 Datasets
We now present the datasets used in our measurements.
3.1 Web Communities
As mentioned earlier, our data sources are Web communities
that post memes and meme annotation sites. For the former, we
focus on four communities: Twitter, Reddit, Gab, and 4chan
(more precisely, 4chan's Politically Incorrect board, /pol/).
This provides a mix of mainstream social networks (Twitter
and Reddit) as well as fringe communities that are often asso-
ciated with the alt-right and have an impact on the information
ecosystem (Gab and /pol/) [86].
There are several other platforms playing important roles
in spreading memes, however, many are "closed" (e.g., Face-
book) or do not involve memes based on static images (e.g.,
Figure 3: Different values of rperceptual (y-axis) for all possible in-
puts of d (x-axis) with respect to the smoother τ.
represents the relevance of each feature. Note that(cid:80)
of type f ∈ F of cluster ci and cj, and wf is a weight that
f wf = 1
and rf (ci, cj) = {x ∈ R 0 ≤ x ≤ 1}. Thus, distance(ci, cj)
is a number between 0 and 1.
Features. We consider four different features for rf∈F, specif-
ically, F = {perceptual, meme, people, culture}; see below.
rperceptual: this feature is the similarity between two clusters
from a perceptual viewpoint. Let h be a pHash vector for an
image m in cluster c, where m is the medoid of the cluster,
and dij the Hamming distance between vectors hi and hj (see
Step 5 in Section 2.2). We compute dij from ci and cj as fol-
lows. First, we obtain obtain the medoid mi from cluster ci.
Subsequently, we obtain hi=pHash(mi). Finally, we compute
dij=Hamming(hi, hj). We simplify notation and use d instead
of dij to denote the distance between two medoid images and
refer to this distance as the Hamming score.
We define the perceptual similarity between two clusters as
an exponential decay function over the Hamming score d:
rperceptual(d) = 1 −
d
τ × emax/τ
(2)
where max represents the maximum pHash distance between
two images and τ is a constant parameter, or smoother, that
controls how fast the exponential function decays for all val-
ues of d (recall that {d ∈ R 0 ≤ d ≤ max}). Note
that max is bound to the precision given by the pHash al-
gorithm. Recall that each pHash has a size of d=64, hence
max=64. Intuitively, when τ << 64, rperceptual is a high
value only with perceptually indistinguishable images, e.g., for
τ =1, two images with d=0 have a similarity rperceptual=1.0.
With the same τ, the similarity drops to 0.4 when d=1. By
contrast, when τ is close to 64, rperceptual decays almost
linearly. For example, for τ =64, rperceptual(d=0)=1.0 and
rperceptual(d=1)=0.98. Figure 3 shows how rperceptual per-
forms for different values of τ. As mentioned above, we ob-
serve that pairs of images with scores between d=0 and d=8
are usually part of the same variant (see Step 5 in Section 2.2).
In our implementation, we set τ =25 as rperceptual returns high
values up to d=8, and rapidly decays thereafter.
rmeme, rculture, and rpeople: the annotation process (Step 5)
provides contextualized information about the cluster medoid,
including the name (i.e., the main identifier) given to a meme,
the associated culture (i.e., high-level group of meme), and
people that are included in a meme. Note that we use all the
annotations for each category and not only the representative
one (see Step 5). Therefore, we model a different similarity
for each of the these categories, by looking at the overlap of
all the annotations among the medoids of both clusters (mi,
4
020406000.51τ = 1τ = 25τ = 64Platform
Twitter
Reddit
/pol/
Gab
KYM
#Posts #Posts with
Images
#Images
#Unique
pHashes
1,469,582,378 242,723,732 114,459,736 74,234,065
40,523,275 30,441,325
1,081,701,536
3,626,184
4,325,648
48,725,043
193,783
235,222
12,395,575
15,584
706,940
597,060
62,321,628
13,190,390
955,440
15,584
Table 1: Overview of our datasets.
YouTube, Giphy). In future work, we plan to extend our mea-
surements to communities like Instagram and Tumblr, as well
as to GIF and video memes. Nonetheless, we believe our data
sources already allow us to elicit comprehensive insights into
the meme ecosystem.
Table 1 reports the number of posts and images processed
for each community. Note that the number of images is lower
than the number of posts with images because of duplicate im-
age URLs and because some images get deleted. Next, we dis-
cuss each dataset.
Twitter. Twitter is a mainstream microblogging platform, al-
lowing users to broadcast 280-character messages (tweets) to
their followers. Our Twitter dataset is based on tweets made
available via the 1% Streaming API, between July 1, 2016 and
July 31, 2017. In total, we parse 1.4B tweets: 242M of them
have at least one image. We extract all the images, ultimately
collecting 114M images yielding 74M unique pHashes.
Reddit. Reddit is a news aggregator: users create submissions
by posting a URL and others can reply in a structured way. It is
divided into multiple sub-communities called subreddits, each
with its own topic and moderation policy. Content popularity
and ranking are determined via a voting system based on the
up- and down-votes that users cast. We gather images from
Reddit using publicly available data from Pushshift [68]. We
parse all submissions and comments2 between July 1, 2016
and July, 31 2017, and extract 62M posts that contain at least
one image. We then download 40M images producing 30M
unique pHashes.
4chan. 4chan is an anonymous image board; users create new
threads by posting an image with some text, which others can
reply to. It lacks many of the traditional social networking fea-
tures like sharing or liking content, but has two characteristic
features: anonymity and ephemerality. By default, user iden-
tities are concealed and messages by the same users are not
linkable across threads, and all threads are deleted after one
week. Overall, 4chan is known for its extremely lax moder-
ation and the high degree of hate and racism, especially on
boards like /pol/ [22]. We obtain all threads posted on /pol/, be-
tween July 1, 2016 and July 31, 2017, using the same method-
ology of [22]. Since all threads (and images) are removed after
a week, we use a public archive service called 4plebs [2] to
collect 4.3M images, thus yielding 3.6M unique pHashes.
Gab. Gab is a social network launched in August 2016 as
a "champion" of free speech, providing "shelter" to users
banned from other platforms. It combines social networking
2See [70] for metadata associated with submissions and comments.
5
features from Twitter (broadcast of 300-character messages)
and Reddit (content is ranked according to up- and down-
votes). It also has extremely lax moderation as it allows ev-
erything except illegal pornography, terrorist propaganda, and
doxing [77]. Overall, Gab attracts alt-right users, conspiracy
theorists, and trolls, and high volumes of hate speech [85]. We
collect 12M posts, posted on Gab between August 10, 2016
and July 31, 2017, and 955K posts have at least one image, us-
ing the same methodology as in [85]. Out of these, 235K im-
ages are unique, producing 193K unique pHashes. Note that
our Gab dataset starts one month later than the other ones,
since Gab was launched in August 2016.
Ethics. Although we only collect publicly available data, our
study has been approved by the designated ethics officer at
UCL. Since 4chan content is typically posted with expecta-
tions of anonymity, we note that we have followed standard
ethical guidelines [71] and encrypted data at rest, while mak-
ing no attempt to de-anonymize users.
3.2 Meme Annotation Site
Know Your Meme (KYM). We choose KYM as the source
for meme annotation as it offers a comprehensive database of
memes. KYM is a sort of encyclopedia of Internet memes: for
each meme, it provides information such as its origin (i.e., the
platform on which it was first observed), the year it started,
as well as descriptions and examples. In addition, for each
entry, KYM provides a set of keywords, called tags, that de-
scribe the entry. Also, KYM provides a variety of higher-level
categories that group meme entries; namely, cultures, subcul-
tures, people, events, and sites. "Cultures" and "subcultures"
entries refer to a wide variety of topics ranging from video
games to various general categories. For example, the Rage
Comics subculture [47] is a higher level category associated
with memes related to comics like Rage Guy [48] or LOL
Guy [38], while the Alt-right culture [24] gathers entries from
a loosely defined segment of the right-wing community. The
rest of the categories refer to specific individuals (e.g., Donald
Trump [31]), specific events (e.g.,#CNNBlackmail [29]), and
sites (e.g., /pol/ [46]), respectively. It is also worth noting that
KYM moderates all entries, hence entries that are wrong or
incomplete are marked as so by the site.
As of May 2018, the site has 18.3K entries, specifically, 14K
memes, 1.3K subcultures, 1.2K people, 1.3K events, and 427
websites [39]. We crawl KYM between October and Decem-
ber 2017, acquiring data for 15.6K entries; for each entry, we
also download all the images related to it by crawling all the
pages of the image gallery. In total, we collect 707K images
corresponding to 597K unique pHashes. Note that we obtain
15.6K out of 18.3K entries, as we crawled the site several
months before May 2018.
Getting to know KYM. We also perform a general character-
ization of KYM. First, we look at the distribution of entries
across categories: as shown in Figure 4(a), as expected, the
majority (57%) are memes, followed by subcultures (30%),
cultures (3%), websites (2%), and people (2%).
Next, we measure the number of images per entry: as shown
in Figure 4(b), this varies considerably (note log-scale on x-
(a) Categories
(b) Images
(c) Origins
Figure 4: Basic statistics of the KYM dataset.
axis). KYM entries have as few as 1 and as many as 8K images,
with an average of 45 and a median of 9 images. Larger values
may be related to the meme's popularity, but also to the "di-
versity" of image variants it generates. Upon manual inspec-
tion, we find that the presence of a large number of images for
the same meme happens either when images are visually very
similar to each other (e.g., Smug Frog images within the two
clusters in Figure 1), or if there are actually remarkably differ-
ent variants of the same meme (e.g., images in 'cluster 1' vs.
images in 'cluster N' in the same figure). We also note that the
distribution varies according to the category: e.g., higher-level
concepts like cultures include more images than more specific
entries like memes.
We then analyze the origin of each entry: see Figure 4(c).
Note that a large portion of the memes (28%) have an un-
known origin, while YouTube, 4chan, and Twitter are the most
popular platforms with, respectively, 21%, 12%, and 11%, fol-
lowed by Tumblr and Reddit with 8% and 7%. This confirms
our intuition that 4chan, Twitter, and Reddit, which are among
our data sources, play an important role in the generation and
dissemination of memes. As mentioned, we do not currently
study video memes originating from YouTube, due to the in-
herent complexity of video-processing tasks as well as scala-
bility issues. However, a large portion of YouTube memes ac-
tually end up being morphed into image-based memes (see,
e.g., the Overly Attached Girlfriend meme [44]).
3.3 Running the pipeline on our datasets
For all four Web communities (Twitter, Reddit, /pol/, and
Gab), we perform Step 1 of the pipeline (Figure 2), using the
ImageHash library.3After computing the pHashes, we delete
the images (i.e., we only keep the associated URL and pHash)
due to space limitations of our infrastructure. We then perform
Steps 2-3 (i.e., pairwise comparisons between all images and
clustering), for all the images from /pol/, The Donald subred-
dit, and Gab, as we treat them as fringe Web communities.
Note that, we exclude mainstream communities like the rest
of Reddit and Twitter as our main goal is to obtain clusters of
memes from fringe Web communities and later characterize
all communities by means of the clusters. Next, we go through
Steps 4-5 using all the images obtained from meme annotation
websites (specifically, Know Your Meme, see Section 3.2) and
the medoid of each cluster from /pol/, The Donald, and Gab.
3https://github.com/JohannesBuchner/imagehash
Platform
#Images Noise
#Clusters
/pol/
T D
Gab
4,325,648
1,234,940
235,222
63%
64%
69%
38,851
21,917
3,083
#Clusters with
KYM tags (%)
9,265 (24%)
2,902 (13%)
447 (15%)
Table 2: Statistics obtained from clustering images from /pol/,
The Donald, and Gab.
Finally, Steps 6-7 use all the pHashes obtained from Twitter,
Reddit (all subreddits), /pol/, and Gab to find posts with images
matching the annotated clusters. This is an integral part of our
process as it allows to characterize and study mainstream Web
communities not used for clustering (i.e., Twitter and Reddit).
4 Analysis
In this section, we present a cluster-based measurement of
memes and an analysis of a few Web communities from the
"perspective" of memes. We measure the prevalence of memes
across the clusters obtained from fringe communities: /pol/,
The Donald subreddit (T D), and Gab. We also use the dis-
tance metric introduced in Eq. 1 to perform a cross-community
analysis, then, we group clusters into broad, but related, cat-
egories to gain a macro-perspective understanding of larger
communities, including Reddit and Twitter.
4.1 Cluster-based Analysis
We start by analyzing the 12.6K annotated clusters consist-
ing of 268K images from /pol/, The Donald, and Gab (Step 5
in Figure 2). We do so to understand the diversity of memes in
each Web community, as well as the interplay between vari-
ants of memes. We then evaluate how clusters can be grouped
into higher structures using hierarchical clustering and graph
visualization techniques.
4.1.1 Clusters
Statistics. In Table 2, we report some basic statistics of the
clusters obtained for each Web community. A relatively high
percentage of images (63% -- 69%) are not clustered, i.e., are la-
beled as noise. While in DBSCAN "noise" is just an instance
that does not fit in any cluster (more specifically, there are less
than 5 images with perceptual distance ≤ 8 from that particu-
lar instance), we note that this likely happens as these images
are not memes, but rather "one-off images." For example, on
6
MemesSubculturesEventsCulturesSitesPeople01020304050% of KYM entries100101102103104# of images per KYM entry0.00.20.40.60.81.0CDFAllMemesSubculturesCulturesSitesPeopleEventsUnknownYoutube4chanTwitterTumblrRedditFacebookNiconicoYtmndInstagram0510152025% of KYM entries(a)
(b)
Figure 5: CDF of KYM entries per cluster (a) and clusters per KYM entry (b).
/pol/ there is a large number of pictures of random people taken
from various social media platforms.
Overall, we have 2.1M images in 63.9K clusters: 38K clus-
ters for /pol/, 21K for The Donald, and 3K for Gab. 12.6K of
these clusters are successfully annotated using the KYM data:
9.2K from /pol/ (142K images), 2.9K from The Donald (121K
images), and 447 from Gab (4.5K images). Examples of clus-
ters are reported in Appendix D. As for the un-annotated clus-
ters, manual inspection confirms that many include miscella-
neous images unrelated to memes, e.g., similar screenshots of
social networks posts (recall that we only filter out screenshots
from the KYM image galleries), images captured from video
games, etc.
KYM entries per cluster. Each cluster may receive multiple
annotations, depending on the KYM entries that have at least
one image matching that cluster's medoid. As shown in Fig-
ure 5(a), the majority of the annotated clusters (74% for /pol/,
70% for The Donald, and 58% for Gab) only have a single
matching KYM entry. However, a few clusters have a large
number of matching entries, e.g., the one matching the Con-
spiracy Keanu meme [30] is annotated by 126 KYM entries
(primarily, other memes that add text in an image associated
with that meme). This highlights that memes do overlap and
that some are highly influenced by other ones.
Clusters per KYM entry. We also look at the number of clus-
ters annotated by the same KYM entry. Figure 5(b) plots the
CDF of the number of clusters per entry. About 40% only an-
notate a single /pol/ cluster, while 34% and 20% of the entries
annotate a single The Donald and a single Gab cluster, respec-
tively. We also find that a small number of entries are asso-
ciated to a large number of clusters: for example, the Happy
Merchant meme [36] annotates 124 different clusters on /pol/.
This highlights the diverse nature of memes, i.e., memes are
mixed and matched, not unlike the way that genetic traits are
combined in biological reproduction.
Top KYM entries. Because the majority of clusters match
only one or two KYM entries (Figure 5(a)), we simplify things
by giving all clusters a representative annotation based on the
most prevalent annotation given to the medoid, and, in the
case of ties the average distance between all matches (see Sec-
tion 2.2). Thus, in the rest of the paper, we report our findings
based on the representative annotation for each cluster.
In Table 3, we report the top 20 KYM entries with respect
to the number of clusters they annotate. These cover 17%,
23%, and 27% of the clusters in /pol/, The Donald, and Gab,
respectively, hence covering a relatively good sample of our
datasets. Donald Trump [31], Smug Frog [52], and Pepe the
Frog [45] appear in the top 20 for all three communities, while
the Happy Merchant [36] only in /pol/ and Gab. In particu-
lar, Donald Trump annotates the most clusters (207 in /pol/,
177 in The Donald, and 25 in Gab). In fact, politics-related
entries appear several times in the Table, e.g., Make America
Great Again [40] as well as political personalities like Bernie
Sanders, Barack Obama, Vladimir Putin, and Hillary Clinton.
When comparing the different communities, we observe the
most prevalent categories are memes (6 to 14 entries in each
community) and people (2-5). Moreover, in /pol/, the 2nd most
popular entry, related to people, is Adolf Hilter, which supports
previous reports of the community's sympathetic views toward
Nazi ideology [22]. Overall, there are several memes with
hateful or disturbing content (e.g., holocaust). This happens
to a lesser extent in The Donald and Gab: the most popular
people after Donald Trump are contemporary politicians, i.e.,
Bernie Sanders, Vladimir Putin, Barack Obama, and Hillary
Clinton.
Finally, image posting behavior in fringe Web communi-
ties is greatly influenced by real-world events. For instance,
in /pol/, we find the #TrumpAnime controversy event [55],
where a political individual (Rick Wilson) offended the alt-
right community, Donald Trump supporters, and anime fans
(an oddly intersecting set of interests of /pol/ users). Simi-
larly, on The Donald and Gab, we find the #Cnnblackmail [29]
event, referring to the (alleged) blackmail of the Reddit user
that created the infamous video of Donald Trump wrestling
the CNN.
4.1.2 Memes' Branching Nature
Next, we study how memes evolve by looking at variants
across different clusters. Intuitively, clusters that look alike
and/or are part of the same meme are grouped together under
the same branch of an evolutionary tree. We use the custom
distance metric introduced in Section 2.3, aiming to infer the
phylogenetic relationship between variants of memes. Since
there are 12.6K annotated clusters, we only report on a subset
of variants. In particular, we focus on "frog" memes (e.g., Pepe
7
100101102# of KYM entries per cluster0.00.20.40.60.81.0CDF/pol/T_DGab0100101102# of clusters per KYM entry0.00.20.40.60.81.0CDF/pol/T_DGab/pol/
T D
Gab
Category Clusters (%) Entry
Entry
Category Clusters (%)
People
Donald Trump
People
25 (5.6%)
177 (6.1%) Donald Trump
Memes
Happy Merchant
10 (2.2%)
Memes
78 (2.7%) Happy Merchant
Smug Frog
Memes
7 (1.5%)
Memes
63 (2.1%) Demotivational Posters
Computer Reaction Faces Memes
6 (1.3%)
Memes
61 (2.1%) Pepe the Frog
Feels Bad Man/ Sad Frog Memes
6 (1.3%)
Events
50 (1.7%) #Cnnblackmail
Events
6 (1.3%)
31 (1.0%) 2016 US election
I Know that Feel Bro
Memes
Memes
Tony Kornheiser's Why
6 (1.3%)
Sites
27 (0.9%) Know Your Meme
Bait/This is Bait
Memes
6 (1.3%)
Sites
24 (0.8%) Tumblr
#TrumpAnime/Rick Wilson Events
5 (1.1%)
Cultures
24 (0.8%) Feminism
5 (1.1%)
People
20 (0.7%) Barack Obama
Reaction Images
Memes
Make America Great Again Memes
5 (1.1%)
Memes
18 (0.6%) Smug Frog
Counter Signal Memes
Memes
Subcultures
5 (1.1%)
18 (0.6%) rwby
5 (1.1%)
People
16 (0.5%) Kim Jong Un
Memes
Pepe the Frog
Spongebob Squarepants
Subcultures
5 (1.1%)
Memes
15 (0.5%) Murica
Doom Paul its Happening Memes
5 (1.1%)
15 (0.5%) UA Passenger Removal
Events
People
Adolf Hitler
4 (0.9%)
15 (0.5%) Make America Great Again Memes
pol
Sites
15 (0.5%) Bill Nye
People
4 (0.9%)
Memes
Dubs Guy/Check'em
4 (0.9%)
Cultures
15 (0.5%) Trolling
4 (0.9%)
Sites
15 (0.5%) 4chan
Memes
Smug Anime Face
Warhammer 40000
Subcultures
3 (0.7%)
15 (0.5%) Furries
Cultures
Total
121 (27.1%)
Table 3: Top 20 KYM entries appearing in the clusters of /pol/, The Donald, and Gab. We report the number of clusters and their respective
percentage (per community). Each item contains a hyperlink to the corresponding entry on the KYM website.
Category Clusters (%) Entry
People
207 (2.2%) Donald Trump
Memes
124 (1.3%) Smug Frog
114 (1.2%) Pepe the Frog
Memes
112 (1.2%) Feels Bad Man/ Sad Frog Memes
94 (1.0%) Make America Great Again Memes
90 (1.0%) Bernie Sanders
People
Events
89 (1.0%) 2016 US Election
Memes
84 (0.9%) Counter Signal Memes
Events
76 (0.8%) #Cnnblackmail
Sites
73 (0.8%) Know Your Meme
Memes
72 (0.8%) Angry Pepe
72 (0.8%) Demotivational Posters
Memes
Sites
65 (0.7%) 4chan
Sites
61 (0.7%) Tumblr
Events
57 (0.6%) Gamergate
Memes
56 (0.6%) Colbertposting
53 (0.6%) Donald Trump's Wall
Memes
People
53 (0.6%) Vladimir Putin
People
51 (0.6%) Barack Obama
51 (0.6%) Hillary Clinton
People
1,638 (17.7%)
695 (23.9%)
apustaja
sad-frog
savepepe
pepe
smug-frog-a
smug-frog-b anti-meme
Figure 6: Inter-cluster distance between all clusters with frog memes. Clusters are labeled with the origin (4 for 4chan, D for The Donald, and
G for Gab) and the meme name. To ease readability, we do not display all labels, abbreviate meme names, and only show an excerpt of all
relationships.
the Frog [45]); as discussed later in Section 4.2, this is one of
the most popular memes in our datasets.
The dendrogram in Figure 6 shows the hierarchical rela-
tionship between groups of clusters of memes related to frogs.
Overall, there are 525 clusters of frogs, belonging to 23 differ-
ent memes. These clusters can be grouped into four large cat-
egories, dominated by Apu Apustaja [26], Feels Bad Man/Sad
Frog [34], Pepe the Frog [45], and Smug Frog [52]. The dif-
ferent memes express different ideas or messages: e.g., Apu
Apustaja depicts a simple-minded non-native speaker using
broken English, while the Feels Bad Man/Sad Frog (ironically)
expresses dismay at a given situation, often accompanied with
text like "You will never do/be/have X." The dendrogram also
shows a variant of Smug Frog (smug-frog-b) related to a vari-
ant of the Russian Anti Meme Law [51] (anti-meme) as well
as relationships between clusters from Pepe the Frog and Isis
meme [37], and between Smug Frog and Brexit-related clus-
ters [56], as shown in Appendix E.
The distance metric quantifies the similarity of any two vari-
ants of different memes; however, recall that two clusters can
be close to each other even when the medoids are perceptu-
ally different (see Section 2.3), as in the case of Smug Frog
variants in the smug-frog-a and smug-frog-b clusters (top of
Figure 6). Although, due to space constraints, this analysis is
limited to a single "family" of memes, our distance metric can
actually provide useful insights regarding the phylogenetic re-
lationships of any clusters. In fact, more extensive analysis of
these relationships (through our pipeline) can facilitate the un-
derstanding of the diffusion of ideas and information across the
Web, and provide a rigorous technique for large-scale analysis
of Internet culture.
4.1.3 Meme Visualization
We also use the custom distance metric (see Eq. 1) to vi-
sualize the clusters with annotations. We build a graph G =
(V , E), where V are the medoids of annotated clusters and E
8
4@kermitD@jeffreyfrog4@apustaja4@warhammerD@apustaja4@apustaja4@apustajaD@apustajaD@apustaja4@apustaja4@apustajaD@sad-frogD@sad-frogD@pepe4@pepeD@sad-frogD@sad-frog4@sad-frog4@sad-frogD@sad-frogD@sad-frogD@sad-frogD@sad-frogD@sad-frog4@sad-frogD@sad-frogD@sad-frog4@sad-frog4@sad-frog4@sad-frogD@sad-frog4@sad-frog4@sad-frog4@sad-frogD@sad-frogD@sad-frogG@sad-frog4@pepe4@pepe4@pepe4@pepeD@pepeD@pepe4@pepe4@pepeD@pepeD@pepe4@pepe4@pepe4@pepeD@pepeG@pepe4@pepe4@pepeD@pepe4@pepeD@pepeD@smug-frogD@smug-frogD@smug-frogD@smug-frog4@smug-frogD@smug-frog4@smug-frog4@smug-frogD@smug-frog4@smug-frogD@smug-frog4@smug-frogD@smug-frogD@smug-frogD@smug-frog4@smug-frogD@smug-frog4@smug-frog4@smug-frog4@smug-frogD@smug-frog4@smug-frogD@anti-memeD@smug-frog4@smug-frog4@smug-frog4@smug-frog4@smug-frog4@smug-frogG@[email protected]Figure 7: Visualization of the obtained clusters from /pol/, The Donald, and Gab. Note that memes with red labels are annotated as racist,
while memes with green labels are annotated as politics (see Section 4.2.1 for the selection criteria).
the connections between medoids with distance under a thresh-
old κ. Figure 7 shows a snapshot of the graph for κ = 0.45,
chosen based on the frogs analysis above (see red horizontal
line in Figure 6). In particular, we select this threshold as the
majority of the clusters from the same meme (note coloration
in Figure 6) are hierarchically connected with a higher-level
cluster at a distance close to 0.45. To ease readability, we filter
out nodes and edges that have a sum of in- and out-degree less
than 10, which leaves 40% of the nodes and 92% of the edges.
Nodes are colored according to their KYM annotation. NB:
the graph is laid out using the OpenOrd algorithm [63] and the
distance between the components in it does not exactly match
the actual distance metric. We observe a large set of discon-
nected components, with each component containing nodes of
primarily one color. This indicates that our distance metric is
indeed capturing the peculiarities of different memes. Finally,
note that an interactive version of the full graph is publicly
available from [1].
4.2 Web Community-based Analysis
We now present a macro-perspective analysis of the Web
communities through the lens of memes. We assess the pres-
ence of different memes in each community, how popular they
are, and how they evolve. To this end, we examine the posts
from all four communities (Twitter, Reddit, /pol/, and Gab)
that contain images matching memes from fringe Web com-
munities (/pol/, The Donald, and Gab).
4.2.1 Meme Popularity
Memes. We start by analyzing clusters grouped by KYM
'meme' entries, looking at the number of posts for each meme
in /pol/, Reddit, Gab, and Twitter.
In Table 4, we report the top 20 memes for each Web com-
munity sorted by the number of posts. We observe that Pepe
the Frog [45] and its variants are among the most popular
memes for every platform. While this might be an artifact of
using fringe communities as a "seed" for the clustering, re-
call that the goal of this work is in fact to gain an understand-
ing of how fringe communities disseminate memes and influ-
ence mainstream ones. Thus, we leave to future work a broader
analysis of the wider meme ecosystem.
Sad Frog [34] is the most popular meme on /pol/ (4.9%),
the 3rd on Reddit (1.3%), the 10th on Gab (0.8%), and the
12th on Twitter (0.5%). We also find variations like Smug
Frog [52], Apu Apustaja [26], Pepe the Frog [45], and Angry
Pepe [25]. Considering that Pepe is treated as a hate symbol
by the Anti-Defamation League [58] and that is often used in
hateful or racist, this likely indicates that polarized commu-
nities like /pol/ and Gab do use memes to incite hateful con-
versation. This is also evident from the popularity of the anti-
semitic Happy Merchant meme [36], which depicts a "greedy"
and "manipulative" stereotypical caricature of a Jew (3.8% on
/pol/ and 1.1% on Gab).
By contrast, mainstream communities like Reddit and Twit-
9
Smug FrogBait this is BaitHappy MerchantDoom Paul ItsHappeningMake AmericaGreat AgainReaction ImagesApuApustajaComputer Reaction FacesSad FrogPepe the FrogCounter Signal MemesTony Kornheiser'sWhyMuricaCostanzaPolandballDubs/Check'emInto the Trashit goesBaneposting60's SpidermanI Know that Feel BroAngry PepeLaughing TomCruiseSpurdoSpardeDemotivationalPostersHe will not divide usColbertpostingAbsolutely DisgustingForty KeksWojak/Feels GuyFeels GoodSmug Anime FaceAutistic ScreechingDonald Trump'sWall/pol/
Reddit
Gab
Twitter
Entry
Entry
Entry
Posts (%)
454 (1.6%) Roll Safe
414 (1.5%) Evil Kermit
392 (1.4%) Arthur's Fist
391 (1.4%) Nut Button
378 (1.3%) Spongebob Mock
297 (1.1%) Reaction Images
274 (1.0%) Conceited Reaction
235 (0.9%) Expanding Brain
207 (0.8%) Demotivational Posters
206 (0.8%) Cash Me Ousside/Howbow Dah
Entry
Posts (%)
12,540 (2.2%) Jesusland (P)
7,626 (1.3%) Demotivational Posters
7,240 (1.3%) Smug Frog
7,147 (1.3%) Based Stickman (P)
5,032 (0.9%) Pepe the Frog
4,642 (0.8%) Happy Merchant (R)
4,523 (0.8%) Murica
4,491 (0.8%) And Its Gone
Posts (%)
Posts(%)
64,367 (4.9%) Manning Face
Feels Bad Man/Sad Frog
55,010 (5.9%)
63,290 (4.8%) That's the Joke
Smug Frog
50,642 (5.4%)
Happy Merchant (R)
49,608 (3.8%) Feels Bad Man/ Sad Frog
37,591 (4.0%)
29,756 (2.2%) Confession Bear
Apu Apustaja
13,598 (1,5%)
Pepe the Frog
25,197 (1.9%) This is Fine
11,136 (1,2%)
Make America Great Again (P) 21,229 (1.6%) Smug Frog
9,387 (1.0%)
Angry Pepe
9,106 (1.0%)
Bait this is Bait
8,701 (0.9%)
7,781 (0.8%)
I Know that Feel Bro
Cult of Kek
5,972 (0.6%)
Laughing Tom Cruise
5,375 (0.6%)
186 (0.6%) Feels Bad Man/ Sad Frog
4,991 (0.5%)
Awoo
Tony Kornheiser's Why
183 (0.6%) Math Lady/Confused Lady
4,722 (0.5%)
Picardia (P)
156 (0.5%) Computer Reaction Faces
4,720 (0.5%)
149 (0.5%) Clinton Trump Duet (P)
3,901 (0.4%)
Big Grin / Never Ever
Reaction Images
148 (0.5%) Kendrick Lamar Damn Album Cover 3,656 (0.4%)
Computer Reaction Faces
3,363 (0.3%)
144 (0.5%) What in tarnation
Wojak / Feels Guy
3,164 (0.3%)
140 (0.5%) Harambe the Gorilla
3,137 (0.3%)
131 (0.4%) I Know that Feel Bro
Absolutely Disgusting
Spurdo Sparde
3,094 (0.3%)
131 (0.4%) This is Fine
Total
249,047 (26.4%)
Table 4: Top 20 KYM entries for memes that we find our datasets. We report the number of posts for each meme as well as the percentage over
all the posts (per community) that contain images that match one of the annotated clusters. The (R) and (P) markers indicate whether a meme
is annotated as racist or politics-related, respectively (see Section 4.2.1 for the selection criteria).
20,485 (1.5%) Roll Safe
16,686 (1.2%) Rage Guy
14,490 (1.1%) Make America Great Again (P) 4,440 (0.8%) Make America Great Again (P)
14,428 (1.1%) Fake CCG Cards
14,312 (1.1%) Confused Nick Young
13,767 (1.0%) Daily Struggle
13,577 (1.0%) Expanding Brain
13,540 (1.0%) Demotivational Posters
12,893 (1.0%) Actual Advice Mallard
12,608 (0.9%) Reaction Images
12,247 (0.9%) Handsome Face
11,682 (0.9%) Absolutely Disgusting
11,436 (0.8%) Pepe the Frog
9,581 (0.7%) Pretending to be Retarded
4,438 (0.8%) Feels Bad Man/ Sad Frog
4,024 (0.7%) Trump's First Order of Business (P) 192 (0.7%) Salt Bae
4,015 (0.7%) Kekistan
3,757 (0.7%) Picardia (P)
3,419 (0.6%) Things with Faces (Pareidolia)
3,293 (0.6%) Serbia Strong/Remove Kebab
2,959 (0.5%) Riot Hipster
2,675 (0.5%) Colorized History
2,674 (0.5%) Most Interesting Man in World
2,672 (0.5%) Chuck Norris Facts
2,462 (0.4%) Roll Safe
445,179 (33.4%)
94,069 (16.7%)
4,808 (17.0%)
ter primarily share harmless/neutral memes, which are rarely
used in hateful contexts. Specifically, on Reddit the top memes
are Manning Face [41] (2.2%) and That's the Joke [53] (1.3%),
while on Twitter the top ones are Roll Safe [50] (5.9%) and
Evil Kermit [33] (5.4%).
Once again, we find that users (in all communities) post
memes to share politics-related information, possibly aiming
to enhance or penalize the public image of politicians (see Ap-
pendix E for an example of such memes). For instance, we find
Make America Great Again [40], a meme dedicated to Donald
Trump's US presidential campaign, among the top memes in
/pol/ (1.6%), in Reddit (0.8%), and Gab (0.8%). Similarly, in
Twitter, we find the Clinton Trump Duet meme [28] (0.4%), a
meme inspired by the 2nd US presidential debate.
People. We also analyze memes related to people (i.e., KYM
entries with the people category). Table 5 reports the top 15
KYM entries in this category. We observe that, in all Web
Communities, the most popular person portrayed in memes
is Donald Trump: he is depicted in 4.6% of /pol/ posts that
contain annotated images, while for Reddit, Gab, and Twitter
the percentages are 6.1%, 6.1%, and 1.3%, respectively. Other
popular personalities, in all platforms, include several politi-
cians. For instance, in /pol/, we find Mike Pence (0.3%), Jeb
Bush (0.3%), Vladimir Putin (0.2%), while, in Reddit, we find
Steve Bannon (0.6%), Chelsea Manning (0.6%), and Bernie
Sanders (0.3%), in Gab, Mitt Romney (1.7%) and Barack
Obama (0.4%), and, in Twitter, Barack Obama (0.6%), Kim
Jong Un (0.5%), and Chelsea Manning (0.4%). This highlights
the fact that users on these communities utilize memes to share
information and opinions about politicians, and possibly try to
either enhance or harm public opinion about them. Finally, we
note the presence of Adolf Hitler memes on all Web Com-
munities, i.e., /pol/ (0.6%), Reddit (0.3%), Gab (0.4%), and
Twitter (0.2%).
We further group memes into two high-level groups, racist
and politics-related. We use the tags that are available in our
KYM dataset, i.e., we assign a meme to the politics-related
group if it has the "politics," "2016 us presidential election,"
"presidential election," "trump," or "clinton" tags, and to the
racism-related one if the tags include "racism," "racist," or "an-
tisemitism," obtaining 117 racist memes (4.4% of all memes
that appear in our dataset) and 556 politics-related memes
(21.2% of all memes that appear on our dataset). In the rest of
this section, we use these groups to further study the memes,
and later in Section 5 to estimate influence.
4.2.2 Temporal Analysis
Next, we study the temporal aspects of posts that contain
memes from /pol/, Reddit, Twitter, and Gab. In Figure 8, we
plot the percentage of posts per day that include memes. For all
memes (Figure 8(a)), we observe that /pol/ and Reddit follow
a steady posting behavior, with a peak in activity around the
2016 US elections. We also find that memes are increasingly
more used on Gab (see, e.g., 2016 vs 2017).
As shown in Figure 8(b), both /pol/ and Gab include a sub-
stantially higher number of posts with racist memes, used over
time with a difference in behavior: while /pol/ users share
them in a very steady and constant way, Gab exhibits a bursty
behavior. A possible explanation is that the former is inher-
ently more racist, with the latter primarily reacting to particu-
lar world events. As for political memes (Figure 8(c)), we find
a lot of activity overall on Twitter, Reddit, and /pol/, but with
different spikes in time. On Reddit and /pol/, the peaks coin-
cide with the 2016 US elections. On Twitter, we note a peak
that coincides with the 2nd US Presidential Debate on October
2016. For Gab, there is again an increase in posts with political
memes after January 2017.
4.2.3 Score Analysis
As discussed in Section 3.1, Reddit and Gab incorporate a
voting system that determines the popularity of content within
the Web community and essentially captures the appreciation
of other users towards the shared content. To study how users
10
/pol/
Reddit
Gab
Twitter
Entry
Posts (%)
Entry
Posts (%)
Entry
Donald Trump
Adolf Hitler
Mike Pence
Jeb Bush
Vladimir Putin
Alex Jones
Ron Paul
Bernie Sanders
Massimo D'alema
Mitt Romney
Chelsea Manning
Hillary Clinton
A. Wyatt Mann
Ben Carson
Filthy Frank
60,611 (4.6%) Donald Trump
Steve Bannon
8,759 (0.6%)
4,738 (0.3%)
Stephen Colbert
4,217 (0.3%) Chelsea Manning
3,218 (0.2%) Ben Carson
3,206 (0.2%) Bernie Sanders
3,116 (0.2%) Ajit Pai
3,022 (0.2%) Barack Obama
2,725 (0.2%) Gabe Newell
2,468 (0.2%) Bill Nye
2,403 (0.2%) Hillary Clinton
2,378 (0.2%) Death Grips
2,110 (0.2%) Adolf Hitler
1,780 (0.1%) Mitt Romney
1,598 (0.1%) Eminem
Isis Daesh
34,533 (6.1%) Donald Trump
3,733 (0.6%) Mitt Romney
3,121 (0.6%) Bill Nye
2,261 (0.4%) Adolf Hitler
2,148 (0.4%) Barack Obama
1,757 (0.3%)
1,658 (0.3%) Death Grips
1,628 (0.3%) Eminem
1,518 (0.3%) Kim Jong Un
1,478 (0.3%) Ajit Pai
1,468 (0.3%)
1,463 (0.3%) Bernie Sanders
1,449 (0.3%) Alex Jones
1,294 (0.2%) Hillary Clinton
1,274 (0.2%) Anita Sarkeesian
Pewdiepie
Entry
Posts (%)
1,665 (6.1%) Donald Trump
455 (1.7%) Barack Obama
370 (1.3%) Chelsea Manning
106 (0.4%) Kim Jong Un
104 (0.4%) Anita Sarkeesian
92 (0.3%) Bernie Sanders
91 (0.3%) Vladimir Putin
89 (0.3%) Billy Mays
87 (0.3%) Adolf Hitler
76 (0.3%) Kanye West
73 (0.3%) Bill Nye
71 (0.3%) Mitt Romney
70 (0.3%)
Filthy Frank
59 (0.2%) Hillary Clinton
54 (0.2%) Ajit Pai
Posts(%)
10,208 (1.3%)
5,187 (0.6%)
4,173 (0.5%)
3,271 (0.4%)
2,764 (0.3%)
2,277 (0.3%)
1,733 (0.2%)
1,454 (0.2%)
1,304 (0.2%)
1,261 (0.2%)
968 (0.2%)
923 (0.1%)
777 (0.1%)
758 (0.1%)
715 (0.1%)
Table 5: Top 15 KYM entries about people that we find in each of our dataset. We report the number of posts and the percentage over all the
posts (per community) that match a cluster with KYM annotations.
(a) all memes
(b) racist
(c) politics
Figure 8: Percentage of posts per day in our dataset for all, racist, and politics-related memes.
(a) Reddit
(b) Gab
Figure 9: CDF of scores of posts that contain memes on Reddit and Gab.
react to racist and politics-related memes, we plot the CDF of
the posts' scores that contain such memes in Figure 9.
For Reddit (Figure 9(a)), we find that posts that contain
politics-related memes are rated highly (mean score of 224.7
and a median of 5) than posts that contain non-politics memes
(mean 124.9, median 4). On the contrary, posts that contain
racist memes are rated lower (average score of 94.8 and a me-
dian of 3) than other non-racist memes (average 141.6 and
median 4). On Gab (Figure 9(b)), posts that contain politics-
related memes have a similar score as non-political memes
(mean 87.3 vs 82.4). However, this does not apply for racist
and non-racist memes, as non-racist memes have over 2 times
higher scores than racist memes (means 84.7 vs 35.5).
Overall, this suggests that posts that contain politics-related
memes receive high scores by Reddit and Gab users, while for
racist memes this applies only on Reddit.
4.2.4 Sub-Communities
Among all the Web communities that we study, only Red-
dit is divided into multiple sub-communities. We now study
which sub-communities share memes with a focus on racist
and politics-related content. In Table 6, we report the top ten
subreddits in terms of the percentage over all posts that con-
tain memes in Reddit for: 1) all memes; 2) racist ones; and
3) politics-related memes.
three groups,
is
The Donald with 12.5%, 9.3%, and 26.4%, respectively. Inter-
estingly, AdviceAnimals, a general-purpose meme subreddit,
is among the top-ten sub-communities also for racist and po-
litical memes, highlighting their infiltration in otherwise non-
hateful communities.
the most popular subreddit
For all
Other popular subreddits for racist memes include conspir-
acy (2.0%), me irl (1.8%), and funny (1.4%) subreddits. For
11
07/1609/1611/1601/1703/1705/1707/170.00.51.01.52.0% of posts/pol/RedditTwitterGab07/1609/1611/1601/1703/1705/1707/170.0000.0250.0500.0750.1000.1250.1500.175% of posts/pol/RedditTwitterGab07/1609/1611/1601/1703/1705/1707/170.00.10.20.30.40.50.60.7% of posts/pol/RedditTwitterGab100101102103104105Score0.00.20.40.60.81.0CDFPoliticsNon-PoliticsRacismNon-RacismAll memes100101102103Score0.00.20.40.60.81.0CDFPoliticsNon-PoliticsRacismNon-RacismAll memesAll Memes
Racism-Related Memes
Politics-Related Memes
Subreddit
The Donald
AdviceAnimals
me irl
politics
funny
dankmemes
EnoughTrumpSpam
pics
AskReddit
HOTandTrending
conspiracy
Posts (%)
Subreddit
82,698 (12.5%) The Donald
35,475 (5.3%) AdviceAnimals
15,366 (2.3%)
8,875 (1,3%) me irl
8,508 (1.3%)
funny
7,744 (1,1%) CringeAnarchy
6,973 (1.1%) EDH
5,945 (0.9%) magicTCG
dankmemes
5,482 (0.8%)
ImGoingToHellForThis
4,674 (0.7%)
politics
Posts (%)
Subreddit
359 (9.3%) The Donald
87 (2.2%)
76 (2.0%) EnoughTrumpSpam
70 (1.8%) TrumpsTweets
56 (1.4%) AdviceAnimals
43 (1.1%) USE2016
43 (1.1%)
PoliticsAll
dankmemes
42 (1.1%)
40 (1.0%)
pics
39 (1.0%) me irl
Posts (%)
24,343 (26.4%)
2,751 (3.0%)
2,679 (2.9%)
2,363 (2.5%)
1,740 (1.9%)
1,653 (1.8%)
1,401(1.5%)
881 (0.9%)
877 (0.9%)
873 (0.9%)
Table 6: Top ten subreddits for all memes, racism-related memes, and politics-related memes.
politics-related memes, the majority of the subreddits are re-
lated to Donald Trump, while there also are general subreddits
that talk about politics, e.g., the politics (3.0%) and the Poli-
ticsAll subreddit (1.5%).
4.3 Take-Aways
In summary, the main take-aways of our analysis include:
1. Fringe Web communities use many variants of memes
related to politics and world events, possibly aiming to
share weaponized information about them (Appendix E
include some examples of such memes). For instance,
Donald Trump is the KYM entry with the largest num-
ber of clusters in /pol/ (2.2%), The Donald (6.1%), and
Gab (2.2%).
2. /pol/ and Gab share hateful and racist memes at a higher
rate than mainstream communities, as we find a consid-
erable number of anti-semitic and pro-Nazi clusters (e.g.,
The Happy Merchant meme [36] appears in 1.3% of all
/pol/ annotated clusters and 2.2% of Gab's, while Adolf
Hitler in 0.6% of /pol/'s). This trend is steady over time
for /pol/ but ramping up for Gab.
3. Seemingly "neutral" memes, like Pepe the Frog (or one of
its variants), are used in conjunction with other memes to
incite hate or influence public opinion on world events,
e.g., with images related to terrorist organizations like
ISIS or world events such as Brexit.
4. Our custom distance metric successfully allows us to
study the interplay and the overlap of memes, as show-
cased by the visualizations of the clusters and the dendro-
gram (see Figs. 6 and 7).
5. Reddit users are more interested in politics-related
memes than other type of memes. That said, when look-
ing at individual subreddits, we find that The Donald is
the most active one when it comes to posting memes in
general. It is also the subreddit where most racism and
politics-related memes are posted.
Influence Estimation
5
So far we have studied the dissemination of memes by looking
at Web communities in isolation. However, in reality, these in-
fluence each other: e.g., memes posted on one community are
often re-posted to another. Aiming to capture the relationship
between them, we use a statistical model known as Hawkes
Processes [61, 62], which describes how events occur over
12
time on a collection of processes. This maps well to the posting
of memes on different platforms: each community can be seen
as a process, and an event occurs each time a meme image is
posted on one of the communities. Events on one process can
cause impulses that can increase the likelihood of subsequent
events, including other processes, e.g., a person might see a
meme on one community and re-post it, or share it to a dif-
ferent one. This approach allows us to assess the causality of
events, hence it is a far better approach when compared to sim-
ple approaches like looking at the timeline of specific memes
or pHashes.
5.1 Hawkes Processes
To model the spread of memes on Web communities, we
use a similar approach as in our previous work [86], which
looked at the spread of mainstream and alternative news URLs.
Next, we provide a brief description, and present an improved
method for estimating influence.
We use five processes, one for each of our seed Web com-
munities (/pol/, Gab, and The Donald), as well as Twitter and
Reddit, fitting a separate model for each meme cluster. Fitting
the model to the data yields a number of values: background
rates for each process, weights from each process to each other,
and the shape of the impulses an event on one process causes
on the rates of the others. The background rate is the expected
rate at which events will occur on a process without influence
from the communities modeled or previous events; this cap-
tures memes posted for the first time, or those seen on a com-
munity we do not model and then reposted on a community we
do. The weights from community-to-community indicate the
effect an event on one has on the others; for example, a weight
from Twitter to Reddit of 1.2 means that each event on Twit-
ter will cause an expected 1.2 additional events on Reddit. The
shape of the impulse from Twitter to Reddit determines how
the probability of these events occurring is distributed over
time; typically the probability of another event occurring is
highest soon after the original event and decreases over time.
Figure 10 illustrates a Hawkes model with three processes.
The first event occurs on process B, which causes an increase
in the rate of events on all three processes. The second event
then occurs on process C, again increasing the rate of events on
the processes. The third event occurs soon after, on process A.
The fourth event occurs later, again caused by the background
arrival rate on process B, after the increases in arrival rate from
the other events have disappeared.
/pol/
1,574,045
Twitter
865,885
Reddit
581,803
T D
81,924
Gab
44,918
Table 7: Events per community from the 12.6K clusters.
substantial improvement over the influence estimation in [86],
which used the weights from source to destination community,
multiplied by the number of events on the source to estimate
influence. However, this only looks at influence across a single
"hop" and would not allow us to understand the source com-
munity's influence as memes spread onwards from the desti-
nation community. The new method allows us to gain an un-
derstanding of where memes that appear on a community orig-
inally come from, and how they are likely to spread from com-
munity to community from the original source.
5.2
Influence
We fit Hawkes models using Gibbs sampling as described
in [62] for the 12.6K annotated clusters; in Table 7, we report
the total number of meme images posted to each community in
these clusters. As seen in Table 7, /pol/ has the greatest num-
ber of memes posted, followed by Twitter and then Reddit.
In terms of total images collected (see Table 1), Twitter and
Reddit have many more than /pol/. However, many of the im-
ages on these communities might not be memes; additionally,
because our clusters are created from the memes present on
only /pol/, The Donald, and Gab (as these are the communi-
ties primarily of interest in this paper), it is possible that there
are memes on Twitter and Reddit that are not included in the
clusters. This yields an additional interesting question: how ef-
ficient are different communities at disseminating memes?
First, we report the source of events in terms of the percent
of events on the destination community. This describes the re-
sults in terms of the data as we have collected it, e.g., it tells us
the percentage of memes posted on Twitter that were caused
by /pol/. The second way we report influence is by normal-
izing the values by the total number of events in the source
community, which lets us see how much influence each com-
munity has, relative to the number of memes they post -- in
other words, their efficiency.
We first look at the influence of all clusters together. Fig-
ure 11 shows the percent of events on each destination commu-
nity caused by each source community. The values from one
community to the same community (for example, from /pol/
to /pol/) include both events caused by the background rate of
that community and events caused by previous events within
that community; these values are the largest influence for each
community. After this, /pol/ is the strongest source of influence
for Reddit, The Donald, and Gab, but not for Twitter, which is
most influenced by Reddit. Interestingly, although Twitter has
a greater number of memes posted than Reddit, it causes less
influence. Perhaps there is less original content posted directly
to Twitter.
Next, we look at the normalized influence of all clusters to-
gether. Figure 12 shows the influence that a source commu-
nity has on a destination community, normalized by the total
number of memes posted on the source community. The val-
Figure 10: A Hawkes model with three processes. Events cause im-
pulses that increase the rate of subsequent events in the same or other
processes. By looking at the impulses present when events occur, the
probability of a process being the root cause of an event can be de-
termined. Note that on the second part of the figure, colors represent
events while arrows represent impulses between the events.
To understand the influence different communities have on
the spread of memes, we want to be able to attribute the cause
of a meme being posted back to a specific community. For
example, if a meme is posted on /pol/ and then someone sees
it there and posts it on Twitter where it is shared several times,
we would like to be able to say that /pol/ was the root cause
of those events. Obviously, we do not actually know where
someone saw something and decided to share it, but we can,
using the Hawkes models, determine the probability of each
community being the root cause of an event.
Looking again at Figure 10, we see that events 1 and 4 are
caused directly by the background rate of process B. This is
because, in the case of event 1, there are no previous events on
other processes, and in the case of event 4, the impulses from
previous events have already stopped. Events 2 and 3, however,
occur when there are multiple possible causes: the background
rate for the community and the impulses from previous events.
In these cases, we assign the probability of being the root cause
in proportion to the magnitudes of the impulses (including the
background rate) present at the time of the event. For event 2,
the impulse from event 1 is smaller than the background rate
of community C, so the background rate has a higher proba-
bility of being the cause of event 2 than event 1. Thus, most
of the cause for event 2 is attributed to community C, with a
lesser amount to B (through event 1). Event 3 is more com-
plicated: impulses from both previous events are present, thus
the probability of being the cause is split three ways, between
the background rate and the two previous events. The impulse
from event 2 is the largest, with the background rate and event
1 impulse smaller. Because event 2 is attributed both to com-
munities B and C, event 3 is partly attributed to community B
through both event 1 and event 2.
In the rest of our analysis, we use this new measure. This is a
13
1234Background rates1234Impulses attime of eventAttributedroot causeABCBBBBACCFigure 11: Percent of destination events caused by the source com-
munity on the destination community. Colors indicate the largest-to-
smallest influences per destination.
Figure 13: Percent of the destination community's racist (R) and non-
racist (NR) meme postings caused by the source community. Colors
indicate the percent difference between racist and non-racist.
Figure 12: Influence from source to destination community, normal-
ized by the number of events in the source community. Columns for
total influence and total external influence are shown.
Figure 14: Percent of the destination community's political (P) and
non-political (NP) meme postings caused by the source community.
Colors indicate the percent difference between political and non-
political.
ues can be understood as an indication of how much influence
a community has, relative to the frequency of memes posted.
For example, the influence Reddit has on Twitter is equal to
5.71% of the total events on Reddit. If the sum of values for a
source is less than 100%, it implies that many of the posts on
the source community were caused by other communities, or
that posts on the source community do not cause many posts
on other communities.
There are several interesting things to note in Figure 12.
First, The Donald has by far the greatest influence for the num-
ber of memes posted on it. This is particularly apparent when
looking at just external influence, where The Donald has more
than 4 times as much influence than the rest of Reddit, the clos-
est other community. Memes from this community spread very
well to all of the other communities. While /pol/ has a large to-
tal influence on the other communities (as seen in Figure 11),
when normalized by its size, it has the smallest external influ-
ence: just 4.03%. Most of the memes posted on /pol/ do not
spread to other communities. Both Gab and Twitter have a to-
tal normalized influence of less than 100%; much less in Gab's
case, although it has higher external influence.
Using the clusters identified as either racist or non-racist
(see the end of Section 4.2.1), we compare how the commu-
nities influence the spread of these two types of content. Fig-
ure 13 shows the percentage of both the destination commu-
nity's racist and non-racist meme posts caused by the source
community. We perform two-sample Kolmogorov-Smirnov
tests to compare the distributions of influence from the racist
and non-racist clusters; cells with statistically significant dif-
ferences between influence of racist/non-racist memes (with
p<0.01) are reported with a * in the figure. /pol/ has the most
total influence for both racist and non-racist memes, with the
notable exception of Twitter, where Reddit has the most the
influence. Interestingly, while the percentage of racist meme
posts caused by /pol/ is greater than non-racist for Reddit,
Twitter, and Gab, this is not the case for The Donald. The
only other cases where influence is greater for racist memes
are Reddit to The Donald and Gab to Reddit.
When looking at political vs non political memes (Fig-
ure 14), we see a somewhat different story. Here, /pol/ influ-
ences The Donald more in terms of political memes. Further,
we see differences in the percent increase and decrease of in-
fluence between the two figures (as indicated by the cell col-
ors). For example, Twitter has a relatively larger difference in
its influence on /pol/ and Reddit for political and non-political
memes than for racist and non-racist memes, but a smaller dif-
ference in its influence on Gab and The Donald. This exposes
how different communities have varying levels of influence de-
pending on the type of memes they post.
While examining the raw influence provides insights into
the meme ecosystem, it obscures notable differences in the
meme posting behavior of the different communities. To
explore this, we look at the normalized influence in Fig-
ure 15 (racist/non-racist memes) and Figure 16 (political/non-
political memes). As mentioned previously, normalization re-
14
/pol/RedditTwitterGabT_DDestination/pol/RedditTwitterGabT_DSource16.34%13.15%3.13%3.88%97.06%8.89%8.92%4.78%90.37%1.21%5.05%9.11%90.75%3.48%0.94%0.56%59.60%0.16%0.15%0.09%69.15%9.22%1.18%2.11%0.71%/pol/RedditTwitterGabT_DTotalTotal ExtDestination/pol/RedditTwitterGabT_DSource4.38%101.44%0.85%0.38%1.72%1.43%97.06%12.34%102.71%1.25%0.69%7.11%90.37%3.28%4.99%95.74%0.48%0.47%90.75%2.34%1.70%9.10%68.70%1.02%59.60%3.07%1.98%3.03%46.07%115.22%69.15%5.05%12.49%14.97%13.55%/pol/RedditTwitterGabT_DDestination/pol/RedditTwitterGabT_DSourceR: 15.04%NR: 16.35%*R: 18.83%NR: 13.08%R: 4.31%NR: 3.12%*R: 6.36%NR: 3.86%*R: 99.34%NR: 96.97%*R: 9.52%NR: 8.89%*R: 1.29%NR: 9.01%R: 2.48%NR: 4.79%*R: 89.12%NR: 90.38%*R: 0.35%NR: 1.25%*R: 2.10%NR: 5.08%*R: 1.26%NR: 9.21%R: 92.85%NR: 90.74%*R: 2.22%NR: 3.49%*R: 0.20%NR: 0.97%R: 0.22%NR: 0.56%R: 76.08%NR: 59.40%R: 0.06%NR: 0.16%R: 0.54%NR: 0.15%R: 0.05%NR: 0.09%R: 73.13%NR: 69.12%*R: 2.54%NR: 9.30%R: 0.30%NR: 1.19%*R: 1.77%NR: 2.11%*R: 0.06%NR: 0.73%*/pol/RedditTwitterGabT_DDestination/pol/RedditTwitterGabT_DSourceP: 19.79%NP: 14.84%*P: 16.90%NP: 12.09%*P: 6.33%NP: 2.54%*P: 8.72%NP: 3.21%*P: 94.70%NP: 97.56%*P: 7.18%NP: 9.64%*P: 8.79%NP: 8.95%*P: 6.76%NP: 4.42%*P: 78.14%NP: 92.06%*P: 1.70%NP: 1.11%*P: 5.33%NP: 4.94%*P: 8.30%NP: 9.34%*P: 83.77%NP: 92.03%P: 7.63%NP: 2.91%*P: 1.81%NP: 0.75%*P: 0.37%NP: 0.64%*P: 56.08%NP: 60.60%*P: 0.13%NP: 0.16%*P: 0.16%NP: 0.15%*P: 0.10%NP: 0.08%*P: 67.33%NP: 69.95%*P: 9.93%NP: 9.02%*P: 3.01%NP: 0.85%*P: 5.34%NP: 1.66%*P: 1.69%NP: 0.50%*in terms of influence while The Donald is the most efficient.
This provides new insight into the meme ecosystem: there are
clearly evolutionary effects. Many meme postings do not result
in further dissemination, and one of the key components to en-
suring they are disseminated is ensuring that new "offspring"
are continuously produced. /pol/'s "famed" meme magic, i.e.,
the propensity to produce and heavily push memes, is thus the
most likely explanation for /pol/'s influence on the Web in gen-
eral.
6 Related Work
We now review prior work studying the detection, evolution,
and propagation of memes, their popularity, as well as vari-
ous case studies. For each work, we also report whether they
consider text, images, and/or videos.
Detection and Propagation of Memes. Leskovec et al. [60]
perform large-scale tracking of text-based memes, focusing on
news outlets and blogs. Ferrara et al. [17] detect text memes
using an unsupervised framework based on clustering tech-
niques. Dang et al. [11] study memes on Reddit by cluster-
ing submissions and using a set of similarity scores based on
Google Tri-grams. Ratkiewicz et al. [69] introduce Truthy, a
framework supporting the analysis of the diffusion of text-
based, politics-related memes on Twitter. Babaei et al. [5]
study Twitter users' preferences, with respect to information
sources, including how they acquire memes. Romero et al. [72]
study meme propagation on Twitter via hashtags, finding dif-
ferences according to the topic and that politically-related
hashtags, mainly about controversial topics, are persistent on
the platform. Dubey et al. [14] extract a rich semantic em-
bedding corresponding to the template used for the creation
of meme images, using deep learning and optical character
recognition techniques. They demonstrate the efficacy of their
approach on a variety of tasks ranging from image clustering
to virality prediction on datasets obtained from Reddit as well
as scraped data from sites for generating meme images like
memegenerator.net and quickmeme.com. By contrast, we fo-
cus on the detection and propagation of image-based memes
without limiting our scope to image macros. To this end, we re-
duce the dimensionality of raw images using perceptual hash-
ing, and use clustering techniques to identify groups of memes.
We also detect and study the propagation of memes across
multiple Web communities, using publicly available data from
memes annotation sites (i.e., KYM).
Popularity of Memes. Weng et al. [81, 82] study the popular-
ity of memes spreading as hashtags on Twitter. They model
virality using an agent-based approach, taking into account
that users have a limited capacity in receiving/viewing memes
on Twitter. They study the features that make memes popular,
finding that those based on network community structures are
strong indicators of popularity. Tsur and Rappoport [79] pre-
dict popularity of text-based memes on Twitter using linguistic
characteristics as well as cognitive and domain features. Ienco
et al. [23] study memes propagating via text, images, audio,
and video on the Yahoo! Meme platform (a platform discon-
tinued in 2012), aiming to predict virality and select memes to
Figure 15: Influence from source to destination community of racist
and non-racist meme postings, normalized by the number of events in
the source community.
Figure 16: Influence from source to destination community of polit-
ical and non-political meme postings, normalized by the number of
events in the source community.
veals how efficient
the communities are in disseminating
memes to other communities by revealing the per meme in-
fluence of meme posts. First, we note that the percent change
in influence for the dissemination of racist/non-racist memes
is quite a bit larger than that for political/non-political memes
(again, indicated by the coloring of the cells). More interest-
ingly, both figures show that, contrary to the total influence,
/pol/ is the least influential when taking into account the num-
ber of memes posted. While this might seem surprising, it ac-
tually yields a subtle, yet crucial aspect of /pol/'s role in the
meme ecosystem: /pol/ (and 4chan in general) acts as an evo-
lutionary microcosm for memes. The constant production of
new content [22] results in a "survival of the fittest" [16] sce-
nario. A staggering number of memes are posted on /pol/, but
only the best actually make it out to other communities. To the
best of our knowledge, this is the first result quantifying this
analogy to evolutionary pressure.
Take-Aways. There are several take-aways from our measure-
ment of influence. We show that /pol/ is, generally speak-
ing, the most influential disseminator of memes in terms of
raw influence. In particular, it is more influential in spread-
ing racist memes than non-racist one, and this difference is
deeper than in any other community. There is one notable ex-
ception: /pol/ is more influential in terms of non-racist memes
on The Donald. Relatedly, /pol/ has generally more influence
in terms of spreading political memes than other communi-
ties. When looking at the normalized influence, however, we
surface a more interesting result: /pol/ is the least efficient
15
/pol/RedditTwitterGabT_DTotalTotal ExtDestination/pol/RedditTwitterGabT_DSourceR: 1.1NR: 4.5R: 100.4NR: 101.5R: 0.2NR: 0.9*R: 0.2NR: 0.4R: 0.3NR: 1.8*R: 0.4NR: 1.5*R: 99.3NR: 97.0*R: 9.5NR: 12.4R: 98.7NR: 102.7R: 1.4NR: 1.3*R: 0.2NR: 0.7R: 2.9NR: 7.1*R: 89.1NR: 90.4*R: 5.1NR: 3.3*R: 4.7NR: 5.0R: 97.6NR: 95.7R: 0.3NR: 0.5*R: 0.1NR: 0.5R: 92.8NR: 90.7*R: 1.9NR: 2.3*R: 2.4NR: 1.7R: 10.0NR: 9.1R: 86.1NR: 68.5R: 0.2NR: 1.0R: 76.1NR: 59.4R: 0.5NR: 3.1R: 4.0NR: 1.9R: 5.3NR: 3.0R: 23.3NR: 46.2R: 96.4NR: 115.4R: 73.1NR: 69.1*R: 2.3NR: 5.1R: 2.5NR: 12.6*R: 12.2NR: 15.0*R: 6.3NR: 13.6*/pol/RedditTwitterGabT_DTotalTotal ExtDestination/pol/RedditTwitterGabT_DSourceP: 7.7NP: 3.7P: 102.4NP: 101.2P: 1.8NP: 0.7*P: 0.6NP: 0.3*P: 3.1NP: 1.4*P: 2.2NP: 1.3*P: 94.7NP: 97.6*P: 23.2NP: 10.8P: 101.4NP: 102.9P: 2.5NP: 1.1*P: 1.2NP: 0.6*P: 12.8NP: 6.3*P: 78.1NP: 92.1*P: 6.6NP: 2.8*P: 9.3NP: 4.2P: 93.1NP: 96.2P: 1.0NP: 0.4*P: 0.6NP: 0.4*P: 83.8NP: 92.0P: 4.0NP: 2.0*P: 3.7NP: 1.3*P: 6.5NP: 9.9P: 62.5NP: 70.5P: 0.9NP: 1.0*P: 56.1NP: 60.6*P: 1.7NP: 3.5*P: 1.1NP: 2.2*P: 2.7NP: 3.1*P: 54.0NP: 42.6P: 121.3NP: 112.6P: 67.3NP: 69.9*P: 4.0NP: 5.5*P: 16.2NP: 10.9*P: 15.2NP: 14.9*P: 18.7NP: 11.3*be shown to users after login. Coscia [10] studies meme im-
ages and distinguishes the traits that make them more likely to
be popular on the Web, presenting a case study on the Quick-
meme generator site.
Whereas, we also study the popularity of memes, however,
unlike previous work, we rely on a multi-platform approach,
encompassing data from /pol/, Reddit, Twitter, and Gab, and
show that the popularity of memes depends on the Web com-
munity and its ideology. For instance, /pol/ is well-known for
its anti-semitic ideology and in fact the "Happy Merchant"
meme [36] is the 3rd most popular meme on /pol/.
Evolution of Memes. Adamic et al. [4] study the evolution of
text-based memes on Facebook, showing that it can be mod-
eled by the Yule process. They find that memes significantly
evolve and new variants appear as they propagate, and that
specific communities within the network diffuse specific vari-
ants of a meme. Bauckhage [6] study the temporal dynamics
of 150 memes using data from Google Insights as well as so-
cial bookmarking services like Digg, showing that different
communities exhibit different interests/behaviors for different
memes, and that epidemiology models can be used to predict
the evolution and popularity of memes. Simmons et al. [76]
focus on detecting and studying the evolution of memes that
are propagated via quoted text, finding that mutations of text
are surprisingly frequent.
By contrast, we study the temporal aspect of memes using
Hawkes processes. This statistical framework allows us to as-
sess the causality of the posting of memes on various Web
communities, thus modeling their evolution and their influence
across multiple communities.
Generating Memes. Oliveira et al. [66] study the challenges
of creating memes, both for humans and automated bots. They
build and test an automated meme creator bot, which com-
bines a headline with an image macro and posts the resulting
meme on Twitter: while generated posts are easily recogniz-
able as memes, the bot fails to produce humorous memes -- a
task that is challenging for humans too. Wang and Wen [80]
study memes from sites like memegenerator.net that have im-
ages embedded with text, focusing on the correlations between
the text and the characteristics of the image, ultimately propos-
ing a non-paranormal approach for generating text from an im-
age macro.
Case Studies. Heath et al. [20] present a case study of how
people perceive memes with a focus on urban legends, finding
that they are more willing to share memes that evoke stronger
disgust. Shifman and Thelwall [75] study the diffusion, evo-
lution, and translation of single memes (i.e., specific jokes)
by relying on a mixed-methods approach based on clustering
and search engine queries on the Web. Shifman [74] analyzes
30 video memes on YouTube, both qualitatively and quantita-
tively, finding that meme videos have several common features
like humor, simplicity, and repetitiveness. Xie et al. [83] also
focus on YouTube memes, performing a large-scale keyword-
based search for videos related to the Iranian election in 2009,
extracting frequently used images and video segments. They
show that most of the videos are not original, thus, meme-
related techniques can be exploited to deduplicate content and
capture the content diffusion on the Web. Finally, Dewan et
al. [13] study the sentiment and content of images that are dis-
seminated during crisis events like the 2015 Paris terror at-
tacks. They analyze 57K images related to the attacks, finding
instances of misinformation and conspiracy theories.
We also present a case study focusing on image memes of
Pepe the Frog (see the discussion about Figure 6). This show-
cases both the overlap and the diversity of certain memes, as
well as how memes can be influenced by real-world events,
with new variants being generated. For instance, after the UK
Brexit referendum in 2016, memes with Pepe the Frog started
to be used in the Brexit context (see Appendix E). This also
demonstrates how our processing pipeline can effectively un-
cover interesting overlaps and characteristics across memes.
Fringe Communities. Previous work has also shed light
on fringe Web communities like 4chan, Gab, and sub-
communities within Reddit. Bernstein et al. [7] study the
ephemerality and anonymity features of the 4chan community
using data from the Random board (/b/). Hine et al. [22] focus
on /pol/, analyzing 8M posts and detecting a high volume of
hate speech as well as the phenomenon of "raids," i.e., coor-
dinated attacks aimed at disrupting other services. Zannettou
et al. [85] analyze 22M posts from 336K users on Gab, find-
ing that hate speech occurs twice as much as in Twitter, but
twice less than /pol/. They also highlight a strong presence of
alt-rights users previously banned from mainstream social net-
works. Snyder et al. [77] measure doxing on 4chan and 8chan,
while Chandrasekharan et al. [8] introduce a computational
approach to detect abusive content also looking at 4chan and
Reddit.
Finally, Hawkes processes have also been used to quan-
tify influence of fringe Web communities like /pol/ and
The Donald to mainstream ones like Twitter in the context of
misinformation [86]. We follow a similar approach here, but
use an improved method of determining the influence of the
different communities.
7 Discussion & Conclusion
In this paper, we presented a large-scale measurement study of
the meme ecosystem. We introduced a novel image process-
ing pipeline and ran it over 160M images collected from four
Web communities (4chan's /pol/, Reddit, Twitter, and Gab).
We clustered images from fringe communities (/pol/, Gab, and
Reddit's The Donald) based on perceptual hashing and a cus-
tom distance metric, annotated the clusters using data gathered
from Know Your Meme, and analyzed them along a variety of
axes. We then associated images from all the communities to
the clusters to characterize them through the lens of memes
and the influence they have on each other.
Our analysis highlights that the meme ecosystem is quite
complex, with intricate relationships between different memes
and their variants. We found important differences between
the memes posted on different communities (e.g., Reddit and
Twitter tend to post "fun" memes, while Gab and /pol/ racist or
political ones). When measuring the influence of each commu-
nity toward disseminating memes to other Web communities,
16
we found that /pol/ has the largest overall influence for racist
and political memes, however, /pol/ was the least efficient, i.e.,
in terms of influence w.r.t. the total number of memes posted,
while The Donald is very successful in pushing memes to both
fringe and mainstream Web communities.
Our work constitutes the first attempt to provide a multi-
platform measurement of the meme ecosystem, with a focus
on fringe and potentially dangerous communities. Consider-
ing the increasing relevance of digital information on world
events, our study provides a building block for future cultural
anthropology work, as well as for building systems to protect
against the dissemination of harmful ideologies. Moreover, our
pipeline can already be used by social network providers to
assist the identification of hateful content; for instance, Face-
book is taking steps to ban Pepe the Frog used in the context
of hate [59], and our methodology can help them automatically
identify hateful variants. Finally, our pipeline can be used for
tracking the propagation of images from any context or other
language spheres, provided an appropriate annotation dataset.
Performance. We also measured the time that it takes to asso-
ciate images posted on Web communities to memes. All other
steps in our system are one-time batch tasks, only executed
if the annotations dataset is updated. To ease presentation, we
only report the time to compare all the 74M images from Twit-
ter (the largest dataset) against the medoids of all 12K an-
notated clusters: it took about 12 days on our infrastructure,
equipped with two NVIDIA Titan Xp GPUs. This corresponds
to 14ms per image, or 73 images per second. Note that, if new
GPUs are added to our infrastructure, the workload would be
divided equally across all GPUs.
Future work. In future work, we plan to include memes
in video format, thus extending to other communities (e.g.,
YouTube). We also plan to study the content of the posts that
contain memes, incorporating OCR techniques to capture as-
sociated text-based features that memes usually contain, and
improving on KYM annotations via crowdsourced labeling.
While shedding light on the Internet meme ecosystem, our
findings yield a number of future directions exploring, e.g.,
where memes are first created, understanding components of
a meme that might increase/decrease its chance of dissemina-
tion, gaining a better understanding of the various families of
memes, how they influence public opinion, and so on.
Acknowledgments. We thank the anonymous reviewers and
our shepherd Christo Wilson for their insightful feedback. This
project has received funding from the European Union's Hori-
zon 2020 Research and Innovation program under the Marie
Skłodowska-Curie ENCASE project (Grant Agreement No.
691025). We also gratefully acknowledge the support of the
NVIDIA Corporation, for the donation of the two Titan Xp
GPUs used for our experiments. Finally, we want to thank
/pol/'s anonymous users for their "creativity" and "invaluable"
input to this paper (in meme form; see Appendix E).
References
[1] Cluster Visualization. https://memespaper.github.io/.
[2] 4plebs. 4chan archive. http://4plebs.org/.
[3] M. Abadi, P. Barham, J. Chen, Z. Chen, A. Davis, J. Dean,
M. Devin, S. Ghemawat, G. Irving, M. Isard, et al. TensorFlow:
A System for Large-Scale Machine Learning. In OSDI, 2016.
[4] L. A. Adamic, T. M. Lento, E. Adar, and P. C. Ng. Information
Evolution in Social Networks. In WSDM, 2016.
[5] M. Babaei, P. Grabowicz, I. Valera, K. P. Gummadi, and
M. Gomez-Rodriguez. On the Efficiency of the Information
Networks in Social Media. In WSDM, 2016.
[6] C. Bauckhage. Insights into Internet Memes. In ICWSM, 2011.
[7] M. S. Bernstein, A. Monroy-Hern´andez, D. Harry, P. Andr´e,
K. Panovich, and G. G. Vargas. 4chan and/b: An Analysis of
Anonymity and Ephemerality in a Large Online Community. In
ICWSM, 2011.
[8] E. Chandrasekharan, M. Samory, A. Srinivasan, and E. Gilbert.
The bag of communities: Identifying abusive behavior online
with preexisting Internet data. In CHI, 2017.
[9] F. Chollet. Keras. https://github.com/fchollet/keras, 2015.
[10] M. Coscia. Competition and Success in the Meme Pool: A Case
Study on Quickmeme.com. ArXiv 1304.1712, 2013.
[11] A. Dang, A. Mohammad, A. A. Gruzd, E. E. Milios, and
R. Minghim. A visual framework for clustering memes in social
media. In ASONAM, 2015.
[12] R. Dawkins. The selfish gene. Oxford university press, 1976.
[13] P. Dewan, A. Suri, V. Bharadhwaj, A. Mithal, and P. Ku-
maraguru. Towards Understanding Crisis Events On Online So-
cial Networks Through Pictures. In ASONAM, 2017.
[14] A. Dubey, E. Moro, M. Cebrian, and I. Rahwan. MemeSe-
In
quencer: Sparse Matching for Embedding Image Macros.
WWW, 2018.
[15] M. Ester, H.-P. Kriegel, J. Sander, X. Xu, et al. A Density-Based
Algorithm for Discovering Clusters in Large Spatial Databases
with Noise. In KDD, 1996.
[16] C. Faife. How 4Chan's Structure Creates a 'Survival of the
Fittest' for Memes. https://motherboard.vice.com/en us/article/
ywzm8m/how-4chans-structure-creates-a-survival-of-the-
fittest-for-memes, 2017.
[17] E. Ferrara, M.
JafariAsbagh, O. Varol, V. Qazvinian,
F. Menczer, and A. Flammini. Clustering Memes in Social Me-
dia. In ASONAM, 2013.
[18] G. Graham. Genes: A Philosophical Inquiry. Routledge, 2005.
[19] D. Haddow. Meme warfare: how the power of mass replication
has poisoned the US election. https://www.theguardian.com/us-
news/2016/nov/04/political-memes-2016-election-hillary-
clinton-donald-trump, 2016.
[20] C. Heath, C. Bell, and E. Sternberg. Emotional selection in
memes: the case of urban legends. Journal of Personality and
Social Psychology, 2001.
[21] G. E. Hine, J. Onaolapo, E. D. Cristofaro, N. Kourtellis, I. Leon-
tiadis, R. Samaras, G. Stringhini, and J. Blackburn. A Longitu-
dinal Measurement Study of 4chan's Politically Incorrect Fo-
rum and its Effect on the Web. ArXiv 1610.03452, 2016.
[22] G. E. Hine, J. Onaolapo, E. De Cristofaro, N. Kourtellis,
I. Leontiadis, R. Samaras, G. Stringhini, and J. Blackburn. Kek,
Cucks, and God Emperor Trump: A Measurement Study of
4chan's Politically Incorrect Forum and Its Effects on the Web.
In ICWSM, 2017.
[23] D. Ienco, F. Bonchi, and C. Castillo. The Meme Ranking Prob-
lem: Maximizing Microblogging Virality. In ICDMW, 2010.
[24] Know Your Meme. Alt-Right Culture. http://knowyourmeme.
com/memes/cultures/alt-right, 2018.
[25] Know Your Meme. Angry Pepe Meme. http://knowyourmeme.
com/memes/angry-pepe, 2018.
[26] Know Your Meme.
Apu Apustaja Meme.
http://
17
knowyourmeme.com/memes/apu-apustaja, 2018.
[27] Know Your Meme.
Bad Luck Brian Meme.
knowyourmeme.com/memes/bad-luck-brian, 2018.
http://
[28] Know Your Meme.
http://
knowyourmeme.com/memes/make-america-great-again, 2018.
[29] Know Your Meme. #CNNBlackmail. http://knowyourmeme.
Clinton/Trump Duet Meme.
com/memes/events/cnnblackmail, 2018.
[30] Know Your Meme.
Conspiracy Keanu Meme.
knowyourmeme.com/memes/conspiracy-keanu, 2018.
[31] Know Your Meme.
Donald Trump Meme.
http://
http://
knowyourmeme.com/memes/people/donald-trump, 2018.
[32] Know Your Meme. Dubs Guy/Check Em Meme.
http://
knowyourmeme.com/memes/dubs-guy-check-em, 2018.
From the European Union / Brexit Meme.
//knowyourmeme.com/memes/events/united-kingdom-
withdrawal-from-the-european-union-brexit, 2018.
http:
[57] Know Your Meme. X delivers Y at Z Meme.
knowyourmeme.com/memes/x-delivers-y-at-z, 2018.
https://
[58] A.-D. League. Pepe the Frog. https://www.adl.org/education/
references/hate-symbols/pepe-the-frog, 2018.
[59] S. Lerner. Facebook To Ban Pepe The Frog Images Used In The
Context Of Hate. http://www.techtimes.com/articles/228632/
20180525/facebook-publishes-official-policy-on-pepe-the-
frog.htm, 2018.
[60] J. Leskovec, L. Backstrom, and J. M. Kleinberg. Meme-tracking
and the Dynamics of the News Cycle. In KDD, 2009.
[33] Know Your Meme. Evil Kermit Meme. http://knowyourmeme.
[61] S. W. Linderman and R. P. Adams. Discovering Latent Network
com/memes/evil-kermit, 2018.
[34] Know Your Meme. Feels Bad Man / Sad Frog Meme. http:
//knowyourmeme.com/memes/feels-bad-man-sad-frog, 2018.
http://
Goofy's Time Meme.
knowyourmeme.com/memes/its-goofy-time, 2018.
[35] Know Your Meme.
[36] Know Your Meme.
Happy Merchant Meme.
knowyourmeme.com/memes/happy-merchant, 2018.
http://
[37] Know Your Meme. ISIS / Daesh Meme. http://knowyourmeme.
com/memes/people/isis-daesh, 2018.
[38] Know Your Meme. LOL Guy Meme. http://knowyourmeme.
com/memes/lol-guy, 2018.
[39] Know Your Meme. Main page of KYM entries.
http://
knowyourmeme.com/memes/, 2018.
[40] Know Your Meme. Make America Great Again Meme. http://
knowyourmeme.com/memes/make-america-great-again, 2018.
http://
[41] Know Your Meme.
Manning Face Meme.
knowyourmeme.com/memes/manningface, 2018.
[42] Know Your Meme. Maxvidya Meme. https://knowyourmeme.
com/memes/maxvidya, 2018.
[43] Know Your Meme. Nut Button Meme. http://knowyourmeme.
com/memes/nut-button, 2018.
[44] Know Your Meme. Overly Attached Girlfriend Meme. http://
knowyourmeme.com/memes/overly-attached-girlfriend, 2018.
http://
[45] Know Your Meme.
Pepe the Frog Meme.
knowyourmeme.com/memes/pepe-the-frog, 2018.
Structure in Point Process Data. In ICML, 2014.
[62] S. W. Linderman and R. P. Adams. Scalable Bayesian Infer-
ence for Excitatory Point Process Networks. ArXiv 1507.03228,
2015.
[63] S. Martin, W. M. Brown, R. Klavans, and K. W. Boyack.
OpenOrd: An Open-source Toolbox for Large Graph Layout.
In Visualization and Data Analysis 2011, 2011.
[64] A. Marwick and R. Lewis. Media manipulation and disinfor-
mation online. https://datasociety.net/pubs/oh/DataAndSociety
MediaManipulationAndDisinformationOnline.pdf, 2017.
[65] V. Monga and B. L. Evans. Perceptual Image Hashing Via
IEEE
Feature Points: Performance Evaluation and Tradeoffs.
Transactions on Image Processing, 2006.
[66] H. G. Oliveira, D. Costa, and A. M. Pinto. One does not simply
produce funny memes! - Explorations on the Automatic Gener-
ation of Internet humor. In ICCC, 2016.
[67] D. Olsen. How memes are being weaponized for political pro-
paganda. https://www.salon.com/2018/02/24/how-memes-are-
being-weaponized-for-political-propaganda/, 2018.
[68] Pushshift. Reddit Data. http://files.pushshift.io/reddit/, 2018.
[69] J. Ratkiewicz, M. Conover, M. R. Meiss, B. Gonalves, S. Patil,
A. Flammini, and F. Menczer. Detecting and Tracking the
Arxiv
Spread of Astroturf Memes in Microblog Streams.
1011.3768, 2010.
[70] Reddit. Reddit JSON Documentation.
https://github.com/
[46] Know Your Meme.
/pol/ KYM entry. http://knowyourmeme.
reddit-archive/reddit/wiki/JSON, 2018.
com/memes/sites/pol, 2018.
[47] Know Your Meme.
Rage Comics Subculture.
http://
knowyourmeme.com/memes/subcultures/rage-comics, 2018.
[48] Know Your Meme. Rage Guy Meme. http://knowyourmeme.
com/memes/rage-guy-fffffuuuuuuuu, 2018.
[49] Know Your Meme. Rickroll Meme. http://knowyourmeme.
com/memes/rickroll, 2018.
[50] Know Your Meme. Roll Safe Meme. http://knowyourmeme.
com/memes/roll-safe, 2018.
[51] Know Your Meme. Russian Anti-Meme Law Meme. http:
//knowyourmeme.com/memes/events/russian-anti-meme-law,
2018.
[52] Know Your Meme. Smug Frog Meme. http://knowyourmeme.
com/memes/smug-frog, 2018.
[53] Know Your Meme.
That's The Joke Meme.
http://
knowyourmeme.com/memes/thats-the-joke, 2018.
[54] Know Your Meme.
Trollface / Coolface / Problem?
Meme. http://knowyourmeme.com/memes/trollface-coolface-
problem, 2018.
[55] Know Your Meme.
#TrumpAnime / Rick Wilson Contro-
versy. http://knowyourmeme.com/memes/events/trumpanime-
rick-wilson-controversy, 2018.
[56] Know Your Meme.
United Kingdom Withdrawal
[71] C. M. Rivers and B. L. Lewis. Ethical research standards in a
world of big data. F1000Research, 2014.
[72] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the
Mechanics of Information Diffusion Across Topics: Idioms, Po-
litical Hashtags, and Complex Contagion on Twitter. In WWW,
2011.
[73] J. Scott. Information Warfare: The Meme is the Embryo of the
Narrative Illusion. Institute for Critical Infrastructure Technol-
ogy, 2018.
[74] L. Shifman. An anatomy of a YouTube meme. New Media &
Society, 2012.
[75] L. Shifman and M. Thelwall. Assessing global diffusion with
Web memetics: The spread and evolution of a popular joke.
Journal of the Association for Information Science and Tech-
nology, 2009.
[76] M. Simmons, L. Adamic, and E. Adar. Memes online: Ex-
tracted, subtracted, injected, and recollected. In ICWSM, 2011.
[77] P. Snyder, P. Doerfler, C. Kanich, and D. McCoy. Fifteen min-
utes of unwanted fame: Detecting and characterizing doxing. In
IMC, 2017.
[78] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and
R. Salakhutdinov. Dropout: A simple way to prevent neural
networks from overfitting. JMLR, 2014.
18
[79] O. Tsur and A. Rappoport. Don't Let Me Be #Misunderstood:
Linguistically Motivated Algorithm for Predicting the Popular-
ity of Textual Memes. In ICWSM, 2015.
[80] W. Y. Wang and M. Wen. I Can Has Cheezburger? A Nonpara-
normal Approach to Combining Textual and Visual Information
for Predicting and Generating Popular Meme Descriptions. In
HLT-NAACL, 2015.
[81] L. Weng, A. Flammini, A. Vespignani, and F. Menczer. Com-
In
petition among memes in a world with limited attention.
Scientific Reports, 2012.
[82] L. Weng, F. Menczer, and Y.-Y. Ahn. Predicting Successful
Memes Using Network and Community Structure. In ICWSM,
2014.
[83] L. Xie, A. Natsev, J. R. Kender, M. L. Hill, and J. R. Smith.
Tracking Visual Memes in Rich-Media Social Communities. In
ICWSM, 2011.
[84] I. Yoon. Why is it not just a joke? Analysis of Internet memes
associated with racism and hidden ideology of colorblindness.
Journal of Cultural Research in Art Education, 33, 2016.
[85] S. Zannettou, B. Bradlyn, E. De Cristofaro, M. Sirivianos,
G. Stringhini, H. Kwak, and J. Blackburn. What is Gab? A Bas-
tion of Free Speech or an Alt-Right Echo Chamber? In WWW
Companion, 2018.
[86] S. Zannettou, T. Caulfield, E. De Cristofaro, N. Kourtellis,
I. Leontiadis, M. Sirivianos, G. Stringhini, and J. Blackburn.
The Web Centipede: Understanding How Web Communities In-
fluence Each Other Through the Lens of Mainstream and Alter-
native News Sources. In IMC, 2017.
[87] C. Zauner, M. Steinebach, and E. Hermann. Rihamark: percep-
tual image hash benchmarking. In Media Forensics and Secu-
rity, 2011.
A Clustering Parameter Selection
Our implementation uses the DBSCAN algorithm with a clus-
tering threshold equal to 8. To select this threshold, we perform
the clustering step while varying the distances. Table 8 shows
the number of clusters and the percentage of images that are
regarded as noise by the clustering algorithm for varying dis-
tances. We observe that, for distances 2-4, we have a substan-
tially larger percentage of noise, while with distance 10 we
have the least percentage of noise. With distances between 6
and 8 we observe that we get a larger number of clusters than
the other distances, while the noise percentages are 73% and
63%, respectively.
To further evaluate the clustering performance for varying
distances, we randomly select 200 clusters and manually cal-
culate the number of images that are false positives within each
cluster. Figure 17 shows the CDF of the false positive fraction
in the random sample of clusters for distances 6, 8, and 10 (we
disregard distances 2-4 due to the high percentage of noise).
Distance 10 yields a high number of false positives, while dis-
tances 6-8 the overall false positives are below 3%. Therefore,
we investigate the impact of these false positives in the overall
dataset, looking at all posts that contain false and true posi-
tives in the random sample of 200 clusters, using distance 8.
We find that the false positives have little impact as they occur
substantially fewer times than true positives: the percentage of
true positives over the set of false positives and true positives is
99.4%. Thus, due to the larger number of clusters, the accept-
19
Distance
2
4
6
8
10
#Clusters %Noise
30,327
34,146
37,292
38,851
30,737
82.9%
78.5%
73.0%
62.8%
27.8%
Table 8: Number of clusters and percentage of noise for varying clus-
tering distances.
Figure 17: Fraction of false positives in clusters with varying cluster-
ing distance.
able false positive performance, and the smaller percentage of
noise (when compared to distances 2-6), we elect to use as a
threshold the perceptual distance that is equal to 8.
B KYM and Clustering Annotation
Evaluation
While KYM might not be a household name, the site is seem-
ingly the largest curated collection of memes on the Web, i.e.,
KYM is as close to an "authority" on memes as there is. That
said, crowdsourcing is an aspect of how KYM works, and thus
there might be questions as to how "legitimate" some of the
content is. To this end, we set out to measure the quality of
KYM by sampling a number of pages and manually examin-
ing them. This is clearly a subjective task, and a fully specified
definition of what makes a valid meme is approximately as dif-
ficult as defining "art." Nevertheless, the authors of this paper
have, for better or worse, collectively spent thousands of hours
immersed in the communities we explore; thus, while we are
not confident in providing a strict definition of a meme, we are
in claiming that we know a meme when we see it.
Using the same randomly selected 200 clusters as men-
tioned in Appendix A, we visited each KYM page the cluster
was tagged with and noted whether or not it properly docu-
mented what we consider an "actual" meme. The 200 clus-
ters were mapped to 162 unique KYM pages, and of these 162
pages, 3 (1.85%) we decided were "bad." This is mainly due
to the lack of completeness and relatively high number of ran-
dom images in the gallery (see [42, 57] for some examples of
"bad" KYM entries).
Next, we set out to determine whether the label (i.e., KYM
page) assigned to each of our randomly sampled clusters was
appropriate. Using three annotators, for each cluster we exam-
ined the KYM page, the medoid of the cluster, and the im-
0.00.10.20.30.40.50.60.70.8Fraction of false positives0.00.20.40.60.81.0CDFdistance = 6distance = 8distance = 10Figure 18: Architecture of the deep learning model for detecting screenshots from Twitter, /pol/, Reddit, Instagram, and Facebook.
ages in the cluster itself and noted whether the label does in
fact apply to the cluster. Here, again, there is a great degree of
subjectivity. To reign some of the subjectivity in, we used the
following guidelines:
Platform Twitter 4chan
# images
14,602 10,127
Reddit Facebook Instagram Other
2,181
497 10,630
1,414
Table 9: Curated dataset used to train the screenshot classifier.
1. If the exact image(s) in the cluster appear in the KYM
gallery, then the label is correct.
2. For images that do not appear in the KYM gallery, if the
label is appropriate, then it is a correct labeling.
There are some important caveats with these guidelines.
First, KYM galleries are crowdsourced, and while curated to
some extent, the possibility for what amounts to random im-
ages in a gallery does exist; however, based on our assessment
of KYM page validity, this occurs with low probability. Sec-
ond, we considered a label correct if it was appropriate, even
if it was not necessarily the best possible label. For example,
as our results show, many memes are related, and many images
mix and match pieces of various memes. While it is definitely
true that there might be better labels that exist for a given clus-
ter, this straightforward and comprehensible labeling process
is sufficient for our purposes. We leave a more in-depth study
of the subjective nature of memes for future work. Finally, it is
important to note that memes are a cultural phenomenon, and
thus the potential for cultural bias in our annotation is possible.
Note that our annotators were born in three different countries
(USA, Italy, and Cyprus), only one is a native English speaker,
and two have spent substantial time in the US.
After annotating clusters, we compute the Fleis agreement
score (κ). With our cluster samples, we achieve κ=0.67, which
is considered "substantial" agreement. Finally, for each cluster
we obtain the majority agreement of all annotators to assess
the accuracy of our annotation process; we find that 89% of the
clusters had a legitimate annotation to a specific KYM entry.
C Screenshot Classifier
We now provide details on our screenshot classifier mentioned
in Step 4 in Figure 2).
Dataset. Table 9 summarizes the dataset used for training the
classifier. It includes 28.8K images that depict posts from Twit-
ter, 4chan, Reddit, Facebook, and Instagram, which we collect
from public sources. First, we download images from specific
subreddits that only allow screenshots from a particular com-
munity. For example, the 4chan subreddit require all submis-
sions to be of a screenshot of a 4chan thread. Next, we use
the Pinterest platform to download specific boards that contain
mostly screenshots from the communities we study. Also, we
Figure 19: ROC curve of the screenshot classifier.
search and obtain image datasets that are publicly available on
Web archiving services like the Wayback Machine. We then
manually filter out images that were misplaced. Finally, we in-
clude 10K random images posted on /pol/ (i.e., a subset of the
4.3M images collected for our measurements).
Classifier. To detect screenshots that contain images from one
of the social networks included in our dataset, we use Convolu-
tional Neural Networks. Figure 18 provides an overview of our
classifier's architecture. It includes two Convolutional Neural
Networks, each followed by a max-pooling layer. The output
of these layers is fed to a fully-connected dense layer compris-
ing 512 units. Finally, we have another fully-connected layer
with two units, which outputs the probability that a particular
image is a screenshot from one of the five social networks and
the probability that an image is a random one. To avoid overfit-
ting on the two last fully-connected layers, we apply Dropout
with d = 0.5 [78]. This means that, while training, 50% of the
units are randomly omitted from updating their parameters.
implementation
Experimental Evaluation. Our
uses
Keras [9] with TensorFlow as the backend [3]. To train our
model, we randomly select 80% of the images and evaluate
based on the rest 20% out-of-sample dataset. Figure 19 shows
the ROC curve of the model. We observe that the devised
classifier exhibits acceptable performance with an Area Under
the Curve (AUC) of 0.96. We also evaluate our model in terms
of accuracy, precision, recall, and F1-score, which amount to
91.3%, 94.3%, 93.5%, and 93.9%, respectively.
20
0.00.20.40.60.81.0False Positive Rate0.00.20.40.60.81.0True Positive RateFigure 20: Images that are part of the Dubs Guy/Check Em Meme.
Figure 22: Images that are part of the Goofy's Time Meme.
Figure 21: Images that are part of the Nut Button Meme.
D Clusters examples
As anticipated in Section 4.1, we also present some examples
of clusters showcasing how the proposed pipeline can effec-
tively detect and group images that belong to the same meme.
Specifically, Figure 20 shows a subset of the images from
the Dubs Guy/Check Em meme [32], Figure 21 a subset of
images that belong to the Nut Button meme [43], while Fig-
ure 22 -- to the Goofy's Time meme [35]. Note that all these
images are obtained from /pol/ clusters.
In all clusters, we observe similar variations, i.e., variations
of Donald Trump, Adolf Hitler, The Happy Merchant, and
Pepe the Frog appear in all examples. Once again, this em-
phasizes the overlap that exists among memes.
E Interesting Images
Finally, we report some "interesting" examples of images from
our frogs case study (see Section 4.1.2), as well as an exam-
ple of an image for enhancing/penalizing the public image of
specific politicians (as discussed in Section 4.2.1).
Specifically, Figure 23 shows an image connecting the
Smug Frog [52] and the ISIS memes [37]. Also, Figure 24
shows an image connecting the Smug Frog and the Brexit
meme [56]. Finally, Figure 25 shows a graphic image found
in /pol/ that aims to attack the image of Hillary Clinton, while
boosting that of Donald Trump. (The image depicts Hillary
Clinton as a monster, Medusa, while Donald Trump is pre-
sented as Perseus, the hero who beheaded Medusa.)
Furthermore, some of the communities we study in the cur-
rent work have taken an interest in our previous work. /pol/ has
taken a particular interest, and as additional evidence to the
community's meme creating "ability," Figures 26 and 27 are
two sample memes created in response to our work. Figure 26
is a manipulated photo of the 6th author, originally taken as
part of an interview for Nature News. /pol/ seized upon this
opportunity and, during the course of one discussion thread4,
decided that he "definitely masturbates to beavers," creating
Figure 26 to prove the point. Figure 27, which appeared in a
recent /pol/ thread5, is an edited version of a photo, related to
a Simpsons derived meme, of the 3rd author giving a talk on
our previous work.
In addition, after the release of the initial version of this pa-
per, /pol/ quickly picked up and its users started generating
memes. For example, they photoshopped the face of the first
author on top of a "comfy pepe" meme, the particular variant
of which is actually a screenshot from our previous work [21],
hence creating the new "very comfy Savvas Zannettou" vari-
ant in Figure 28.6 At the same time, Figure 7 from the current
work became a meme itself, as /pol/ users treated it as a base
upon which to build further memes. Figure 29 shows the graph
with /pol/'s "logo," Figure 30 the graph combined with a vari-
ation of the Smug Frog Meme, Figure 31 the same gra[h with
the "comfy pepe" meme, while the newly created "very comfy
Savvas Zannettou" appears as a variant too (see Figure 32).
To conclude, our work also attracted the interest of the press,
and journalists have created their own memes about our paper.
For instance, in a Quartz article7, an Expanding Brain meme
was created and shared showing the use of memes by peo-
ple, while in an IFLSCIENCE article8 a Distracted Boyfriend
Meme was shared showing our particular value to the scien-
tific community: we have, in large part, quantified some fun-
damental aspects of memes on the Internet, leaving the rest of
the community to focus on other areas of curiosity.
4http://archive.4plebs.org/pol/thread/129243152/
5http://archive.4plebs.org/pol/thread/172617415/
6http://archive.4plebs.org/pol/thread/175115412
7https://goo.gl/KubZjX
8https://goo.gl/YKVjw2
21
Figure 23: Image that exists in the clusters that are connected with
frogs and Isis Daesh.
Figure 27: A meme of the 3rd author of this paper created by /pol/.
Figure 24: Image that exists in the clusters that are connected with
frogs and Brexit.
Figure 28: A meme of the 1st author of this paper created by /pol/
via modification of a Figure from the "Rare Pepe" appendix in [21].
This new variant, "a very comfy Savvas Zannettou," is a modification
of the "comfy pepe" meme.
Figure 25: Meme that is used for enhancing/penalizing the public im-
age of specific politicians. Hillary Clinton is represented as Medusa,
a monster, while Donald Trump is presented as Perseus (the hero who
beheaded Medusa).
Figure 26: A meme of the 6th author of this paper created by /pol/.
22
Figure 29: A meme created by /pol/ users combining Figure 7 with
/pol/'s logo.
Figure 30: A meme created by /pol/ combining Figure 7 with the
Smug Frog Meme.
Figure 31: A meme created by /pol/ users combining Figure 7 with
the "comfy pepe" meme.
Figure 33: A variant of the "expanding brain" meme created by QZ
in an article about this paper. The meme illustrates a progression of
"intelligence," starting from people that just look at memes and cul-
minating in those that write a paper about memes (i.e., the authors of
this paper).
Figure 32: A meme created by /pol/ users combining Figure 7 with
the "very comfy Savvas Zannettou" variant from Fig 28.
Figure 34: A meme created by IFLSCIENCE in an article featuring
this paper.
23
|
1806.06813 | 1 | 1806 | 2018-06-18T16:41:28 | "What's ur type?" Contextualized Classification of User Types in Marijuana-related Communications using Compositional Multiview Embedding | [
"cs.SI"
] | With 93% of pro-marijuana population in US favoring legalization of medical marijuana, high expectations of a greater return for Marijuana stocks, and public actively sharing information about medical, recreational and business aspects related to marijuana, it is no surprise that marijuana culture is thriving on Twitter. After the legalization of marijuana for recreational and medical purposes in 29 states, there has been a dramatic increase in the volume of drug-related communication on Twitter. Specifically, Twitter accounts have been established for promotional and informational purposes, some prominent among them being American Ganja, Medical Marijuana Exchange, and Cannabis Now. Identification and characterization of different user types can allow us to conduct more fine-grained spatiotemporal analysis to identify dominant or emerging topics in the echo chambers of marijuana-related communities on Twitter. In this research, we mainly focus on classifying Twitter accounts created and run by ordinary users, retailers, and informed agencies. Classifying user accounts by type can enable better capturing and highlighting of aspects such as trending topics, business profiling of marijuana companies, and state-specific marijuana policymaking. Furthermore, type-based analysis can provide more profound understanding and reliable assessment of the implications of marijuana-related communications. We developed a comprehensive approach to classifying users by their types on Twitter through contextualization of their marijuana-related conversations. We accomplished this using compositional multiview embedding synthesized from People, Content, and Network views achieving 8% improvement over the empirical baseline. | cs.SI | cs | "What's ur type?"
Contextualized Classification of User Types in Marijuana-related
Communications using Compositional Multiview Embedding
Ugur Kursuncu1,3, Manas Gaur1, Usha Lokala1, Anurag Illendula1, Krishnaprasad Thirunarayan1,
Raminta Daniulaityte1,2, Amit Sheth1 & I. Budak Arpinar3
8
1
0
2
n
u
J
8
1
]
I
S
.
s
c
[
1
v
3
1
8
6
0
.
6
0
8
1
:
v
i
X
r
a
Abstract- With 93% of pro-marijuana population in US
favoring legalization of medical marijuana1, high expectations
of a greater return for Marijuana stocks2, and public
actively sharing information about medical, recreational and
business aspects related to marijuana, it is no surprise that
marijuana culture is thriving on Twitter. After the legalization
of marijuana for recreational and medical purposes in 29
states3, there has been a dramatic increase in the volume
of drug-related communication on Twitter. Specifically,
Twitter accounts have been established for promotional and
informational purposes, some prominent among them being
American Ganja, Medical Marijuana Exchange, and Cannabis
Now. Identification and characterization of different user types
can allow us to conduct more fine-grained spatiotemporal
analysis to identify dominant or emerging topics in the echo
chambers of marijuana-related communities on Twitter. In
this research, we mainly focus on classifying Twitter accounts
created and run by ordinary users, retailers, and informed
agencies. Classifying user accounts by type can enable better
capturing and highlighting of aspects such as trending topics,
business profiling of marijuana companies, and state-specific
marijuana policymaking. Furthermore, type-based analysis can
provide more profound understanding and reliable assessment
of
the implications of marijuana-related communications.
We developed a comprehensive approach to classifying users
by their types on Twitter through contextualization of their
marijuana-related conversations. We accomplished this using
compositional multiview embedding synthesized from People,
Content, and Network views achieving 8% improvement over
the empirical baseline.
Index Terms- Semantic Social Computing, Compositional
Multiview Embedding, Emoji Embedding, Network Embed-
ding, Marijuana, User classification
I. INTRODUCTION
"It's 4/20, and that means everyone is talking about
marijuana4," highlights the state of marijuana-related com-
munication on Twitter, especially around the time marijuana
legalization polls were conducted in the USA. As more
evidence is gathered through research studies on the safety
and benefits of the medical and recreational uses of cannabis,
1 Kno.e.sis Center, Wright State University, Dayton, OH, USA
{ugur,manas,usha,anurag,tkprasad,amit}@knoesis.org
State University, Dayton, OH, USA
CITAR, Wright
2
3 Dept. of Computer Science, University of Georgia, Athens, GA, USA
[email protected]
{kursuncu,budak}@uga.edu
1https://goo.gl/um2dDE
2https://goo.gl/spSnVX
3https://goo.gl/CJVX5a
4https://goo.gl/JGSs3X
there is a rise in public demand for broader legalization of
marijuana and its variants. Accordingly, it is useful to study
the engagement of users on social media to understand public
opinion and its influence on policies better.
Characterization of marijuana concentrate users on social
media can enable researchers and analysts to describe the
patterns of use, reasons of symptoms, and side effects as
well as identify the predictor of risks with the help of
spatiotemporal analysis. Specifically, classification of user
types in marijuana communications on social media can
aid in analyzing content-network dynamics at a user level,
through an assessment of homophily in marijuana-related
communities. Further, assessing the differences concerning
marijuana conversations, the information flow, and interac-
tions between user types, such as retail, informed agency and
personal accounts, can help better situate their characteristics
and understand the implications. For instance, in the case
of predicting the outcome of a state legalization process[1],
understanding the public opinions of the residents, assessing
trending marijuana related topics in their conversations and
monitoring their implications, are relevant and critical, as
these opinions translate to votes. We associate personal
user type (P) with an account handled by an individual
user expressing their opinions, retail user type (R) with an
account managed by a business entity to promote and market
marijuana-related products, and informed agency user type
(I) with an account handled by a group or organization to
disseminate marijuana related information. Throughout the
paper, we use informed agency & media interchangeably to
refer to the same user type.
In this study, we are proposing a user classification ap-
proach exploiting the multiview aspect of the Twitter data
and features extracted from people, content, and network
dimensions. The multiview stems from the inclusion of
text, image (profile pictures), emoji and network interactions
among accounts of different user types [2]. Hence, for
a reliable classification, we use Compositional Multiview
Embedding(CME) that combines different elements of the
context such as text, image, emoji and network activities.
This study addresses two key challenges: (i) The im-
balanced dataset due to the relatively few users pertaining
to Retail and Informed Agency user types, and (ii) Lack
of proper use of different contextual dimensions, precisely,
by incorporating Person-Content-Network views in compo-
sitional multiview embedding, for interpreting marijuana-
related Twitter data.
We create compositions of vector embeddings of these
views of the Twitter data, called Compositional Multiview
Embedding(CME), as it can represent the context in a more
coherent manner [3]. In our approach, we create two CMEs:
(i) one using tweet text, emoji and network interactions of
users, and (ii) another using user description and emoji. In
Section V-B, we explain the correlation analysis performed
on various feature combinations to assess their relationship.
For instance, we found that descriptions and network inter-
actions of users are highly correlated, suggesting that their
combination can affect the performance of the classifier over
the validation and test data. Therefore, we did not create
the embedding using these two views. We evaluated the
classifiers based on the individual F-scores of user type
classes. We also generated word embedding vectors for
profile pictures of users, which significantly improved the
performance of classification of the informed agency user
type. Details of our approach and results are discussed in
Sections V and VI respectively.
The remainder of the paper is organized as follows: In
Section II, we explain related works on the marijuana-related
user classification. In Section III, we provide preliminaries
about the concepts and technologies used. In Section IV, we
provide an exploratory analysis that includes statistics about
our dataset. Section V explains features and our experimental
settings, and Section VI discusses the results of our analysis.
Section VII concludes the paper with a summary and future
research directions.
II. RELATED WORK
In this section, we describe prior studies that are broadly
related to user classification, under three prominent sub-
headings: (i) Embedding based Approaches to User Clas-
sification, (ii) Diverse Features for User Classification, and
(iii) User-level Approaches.
A. Embedding based Approaches to User Classification
The profile of a user on Twitter consists of user descrip-
tion, tweets exchanged with their followers/friends, profile
picture. Researchers [4] utilized user tweets to learn an
embedding model using Long Short-Term Memory (LSTM)
and Recurrent Neural Network (RNN) to classify users
based on their gender and age information achieving an
accuracy of 91% and 82% respectively. In contrast, [5]
employed interactional features to generate embeddings for
a semi-supervised approach. Specifically, they utilize a small
number of seed users with labels (e.g., news agency, person,
genres) and interactions with "mentions" in their tweets. [6]
proposed an approach to learn the interactional features of
the users by optimizing the structural and attribute level prop-
erties of their networks that characterizes homophily in their
communication. In another study [2], researchers utilized
person-level multiview embedding to predict engagement,
friend selection and demographic information of users. In
contrast, our study gleans person, content and network-level
features, creating a composition of multiview embeddings
through vector addition operation that characterizes users in
the context of marijuana-related communications on social
media.
B. Diverse Features for User Classification
Prior work related to user classification on social media
has involved different sets of features. Person-level features
included profile [7], user behavior, first and last names [8],
demographics, Content level features including linguistic,
domain-specific and generic LDA topics, and Network level
features comprising follower-followee connections [7]. These
features were utilized to glean political affinity, ethnicity,
and favorability towards a particular profession, to generate
machine-readable user-profiles for improving the user classi-
fication [7], and to cluster users based on their conversations
and predict demographics [8]. Combination of these features
with network interactions results in a better-contextualized
representation of the dataset [9]. They claimed that their
model provides an in-depth analysis of users' communication
from both content and network perspective, and improves
user classification.
C. User-level Approaches
For particular problems such as identification of user
interests and event detection, user-level understanding of
the content as well as the network dynamics is pivotal.
In [10],
they classified users into three classes, namely,
organization, journalist (or media personnel), and an ordinary
person, to identify variation in characteristics across multiple
events. Engagement of users on a particular subject on
social media is considered as an important signal in social
media analytics, and has been used for user classification in
[11]. The authors developed a working model to categorize
a user as Idea Starter, Commentator, Curator, Amplifier,
and Viewer. In the election domain, political homophily on
social media forms a feature for user classification, and
[12] illustrates its significance for resolving reciprocated or
non-reciprocated ties in the network of users. Homophily
creates social echo chambers which polarizes the world
of users. This fact can be used to discriminate ordinary
users (or information seekers) from information providers
(e.g.,
topical analysis of the user-
generated content can be informative about their intentions.
In [13], topic-centric Naive Bayes classifier was developed to
identify the topics to categorize unknown users based on the
closeness of their topics to those of the users in the training
dataset. In recent years, there has been a surge in the use of e-
cigarettes among smokers, and Twitter has emerged as a cost-
effective platform for sharing and promoting information.
In [14], a user classification approach has been designed
employing metadata and tweeting behavior to classify users
as individuals, informed agencies, marketers, spammers, and
vapor enthusiasts.
journalist). Moreover,
III. PRELIMINARIES
Our approach uses several building blocks for an in-
depth analysis of tweet content to extract relevant context
in marijuana dataset. Specifically, we discuss the people-
content-network paradigm [15] and compositional word em-
beddings for expressiveness, EmojiNet for interpreting emoji,
Clarifai for processing profile pictures, and SMOTE for
oversampling.
A. People-Content-Network
On social media, communities are being formed around
various topics of interest through network interactions [15].
The information being shared in tweets by a user in the
marijuana community displays an intent that depends on the
user's type [16]. For instance, personal users share their ex-
periences and opinions on marijuana, retail accounts usually
promote the use of marijuana and other related products that
they sell, and media accounts disseminate information on
marijuana-related events and festivals, legalization processes.
Accordingly, as these user types show different characteris-
tics, it is critical to bring to bear different perspectives, such
as person, content, and network, for reliable analysis and
insights. We describe a systematic organization and analysis
of features in Section V-C.
B. EmojiNet
Emoji are a pictorial representation of facial expressions,
places, foods and other objects. These are often used by mar-
ijuana community on social media to express opinions and
emotions about marijuana-related topics. Emoji contribute to
the interpretation of the content created by the users and can
contribute to the better recognition of the characteristics of
user types. To achieve this goal, we make use of EmojiNet
[17] which gathers meanings of 2,389 emoji. Specifically,
EmojiNet provides a set of words (e.g., smile), associated
POS tags (e.g., verb), and their sense definitions. It maps
12,904 sense definitions to 2,389 emoji, to capture platform-
specific interpretations.
C. Word Embedding Model
A word embedding model created using word2vec can
learn a rich low dimensional representation of words in
a tweet corpus. Initially,
the word embedding procedure
was developed to generate distributional representations over
corpora such as Wikinews, News articles, and Google News
corpus that represent the current state-of-the-art. [18] also
shows that vector arithmetic over the word vectors can be
used to generate analogies. For instance, word embedding of
"Queen" can be obtained by summing the word embeddings
of "Man" and "Woman" and subtracting from it the word
embedding of "King."
In recent studies [19], [20], the researchers have shown
that word embedding models perform well over short texts.
In another study [21], the authors have created a named entity
recognition shared task for data from microblogging plat-
forms using distributed word representations. These recent
and prior successes in modeling words as computable vectors
have encouraged us to utilize a pre-trained word2vec model
trained over a generic Twitter corpus [21] or train a new
word-embedding model over our domain-specific Twitter
corpus. Depending on the type of the corpus (characterized
using sentence level statistics and word frequency counts),
we can use one of two neural network architectures for learn-
ing word2vec embeddings: (i) Continuous Bag-Of-Words
Fig. 1. Word Cloud of tweets from Informed Agency.
model [18] (CBOW) (ii) Skip-gram model [18]. In our study
we have used skip-gram architecture.
D. Compositional Word Embedding
In our study, we utilize compositional word embedding [3]
to combine feature-level embedding vectors and to generate
a comprehensive representation of a data point (e.g., user,
tweet, user descriptions). Specifically, we employ weighted
vector addition, a linear composition function detailed in [3].
Formally, we define Z, the weighted composition of word
embeddings of U and V as follows: Z = W0 · U + W1 · V ,
where U,V ∈ Rm×300(m represent number of users) are
two embeddings which are composed by weight-based (e.g.,
cosine similarity matrix) modulation using W0,W1 ∈ Rm×m,
respectively. Note that in such a composition, the dimension
of input and output representation is unaltered. As detailed
in Section V-B, it is essential to consider the correlation
between different view embeddings before composing them.
For instance, in Z the weight matrices will be optimized
through an optimization function; however, if the embed-
dings U and V are uncorrelated, it is computationally hard
to generate the representation of Z as such optimization
function over the two uncorrelated embeddings, will fail
to converge. Hence, we performed a linear composition,
vector addition, to generate the representation of Z. Since the
classification is insensitive to the position of emoji and words
in the content, we consider such composition as appropriate.
Formally, Z= U+V is a vector addition of U and V.
IV. EXPLORATORY ANALYSIS
We have conducted an analysis of our dataset by extracting
statistical, textual and topical information. Fig 1 captures the
word cloud synthesized using the tweets from the Informed
Agency user type that can be used to glean related topics.
We have three classes of user types, namely, Personal
Accounts (P), Informed Agency (I), and Retail Accounts
(R). Our corpus contains tweets crawled in Summer 2017
that includes the months of June, July, and August, covering
all states in the U.S. During this time frame, the volume
of communication-related to marijuana was high due to
ongoing events (e.g. Cannabis Cup, The 420 Games)5. Data
collection involved semantic filtering [22] utilizing the DAO6
ontology on the eDrugTrends7/Twitris platform8. The corpus
comprised of a total of 4,106,566 tweets from 1,066,615
5https://goo.gl/Xzsd5V
6https://goo.gl/9cXQcT
7http://wiki.knoesis.org/index.php/EDrugTrends
8http://twitris.knoesis.org
unique users. Out of nearly 4.1M tweets, 1,895,777 tweets
were identified as unique through tweet id and the content.
TABLE I
DESCRIPTIVE INFORMATION ON THE TRAINING SET.
Features ('#' is "number of")
#Tweets (T)
#Profile Pictures (PP)
#Users use Emoji (E)
#Users with Descriptions (D)
#Retweets
#Mentions
P
9836
4394
1085
3884
955
94
R
1928
476
37
461
24
6
I
338
111
17
108
964
307
Total
12102
4981
1139
4453
1943
407
We randomly selected a set of 4982 users with 12,103
tweets from our pool of 1M unique users to be considered as
the training set. The domain experts from CITAR9 annotated
the 4982 users in our training dataset as one of the following
three types: Personal Accounts, Informed Agency, and Retail
Accounts. After the annotation process, the distribution per
user type was as follows: 4395 personal, 476 informed
agency, and 111 retail accounts. Effectively, the distribution
of user types in the training set
is highly skewed. The
reason for sparsity among retailers (i.e., retail business twitter
accounts) is that marijuana is a schedule I10 drug according
to the federal law, and thus its promotion of social media
platforms is complicated due to its federal status as an illegal
drug. Similarly, media accounts are significantly smaller
compared to personal accounts, but still significantly higher
than the retail accounts. Such data imbalance poses a serious
risk in biasing the classifier towards the majority class.
Upon our initial exploratory analysis of the corpus, we
saw that the content in tweets and description of users are
adequate to identify the characteristics of different user types.
The average number of words in descriptions and tweets
are 9.6 and 12.8, while the average number of emoji in
descriptions and tweets are 0.46 and 0.26, respectively. 88%
of the users have their descriptions complete, and these user
descriptions carry information containing emoji and text that
can be utilized for classification.
Further, interactions among users can play an essential
role in disseminating the information and influence other
connected users in the network. The median number of
followers and friends for users are 367 and 376 respectively,
and the average number of tweets per user is 3.85. Our corpus
includes 2,837,734 interactions (mentions, retweets) between
users, 83% of which are retweets, and the rest are mentions.
This statistics suggests that there is much communication
among users that can contribute to the classification of user
types.
V. METHODOLOGY
The novelty in our approach to the user classification
problem is to leverage the multiview aspect of the Twitter
data by creating compositions of embeddings for different
views. As depicted in the overall architecture of our approach
in Fig 2, this section provides details of critical steps in our
approach.
9https://medicine.wright.edu/citar
10https://goo.gl/UQhR4D
Overall Architecture and Processing showing composition of
Fig. 2.
embeddings across People-Content-Network views for User Classification
A. Preprocessing
At this stage, we trained two Word Embedding(WE) mod-
els for Content and People views using our domain-specific
Twitter corpus. (i) The Content WE model is based on 1.8M
unique pre-processed tweets, and (ii) The People WE model
is based on pre-processed user descriptions of 1M unique
users. We built such two separate WE models because we
observed that user descriptions were more complete and
contained less jargon and slang terms as compared to tweets.
To obtain discriminative features for user classification,
we removed stop words, punctuations, and alphanumeric
characters from tweets and user descriptions. We also ex-
tracted URLs, mentions of screen names, retweeted user
screen names, contact information (e.g., phone number, email
and web address), and emoji. After that, we lemmatized the
tweets and user descriptions corpus. Moreover, we employ
EmojiNet [17] to retrieve senses and keywords from emoji,
and Clarifai11 to process profile pictures. The overall goal
is to enable gleaning of semantically relevant information
about users from their tweets for reliable determination of
user types.
B. Correlation Analysis
In this study, we perform correlation analysis between
embeddings of features from different views to assess which
compositional operation is appropriate. The similarity be-
tween embedding vectors derived from the textual repre-
sentation of features constrains the operations that can be
used to combine them since the resulting vector needs to be
representative of the components. For example, when two
embedding vectors are highly uncorrelated, dimensionality
reduction does not generate representative vector space.
However, uncorrelated embeddings can be composed merely
with vector addition, to make resulting vector space more
representative.
For instance, researchers [23] made use of operations such
as addition and concatenation, to combine word embedding
vectors of the input
text. These word embeddings were
generated from text corpora and knowledge bases for more
contextually rich representation of the input text. Similarly,
[24] retrofits word vectors, using the WordNet embeddings
to enrich the word embeddings of the input text.
The creation of embedding vectors is performed through
probabilistic calculations [25], and the embedding of each
11https://www.clarifai.com/demo
view (Section V-D) may or may not correlate with that of
the other views.
TABLE II
SPEARMAN (ρ) CORRELATION ANALYSIS FOR VIEW PAIRS
View Pairs
User Description & Emoji
Tweets & Emoji
Tweets & Network
User Description & Network
ρ
0.002
0.02
0.04
0.0001
p-value
< 0.01
< 0.01
< 0.01
> 0.01
We conducted correlation analysis between different pairs
of view embedding vectors as shown in Table II. The table
shows Spearman correlation and their corresponding p values
for these pairs.
We use Spearman as our correlation metric to measure the
similarity between view embeddings at each data point since
our embeddings do not follow the Gaussian distribution. In
this analysis, our alternative hypothesis (H1) is that the two
embedding vectors are uncorrelated, and similarly the null
hypothesis (H0) is that they are correlated. Having the p-
value, less than 0.01 suggests the rejection of H0. Hence,
based on Spearman, we see from the Table II that for the
first three pairs the null hypothesis of correlation H0 can be
rejected, while for the pair User description and Network, we
are unable to reject the null hypothesis of correlation (H0).
In fact, the data indicates that people interact closely based
on their similar user characteristics rather than the shared
tweet content in marijuana-related communications.
C. Feature Engineering
In our analysis, we have organized our features under three
main categories: Person, Content, and Network, since we
consider these as the main views of the Twitter communica-
tion that contribute to the context.
Fig. 3. Example profile pictures(2 each) of P(left), R(center) and I(right)
1) People: This set of features are user-level that con-
tributes to differentiating the user types from each other
on social media. Specifically, it includes user descriptions,
name, screen name, contact information and profile pictures.
• User Descriptions: This field holds the description of the
account that was defined by the user. As this metadata
carries information on characteristics of the user, we
exploit the elements of this feature such as text, emoji,
and contact information by employing text processing
techniques.
• Name: This field holds the name of each user where
users can enter their full personal, business, or or-
ganization name, or have an arbitrary entry. We use
this information to discriminate person users utilizing
a lexicon12 of commonly used person's first and last
names. In fact, we found that 68% of the person users
can be identified using names listed in the lexicon.
• Contact Information: We extract this information from
the description of users as it includes a phone number,
12https://goo.gl/8MY5Cz
email and web addresses. Usually, retail accounts pro-
vide this information in their profile for their customers
to reach out to them, making this feature a discrimina-
tive factor in classification.
• Profile Pictures: This visual form of Twitter data can
reflect feelings, emotions, intentions, and other charac-
teristics of a user. We consider this feature as discrimi-
native as there is a noticeable difference in profile pic-
tures of personal, retail, and informed agency accounts.
See Fig 3 for examples.
2) Content: To glean discriminatory features from tweet
content, we first separated text, emoji and URLs, and then
processed them separately.
• Tweet text: We first extracted tweet text, by filtering
other elements such as mentions, URLs, and emoji, and
concatenate tweets of each user. Then we created word
embedding vectors out of this textual data.
• URLs: Users usually provide URLs in their character-
limited tweets to refer to a more detailed version of
their stories. For instance, retail and media accounts use
URLs in their tweets to direct clients to their web page,
more often than personal accounts. The number and
frequency of URLs in a tweet can help to discriminate
among user types.
• Emoji: The use of emoji provides a concise and pre-
cise expression of opinions, reactions, sentiments, and
emotions concerning a topic of discussion. It
is a
discriminative feature in our study capturing the number
and senses of emoji used by different user types.
3) Network: As users on Twitter primarily interact using
replies, mentions, and retweets, we utilize these interactions
as our features to identify communication patterns for each
user type. We consider replies as mentions. In our ex-
ploratory data analysis of marijuana-related communications,
we found that the following features are prominent.
• Mentions: It is a derived feature where the author men-
tions the screen-name of another user and is considered
as direct interaction.
• Retweets: It is a derived feature where the retweeting
user forwards another users tweet and is considered a
direct interaction between these two users.
We generate network embeddings by creating the adjacency
matrix based on these interactions between users. This pro-
cedure is further explained in Section V-D.2
D. Compositional Multiview Embedding (CME)
The Twitter data contains multiple dimensions that we call
views, such as People, Content, and Network. These views
can be leveraged to contextualize a comprehensive and multi-
level analysis of the Twitter social network.
In our study, we employed the Content and People WE
models for generating embeddings for Content view (e.g.,
Tweets) and People view (e.g., User Descriptions and Profile
Pictures), respectively.
As described in Section III-B, the tweet content and user
descriptions involve emoji, which we regard as critical for
interpreting the meaning. For this reason, we extracted the
textual representation of emoji from EmojiNet, and generated
cumulative emoji embeddings utilizing a pre-trained word
embedding model that was trained over Wikinews corpus[26]
as explained in [27]. We also generated word embeddings for
profile pictures of users. As Clarifai provides a set of tags
that textually represents the profile images, we input these
tags into the People WE model because we consider profile
pictures as related to the People view. Then we generated
CMEs by combining the embeddings at the intersection of
different views of the Twitter data, as formulated below.
For Person and Content views (T), word embedding vector
(WV ) in each data point (WVTi, i represents an index of a data
point in a view) is calculated by averaging the word-vectors
of each word that is present in the view. For instance, we
preprocess the tweets of a user and generate word vectors of
each word in 300 dimensions. Then we sum these vectors and
divide by the number of words to generate the embedding
vector for tweets of the user. However, while we perform
the average operation to generate embedding vectors for
Person and Content views, we do not perform average for
the Network view. For generation of network embeddings,
we utilized interactional features (mentions and retweets) and
performed t-SVD to generate dense embeddings, where each
embedding has 300 dimensions. The procedure is detailed in
Section V-D.2.
We formally define the calculation of WVTi as WVTi =
∑w∈Ti∩V (cid:126)vw
, where (cid:126)vw is the embedding of word w and V is
Ti∩V
the vocabulary of the Content WE model trained over the
marijuana-related tweet corpus.
Fig. 4. Creation of CMEs for Tweet, Description, Emoji and Network
1) Tweet-Emoji(T+E) & User Description-Emoji(D+E):
We explained the procedure for generating WEs for Tweets,
User Descriptions and Emoji earlier in this section, and we
explain here how we generate CMEs for Tweet & Emoji,
and User Description & Emoji.
As depicted in Fig. 4, to generate the Tweet-Emoji CME,
we combine the WE vectors, which we generated for Tweets
and Emoji, by performing the vector addition operation.
Similarly for User Description-Emoji CME, we combine the
WE vectors for User Descriptions and Emoji via the vector
additon.
2) Network Embedding (N): The user types that we
characterize in this study have different volumes of network
activities. For instance, while average retweet and mention
rates (derived from Table I) per user are 0.9 and 0.09
respectively on personal accounts, they are 11.08 and 3.53
on informed agency accounts. Clearly, the network activity
can be used to distinguish and recognize these user types.
Thus, combining the network activity information with tweet
content and user information can contribute to a reliable
classification.
For representing the network activities of users, we created
the weighted adjacency matrix of interactions; however, the
adjacency matrix was sparse that made the generalization
of the classifier difficult. Hence, creating dense vectors is
imperative for better representation. For generating a low
dimensional dense vector, we utilize truncated Singular Value
Decomposition (t-SVD) which has proven to generate dense
embedding in NLP and network embedding tasks [28].
Formally, we define the adjacency matrix as A ∈ Rm×n,
where m and n denote source users and target users respec-
tively (capturing direction of communication).
Aui,u j = InteractionCountui,u j
(1)
where, for a pair of users ui,u j, Aui,u j represents a cell in
the matrix A of dimension m×n representing interaction
counts, which includes both retweets and mentions, for the
corresponding users.
The adjacency matrix A is sparse and non-stochastic
j=1 Ai, j (cid:54)= 1). As we need to create a dense and stochastic
(∑n
representation of the network activities, we normalize the
values in a row such that they will all sum up to 1. This
normalization is done by diving every value by the sum of all
values in a row, and this process makes the matrix stochastic.
As the number of sources and target users is mostly different
in A (1149× 1701), we convert A to square cosine matrix,
denoted by Acosine ∈ Rm×m obtaining a matrix 1149× 1149,
since we want to measure the similarity between users in our
training set. Transformation of A to Acosine is formulated as
follows: Acosine = A·AT
AAT. Each cell value in Acosine lies
between 0 and 1 and is symmetric.
As our adjacency matrix Acosine is 1149× 1149, we need
to reduce its dimension down to 300 for us to perform
composition of the network embedding with other word
embeddings. Therefore, we apply t-SVD over the matrix
Acosine resulting three square matrices: U, Σ, U T ∈ Rm×m,
where Σ ={σ1,σ2, ...,σm} is a set of m singular values. After
we apply the dimensionality reduction, the reduced matrix
becomes of dimension m × 300. We denote the reduced
matrix as Areduced ∈ Rm×300 and its value is determined by:
Areduced = Um×300 · (Σ−1
The 300 dimensional embeddings in Areduced is considered
as the network embedding of users, and is used to create a
CME in our user type classification.
300×300)T .
3) Network-Tweet-Emoji(N+T+E): After we generate the
network embeddings(NE) of users, we combine the WEs
for Tweets and User Descriptions, and NE to generate
the Network-Tweet-Emoji CME by performing the vector
addition operation. Embeddings for Network, Tweets and
Emoji are all in 300 dimensions.
E. Experimental Setting
In building the Content and Person WE models, we
used Skip-gram model with negative sampling. The rate of
negative sampling was set to 10 and the window size was
set to 5. Such a set up is desirable for datasets of average-
size [18]. The Content WE model was trained on a pre-
processed corpus of 1.8M unique tweets generated from
1M unique users creating a vocabulary (V) of 16,531 words.
The People WE model was trained on 946,975 pre-processed
user descriptions obtained from 1M unique users, generating
a vocabulary (V) of 16,903 words. Apart from linguistic
differences between user descriptions and tweets, another
reason to build two WE models is multiview aspect of our
dataset that also includes profile pictures and emoji in a
profile that reflect different contextual meanings as compared
to the tweets of a user. In order to create an embedding of a
profile picture, we used Clarifai to generate text caption and
then apply the Person WE model on the text caption.
Empirical Baseline: To the best of our knowledge,
the
problem of user type classification in marijuana-related com-
munications on Twitter that we address in this study has
not been investigated before. For this reason, we created
an empirical baseline that utilizes word embeddings of the
textual content of tweets and descriptions.
We conducted two sets of experiments depending on the
inclusion of CME with network level features. The first
set of experiments do not include the CME with network
level features, and we incrementally include the Person and
Content
level features. We utilize all data points in our
training set that comprises of 4982 users. As discussed in
earlier sections, interactions also play an essential role in
forming the characteristics of user types. Therefore,
the
second set of experiments included CMEs which contain
Network level features, where we take the best performing
classification setting from the first set of experiments as a
baseline for comparison. At this stage, we had to reduce the
size of the training set down to 1149 users where the sizes
of P, I, and R classes were 1045, 87 and 17 respectively.
Since our training set was highly imbalanced, we applied
the oversampling algorithm SMOTE to avoid bias towards
the majority class at the expense of the minority classes.
In our experiments,
to illustrate the improvement
that
the domain specific WE models provides, we also utilized
a generic word2Vec model, called Tweet2Vec [21], for a
comparison, which is explained in detail in Section VI.
VI. RESULTS
TableIII and Table IV present the results of the two sets of
experiments. The first set of experiments involve only user
profile and tweet content level features, whereas the second
set of experiments involve the addition of network features.
To illustrate the improvement obtained by the addition of
network level features into the classification, we take the
best performing approach of the first set of experiments as
the baseline for the second set of experiments.
The different feature sets incorporate different views of the
data as explained in Section V. We systematically and gradu-
ally include person-content-network features to observe their
individual contributions to the outcome of the classification.
TABLE III
RESULTS ON CLASSIFICATION OF USER TYPES WITH 4982 USERS.
Feature Set
E(T),E(D)
T2V(T),T2V(D)
E(T+E),E(D+E)
E(T+E),E(D+E),
TMD,UMD
E(T+E),E(D+E),
TMD,UMD,PP
Precision
I
0.86
0.87
0.96
P
0.91
0.89
0.89
R
0.79
0.87
0.88
P
0.99
0.99
0.99
Recall
I
0.27
0.10
0.10
R
0.67
0.66
0.60
P
0.95
0.94
0.94
F-score
I
0.42
0.18
0.18
R
0.73
0.75
0.71
Avg.F
0.88
0.86
0.85
0.89
0.95
0.84
0.99
0.09
0.63
0.94
0.17
0.72
0.85
0.97
0.99
0.88
0.99
0.77
0.92
0.98
0.87
0.90
0.97
RESULTS FOR CLASSIFICATION OF USER TYPES WITH 1149 USERS
TABLE IV
Precision
P
I
Recall
I
F-score
I
Avg.F
R
R
P
R
P
1.0
0.95
0.95
0.82
0.97
0.95
0.95
0.72
0.87
0.57
0.99
0.93
0.98
0.96
Feature Set
E(T+E),E(D+E),
TMD,UMD,PP
E(N),E(T+E),
E(D+E),TMD
UMD,PP
E(N+T+E),
E(D+E),TMD
UMD,PP
0.96
E:Embedding, T:Tweet, D:Description, N:Network, T2V:Tweet2Vec,
TMD:Tweet Metadata, UMD:User Metadata, PP: Profile Pictures
We evaluated our approach using Average F-score (Avg.F)
for each user type (P,I,R). We also report precision, recall,
and average F-score, and discuss the overall performance.
0.67
0.87
0.73
0.91
0.96
0.98
0.52
0.80
0.97
0.97
1.0
0.58
0.86
0.98
0.95
The baseline approach that we empirically chose achieved
an overall F-score of 88% using the word embeddings
of tweets content and user descriptions. The F-scores for
individual classes of P, I, and R were 95%, 42%, and 73%,
respectively. We generated these embedding vectors using
the domain-specific word embedding models.
As we see in Table III that the classifier built with the
embeddings of tweets and descriptions generated through the
Tweet2Vec model obtained an average F-score of 86%, and
underperformed for P and I classes. Therefore, we continued
experiments using Content and People WE models.
As discussed in Section V, to better contextualize different
elements of the content such as text and emoji, we have
generated CMEs from the tweets and emoji embeddings,
and similarly from user descriptions and emoji. Though this
experiment has shown a reduction of average F-score by 3%,
the precision has been improved by 10% for I and R classes,
meaning false positives for I and R are reduced. Given
the small size of these classes in our training dataset, such
improvement in precision encouraged us to further continue
our experiments with the inclusion of CMEs.
We have further included the tweet and user metadata to
the feature set, and it still did not make a significant differ-
ence in the performance. However, the inclusion of profile
pictures as a feature in the experiments showed a significant
improvement in the overall F-score to 97%, where F-scores
for P, I, and R were 98%, 87%, and 90%, respectively. As
discussed earlier, we can benefit from the multiview aspect of
the Twitter data to cultivate more satisfactory interpretation
of the content. The inclusion of textual data, emoji and profile
pictures in our approach by combining them through CMEs
for classification of user types, has impacted the outcome
significantly. Furthermore, recall that, in the second set of
experiments, we have extended our study by applying our
approach with the addition of network interactions between
users. We have generated network embeddings from the
interactions between users. We have used the best performing
classifier from the first set of experiments(Table III) as a
baseline for the second set of experiments, to compare our
approach that incorporates the network embeddings.
In our second set of experiments, we have first added
the network embedding as a separate feature along with
the features from the second baseline approach, and it did
not affect the performance. Then we created CME from the
embeddings of tweets, emoji, and network, and it boosted the
performance of each class, P, I, and R in terms of their F-
scores, by 1%, 6%, and 4%, respectively. It also improved the
overall F-score by 1%. The improvement that we achieved by
applying CMEs is significant since the F-score for the second
baseline was already significantly high, and our approach has
improved upon that performance.
VII. CONCLUSION AND FUTURE WORK
Our overarching goal was to utilize people, content,
and network related features in marijuana-related commu-
nications on Twitter to classify the user types into three
prominent categories: Personal, Informed Agency, and Retail
accounts. Such a classification provides support for under-
standing the dynamics of issues related to marijuana and its
variants from location and temporal perspectives ultimately.
Furthermore, dominant and trending topics can be identified
for each user type for more precise and reliable subjective
analysis of related events and their impacts.
In this paper, we introduced an approach to classify
user types utilizing Compositional Multiview Embedding
(CME). For this purpose, we learned a domain-specific
embedding for tweet text, a separate embedding for user
profile descriptions, and a mapping of profile images to tags
to obtain their embeddings, while incorporating emojis as
words using EmojiNet embeddings. We also incorporated in-
teractional features by creating network embeddings. Overall,
we achieved 7% improvement over the empirical baseline,
when we used the CMEs without network embedding and
8% improvement when we used the CMEs with network
embedding. The latter also resulted in an F-score of 0.96.
Although we are implicitly addressing the homophily
through assessing the similarity between users based on
different views, we plan to enhance our work by analyzing
homophily in marijuana-related communications on Twitter
as a case study by leveraging the approach explained in this
paper. Upon the completion of review process, we will out-
source our baseline and annotated dataset for reproducibility.
ACKNOWLEDGEMENT
Research reported in this publication was supported by National Institute
on Drug Abuse (NIDA) of the National Institutes of Health (NIH) under
award number 5R01DA039454-03. The content is solely the responsibility
of the authors and does not necessarily represent the official views of the
NIH.
REFERENCES
[1] U. Kursuncu, M. Gaur, U. Lokala, K. Thirunarayan, A. Sheth, and
I. B. Arpinar, "Predictive Analysis on Twitter: Techniques and Appli-
cations," in Springer-Nature, 2018.
[2] A. Benton, R. Arora, and M. Dredze, "Learning multiview embeddings
of twitter users," in ACL, 2016.
[3] J. Mitchell and M. Lapata, "Composition in distributional models of
semantics," Cognitive science, 2010.
[4] D. Zhang, S. Li, H. Wang, and G. Zhou, "User classification with
multiple textual perspectives," in COLING, 2016.
[5] G. Rizos, S. Papadopoulos, and Y. Kompatsiaris, "Learning to classify
users in online interaction networks."
[6] L. Liao, X. He, H. Zhang, and T. Chua, "Attributed social network
embedding," arXiv preprint arXiv:1705.04969, 2017.
[7] P. A. Pennacchiotti, M, "Democrats, republicans and starbucks affi-
cionados: user classification in twitter," in ACM SIGKDD, 2011.
[8] S. Bergsma, M. Dredze, B. Van Durme, T. Wilson, and D. Yarowsky,
"Broadly improving user classification via communication-based name
and location clustering on twitter," in NAACL-HLT, 2013.
[9] W. Campbell, E. Baseman, and K. Greenfield, "Content+ context
networks for user classification in twitter," in NIPS, 2013.
[10] M. De Choudhury, N. Diakopoulos, and M. Naaman, "Unfolding
the event landscape on twitter: classification and exploration of user
categories," in ACM CSCW, 2012.
[11] R. Tinati, L. Carr, W. Hall, and J. Bentwood, "Identifying communi-
cator roles in twitter," in WWW, 2012.
[12] E. Colleoni, A. Rozza, and A. Arvidsson, "Echo chamber or public
sphere? predicting political orientation and measuring political ho-
mophily in twitter using big data," Journal of Communication, 2014.
[13] A. Fang, I. Ounis, P. Habel, C. Macdonald, and N. Limsopatham,
"Topic-centric classification of twitter user's political orientation," in
ACM SIGIR, 2015.
[14] A. Kim, T. Miano, R. Chew, M. Eggers, and J. Nonnemaker, "Classi-
fication of twitter users who tweet about e-cigarettes," JMIR, 2017.
[15] H. Purohit, Y. Ruan, A. Joshi, S. Parthasarathy, and A. Sheth, "Un-
derstanding user-community engagement by multi-faceted features: A
case study on twitter," in WWW Workshop SoME, 2011.
[16] H. Purohit, G. Dong, V. Shalin, T. Prasad, and A. Sheth,
"Intent classification of short-text on social media," in Smart
City/SocialCom/SustainCom (SmartCity), 2015 IEEE International
Conference on.
IEEE, 2015.
[17] S. Wijeratne, L. Balasuriya, A. Sheth, and D. Doran, "Emojinet:
An open service and api for emoji sense discovery," arXiv preprint
arXiv:1707.04652, 2017.
[18] T. Mikolov, I. Sutskever, K. Chen, G. Corrado, and J. Dean, "Dis-
tributed representations of words and phrases and their composition-
ality," in NIPS, 2013.
[19] J. Lilleberg, Y. Zhu, and Y. Zhang, "Support vector machines and
word2vec for text classification with semantic features," in IEEE
ICCI* CC, 2015.
[20] P. Wang, B. Xu, J. Xu, G. Tian, C. Liu, and H. Hao, "Semantic
expansion using word embedding clustering & convolutional neural
text classification," Neurocomputing,
network for improving short
2016.
[21] F. Godin, B. Vandersmissen, W. De Neve, and R. Van de Walle,
"Multimedia lab @ acl wnut ner shared task: Named entity recognition
for twitter microposts using distributed word representations," in
Proceedings of the Workshop on Noisy User-generated Text, 2015.
[22] A. Sheth and P. Kapanipathi, "Semantic filtering for social data," IEEE
Internet Computing, 2016.
[23] J. Goikoetxea, E. Agirre, and A. Soroa, "Single or multiple? combining
word representations independently learned from text and wordnet."
in AAAI, 2016.
[24] M. Faruqui, J. Dodge, S. K. Jauhar, C. Dyer, E. Hovy, and N. Smith,
"Retrofitting word vectors to semantic lexicons," arXiv preprint
arXiv:1411.4166.
[25] R. Bamler and S. Mandt, "Dynamic word embeddings," in ICML,
2017.
[26] T. Mikolov, E. Grave, P. Bojanowski, C. Puhrsch, and A. Joulin,
"Advances in pre-training distributed word representations," arXiv
preprint arXiv:1712.09405, 2017.
[27] S. Wijeratne, L. Balasuriya, A. Sheth, and D. Doran, "A semantics-
based measure of emoji similarity," arXiv preprint arXiv:1707.04653,
2017.
[28] A. Tsitsulin, D. Mottin, P. Karras, and E. Muller, "Verse: Versatile
graph embeddings from similarity measures," in WWW, 2018.
|
1309.2199 | 1 | 1309 | 2013-09-09T15:47:00 | Distinguishing Topical and Social Groups Based on Common Identity and Bond Theory | [
"cs.SI",
"cs.CY",
"physics.soc-ph"
] | Social groups play a crucial role in social media platforms because they form the basis for user participation and engagement. Groups are created explicitly by members of the community, but also form organically as members interact. Due to their importance, they have been studied widely (e.g., community detection, evolution, activity, etc.). One of the key questions for understanding how such groups evolve is whether there are different types of groups and how they differ. In Sociology, theories have been proposed to help explain how such groups form. In particular, the common identity and common bond theory states that people join groups based on identity (i.e., interest in the topics discussed) or bond attachment (i.e., social relationships). The theory has been applied qualitatively to small groups to classify them as either topical or social. We use the identity and bond theory to define a set of features to classify groups into those two categories. Using a dataset from Flickr, we extract user-defined groups and automatically-detected groups, obtained from a community detection algorithm. We discuss the process of manual labeling of groups into social or topical and present results of predicting the group label based on the defined features. We directly validate the predictions of the theory showing that the metrics are able to forecast the group type with high accuracy. In addition, we present a comparison between declared and detected groups along topicality and sociality dimensions. | cs.SI | cs | Distinguishing Topical and Social Groups Based on
Common Identity and Bond Theory
Przemyslaw A. Grabowicz§
∗ Luca Maria Aiello†
Víctor M. Eguíluz§
Alejandro Jaimes†
3
1
0
2
p
e
S
9
]
I
S
.
s
c
[
1
v
9
9
1
2
.
9
0
3
1
:
v
i
X
r
a
§{pms,victor}@ifisc.uib-csic.es
IFISC (CSIC-UIB)
Palma de Mallorca, Spain
ABSTRACT
Social groups play a crucial role in social media platforms
because they form the basis for user participation and en-
gagement. Groups are created explicitly by members of
the community, but also form organically as members in-
teract. Due to their importance, they have been studied
widely (e.g., community detection, evolution, activity, etc.).
One of the key questions for understanding how such groups
evolve is whether there are different types of groups and how
they differ.
In Sociology, theories have been proposed to
help explain how such groups form. In particular, the com-
mon identity and common bond theory states that people
join groups based on identity (i.e., interest in the topics dis-
cussed) or bond attachment (i.e., social relationships). The
theory has been applied qualitatively to small groups to clas-
sify them as either topical or social. We use the identity and
bond theory to define a set of features to classify groups into
those two categories. Using a dataset from Flickr, we extract
user-defined groups and automatically-detected groups, ob-
tained from a community detection algorithm. We discuss
the process of manual labeling of groups into social or top-
ical and present results of predicting the group label based
on the defined features. We directly validate the predictions
of the theory showing that the metrics are able to forecast
the group type with high accuracy. In addition, we present
a comparison between declared and detected groups along
topicality and sociality dimensions.
Categories and Subject Descriptors
H.3.5 [Online Information Services ]: Web-based ser-
vices; H.1.2 [User/Machine Systems]: Human informa-
tion processing;
∗P.A.G. has performed the research while visiting Yahoo!
Research Barcelona.
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
WSDM’13, February 4–8, 2013, Rome, Italy.
Copyright 2013 ACM 978-1-4503-1869-3/13/02 ...$15.00.
†{alucca, ajaimes}@yahoo-inc.com
Yahoo! Research
Barcelona, Spain
General Terms
Algorithms, Experimentation, Measurement
Keywords
Social Media, Groups, Bond theory, Identity theory, Flickr
1.
INTRODUCTION
A longstanding theory about the creation of social com-
munities affirms that people join groups driven by either
strong personal ties with other members or by the interest
in the group as a whole. As a result, depending on the preva-
lent motivation of members, spontaneously generated groups
can be categorized as either social or topical. This theory
is known as “common identity and common bond” [22] and
assumes that the two types of groups have distinct and well
recognizable traits that characterize them.
In recent years, the theory has been widely commented
and elaborated by social scientists from a theoretical per-
spective and through small-scale experiments [26, 29, 24],
but a validation over large-scale datasets together with the
development of rigorous, automated methodologies to dis-
tinguish the group types is missing. Indeed, the availability
of big data from social media platforms provides the op-
portunity to study the dynamics of the online communities
from a data-mining perspective [19, 21, 14]. None of those
experiments, however, have been directly aimed at verifying
the common identity and common bond theory.
The design of a technique to detect the group type based
on the common identity and common bond principles would
first contribute to a strong validation of the theory itself
and, on the other hand, would provide a general framework
for automatic classification of user groups in online social
media. Such a classification would have direct impact on the
ability of describing the structure of online social networks
along the axes of sociality and topicality and, consequently,
on the possibility of better user characterization.
We contribute to fill this gap by proposing a set of gen-
eral metrics based on the theory. We show that the metrics’
values computed on a large corpus of groups extracted from
Flickr confirm the cardinal points of the theory and are in-
deed good predictors of the group type.
In addition, we
repeat the same analysis on groups identified by a graph-
based community detection algorithm. This allows us to
compare the user-generated communities to the automati-
cally detected ones not only from a structural perspective
but also along the dimensions of sociality and topicality.
Since community detection techniques have been largely em-
ployed in recent years to describe the structure of complex
social systems [8], the need for a clearer assessment of the
meaning of the detected clusters has been often expressed
from different angles [15, 31], but never completely satis-
fied. With our study we also contribute to shed light on this
matter.
To the best of our knowledge, this is the first attempt
of formalization of the common identity and common bond
theory, and of its validation over a large and diverse set of
user communities. The obtained results can open a new
perspective on the semantic interpretation of implicit and
explicit user groups in social media.
Our main contributions can be summarized as follows:
• Translation of the common identity and common bond
theory into general metrics applicable to social graphs.
An insightful characterization of a large group dataset
from Flickr is performed using the proposed metrics.
• Comparison between user-defined groups and groups
discovered by a community detection algorithm, both
in terms of their overlap and their properties of social-
ity and topicality.
• Design of a method to predict whether a group is social
or topical, based on the defined metrics. Prediction on
the user-generated groups from the Flickr data yields
surprisingly good results.
The rest of the paper is structured as follows. In Section 2
we overview related work. In Section 3 we describe the main
principles of the common identity and common bond theory
and propose their practical translation into general metrics,
and in Section 4 we introduce the Flickr dataset we use to
test these metrics. In Section 5 we describe the process of
gathering a ground truth about group topicality or social-
ity through an editorial process. In Section 6 we provide a
comparison between user-created Flickr groups and groups
identified by a community detection algorithm in terms of
their overlap, then we study the properties of the defined
metrics computed over declared and detected groups and
in particular over the subsets of groups labeled as social or
topical in the ground truth that we produced. Finally, in
Section 7 we show that we can accurately predict the group
type by combining the defined metrics.
2. RELATED WORK
The spontaneous aggregation of people in communities
has been widely studied in social science as one of the fun-
damental processes driving the global dynamics of social
ecosystems [18] and as a factor driving the formation of the
social identity of individuals [27].
Since the emergence of online social media, the global
structure, evolution and dynamics of social groups have been
investigated over large-scale and heterogeneous datasets [12].
Evolution of groups has been characterized as a very broad
phenomenon [19, 5] that is dependent on the nature of the
group [6], its intrinsic fitness [11] and on the density of social
ties connecting its members [2]. Dependency of activity and
connectivity on group size has been studied in several plat-
forms [13, 14, 10], showing relations to Dunbar’s theory on
the upper bound of around 150 stable social relationships for
an average human [7]. Besides activity, similarity between
users is an important dimension in modeling individual users
in groups [28], particularly given that, to a large extent, so-
cial media users tend to aggregate following the homophily
principle [1]. Nevertheless, similarity is not necessarily the
best indicator for group activity and longevity, as diversity
of content shared between group members is a relevant fac-
tor to keep alive the interest of members [17].
At a finer scale, social communities can be described in
terms of user engagement. From a quantitative perspective,
the amount of participation of members in activities related
to the group is varied and dependent on group size [3]. Intra-
group activity has been characterized in terms of propensity
of people to reply to questions of other members [30], coher-
ence of discussion topics [9], or item sharing practices [21].
Modeling inner activity of groups has helped in finding ef-
fective strategies to predict future group growth or activ-
ity [14], recommend group affiliation, or enhance the search
experience on social platforms [20].
Social and thematic components of communities have been
widely studied in social science, most of all within the com-
mon identity and common bond theory on which the present
work is based [22, 26, 24]. Nevertheless, the principles be-
hind the theory have never been translated into practical
methods to categorize groups, nor tested on large datasets.
On the other hand, data-driven studies have investigated
social and thematic components separately when character-
izing groups [5]. Preliminary insights on the interweavement
between such dimensions have been given in exploratory
work on Flickr, where signals of correlation between social
density and tag dispersion in groups is shown [23]. In this
paper, we go far beyond that point, defining metrics that
can be used to predict if a group is social or topical and
testing their effectiveness against a reliable ground truth.
Besides the analysis of user-created groups, the study of
automatically detected groups through community detection
algorithms has attracted much interest lately [8]. Detected
communities are supposed to represent meaningful aggre-
gations of people where dense or intense social exchanges
take place among members [13]. Nevertheless, even if syn-
thetic methods to verify the quality of clusters have been
proposed [15], the question of whether such artificial groups
capture some notion of community perceived by the users re-
mains open. If on the one hand the computation of cluster-
goodness metrics over user-created groups can give useful
hints about their structural cohesion [31], on the other hand
a direct comparison between user-created groups and de-
tected communities is still missing, particularly in terms of
the amount of sociality or topical coherence they embed.
3. TOPICAL AND SOCIAL GROUPS
Notions of community and social group have been widely
studied in the behavioral sciences [25, 27]. It has been shown
that the internal dynamics of social groups emerge from the
combination of complex cognitive processes such as sense
of membership, influence between people, fulfillment of in-
dividual and collective needs inside the group, and shared
emotional connections [18]. Based on such widely accepted
theoretical foundations, sociological theories have been for-
mulated to disentangle all of these complex aspects.
In the following subsections, we provide a high-level de-
scription of one of the most known theories on group forma-
tion and propose a translation of its main cornerstones into
general metrics that can be applied on social graphs.
group g as:
rint
g =
Eint,rec
g
/2
Eint,rec
g
/2 + Eint,nrec
g
,
(1)
3.1 Identity and Bond Theory
The common identity and common bond theory describes
social groups along the dimensions of topicality and social-
ity [22, 24]. According to the theory, the attachment to
a group, as well as the permanence and involvement in it,
can be explained in terms of common identity or common
bond. Identity-based attachment holds when people join a
group based on their interest in the community as a whole or
in a well-defined common theme shared by all of the mem-
bers. People whose participation is due to identity-based
attachment may not directly engage with anyone and might
even participate anonymously. Conversely, bond-based at-
tachment is driven by personal social relations with other
specific members, and thus the main theme of the group
may be disregarded. The two processes result in two differ-
ent group types, that for simplicity we name “topical ” for
identity-based attachment and “social ” for bond-based at-
tachment.
In practice, groups can be formed from a mix of identity
and bond-based attachment, but very often they tend to lean
more towards either sociality or topicality. According to the
theory, the group type is related with the reciprocity and the
topics of discussion. Members of social groups tend to have
reciprocal interactions with other members, whereas inter-
actions in topical groups are generally not directly recipro-
cated. In addition, topics of discussion tend to vary drasti-
cally and cover multiple subjects in social groups, while in
topical groups discussions tend to be related to the group
theme and cover specific areas. According to the theory, so-
cial groups are founded on individual relationships between
their members, therefore it is harder for newcomers to join
and integrate with members that already have strong rela-
tionships between each other. One implication of this is that
social groups are vulnerable to turnover, since the departure
of a person’s friends may influence his own departure. Top-
ical groups, on the other hand, are more open to newcomers
and more robust to departures.
3.2 From theory to metrics
Based on the theoretical principles described above, it is
possible to construct metrics to differentiate between the
two types of groups. In particular, it is possible to quantify
the reciprocity of interactions, and the topicality of the in-
formation exchanged between group members. We adopt a
very general multidigraph model that fits most of the cur-
rent social media platforms. Members are represented as
nodes, and each distinct interaction between any two mem-
bers is represented by a directed arc. Nodes can belong to
multiple groups and we associate, with each group, a bag of
user-generated terms (e.g., tags, group posts).
Next, we describe: i) reciprocity metrics, used to quanti-
fying group sociality, ii) entropy of terms, to determine how
much the topics of discussion vary within a group, and iii)
activity metrics, to measure the liveliness of the group.
3.2.1 Reciprocity
Reciprocity occurs whenever a user interacts with another
user and that user responds her at any time later with the
same type of interaction. We define intra-reciprocity of a
g
g
and Eint,nrec
where Eint,rec
are, respectively, the number
of reciprocated and non-reciprocated links internal to the
group g. Correspondingly, the inter-reciprocity at the bor-
der of the group is defined by rext
g , accounting for the reci-
procity between members and non-members.
We normalize the intra-reciprocity score using the average
reciprocity value (cid:10)rint
g (cid:11) over all groups:
tg =
rint
g
(cid:10)rint
g (cid:11)
.
(2)
The larger the intra-reciprocity, the higher the probability
that the group is social. Alternatively, to compensate for the
effect of the correlation between reciprocity and the number
of internal interactions, and to account for local effects, the
intra-reciprocity can be normalized by the inter-reciprocity:
ug =
rint
g + 1
rext
g + 1
.
(3)
We add 1 to both numerator and denominator to reduce the
fluctuations of ug at low values of rext
g . This relative reci-
procity compares the reciprocity between the members with
their reciprocity toward people not belonging to the group.
It reflects how sociality of group members distinguishes itself
from the environment.
3.2.2 Topicality
The set of terms T (g) associated with a group indicates
the topical diversity of the group. Thus we measure the
entropy of the group as
H(g) = − X
p(t) · log2 p(t),
(4)
t∈T (g)
where p(t) is the probability of occurrence of the term t in
the set T (g). The higher the entropy, the greater is the vari-
ety of terms and, according to the theory, the more social the
group is. Conversely, the lower the entropy, the more topical
the group is. In addition, since not all groups have the same
number of terms and the entropy value grows with the total
number of terms, we introduce the normalized entropy hg,
which is normalized by the average value of entropy for the
groups with the same number of terms:
hg =
H(g)
hH(f )iT (g)=T (f )
.
(5)
3.2.3 Activity
Even if, for the considered theory, activity is not a discrim-
inative factor between social and topical groups, it is useful
to characterize the liveliness of a community. Activity is
quantified in terms of the number of internal interactions
normalized by the expected number of internal interactions
for a set of nodes with the same degree sequence:
ag =
(Din
g
Eint
g Dout
g
.
)/E
(6)
g and Dout
Din
are total numbers of interactions originated
by members of the group g or being targeted to members of
g
comments
favorites
contacts
238M
112M
71M
decl. g.
504K
det. g.
646K
Table 1: Total number of interactions and declared/detected
groups.
Moreover, OSLOM has performed well in recent community
detection benchmarks [15] and it outperformed other algo-
rithms we tested. OSLOM detected 646K groups.
4.3 Tags
this group, where E is the total number of interactions in the
network. If this property has a value higher than 1 then the
number of interactions internal to the group is higher than
the number of interactions expected in a random scenario
with the same group activity volume.
Another way of measuring activity of a group is by com-
paring density of its internal interactions with the density
of its external interactions:
Eint
g /(sg(sg − 1))
Eext
g /(2(N − sg)sg)
bg =
(7)
,
where sg is the cardinality of group g and N is total number
of nodes in the network. Values of bg greater than 1 indicate
a density of internal interactions higher than interactions be-
tween the group and the rest of the network. This metric
effectively compares intensity of interactions between mem-
bers of the groups with the intensity of their interactions
with the entire network.
4. DATASET AND PREPROCESSING
The wide variety of user groups and the richness of inter-
action types make Flickr an ideal platform for our study. We
use only public, anonymous data retrievable via the Flickr
public API, until the end of 2008. Table 1 summarizes the
data described below.
4.1 User interactions
We collected three types of pairwise, directed interactions:
Comments. User u comments on a photo of user v. This
interaction is mediated through the photo. We filter out the
comments of users on their own photos, obtaining a total of
238M comments.
Favorites. User u marks one of user v’s photos as a fa-
vorite. The interaction is mediated through the favorited
photo. We extract 112M favorite interactions.
Contacts. User u adds user v among his contacts. Social
contacts in Flickr are directed and may be reciprocated. One
person can choose another person as his contact only once
and the relation remains in the same state until the contact
is removed. There are 71M contacts in our dataset.
4.2 Groups
Users of Flickr can create, moderate and administer their
own groups. Most groups are open, so users can join without
an invitation. Others are only by invitation and joining re-
quires the administrator’s permission. There are over 500K
groups in our Flickr dataset.
In addition to user-created groups (we refer to them as
declared ), we analyze the sociality and topicality properties
of groups that are not defined by users but are instead found
by community detection algorithms (we name these detected
groups). We applied the OSLOM community detection al-
gorithm [16] over the entire network of social contacts in
our dataset. We choose OSLOM because it detects overlap-
ping communities, which is a natural feature of real groups.
We use tags of the photos as terms for our model. The pri-
mary set of photos from which we extract tags is the photo
pool of the group (i.e., the photos uploaded to the group by
its members). Photo pools are available for declared groups
only. In addition, in both declared and detected groups, the
interactions between members of the group that are medi-
ated through photos (i.e., comments, favorites) result in two
additional photo sets from which tags are extracted. We
process the three tag sets separately (pool, comments, fa-
vorites), and for each of them we compute the normalized
entropy (hpool
, hcom
, hfav
g ).
g
g
5. GROUP LABELING
To determine whether the defined metrics correctly cap-
ture the sociality and topicality of groups, we compare them
against a reliable ground truth. We asked human editors
to label groups based on well-defined guidelines extracted
directly from the common identity and common bond the-
ory [24]. For the labeling we randomly selected groups meet-
ing the following requirements: i) more than 5 members, ii)
more than 100 internal comments, iii) relative activities acom
higher than 102. The third requirement ensured us
and bcom
that the selected groups were active well above the expected
values in a random case. After this selection we obtained
over 34K declared groups and over 33K detected groups.
We describe the labeling process of such groups in detail in
the following subsections.
5.1 Information provided to editors
g
g
The labeling is based on the human capability of process-
ing the semantics and sentiment behind text and photos.
The labeling was performed to generate a ground truth of
“social” and “topical” groups. The editors were asked to
make judgments in this respect and were presented with the
following information for each group:
Group profile. The Flickr group profile consists of the
group name, description by the creator of the group, dis-
cussion board, photo pool, and map of places where photos
uploaded to the group pool were taken. This information is
available only for declared groups.
Comments. We provide text of all comments that happen
between the members. Comments are shown in chronolog-
ical order and are grouped by thread, if they appear under
the same photo. Additionally we also include a link to the
photo.
Tags. Editors are shown the list of the 5 most frequent
tags attached to the photos that mediate the internal com-
ments to the group. The list is sorted alphabetically.
5.2 Labeling guidelines
Human labelers were shown the information described
above and asked to categorize groups as either social, topical
or unknown. The last case is reserved for groups for which
text is written in a language unknown to the labeler, making
the task impossible to accomplish. Intentionally, no unsure
category was allowed to keep the categorization strictly bi-
nary, as the theory does. Some groups can be both topical
and social, and therefore difficult to categorize, but for the
sake of clarity and conformity with the theory we kept the
categorization as a binary task. Editors were provided with
specific instructions on how to recognize social and topi-
cal groups, and on how to perform the categorization. The
guidelines are summarized as follows:
I. Comments and photos. By examining comments and
photos, find traces of people who know each other or who
have a personal relationship. Knowing each other’s real
names, spending time together, co-appearing in photos, shar-
ing common past experiences, referencing mutually known
places, and disclosing personal information are all signals of
the presence of a social relationship [4]. The predominance
of friendly and colloquial comments (e.g., jokes, laughter)
is another element distinguishing social groups from topical
groups.
In topical groups, the atmosphere is more formal
and comments tend to be more impersonal [26]. Examples
of impersonal comments include expressing appreciation for
photos, praising the photographers, thanking them for their
work, or commenting on any particular topic in a neutral
way. As a rule of thumb, if many personal comments are
detected, then the sociality of the group should be consid-
ered high. If such comments are not many (e.g., just between
small subsets of members), but the overall atmosphere of the
interaction is rather personal and friendly, then we consider
the sociality of this group as fairly present. If, on the other
hand, comments are mainly impersonal and neutral, social-
ity has to be considered low, in favor of higher topicality.
II. Tags and description. Read the tags and the profile
description of the group. If the tags are semantically con-
sistent then the topicality of the group should be considered
high, and even higher if the name and description of the
group corresponds to the content of the tags. In some cases,
tags or group descriptions can contain words indicating per-
sonal relations or events (e.g., “wedding”, “grandpa”, names,
etc.), indicating a higher sociality of the group. Tags can
also contain names of specific locations. Geo-characterized
tags can be reasserted by looking at the map of places where
photos were taken. Such tags are a good indication that the
sociality of the group is present, but that has to be confirmed
through the inspection of comments.
The editors labeled the groups after judging the two as-
pects above. If both tags and comments are highly social
or topical, then the choice of label is straightforward. If the
tags are highly topical and the comments are not social then
the group is labeled as topical, and vice versa. If the tags
are a bit topical and comments highly social then the group
is labeled as social. The labelers were asked to read as many
comments as needed to arrive to a fairly clear decision.
5.3 Group examples
To provide a sense of how the defined guidelines were ap-
plied in practice, we describe two examples. The first one is
a group titled “Airlines Austrian”, tagged with labels “air-
craft”, “airport” and “spotting.” Photos are from different
countries in Europe and the vast majority of them depict
airplanes. Members are very active in commenting and writ-
ing comments related on the aircraft theme (e.g., “I just love
this airplane, the TU-154M is just a plane Boeing or Air-
bus could never design”).
In this case, all of the features
are aligned with the concept of topical group defined in the
guidelines. The second group is named “Camp Baby 2008”
and it is described in the main page as a collection of photos
of a two-day event for young mothers taking place at a spe-
1000
a
g
s
100
d
e
t
c
e
t
e
D
10
100
Declared s g
1000
10
1
1000
c
g
100
s
d
e
t
c
e
t
e
D
10
1
10
100
Declared sg
1000
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
-0.1
1000
b
g
s
100
d
e
t
c
e
t
e
D
10
1
3
10
d
s
p
u
o
r
G
2
10
1
10
0
10
10
-2
e
1
y
t
i
r
a
l
i
m
i
s
p
u
o
r
G
0.8
0.6
0.4
0.2
0
0.5
0.4
0.3
0.2
0.1
10
100
Declared s g
0
1000
Real groups
Random
-1
10
Group similarity
0
10
Real groups
Random
1
10
2
10
s
g
3
10
4
10
Figure 1: Jaccard similarity between declared and detected
groups as a function of their sizes. Diagonal shows an inter-
esting pattern (a) which is not reproduced by randomized
groups (b). We subtract (b) from (a) and plot the result
in (c), and a histogram of similarity values for a sample of
groups lying at the diagonal in (d). For groups of various
sizes, we plot 91th and 99th percentiles of similarity between
declared and detected groups (e).
cific location. Photos depict people attending the event and
interacting with each other with a friendly attitude. Tags
and comments often contain names of individuals and refer-
ences to past common experiences (e.g., “I love Mindy and
can not wait to see her again!!”). Although the group has a
specific topic, its social component is very strong.
In practice, more ambiguous cases can occur and, ulti-
mately, the decision of the labeler has an arbitrary compo-
nent, as in every complex annotation process. Nevertheless,
the defined guidelines gave the labelers precise instructions
and, as described next, we recurred to multiple independent
editors to assess the quality of the extracted ground truth.
5.4 Labeling outcome
A total of 101 declared groups and 69 detected groups
were labeled by 3 people: two of the authors and an inde-
pendent labeler who was not aware of the type of study nor
of the purpose of the labeling. The inter-labeler agreement,
measured as Fleiss’ Kappa, is 0.60 for the declared groups,
meaning that there exists good agreement between labelers.
In order to assess the quality of the labels, we also counted
the number of messages exchanged between group members.
The counting was done anonymously in aggregate and the
content of the messages was not accessed. Groups labeled as
social contain around twice as many messages between their
members compared to topical groups of similar size. Even if
this does not constitute a proof of higher sociality, intuitively
people who get in touch via one-on-one communication are
more likely to have a more intimate social relationship.
The Kappa value for detected groups is around 0.44, re-
vealing lower agreement. A factor that partially determined
a
3
2.5
2
〉
g
t
〈
1.5
1
0.5
0
1.1
〉
g
h
〈
1
0.9
0.8
108
106
c
e
〉
g
104
a
〈
Declared groups
Detected groups
b
Photo pool
d
f
Comments
Favorites
Contacts
Randomized
102
100
100
101
102
sg
103
104
100
101
102
sg
103
104
Figure 2: Dependency of normalized reciprocity (a-b), nor-
malized entropy (c-d) and relative activity (e-f) on size of
groups for comments, favorites, contacts and photo pools,
for declared and detected groups. Blue dashed line is for
randomized photos (c-d) and groups (e-f).
such result is the lack of information about the group’s pro-
file, since it is not available for detected groups. Another
cause of the disagreement is a higher variability in the com-
ments. This may be because we use a network of contacts for
the purpose of finding clusters and defining detected groups,
which may not be the best proxy of personal relations.
In total we label 565 distinct declared groups and 126 dis-
tinct detected groups. We characterize them in the following
section.
6. CHARACTERIZATION OF GROUPS
We begin the analysis with a direct comparison of the
overlap between the declared and detected groups. Then we
characterize the two sets of groups in terms of the metrics
we introduced in Section 3.2. Finally, we study the relation
between the labels of the declared groups annotated by the
editors and the values of the metrics. Additionally, we report
ratios of groups labeled as social and topical among both
declared, and detected groups.
6.1 Membership overlap of declared and de-
tected groups
The groups from the two sets share typical properties of
groups found in on-line social networks. The distribution
of sizes of groups in both cases is heavy-tailed and close to
power-laws (not shown due to space limits). Declared groups
tend to be much bigger, having on average 61 members ver-
sus 7 members in detected groups.
To test if the groups from the two sets overlap, and to what
extent, we measure the Jaccard similarity between their
sets of members. Similarity is computed for all declared-
detected group pairs and for each detected group we select
the declared one with the highest similarity value as the best
match. We plot the average similarity of the best matches
1.1
1.05
1
g
h
0.95
0.9
0.85
0
Declared groups
Detected groups
a
Commented photos
Favorited photos
Photos in pool
1
2
3
tg
4
5
6
0
1
2
3
4
5
6
tg
b
1.1
1.05
1
0.95
0.9
0.85
7
Figure 3: Correlation between reciprocity of comments in-
side a group and entropy of photos commented or favorited
between its members, or belonging to the photo pool of this
group, for declared and detected groups.
as a function of the size of groups in Fig. 1a. Zero values of
similarity are not taken into account for these averages. For
the purpose of comparison with a null model, in Fig. 1b we
draw the same plot after randomly reshuffling the members
of detected groups, while preserving their sizes. We observe
that the two plots differ in values significantly along the di-
agonal, and that the difference between them is substantial,
as shown in Fig. 1c, meaning that indeed detected groups
are, to some extent, similar to the declared ones. Further
insights are shown in Fig. 1d, where we depict the distribu-
tion of similarities of pairs of groups extracted from a small
sector of the diagonal, having between 32 and 64 members.
The figure shows that there exist multiple detected groups
which overlap significantly with declared groups, and that
randomized groups do not show this pattern. This holds
for groups of all sizes, as shown in Fig. 1e, in which we
plot the 91th and 99th percentiles of the best match sim-
ilarity for detected groups of various sizes (e.g., 1% of de-
tected groups of size 20 have similarity with declared groups
higher than 0.75, while for the randomized case 1% of the
groups have similarity higher than just 0.05). Therefore, in
some cases the community detection algorithm finds groups
which are also defined by users (i.e., declared groups). We
present evidences that this does not occur by chance through
the comparison with the randomized case. Nevertheless, a
substantial overlap is found for just a small percentage of
groups. Most of the group pairs have similarity close to 0.
Consequently, the similarity of detected groups to the best-
matching declared groups is 0.082, while for the randomized
detected groups it is not much lower, yielding 0.058.
6.2 Statistical properties of metrics
Besides directly comparing membership overlap, we study
the variation of the metrics defined in Section 3.2 with the
group size. Reciprocity and normalized entropy have a wide
local maximum for groups of sizes between 50 and 100 mem-
bers, both for declared and detected groups, as shown in
Figs. 2a-d. This holds for all interactions and all sets of
tags, with the exception of contacts, for which the curves
are relatively flat. A similar local maximum has been found
in a recent study [13] for pairwise interactions in Twitter by
various community detection algorithms. We perform a ran-
domization of photos between groups, keeping the number of
photos per group fixed. The normalized entropy calculated
for the shuffled photos stays close to 1, as expected, and the
maximum disappears. A possible interpretation of the exis-
tence of the maximum is that these sizes tend to correspond
to social groups, while bigger groups are more frequently
Interaction
a
104
g
i
l
103
Topical
Social
b
c
102
104
g
i
l
103
102
103
g
i
l
102
g
a
g
a
101
101
102
sg
103
101
105
104
g
a
103
102
104
103
102
101
104
103
102
101
Activity
106
105
104
103
102
b
g
104
g
b
103
102
d
e
f
g
b
104
Reciprocity
j
k
l
g
t
g
t
g
h
i
4
3
2
1
0
3
2
1
0
2.5
g
t
2
1.5
1.3
1.25
1.2
1.15
1.1
1.05
1
g
u
1.15
g
u
1.1
1.05
1
1.25
g
u
1.2
1.15
m
n
o
)
g
(
H
)
g
(
H
)
g
(
H
103
103
101
102
sg
102
sg
103
1
101
102
sg
103
1.1
101
102
sg
103
7
6.5
6
5.5
6.5
6
5.5
5
4.5
4
5.5
5
4.5
4
3.5
3
101
Entropy
1.1
p
q
r
1.05
g
h
1
0.95
0.9
g
h
1.05
1
0.95
0.9
0.85
1.05
g
h
1
0.95
s
t
u
C
o
m
m
e
n
t
s
F
a
v
o
r
i
t
e
s
C
o
n
t
a
c
t
s
102
sg
103
101
102
sg
103
Figure 4: Averages of various properties of topical (black circles) and social (blue squares) groups as a function of their size.
Each point corresponds to 30 groups.
topical. Further findings to support this interpretation are
presented in the next subsection.
Strong correspondence of the maxima for normalized en-
tropy and reciprocity suggests that these properties are cor-
related, as shown in Fig. 3. While it may be natural to ex-
plain the correlation between reciprocity of comments and
normalized entropy based on commented photos, it is not
clear why we also find a positive correlation with normalized
entropy based on other sets of photos. A possible interpre-
tation is that high intra-reciprocity leads to wider variety of
topics covered inside of that group, and vice versa.
The values of relative activity both in declared and de-
tected groups are very high, as presented in Figs. 2e,f. As ex-
pected, activity of randomized groups exhibits values around
1 for all group sizes. For real groups instead, the value of
relative activity decreases with the size of groups and gets
close to 1 for very large ones. This may be caused by the fact
that larger groups cannot be as integrated as smaller groups
and the social commitment of their members towards other
members of the group drops due to limited human capabil-
ities. Additionally, we observe that the activity decay for
declared groups occurs sharply between groups of size 100
and 200, in agreement with Dunbar’s theory on the upper
bound of the number of stable relationships manageable by
a human. The activity drop for detected groups is contin-
uous and much more moderate (Fig. 2f), since community
detection algorithms tend by design to output node clusters
with high numbers of connections between them.
6.3 Relation between metrics and group label
Here we analyze properties and values of the metrics for
groups labeled through the editorial process. First, the ra-
tio of groups labeled as social differs between declared and
detected groups.
In declared groups we find around 48%
social groups, whereas among detected groups almost 69%
are labeled as social. Additionally, we picked 50 detected
groups among the ones that are the most similar to declared
groups. Specifically, we selected them randomly from the
99th percentile shown in Fig. 1. These groups have signif-
icant overlap with declared groups and should share simi-
lar properties. Indeed, the ratio of groups labeled as social
among them is closer to that of declared groups and equal to
53%. We conclude that detected groups are more likely to be
social than declared ones. It is a somewhat expected result,
since clustering algorithms detect dense parts of a network,
and so they are inclined to detect areas with more reciprocal
connections. Note that the theory envisions more recipro-
cal relations in social groups. Thus, community detection
algorithms are more likely to find social groups, however,
determining to what extent it happens is not trivial.
One of the expectations is that bond-based groups should
not be very large, as the human capacity for stable relation-
ships is limited. As pointed in Section 6.2, the Dunbar num-
ber can be considered as a possible cap for the size of such
groups, while topical groups do no yield such a restriction.
In line with this expectation, we find that declared groups la-
beled as social have on average 35 members, whereas groups
labeled as topical have on average around 172 members.
We find insightful differences and similarities in various
properties, which we explore in detail in Fig. 4. We plot
them as a function of the size of groups as they vary dras-
tically with it, and one needs to compare groups of similar
sizes in order to draw unbiased conclusions.
First, there are almost no differences in the number of
photos (not shown), favorites, and contacts (as in Figs. 4b,c)
inside social and topical groups. The number of comments
is, however, around 2 times higher in social groups than in
topical groups of similar size (Fig. 4a). More differences can
be found when looking at relative activity metrics (Figs. 4d-
i), which compare number of internal interactions with an
expectation.
In all three types of interaction the relative
activity metrics for social groups yield values from 2 to over
10 times higher than for topical groups. The activity metric
bg compares density of interactions internal to the group
with the density external to it. Therefore this result reflects
a stronger focus or even an isolation of members belonging
to social groups from the rest of people they interact with.
More importantly, we observe large differences in values
of reciprocity and relative reciprocity of comments and fa-
vorites. Social groups exhibit significantly higher reciprocity
than topical groups (Figs. 4j-o), in line with common iden-
tity and common bond theory. There is no difference in
s
p
u
o
r
g
l
a
i
c
o
s
f
o
%
1
0.8
0.6
0.4
0.2
0
100
a
b
c
d
e
f
g
h
Comments
Favorites
Contacts
Photo pool
102
101
sg
101
102
lig
103
101
102
103
ag
102
103
bg
104
0
1
2
3
4
5
tg
0.9 1 1.1 1.2 1.3
ug
1 2 3 4 5 6 7 8
H(g)
0.7 0.8 0.9 1 1.1
hg
0
0.2
0.4
0.6
0.8
1
s
p
u
o
r
g
l
a
c
i
p
o
t
f
o
%
Figure 5: Dependence of fraction f of groups labeled as social on various metrics: based on comments, favorites, contacts and
photo pools. The remaining (1 − f ) groups are topical. Each point corresponds to 50 groups.
reciprocity of contacts. A plausible interpretation is that
contacts do not reflect personal relations between connected
users, as users often add people they do not know and do
not interact with as contacts in order to follow their con-
tent. Finally, we observe much higher values of entropy
and normalized entropy in social groups than in topical ones
(Figs. 4p,q,s,t). This holds for the tags extracted from pho-
tos commented, and favorited between members. Assum-
ing that tags of photos represent topics of interaction, the
result is consistent with bond attachment.
It is expected
for members of bond-based groups to cover many different
topics and areas in their interactions, whereas members of
identity-based groups focus their interactions on specific top-
ics. However, this effect is weaker for the tags extracted
from photo pool of the group (Figs. 4r,u). Apparently, the
content of the photo pool does not always reflect well the
interactions and relations between members of the group.
g
Additionally, we plot the fraction of groups labeled as so-
cial with respect to group size, activity, reciprocity, and
entropy (Fig. 5). The fraction correlates negatively with
group size, as expected (Fig. 5a). The correlations with the
number of interactions and relative activity ag are rather
weak (Figs. 5b,c), whereas, surprisingly, there is a strong
dependency on relative activity bg (Fig. 5d). For the low-
est values of bcom
, 95% of the groups are topical, while for
the highest, 80% of the groups are social. High values of
bg can mean stronger group-focus, or even an isolation of
the group members from the rest of people they interact
with. It may relate to the fact that it is hard to enter bond-
based groups due to strong relations existing between their
members and because high investment is required to create
such relations with them [24]. Direct reciprocity of inter-
actions, with the exception of contacts, correlates strongly
with social groups (Figs. 5e,f). We strongly expected this
result based on bond attachment. Furthermore, we found
that the entropy of tags correlates with social groups, but
entropy based on other sources does not (Fig. 5g). However,
we find that our normalized entropy performs much better
than this, and a strong correlation is found both for tags
extracted from comments and from favorites (Fig. 5h). This
shows that the normalized entropy of tags may be the most
proper way of measuring topical diversity of communications
of a set of people.
7. GROUP TYPE DETECTION
The properties of labeled social and topical groups tend
to confirm the validity of the principles identified by the
common identity and common bond theory. A further con-
firmation comes from the ability of the defined metrics to
predict the tendency of a group towards sociality or topical-
ity. To this end, we propose and compare two methods to
predict the group type and we test their accuracy over the
corpus of the labeled groups.
7.1 Prediction methodology
The first approach we use is a linear combination of the
metrics. To this end, we select the features that are the
most related to the sociological theory and for which we
built specific metrics, i.e., tg, ug and hg. Each of them is
applied to the 3 different interaction types and bags of tags,
which produces a total of 9 values. We transform the val-
ues of the metrics into their t-statistics by subtracting the
average value and dividing them by the standard deviation
of the distribution. Then we weight the normalized scores
evenly by dividing them by the total number of metrics con-
sidered and we finally sum them up to obtain a single score
Sg. All of the components are supposed to score high for
social groups. Therefore, the higher the value of the score,
the higher the chance that the group is social rather than
topical. To convert the score into a binary label, a fixed
threshold above which groups are predicted to be social must
be selected. Using this approach, we aim at testing if those
metrics, based on the theory, can be successful in predicting
the type of group (social or topical).
The second approach relies on machine-learning methods
that use the metrics’ values as features. Features are com-
bined in a classifier that is first trained on a sample of labeled
data to learn a prediction model. The trained classifier then
outputs a binary prediction for any new group instance de-
fined in the same feature space. Due to the limited size of
our corpus of labeled groups, we estimate the classifier per-
formance using 10-fold cross validation. We report results on
a Rotation Forest classifier, which performed best in com-
parison to several algorithms implemented in WEKA. For
the classifier we used a wider set of features than for the lin-
ear combination approach, namely: group size sg and Eint
g ,
ag, bg, tg, ug, H(g), hg, each applied to the 3 different in-
teraction types and bags of tags. This results in a total of
22 features. We selected such a wide set of features to test
if indeed the metrics proposed to distinguish between the
social and topical groups are the best ones for the task. The
relative predictive power of the features is measured through
a feature selection algorithm.
7.2 Prediction results
The ratio of groups labeled as social increases quickly with
the score Sg, as shown in Fig. 6a. This summarizes the find-
ings of previous sections, suggesting that the features em-
bedded in the score are able to capture well the nature of
the groups. The higher the score, the higher the probability
that the group is social; the lower, the more topical. When
the score is around zero, groups can be either social or top-
Editorial labeling
Score
Classifier
1
a
s
p
u
o
r
g
l
a
i
c
o
s
f
o
o
i
t
a
R
0.8
0.6
0.4
0.2
0
-1.5
-1
-0.5
0
0.5
1
Sg
y
c
a
r
u
c
c
a
,
t
n
e
m
e
e
r
g
A
1
0.8
0.6
0.4
0.2
0
-1.5
b
Agreement between editors
Score accuracy
Classifier accuracy
-1
-0.5
0
Sg
0.5
1
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
1
0.8
0.6
0.4
0.2
0
0
c
AUC = 0.879
AUC = 0.749
Score
Classifier
0.4
0.2
0.8
False positive rate
0.6
1
Figure 6: Comparison between prediction methods. a) Ratio
of groups labeled as social versus the score. The same ratio
is plotted for the score-based (threshold at 0) and trained
classifier predictions. b) The accuracy of prediction of the
two techniques and agreement between two of the labelers
against the Sg values. c) ROC curves for the prediction with
the two different techniques.
ical, or both, meaning that a decision on the nature of the
group may be more difficult. If we fix the threshold for the
Sg value in order to perform a binary group classification, it
is clear that several misclassifications will occur, especially
around the threshold value. An example for threshold at 0
is shown in Fig. 6a. Conversely, the classifier performs much
better and achieves the ratio that adheres much more to the
actual ratio of social and topical groups.
Both methods, however, fail more frequently for groups
with mixed social and topical features. The prediction ac-
curacies of the classifier and of the score-based predictions
have an evident drop of performance around 0 (Fig. 6b). The
accuracy at the extreme values of the score is close to 0.95,
while it falls below 0.6 for groups with a score close to 0.
On the other hand, this drop appears also in the agreement
between two of the human labelers, measured as a ratio of
groups that have been given the same label. Apparently,
this is a shortcoming of the binary classification itself, as
opposed to multi-label classification.
The overall performance of the two approaches can be
compared fairly through ROC curves (Fig. 6c), which astray
from the selection of a fixed threshold. The curve for the
classifier (computed for the 10-fold cross validation) always
performs better, and this is reflected in the considerably
higher AUC value and accuracy, as shown in Tab. 2.
, hfav
g
g
g
, ucom
g , and bcom
In addition, to determine the most predictive features, we
rank the features using Chi-square feature selection. The
top 5 features are, in decreasing order of importance: hcom
,
tcom
. The selected set is the optimal
g
for the prediction performance: retraining the classifier on
such restricted set of features results in stable performance,
as shown in Tab. 2. The top 4 most predictive features
correspond directly to the expectations of the theory and
results of the analysis from Section 6. Reciprocity-based
metrics and normalized entropy are significantly more pre-
dictive than other features. The high position of relative
activity bcom
is rather unexpected. However, we have al-
ready remarked on its importance and commented on its
interpretation in Section 6.
g
Method
Score
Classifier
Classifierχ2
top5
Accuracy AUC
0.749
0.879
0.872
0.763
0.801
0.803
Table 2: Group type prediction performance using i) the
score with threshold at 0, ii) 10-fold cross validation on a
Rotation Forest classifier trained on all the features, or iii)
the same classifier trained on the set of top-5 predictive fea-
tures, according to the Chi Squared feature selection.
high-level characterization of topical and social groups. We
propose metrics capturing reciprocity of interactions and en-
tropy of user-generated terms, to realize the concepts dis-
cussed in the theory and to measure sociality and topicality
of groups. We label a number of groups from Flickr as ei-
ther topical or social and we leverage this ground truth to
show that the metrics, combined with a machine-learning
approach, predict the group type with high accuracy. More-
over, we note that the degree of isolation of the group activ-
ity from the rest of the social network, measured in terms of
more personal interactions, is a good predictor of the group
type, in addition to the elements identified in the theory.
Besides the main prediction results, the supporting analysis
of the group properties in terms of the identified dimen-
sions confirms the theory from different angles and high-
lights other interesting findings. In particular, dependencies
of the metrics with the group size confirm previous obser-
vations about the effective size of social communities, peak-
ing around rather small sizes and being limited by a cap of
100-200 members.
The study is complemented with a comparison of the
structure and sociality and topicality traits between declared
groups and groups from community detection algorithms.
Detected groups do not overlap much with declared groups
on average, but they match sensibly more than the random
case for groups of comparable sizes. Furthermore, detected
groups are more often social than the declared ones.
Findings from the present work open new opportunities
for characterization of social communities and of their mem-
bers. Extensions to the study include a more exhaustive ex-
traction of detected groups using a different network than
the network of contacts e.g., we find mutual comments to
carry more social traits than the contacts do. Another inter-
esting extension could be multi-label classification of groups,
in order to better categorize groups with mixed social and
topical components.
Acknowledgments
The authors would like to thank Gideon Zenz for his help-
ful suggestions and contributions. This research is partially
supported by EU’s FP7/2007-2013 under the ARCOMEM
and SOCIALSENSOR projects, by the CDTI (Spain) under
the CENIT program, project CEN-20101037 “Social Media”,
and by MICINN (Spain) through Grant TIN2009-14560-
C03-01, and by MINECO (Spain) and FEDER (EU) through
projects MODASS (FIS2011-247852) and FISICOS (FIS2007-
60327). P.A.G. acknowledges support from the JAE Predoc
program of CSIC (Spain).
8. CONCLUSIONS
Common identity and common bond theory indicates a
9. REFERENCES
[1] L. M. Aiello, A. Barrat, R. Schifanella, C. Cattuto,
B. Markines, and F. Menczer. Friendship prediction
and homophily in social media. ACM Trans. Web,
6(2):9:1–9:33, 2012.
[2] L. Backstrom, D. Huttenlocher, J. Kleinberg, and
X. Lan. Group formation in large social networks:
membership, growth, and evolution. In 12th ACM
SIGKDD international conference on Knowledge
discovery and data mining - KDD’06, page 44, New
York, New York, USA, 2006.
[3] L. Backstrom, R. Kumar, C. Marlow, J. Novak, and
A. Tomkins. Preferential behavior in online groups. In
International conference on Web search and web data
mining - WSDM’08, pages 117–128, New York, NY,
USA, 2008.
[4] N. L. Collins and L. C. Miller. Self-disclosure and
liking: A meta-analytic review. Psychological Bulletin,
166(3):457–475, 1994.
[5] A. Cox, P. Clough, and S. Siersdorfer. Developing
metrics to characterize Flickr groups. Journal of the
American Society for Information Science and
Technology, 62(1):493–506, 2011.
[6] J. N. Cummings, B. Butler, and R. Kraut. The quality
of online social relationships. Comm. of the ACM,
45(7):103–108, 2002.
[7] R. I. M. Dunbar. The social brain hypothesis.
Evolutionary Anthropology, 6:178–190, 1998.
community participation using uniqueness and group
dissimilarity. In Proceedings of the SIGCHI Conference
on Human Factors in Computing Systems, CHI ’04,
pages 631–638, New York, NY, USA, 2004.
[18] D. W. McMillan and D. M. Chavis. Sense of
community: A definition and theory. Journal of
Community Psychology, 14(1):6–23, 1986.
[19] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel,
and B. Bhattacharjee. Measurement and analysis of
online social networks. In 7th ACM SIGCOMM
conference on Internet measurement - IMC ’07, pages
29–42, San Diego, California, USA, 2007.
[20] R.-A. Negoescu, B. Adams, D. Phung, S. Venkatesh,
and D. Gatica-Perez. Flickr hypergroups. In 17th
ACM international conference on Multimedia, MM’09,
pages 813–816, New York, NY, USA, 2009.
[21] R. A. Negoescu and D. Gatica-Perez. Analyzing flickr
groups. In International conference on Content-based
image and video retrieval, CIVR’08, pages 417–426,
New York, NY, USA, 2008.
[22] D. A. Prentice, D. T. Miller, and J. R. Lightdale.
Asymmetries in attachments to groups and to their
members: Distinguishing between common-identity
and common-bond groups. Personality and Social
Psychology Bulletin, 20(5):484–493, 1994.
[23] C. Prieur, N. Pissard, J. Beuscart, and D. Cardon.
Thematic and social indicators for Flickr groups. In
Proceedings of International Conference on Weblogs
and Social Media - ICWSM’08, 2008.
[8] S. Fortunato. Community detection in graphs. Physics
[24] Y. Ren, R. Kraut, and S. Kiesler. Applying Common
Reports, 486(3-5):75–174, 2010.
[9] P. A. Gloor and Y. Zhao. Analyzing Actors and Their
Discussion Topics by Semantic Social Network
Analysis. In Conference on Information Visualization,
IV ’06, pages 130–135, Washington, DC, USA, 2006.
[10] B. Goncalves, N. Perra, and A. Vespignani. Modeling
Users’ Activity on Twitter Networks: Validation of
Dunbar’s Number. PLoS ONE, 6(8):e22656, 2011.
[11] P. A. Grabowicz and V. M. Egu´ıluz. Heterogeneity
shapes groups growth in social online communities.
Europhys. Lett., 97(2):28002, 2012.
[12] P. A. Grabowicz, J. J. Ramasco, and V. M. Eguiluz.
Dynamics in online social networks. arXiv:1210.0808,
2012.
Identity and Bond Theory to Design of Online
Communities. Organization Studies, 28(3):377–408,
2007.
[25] S. Riger and P. J. Lavrakas. Community ties: Patterns
of attachment and social interaction in urban
neighborhoods. American Journal of Community
Psychology, 9:55–66, 1981.
[26] K. Sassenberg. Common bond and common identity
groups on the Internet: Attachment and normative
behavior in on-topic and off-topic chats. Group
Dynamics Theory Research And Practice, 6(1):27–37,
2002.
[27] H. Tajfel. Social identity and intergroup relations.
Cambridge University Press, 1982.
[13] P. A. Grabowicz, J. J. Ramasco, E. Moro, J. M. Pujol,
[28] L. Tang, X. Wang, and H. Liu. Group profiling for
and V. M. Eguiluz. Social Features of Online
Networks: The Strength of Intermediary Ties in
Online Social Media. PLoS ONE, 7(1):e29358, 2012.
[14] S. R. Kairam, D. J. Wang, and J. Leskovec. The life
and death of online groups: predicting group growth
and longevity. In 5th ACM international conference
on Web search and data mining, WSDM’12, pages
673–682, New York, NY, USA, 2012.
[15] A. Lancichinetti, S. Fortunato, and F. Radicchi.
Benchmark graphs for testing community detection
algorithms. Physical Review E, 78:046110, 2008.
[16] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and
S. Fortunato. Finding Statistically Significant
Communities in Networks. PLoS ONE, 6(4):e18961,
2011.
[17] P. J. Ludford, D. Cosley, D. Frankowski, and
L. Terveen. Think different: increasing online
understanding social structures. ACM Trans. Intell.
Syst. Technol., 3(1):15:1–15:25, 2011.
[29] S. Utz and K. Sassenberg. Distributive justice in
common-bond and common-identity groups. Group
Processes and Intergroup Relations, 5(2):151–162,
2002.
[30] H. T. Welser, E. Gleave, D. Fisher, and M. Smith.
Visualizing the Signatures of Social Roles in Online
Discussion Groups. The Journal of Social Structure,
8(2), 2007.
[31] J. Yang and J. Leskovec. Defining and evaluating
network communities based on ground-truth. In
Proceedings of the ACM SIGKDD Workshop on
Mining Data Semantics, MDS’12, pages 3:1–3:8, New
York, NY, USA, 2012.
|
1812.10962 | 1 | 1812 | 2018-12-28T11:53:08 | A Variational Topological Neural Model for Cascade-based Diffusion in Networks | [
"cs.SI",
"cs.LG",
"stat.ML"
] | Many works have been proposed in the literature to capture the dynamics of diffusion in networks. While some of them define graphical markovian models to extract temporal relationships between node infections in networks, others consider diffusion episodes as sequences of infections via recurrent neural models. In this paper we propose a model at the crossroads of these two extremes, which embeds the history of diffusion in infected nodes as hidden continuous states. Depending on the trajectory followed by the content before reaching a given node, the distribution of influence probabilities may vary. However, content trajectories are usually hidden in the data, which induces challenging learning problems. We propose a topological recurrent neural model which exhibits good experimental performances for diffusion modelling and prediction. | cs.SI | cs |
A Variational Topological Neural Model for
Cascade-based Diffusion in Networks
Sylvain Lamprier Sorbonne Universit´e, LIP6, F-75005, Paris, France
[email protected]
December 31, 2018
Abstract
Many works have been proposed in the literature to capture the dynamics of dif-
fusion in networks. While some of them define graphical markovian models to extract
temporal relationships between node infections in networks, others consider diffusion
episodes as sequences of infections via recurrent neural models. In this paper we pro-
pose a model at the crossroads of these two extremes, which embeds the history of
diffusion in infected nodes as hidden continuous states. Depending on the trajectory
followed by the content before reaching a given node, the distribution of influence
probabilities may vary. However, content trajectories are usually hidden in the data,
which induces challenging learning problems. We propose a topological recurrent neu-
ral model which exhibits good experimental performances for diffusion modelling and
prediction.
1
Introduction
The recent development of online social networks enabled researchers to suggest methods
to explain and predict observations of diffusion across networks. Classical cascade mod-
els, which are at the heart of the research literature on information diffusion, regard the
phenomenon of diffusion as an iterative process in which information transits from users
to others in the network (Saito et al., 2008; Gomez-Rodriguez et al., 2011), by a so-called
word-of-mouth phenomenon.
In this setting, diffusion modeling corresponds to learning
probability distributions of content transmission. Various cascade models have been pro-
posed in the literature, each inducing its own learning process to explain some observed
diffusion episodes and attempting to extract the main dynamics of the network. However,
most of these models rely on a strong markovian assumption for which the probabilities
of next infections1 only depend on who is already infected at the current step, not on the
past trajectories of the diffused content. We claim that the history of spread contains much
valuable information that should be taken into account by the models. Past trajectories of
the diffusion can give insights about the different natures of the contents. Also, the content
may be changed during the diffusion, with different transformations depending on which
nodes re-transmit the information.
On the other hand some recent approaches rely on representation learning and recurrent
neural networks (RNN) to predict the future spread of diffusion given the past. A naive
possibility would be to consider diffusion episodes as sequences of infections and propose
temporal point process approaches to model the dynamics. Using the Recurrent Marked
Temporal Point Process model (Du et al., 2016), the current hidden state of the RNN would
embed the history of the whole diffusion sequence, which would be used to output the
next infected node and its time of infection. However, since diffusion episodes are not
1Throughout this paper, we refer to infection for denoting the participation of a node of the network in
the diffusion.
1
sequences but trees, naive recurrent methods usually fail in capturing the true dynamics of
the networks. Embedding the whole past in the state of a given node rather than restraining
it to its specific ancestor branch leads to consider many independent and noisy events for
future predictions. A model that would consider the true diffusion paths would be more
effective, by focusing on the useful past. If the true diffusion paths were known, it would be
possible to adapt works on recurrent neural models for tree structures such as successfully
proposed in (Tai et al., 2015) for NLP tasks. Unfortunately, in most of applications the
topology of diffusion is unknown while learning. In the task considered in this paper, the
only observations available are the timestamps of the infected nodes.
To cope with it, (Wang et al., 2017a) proposed Topo-LSTM, a Long-Short Time Memory
network that considers a known graph of relationships between nodes to compute hidden
states and cells of infected nodes. The hidden state and cell of a given node at t depend
on those from each of its predecessors that have been infected before t. Since nodes may
have multiple predecessors that are infected at time t, the classical LSTM cannot be applied
directly.
Instead, (Wang et al., 2017a) proposed a cell function that aggregates infector
candidate states via mean pooling. This allows to take the topology of the possible diffusion
into account, but not the past trajectory of the content (it averages all possible paths). To
overcome this, (Wang et al., 2017b) proposed a cascade attention-based RNN, which defines
a neural attention mechanism to assign weights to infector candidates before summing their
contribution in the new hidden state at t. The attention network is supposed to learn
to identify from whom comes the next infection based on past states. However, such an
approach is likely to converge to most of attention weight vectors in the center of the simplex,
since diffusion is a stochastic process with mostly very weak influence probabilities. The
deterministic inference process of the approach limits its ability to produce relevant states
by mixing from multiple candidates rather than sampling the past trajectories from their
posterior probabilities. Note the similar approach in (Wang et al., 2018), which does not
use a RNN but defines a composition module of the past via attention networks to embed
the episode in a representation space from which the probability of the next infected node
can be deduced. Beyond the limits discussed above w.r.t. deterministic mixing of diffusion
trajectories, no delay of infection is considered in this work, which makes it impossible to
use for diffusion modeling purposes.
Recently, many works in representation learning used random walks on graphs to sample
trajectories that can be used to learn a network embedding which respects some topological
constraints. While DeepWalk (Perozzi et al., 2014) only uses structural information, models
proposed in (Nguyen et al., 2018) or (Shi et al., 2018) include temporal constraints in ran-
dom walks to sample feasible trajectories w.r.t. observed diffusion episodes. The approach
DeepCas from (Li et al., 2016) applies this idea for the prediction of diffusion cascades. How-
ever, such approaches require a graph of diffusion relations as input, which is not always
available (and not always representative of the true diffusion channels of the considered net-
work as reported in (Ver Steeg & Galstyan, 2013)). In our work, we consider that no graph
is available beforehand. Moreover, no inference process is introduced in DeepCas to sample
trajectories from their posterior probabilities given the observed diffusion sequences. The
sampling of trajectories is performed in an initialization step, before learning the parameters
of the diffusion model.
In this paper, we propose the first bayesian topological recurrent neural network for
sequences with tree dependencies, which we apply for diffusion cascades modelling. Rather
than building on a preliminary random walk process, the idea is to consider trajectory
inference during learning, in order to converge to better representations of the infected nodes.
Following the stochastic nature of diffusion, the model infers trajectories distributions from
observations of infections, which are in turn used for the inference of infection probabilities
in an iterative learning process. Our probabilistic model, based on the famous continuous-
time independent cascade model (CTIC) (Saito et al., 2009) is able to extract full paths
of diffusion from sequential observations of infections via black-box inference, which has
2
multiple applications in the field. Our experiments validate the potential of the approach
for modeling and prediction purposes.
The remaining of the paper is structured as follows. Section 2 presents some background
and notations of the approach. Section 3 presents the proposed model. Section 4 reports
experimental results of the approach compared to various baselines.
2 Background
2.1
Information Diffusion
Information diffusion is observed as a set of diffusion episodes D. Classically, episodes
considered in this paper only contain the first infection event of each node (the earlier
time a content reached the node). Let U = {u0, u1, ...., uN −1} be a set of N nodes, u0
standing for the world node, used to model influences from external factors or spontaneous
infections (as done in (Gruhl et al., 2004) for instance). A diffusion episode D = (U D, T D)
reports the diffusion of a given content in the network as a sequence of infected nodes
U D = (cid:16)U D
u ∈ N + ∞u ∈ U} of infection time-stamps
for all u ∈ U. U D is ordered chronologically w.r.t. the infection time-stamps T D. Thus,
U D
i ∈ U corresponds to the i-th infected node in D for all i ∈ {0, ..., D − 1}, with D the
number of infected nodes in the diffusion. Every episode in D starts by the world node u0
(i.e., U D
u the infection time-stamp in D for any node
in U, ∞ for nodes not infected in D. Time-stamps are relative w.r.t. to tD
1 , arbitrarily set
to tD
0 = 0 for every episode D. In the following,
Di = (U D
) denotes the i − th infected node in U with its associated time-stamp.
D−1(cid:17) and a set T D = {tD
1 = 1 in the data. Note that we also set tD
0 = u0 for all episodes D). We note tD
0 , ..., U D
i , tD
U D
i
is the infector of U D
Cascades are richer structures than diffusion episodes, since they describe how a given
diffusion happened. The cascade structure stores the first transmission event (u → v) that
succeeded from any node u to each infected node v. Thus, a cascade C D = (U D, T D, I D)
corresponds to a transmission tree rooted in u0 and reaching nodes in U D during the dif-
fusion, according to a sequence I D of infector indices in U D: for any j ∈ {1, ..., D − 1}
and any i ∈ {0, ..., D − 2}, I D
in the diffusion D (i.e.,
U D
0 = 0 (no infector for the world node).
i
Note that I D
1 is always equal to 0, since there is no other candidate for being the infector
of U D
for
1
i ∈ {0, ..., D − 1}. Note that the cascade structures respect that tD
for every D
and all j ∈ {1, ..., D − 1} (the infector of a node v is mandatory a node that was infected
before v). Several different cascade structures are possible for a given diffusion episode.
Cascade models usually perform assumptions on these latent diffusion structures to learn
the diffusion parameters.
than the world u0. For convenience, we note I D(i) ∈ U D the infector of U D
i
j ). We arbitrarily set I D
j was infected by U D
i
j equals i iff U D
ID (j) < tD
U D
j
2.2 Cascade Models
The Independent Cascade model (IC) (Goldenberg et al., 2001) considers the spread of
diffusion as cascades of infections over the network. We focus in this paper on cascade
models such as IC, which tend to reproduce realistic temporal diffusion dynamics on social
networks (Guille et al., 2013). The classical version of IC is an iterative process in which, at
each iteration, every newly infected node u gets a unique chance to infect any other node v
of the network with some probability θu,v. The process iterates while new infections occur.
Since the expectation-maximization algorithm proposed in (Saito et al., 2008) to learn its
parameters, IC has been at the heart of diffusion works.
However, in real life, diffusion occurs in continuous time, not discrete as assumed in
IC. (Lamprier et al., 2016) proposed DAIC, a delay-agnostic version of IC, where diffusion
between nodes is assumed to follow uniform delay distributions rather than occurring in
successive discrete time-steps. A representation learning version of DAIC has been proposed
3
in (Bourigault et al., 2016), where nodes are projected in a continuous space in a way
that the distance between node representations render the probability that diffusion occurs
between them. This allowed the authors to obtain a more compact and robust model than
the former version of DAIC. Beyond uniform time delay distributions, two main works deal
with continuous-time diffusion. NetRate (Gomez-Rodriguez et al., 2011) learns parametric
time-dependent distributions to best fit with observed infection time-stamps. As NetRate,
CTIC (Saito et al., 2009) uses exponential distributions to model delays of diffusion between
nodes, but rather than a single parameter for each possible relationship, delays and influence
factors are considered as separated parameters, which leads to more freedom w.r.t.
to
observed diffusion tendencies. Delays and influence parameters are learned conjointly by
an EM-like algorithm. Note the continuous-time cascade model extension in (Zhang et al.,
2018), which embeds users in a representation space so that their relative positions both
respect some structural community properties and can be used to explain infection time-
stamps of users.
In our model we consider that diffusion probabilities from any infected node v depend
on a latent state associated to v, which embeds the past trajectory of the diffused content.
This state depends on the state of the node u who first transmitted the content to v.
Therefore, we need to rely on a continuous-time model such as CTIC (Saito et al., 2009),
which serves as a basis for our work. In CTIC, two parameters are defined for each pair
(u, v) of nodes in the network: ku,v ∈]0; 1[, which corresponds to the probability that node
u succeeds in infecting v, and ru,v > 0, which corresponds to a time-delay parameter used
in an exponential distribution when u infects v. If u succeeds in infecting v in an episode
D, v is infected at time tD
u + δ, where δ ∼ ru,v exp (−ru,vδ). These parameters are
learned via maximizing the following likelihood on a set of episodes D:
v = tD
p(D) = YD∈D
v Yv6∈U D
v stands for the probability that v is infected at tD
v is the probability that v is not infected by any infected node in D.
p(D) = YD∈D Yv∈U D
where hD
D and gD
v by previous infected nodes in
hD
gD
v
(1)
We build on this in the following, but rather than considering a pair of parameters ku,v
and ru,v for each pair of nodes (u, v) (which implies 2×U×(U−1) parameters to store), we
propose to consider neural functions which output the corresponding parameters according
to the hidden state of the emitter u, depending on its ancestor branch in the cascade, and
a continuous embedding of the receiver v.
3 Recurrent Neural Diffusion Model
This section first presents our recurrent generative model of cascades. Then, it details the
proposed learning algorithm.
3.1 Recurrent Diffusion Model
As discussed above, we consider that each infected node v in an episode D owns a state
v ∈ Rd depending on the path the content followed to reach v in D, with d the dimension
zD
of the representation space. Knowing the state zD
u of the node u that first infected v, the
state zD
v is computed as:
v = fφ(zD
zD
u , ω(f )
v )
(2)
with fφ : Rd × Rd → Rd a function, with parameters φ, that transforms the state of u
according to a shared representation ω(f )
v ∈ Rd of the node v. This function can either be
an Elman RNN cell, a multi-layer perceptron (MLP) or a Gated Recurrent Unit (GRU).
An LSTM could also be used here, but zD
v should include both the cell and the state of v
in that case.
4
Given a state z for an infected node u in D, the probability that u succeeds in transmit-
ting the diffused content to v is given by:
ku,v(z) = σ(cid:16)< z, ω(k)
where σ(.) stands for the sigmoid function and ω(k)
v ∈ U.
v
v >(cid:17)
(3)
an embedding of size d for any node
Similarly to the CTIC model, if a node u succeeds in infecting another node v, the delay of
infection depends on an exponential distribution with parameter ru,v. To simplify learning,
we assume that the delay of infection does not depend on the history of diffusion, only the
probability of infection does. Thus, for a given pair (u, v), the delay parameter is the same
for every episode D:
ru,v = exp(− < ω(r,1)
u
, ω(r,2)
v
> )
(4)
with x the absolute value of a real scalar x and ω(r,1)
correspond to two embed-
dings of size d for any node u ∈ U, ω(r,1) for the source of the transition and ω(r,2) for its
destination in order to enable asymmetric behavior.
)u∈U , (ω(r,2)
u )u∈U , (ω(r,1)
)u∈U , (ω(k)
and ω(r,2)
u
u
u
v
u )u∈U(cid:17) as the parameters of
We set Θ = (cid:16)φ, z0, (ω(f )
our model. The generative process, similar to the one of CTIC, is given in appendix in
algorithm 1. In this process, the state of the initial node, the world node u0, is a parameter
vector z0 to be learned. The process iterates while there remains some nodes in a set of
infectious nodes (initialized with u0). At each iteration, the process selects the infectious
node u with minimal time-stamp of infection, removes it from the set of infectious nodes,
records it as infected and attempts to infect each non infected node v according to the
probability ku,v(zD
u ). If it succeeds, a time t is sampled for v with an exponential law with
parameter ru,v. If the new time t for v is lower than its current time tD
v (initialized with
v = ∞), this new time is stored in tD
tD
v , v is added to the set of infectious nodes and its new
state zD
v is computed according to its new infector u.
3.2 Learning the Model
As in CTIC, we need to define the probability that the node u ∈ U D infects the node v ∈ U D
at time tD
v with our model. Given a state z for u in D, we have:
u,v(z) = ku,v(z)ru,v exp−ru,v (tD
aD
v −tD
u )
(5)
Also, the probability that u does not infect v before tD
v given a state z for u in D is:
u,v(z) = 1 − ku,v(z)Z tD
v
bD
tD
u
ru,v exp−ru,v (t−tD
u ) dt = ku,v(z) exp−ru,v (tD
v −tD
u ) +1 − ku,v(z) (6)
The probability density that node v is infected at time tD
nodes infected before v is:
v given a set of states z for all
hD
v (z) =
=
Pu∈U ,tD
Qx∈U ,tD
x <tD
v
u <tD
v
bD
x∈U \{u},tD
x <tD
v
aD
u,v(zu)/bD
u,v(zu)
x,v(zx) Pu∈U ,tD
u <tD
v
aD
u,v(zu)
bD
x,v(zx)
Q
(7)
(8)
where zu is the state of node u in z. Similarly, the probability density that node v is not
infected in D at the end of observation time T given a set of states z for all nodes infected
in D is:
gD
v (z) = Yu∈U D
(ku,v(zu) exp−ru,v(T −tD
u ) +1 − ku,v(zu)) ≈ Yu∈U D
(1 − ku,v(zu))
(9)
5
where the approximation is done assuming a sufficiently long observation period.
The learning process of our model is based on a likelihood maximization, similarly to
maximizing eq.1 in the classical CTIC model. However, in our case the infection probabilities
depend on hidden states z associated to the infected nodes. Since observations only contain
infection time-stamps, this requires to marginalize over every possible sequence of ancestors
I for every D ∈ D:
log p(D) = PD∈D
log p(D) = XD∈D
log XI∈ID
p(D, I)
(10)
where I D is the set {v ∈ ND−1v0 = 0∧∀i > 0, vi < i} of all possible ancestors sequences for
D. p(D, I) corresponds to the joint probability of the episode D and an ancestor sequence
I ∈ I D. Taking p(D, I) = p(I)p(DI) would lead to an intractable computation of p(DI)
using our recurrent cascade model, since it would imply to estimate the probability of any
infection in D according to the full ancestors sequence. Fortunately, using the bayesian
chain rule, the joint probability can be written as:
D−1
p(D, I) =
Qi=1
p(DiD<i, I<i) p(IiD≤i, I<i) Qv6∈U D
p(v 6∈ U DD≤D−1, I)
(11)
where D<i = (Dj)j∈{0,...,i−1} corresponds to the sequence of the i first components of D (the
i first components in U D with their associated time-stamps) and I<i = (Ij )j∈{0,...,i−1} stands
for the vector containing the i first components of I. We have for every i ∈ {1, ..., D −
1}: p(DiD<i, I<i) = hD
<i is a set containing the states of the i first
U D
i
infected nodes in D, which can be deduced from D<i and I<i using the equation 2. We also
have: p(v 6∈ U DD≤D−1, I) = gD
≤i). The probability p(IiD≤i, I<i) is the conditional
probability that I(U D
i , given all the previous infection
events and the fact that U D
by one of the previously infected nodes in
D. It can be obtained, according to formula 8, via:
i ) was the node who first infected U D
i was infected at tD
U D
i
(zD
<i), where zD
v (zD
p(IiD≤i, I<i) =
aD
I(U D
i ),U D
i (cid:16)zD
Pu∈U ,tD
u <tD
i
U D
i )(cid:17) /bD
I(U D
aD
u,U D
i
I(U D
i ),U D
u ) /bD
(zD
i )(cid:17)
i (cid:16)zD
I(U D
(zD
u )
u,U D
i
(12)
with I(U D
i ) ∈ U D the infector of U D
i
stored in I.
Unfortunately the log-likelihood from formula 10 is still particularly difficult to optimize
directly since it requires to consider every possible vector I ∈ I D for each training episode
D at each optimization iteration. Moreover, the probability products in formula 11 would
lead to zero gradients because of decimal representation limits. Therefore, we need to define
an approach where the optimization can be done via trajectory sampling. Different choices
would be possible. First, MCMC approaches such as the Gibbs Sampling EM could be
used, but they require to sample from the posteriors of the full trajectories of the cascades,
which is very unstable and complex to perform. The full computation of the posterior
distributions could be avoided by using simpler propositional distributions (such as done for
instance via importance sampling with auxiliary variables in (Farajtabar et al., 2015) for
diffusion source detection), but this would face a very high variance in our case. Another
possibility is to adopt a variational approach (Kingma & Welling, 2013), where an auxiliary
distribution q is learned for the inference of the latent variables. As done in (Krishnan et al.,
2016) for the inference in sequences, a smoothing strategy could be developed by relying
on a bi-directional RNN that would consider past and future infections for the inference of
the ancestors of nodes via q(IiD, I<i) for every infected node i in an episode D. However,
learning the parameters of such a distribution is particularly difficult (episodes of different
lengths, cascades considered as sequences, etc.). Also, another possibility for smoothing
would be to define an independent distribution qD
for every episode D ∈ D and every
i
6
infection i ∈ {1, ..., D−1}. However, this induces a huge number of variational parameters,
increasing with the size of the training set (linearly in the number of training episodes and
quadratically in the size of the episodes). Thus, we propose to rather rely on the conditional
distribution of ancestors given the past for sampling (i.e, qD
i (Ii) = p(IiD≤i, I<i)), which
corresponds to a filtering inference process.
From the Jensen inequality on concave functions, we get for a given episode D:
log p(D) = log XI∈ID
p(D, I)
≥ E
I∼qD (cid:2)log p(D, I) − log qD(I)(cid:3)
D−1
Xi=1
log p(DiD<i, I<i) + Xv6∈U D
= EI∼qD
∆= L(D; Θ)
log p(v 6∈ U DD≤D−1, I)
(13)
D−1
Qi=1
where qD =
p(IiD≤i, I<i). This leads to a lower-bound of the log-likelihood, which
corresponds to an expectation from which it is easy to sample: at each new infection of a node
i in a episode D, we can sample from a distribution depending on the past only. Maximizing
this lower-bound (also called the ELBO) encourages the process to choose trajectories that
explain the best the observed episode. To maximize it via stochastic optimization, we refer
to the score function estimator (Ranganath et al., 2014), which leverages the derivative of
the log-function (∇θ log p(x; θ) = ∇θ p(x;θ)
p(x;θ) ) to express the gradient as an expectation from
which we can sample. Another possibility would have been to rely on the Gumbel-Softmax
and the Concrete distribution with reparametrization such as done in (Maddison et al.,
2016), but we observed greatly better results using the log-trick. The gradient of the ELBO
function for all the episodes is given by:
∇ΘL(D; Θ) = XD∈D
E
I∼qD (cid:2)(cid:0)log pI (D) − b(cid:1) ∇Θ log qD(I) + ∇Θ log pI (D)(cid:3)
(14)
where pI(D) is a shortcut for QD−1
i=1
p(DiD<i, I<i)Qv6∈U D p(v 6∈ U DD≤D−1, I) and b is
a moving-average baseline of the ELBO per training episode, used to reduce the variance
(taken over the 100 previous training epochs in our experiments). This stochastic gradient
formulation enables to obtain unbiased steepest ascent directions despite the need to sample
the ancestor vectors for the computation of the node states (with the replacement of expec-
tations by averages over K samples for each episode). It contains two terms: while the first
one encourages high conditional probabilities for ancestors that maximize the likelihood of
the full episodes, the second one leads to improve the likelihood of the observed infections
regarding the past of the sampled diffusion path.
The optimization is done using the ADAM optimizer (Kingma & Ba, 2014) over mini-
batches of M episodes ordered by length to avoid padding (M = 512 and K = 1 in our
experiments). Our full efficient algorithm is given in appendix.
4 Experiments
4.1 Setup
We perform experiments on two artificial and three real-world datasets:
• Arti1: Episodes generated on a scale-free random graph of 100 nodes. The generation
process follows the CTIC model. But rather than only one transmission probability
k parameter per edge, we set 5 different ki depending on the diffusion nature. Before
7
each simulation a number i ∈ {1, ..., 5} is sampled, which determines the parameters
to use. 10000 episodes for training, 5000 for validation, 5000 for testing. Mean length
of the episodes=7.55 (stdev=5.51);
• Arti2: Episodes sampled on the same graph as Arti1, also with CTIC but where
each ku,v is a function of the transmitted content and the features of the receiver v.
A content z ∈ R5 is sampled from a Dirichlet with parameter α = 0.1 before each
simulation and the sigmoid of the dot product between this content and the edge
features determines the transmission probabilities. Features of the hub nodes (nodes
with a degree greater than 30) are sampled from a Dirichet with α = 10 (multi-content
nodes), while those of other nodes are sampled from a Dirichet with α = 0.1 (content-
specific nodes). 10000 episodes for training, 5000 for validation, 5000 for testing. Mean
length of the episodes=6.89 (stdev=7.7).
• Digg: Data collected from the Digg stream API during one month. Infections are the
"diggs" posted by users on links published on the media. We kept the 100 most active
users from the collected data. 20000 episodes for training, 5000 for validation, 5000
for testing. Mean length of the episodes=4.26 (stdev=9,26).
• Weibo: Retweet cascades extracted from the Weibo microbloging website using the
procedure described in (Leskovec et al., 2009). The dataset was collected by (Fu et al.,
2013). 4000 nodes, 45000 episodes for training, 5000 for validation, 5000 for testing.
Mean length of episodes=4.58 (stdev=2.15).
• Memetracker: The memetracker dataset described in (Leskovec et al., 2009) contains
millions of blog posts and news articles. Each website or blog stands as a user, and
we use the phrase clusters extracted by Leskovec et al. (2009) to trace the flow of
information. 500 nodes, 250000 for training, 5000 for validation, 5000 for testing.
Mean length of episodes=8.68 (stdev=11.45).
We compare our model recCTIC to the following temporal diffusion baselines:
• CTIC: the Continuous-Time Independent Cascade model
in its original version
(Saito et al., 2009);
• RNN: the Recurrent Temporal Point Process model from (Du et al., 2016) where
episodes are considered as sequences that can be treated with a classical RNN out-
putting at each step the probability distributions of the next infected node and its
time-stamp;
• CYAN: Similar to RMTPP but with an attention mechanism to select previous states
(Wang et al., 2017b);
• CYAN-cov: The same as Cyan but with a more sophisticated attention mechanism
using an history of attention states, to give more weights to important nodes;
• DAN: the attention model described in (Wang et al., 2018). It is very similar to CYAN
but uses a pooling mechanism rather than a recurrent network to consider the past
in the predictions. In the version of (Wang et al., 2018), the model only predicts the
next infected node at each step, not its time of infection. To enable a comparison with
the other models, we extended it by adding a time prediction mechanism similar to
the temporal head of CYAN.
• EmbCTIC: a version of our model where the node state z is replaced in the diffusion
probability computation (eq. 3) by a static embedding for the source (similarly to
the formulation of the delay parameter in eq. 4). This corresponds to an embedded
version of CTIC, similarly to the embedded version of DAIC from (Bourigault et al.,
2016).
8
Note that to adapt baselines based on RNN for diffusion modeling and render them
comparable to cascade-based ones, we add a "end node" at the end of each episode before
training and testing them. In such a way, these models are able to model the end of the
episodes by predicting this end node as the next event (no time-delay prediction for this
node however).
Our model and the baselines were tuned by a grid search process on a validation set for
each dataset (although the best hyper-parameters obtained for Arti1 remained near optimal
for the other ones). For every model with an embedding space (i.e., all except CTIC), we
set its dimension to d = 50 (larger dimensions induce a more difficult convergence of the
learning without significant gain in accuracy). The reported results for our model use a
GRU module as the recurrent state transformation function fφ.
We evaluate our models on three distinct tasks:
tive log-likelihood of the test episodes (i.e., N LL = −(1/Dtest)PD∈Dtest
• Diffusion modelling: the performances of the methods are reported in term of nega-
log p(D)).
Lower values denote models that are less surprised by test episodes than others, ren-
dering their generalization ability. The NLL measure depends on the model, but for
each it renders the probability of an episode to be observed according to the model,
both on which nodes are eventually infected and at what time. For our model which
has to sample trajectories, the NLL is approximated via importance sampling by con-
p(D,I (s))
sidering p(D) ≈ 1
qD (I (s)) computed on S infector vectors sampled from qD.
We used S = 100 in our experiments;
S PS
s=1
• Diffusion generation: the models are compared on their ability to simulate realistic
cascades. The aim is to predict the marginal probabilities of nodes to be eventu-
ally infected. The results are reported in term of Cross-Entropy (CE) taken over
Dtest×U PD∈Dtest Pu∈U log p(u ∈
the whole set of nodes for each episode: CE =
U D)I(u∈U D) + log p(u 6∈ U D)I(u6∈U D ), where I(.) stands for the indicator function re-
turning 1 if its argument is true, 0 else. p(u ∈ U D) is estimated via Monte-Carlo
simulations (following the generation process of the models and counting the rate
of simulations in which u is infected). 1000 simulations are performed for each test
episode in our experiments.
1
• Diffusion Path prediction:
1
PD∈Dtest
the models are assessed on their ability to choose the
true infectors in observed diffusion episodes. This is only considered on the ar-
tificial dataset for which we have the ground truth on who infected whom. The
INF measure corresponds to the expectation of the rate of true infectors chosen by
the models: IN F =
(D−1) PD∈Dtest Pi∈{1,...,D−1} p(Ii = inf (i, D)D≤i),
with inf (i, D) the true infector of the i-th infected node in the episode D. For
RNN, their is no selection mechanism, it is excluded from the results for this mea-
sure. For models with attention (CYAN and DAN), we consider the attention
weights as selection probabilities. For cascade based models which explicitly model
this, we directly use the corresponding probability p(Ii = inf (i, D)D≤i).
In our
model, this corresponds to an expectation over previous infectors in the cascade (i.e.,
1
s=1 p(Ii = inf (i, D)D≤i, I (s)
<i )), with I (s) the s-th sampled vector from qD.
S PS
For each task, we report results with different amounts of initial observations from test
episodes: infections occurred before a given delay τ from the start of the episode are given
as input to the models, from with they infer internal representations, evaluation measures
are computed on the remaining of the episode. In tables 1 to 4, 0 means that nothing was
initially observed, the models are not conditioned on the start of the episodes. 1 means that
infections at the first time stamp are known beforehand, prediction and modeling results
thus concern time-stamps greater than 1 (models are conditioned on diffusion sources). 2
and 3 mean that infections occurred respectively before a delay of τ = maxT /10 and a delay
9
Arti 1
Arti 2
0
NLL
25,99
rnn
27,85
cyan
26,68
cyan-cov
24,77
dan
ctic
21,00
embCTIC 20,96
recCTIC
19,62
0
CE
0,47
rnn
0,40
cyan
0,50
cyan-cov
0,40
dan
ctic
0,31
embCTIC 0,47
recCTIC
0,31
0
INF
0,38
cyan
0,39
cyan-cov
0,42
dan
ctic
0,64
embCTIC 0,62
recCTIC
0,65
1
23,9
25,82
24,58
22,69
18,56
18,53
14,42
1
0,28
0,28
0,27
0,93
0,36
0,35
0,23
1
0,26
0,27
0,26
0,54
0,51
0,56
2
16,03
17,71
16,64
14,96
10,81
10,78
9,87
2
0,18
0,21
0,18
0,69
0,65
0,25
0,12
2
0,29
0,29
0,22
0,55
0,49
0,58
3
11,35
12,67
11,84
10,5
7,48
7,49
6,87
3
0,14
0,16
0,14
0,44
0,45
0,18
0,08
3
0,32
0,32
0,21
0,58
0,51
0,62
0
NLL
19,72
rnn
18,78
cyan
19,55
cyan-cov
18,71
dan
ctic
20,08
embCTIC 19,90
recCTIC
17,39
0
CE
79,0
rnn
86,9
cyan
91,7
cyan-cov
97,9
dan
ctic
63,1
embCTIC 65,8
68,7
recCTIC
0
INF
cyan
0,30
0,29
cyan-cov
0,42
dan
ctic
0,73
embCTIC 0,73
recCTIC
0,90
1
14,55
13,62
14,35
13,49
14,26
14,13
11,59
1
21,0
19,6
27,8
98,6
23,2
22,6
15,9
1
0,15
0,14
0,31
0,67
0,67
0,88
2
11,78
11,04
11,56
10,86
10,18
10,11
8,31
2
14,2
14,4
19,7
75,7
24,7
17,2
11,2
2
0,11
0,10
0,23
0,61
0,61
0,86
3
7,65
7,09
7,41
6,84
5,99
5,97
4,97
3
9,3
9,4
12,4
43,8
21,8
12,1
8,3
3
0,11
0,10
0,20
0,58
0,58
0,84
Table 1: Results on the artificial datasets.
of τ = maxT /20 from the start of the episode are known and used to condition the models.
Details on how conditioning our model and the baselines w.r.t. starts of episodes are given
in the appendix.
4.2 Results
Results on the two artificial datasets are given in table 1. While our approach shows
significant improvements over other models for NLL and CE results on the Arti1 dataset
(except for CE with weak conditioning), its potential is fully exhibited on the Arti2 dataset,
where embedding the history for predicting the future of diffusion looks of great importance.
Indeed, in this dataset, there exists some hub nodes through which most of the diffusion
episodes transit, whatever the nature of the diffusion. In that case, the path of the diffusion
contains very useful information that can be leveraged to predict infections after the hub
node: the infection of the hub node is a necessary condition for the infection of its successors,
but not sufficient since this node is triggered in various kinds of situations. Depending on
who transmitted the content to it, different successors are infected then. Markovian cascade
models such as CTIC or embCTIC cannot model this since infection probabilities only
depend on disjoint past events of infection, not on paths taken by the propagated content.
RNN-based models are better armed for this, but their performances are undermined by their
way of aggregating past information. Attention mechanisms of CYAN and DAN attempt
to overcome this, but it looks quite unstable with errors accumulating through time. Our
approach appears as an effective compromise between both worlds, by embedding past as
RNN approaches, while maintaining the bayesian cascade structures of the data. Its results
on the INF measure are very great compared to the other approaches. This is especially
true on the Arti2 dataset, which highlights its very good ability for uncovering the dynamics
of diffusion, even for such complex problems with strong entanglement between diffusions
of different natures.
The good behavior of the approach is not only observed on the artificial datasets, which
have been generated by the cascade model of CTIC on a graph of relationships, but also on
10
0
NLL
31,03
rnn
16,82
cyan
21,36
cyan-cov
18,47
dan
ctic
27,70
embCTIC 15,98
recCTIC
15,67
1
26,18
11,56
16,83
13,52
22,07
10,31
10,30
2
24,15
9,32
14,50
11,43
19,20
7,92
7,86
3
23,02
8,03
13,31
10,29
17,74
6,75
6,74
0
CE
0,46
rnn
0,43
cyan
0,43
cyan-cov
0,44
dan
ctic
0,45
embCTIC 0,43
recCTIC
0,43
1
0,28
0,25
0,23
0.25
0,31
0,31
0,27
2
0,24
0,21
0,20
0,22
0,20
0,21
0,17
3
0,22
0,19
0,17
0,19
0,16
0,17
0,14
Table 2: Negative Log-Likelihood (NLL) and Cross Entropy of Infections (CE) on Digg.
0
NLL
27,58
rnn
29,59
cyan
27,50
cyan-cov
32,35
dan
ctic
23,92
embCTIC 24,71
recCTIC
21,72
1
28,98
30,04
29,12
25,02
17,88
18,02
14,08
2
18,62
30,04
29,12
21,97
13,31
13,58
11,29
3
17,15
18,79
18,55
20,39
12,28
12,39
10,34
0
CE
0,59
rnn
0,59
cyan
0,59
cyan-cov
dan
0,58
ctic
0,58
embCTIC 0,59
0,59
recCTIC
1
0,37
0,37
0,36
0,26
0,25
0,26
0,24
2
0,30
0,31
0,30
0,26
0,31
0,30
0,21
3
0,28
0,29
0,28
0,24
0,28
0,28
0,20
Table 3: Negative Log-Likelihood (NLL) and Cross Entropy of Infections (CE) on Weibo.
real-world datasets. Tables 2 to 4 report results on the three real-world datasets. In these
tables, we observe that RNN based approaches have more difficulties to model test episodes
than cascade based ones. The attention mechanism of the CYAN and DAN approaches
allow them to get sometimes closer to the cascade based results (especially on Digg), but
their performances are very variable from a dataset to another. These methods are good for
the task they were initially designed - predicting the directly next infection (this had been
observed in our experimentations)-, but not for modeling or long term prediction purposes.
This is a strong limitation since the directly next infection does not help much to understand
the dynamics and to predict the future of a diffusion. Our approach obtains better results
than all other methods in most of settings, especially for the dynamics modelling task (NLL),
though infection prediction results (CE) are also usually good compared with its competi-
tors. Interestingly, while embCTIC usually beats CTIC, recCTIC often obtains even better
results. This validates that the history of nodes in the diffusion has a great importance for
capturing the main dynamics of the network. Thanks to the black-box inference process and
the recurrent mechanism of our proposal, the propositional distribution qD is encouraged to
resemble the conditionnal probability of the full ancestors vector. Regarding the results, the
inference process looks to have actually converged toward useful trajectories. This enables
the model to adapt distributions regarding the diffusion trajectory during learning. This
also allows the model to simulate more consistent cascades regarding sources of diffusion.
0
NLL
112,3
rnn
115,2
cyan
95,58
cyan-cov
91,70
dan
ctic
52,70
embCTIC 54,18
recCTIC
50,11
1
118,2
113,1
95,05
89,97
55,54
52,29
49,34
2
110,4
109,2
93,64
86,19
48,48
49,68
48,35
3
103,6
102,1
90,20
78,91
44,33
45,15
42,20
0
CE
1,68
rnn
1,66
cyan
1,61
cyan-cov
1,59
dan
ctic
1,33
embCTIC 1,59
1,51
recCTIC
1
1,66
1,64
1,59
1,58
1,68
1,66
1,60
2
1,59
1,59
1,52
1,58
1,60
1,57
1,49
3
1,51
1,49
1,39
1,44
1,46
1,39
1,36
Table 4: Negative Log-Likelihood (NLL) and Cross Entropy of Infections (CE) on Meme-
tracker.
11
5 Conclusion
We proposed a recurrent cascade-based diffusion modeling approach, which is at the cross-
roads of cascade-based and RNN approaches. It leverages the best of both worlds with an
ability to embed the history of diffusion for prediction while still capturing the tree depen-
dencies underlying the diffusion in network. Results validate the approach both for modeling
and prediction tasks.
In this work, we based the sampling of trajectories on a filtering approach where only
the past observations are considered for the inference of the infector of a node. Outgoing
works concern the development of an inductive variational distribution that rely on whole
observed episodes for inference.
References
Simon Bourigault, Sylvain Lamprier, and Patrick Gallinari. Representation learning for in-
formation diffusion through social networks: an embedded cascade model. In Proceedings
of the Ninth ACM International Conference on Web Search and Data Mining, San Fran-
cisco, CA, USA, February 22-25, 2016, pp. 573 -- 582, 2016. doi: 10.1145/2835776.2835817.
URL http://doi.acm.org/10.1145/2835776.2835817.
Nan Du, Hanjun Dai, Rakshit Trivedi, Utkarsh Upadhyay, Manuel Gomez-Rodriguez,
and Le Song. Recurrent marked temporal point processes: Embedding event his-
tory to vector.
In Proceedings of the 22Nd ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, KDD '16, pp. 1555 -- 1564, New York, NY,
USA, 2016. ACM.
ISBN 978-1-4503-4232-2. doi: 10.1145/2939672.2939875. URL
http://doi.acm.org/10.1145/2939672.2939875.
Mehrdad Farajtabar, Manuel Gomez-Rodriguez, Nan Du, Mohammad Zamani, Hongyuan
Source identification in diffusion net-
URL
CoRR, abs/1501.06582, 2015.
Zha, and Le Song.
works from partially observed cascades.
http://arxiv.org/abs/1501.06582.
Back to the past:
K. Fu, Chung hong Chan, and M. Chau. Assessing censorship on microblogs in china: Dis-
criminatory keyword analysis and the real-name registration policy. Internet Computing,
IEEE, 17(3):42 -- 50, May 2013. ISSN 1089-7801. doi: 10.1109/MIC.2013.28.
Jacob Goldenberg, Barak Libai, and Eitan Muller. Talk of the network: A complex systems
look at the underlying process of word-of-mouth. Marketing letters, 12(3):211 -- 223, 2001.
Manuel Gomez-Rodriguez, David Balduzzi, and Bernhard Scholkopf. Uncovering the tem-
poral dynamics of diffusion networks. In Proceedings of the 28th International Conference
on Machine Learning (ICML-11), ICML '11, pp. 561 -- 568. ACM, 2011.
Daniel Gruhl, R. Guha, David Liben-Nowell, and Andrew Tomkins. Information diffusion
through blogspace. In Proceedings of the 13th International Conference on World Wide
Web, WWW '04, pp. 491 -- 501, New York, NY, USA, 2004. ACM. ISBN 1-58113-844-X.
Adrien Guille, Hakim Hacid, Cecile Favre, and Djamel A. Zighed. Information diffusion in
online social networks: A survey. SIGMOD Rec., 42(2):17 -- 28, July 2013. ISSN 0163-5808.
doi: 10.1145/2503792.2503797. URL http://doi.acm.org/10.1145/2503792.2503797.
Diederik P Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv
preprint arXiv:1412.6980, 2014.
Diederik P Kingma and Max Welling. Auto-encoding variational bayes. arXiv preprint
arXiv:1312.6114, 2013.
12
R. G. Krishnan, U. Shalit, and D. Sontag. Structured Inference Networks for Nonlinear
State Space Models. ArXiv e-prints, September 2016.
Sylvain Lamprier, Simon Bourigault, and Patrick Gallinari.
cascade diffusion models:
Analys. Mining, 6(1):93:1 -- 93:16, 2016.
doi:
https://doi.org/10.1007/s13278-016-0406-1.
focus on partial orders of
infections.
Influence learning for
Social Netw.
URL
10.1007/s13278-016-0406-1.
Jure Leskovec, Lars Backstrom, and Jon Kleinberg. Meme-tracking and the dynamics of
the news cycle. In Proceedings of the 15th ACM SIGKDD international conference on
Knowledge discovery and data mining, KDD '09, pp. 497 -- 506, New York, NY, USA, 2009.
ACM. ISBN 978-1-60558-495-9. doi: 10.1145/1557019.1557077.
Cheng Li, Jiaqi Ma, Xiaoxiao Guo, and Qiaozhu Mei.
Deepcas:
CoRR, abs/1611.05373, 2016.
an end-to-
URL
end predictor of
http://arxiv.org/abs/1611.05373.
information cascades.
Chris J. Maddison, Andriy Mnih, and Yee Whye Teh. The concrete distribution: A con-
tinuous relaxation of discrete random variables. CoRR, abs/1611.00712, 2016. URL
http://arxiv.org/abs/1611.00712.
Giang Hoang Nguyen, John Boaz Lee, Ryan A. Rossi, Nesreen K. Ahmed, Eunyee
Koh, and Sungchul Kim. Continuous-time dynamic network embeddings. In Compan-
ion Proceedings of the The Web Conference 2018, WWW '18, pp. 969 -- 976, Republic
and Canton of Geneva, Switzerland, 2018. International World Wide Web Conferences
Steering Committee.
ISBN 978-1-4503-5640-4. doi: 10.1145/3184558.3191526. URL
https://doi.org/10.1145/3184558.3191526.
Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk: Online learning of social
representations. CoRR, abs/1403.6652, 2014. URL http://arxiv.org/abs/1403.6652.
R. Ranganath, S. Gerrish, and D. M. Blei. Black Box Variational Inference. ArXiv e-prints,
December 2014.
Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. Prediction of information diffusion
probabilities for independent cascade model.
In Proceedings of the 12th international
conference on Knowledge-Based Intelligent Information and Engineering Systems, Part
III, KES '08, pp. 67 -- 75. Springer-Verlag, 2008.
Kazumi Saito, Masahiro Kimura, Kouzou Ohara, and Hiroshi Motoda. Learning continuous-
time information diffusion model for social behavioral data analysis. In Proceedings of the
1st Asian Conference on Machine Learning: Advances in Machine Learning, ACML '09,
pp. 322 -- 337, Berlin, Heidelberg, 2009. Springer-Verlag. ISBN 978-3-642-05223-1.
Yong Shi, Minglong Lei, Peng Zhang, and Lingfeng Niu. Diffusion based network embedding.
CoRR, abs/1805.03504, 2018. URL http://arxiv.org/abs/1805.03504.
Kai Sheng Tai, Richard Socher, and Christopher D. Manning. Improved semantic represen-
tations from tree-structured long short-term memory networks. CoRR, abs/1503.00075,
2015. URL http://arxiv.org/abs/1503.00075.
Greg Ver Steeg and Aram Galstyan. Information-theoretic measures of influence based on
content dynamics.
In Proceedings of the sixth ACM international conference on Web
search and data mining, WSDM '13, pp. 3 -- 12, New York, NY, USA, 2013. ACM. ISBN
978-1-4503-1869-3. doi: 10.1145/2433396.2433400.
Jia Wang, Vincent W. Zheng, Zemin Liu, and Kevin Chen-Chuan Chang. Topological
recurrent neural network for diffusion prediction. CoRR, abs/1711.10162, 2017a. URL
http://arxiv.org/abs/1711.10162.
13
Yongqing Wang, Huawei Shen, Shenghua Liu, Jinhua Gao, and Xueqi Cheng. Cas-
In Pro-
the Twenty-Sixth International Joint Conference on Artificial Intelli-
URL
cade dynamics modeling with attention-based recurrent neural network.
ceedings of
gence,
https://doi.org/10.24963/ijcai.2017/416.
IJCAI-17, pp. 2985 -- 2991, 2017b.
10.24963/ijcai.2017/416.
doi:
Zhitao Wang, Chengyao Chen, and Wenjie Li. Attention network for information diffusion
prediction. In Companion Proceedings of the The Web Conference 2018, WWW '18, pp.
65 -- 66, Republic and Canton of Geneva, Switzerland, 2018. International World Wide
Web Conferences Steering Committee. ISBN 978-1-4503-5640-4. doi: 10.1145/3184558.
3186931. URL https://doi.org/10.1145/3184558.3186931.
Yuan Zhang, Tianshu Lyu, and Yan Zhang. Cosine: Community-preserving social network
embedding from information diffusion cascades. In AAAI, 2018.
6 Appendix
6.1 Joint Probability
In this section, we detail the derivation of p(D, I) whose formulation is given in equation
11. For each infected node at position i, we need to compute:
• the probability for U D
i
for being infected at its time of infections given the nodes D<i
previously infected in D and the states associated to these nodes;
• the probability of the ancestor index Ii given the i-th infection Di, and the previous
infections D<i associated to their states zD
<i;
• the probability that not infected nodes are actually not infected by the i-th infected
node given its state.
This gives:
p(D, I) =
×
×
×
=
p(D0D<0, zD
<0)p(I0D≤0, zD
p(D1D<1, zD
<1)p(I1D≤1, zD
p(D2D<2, zD
<2)p(I2D≤2, zD
...
<0) Qv6∈U D
<1) Qv6∈U D
<2) Qv6∈U D
p(v 6∈ U DD0, zD
0 )
(15)
p(v 6∈ U DD1, zD
1 )
p(v 6∈ U DD2, zD
2 )
p(DD−1D<D−1, zD
<D−1)p(ID−1D≤D−1, zD
<D−1)
p(v 6∈ U DDD−1, zD
D−1)
Qv6∈U D
D−1
Qi=1
p(DiD<i, I<i) p(IiD≤i, I<i) Qv6∈U D
p(v 6∈ U DD≤D−1, I)
6.2 Generation Process
The generation process of our model is given in algorithm 1. The process iterates while
there remains some nodes in a set of infectious nodes (initialized with u0). ⊕ denotes the
concatenation between two lists. At each iteration, the process selects the infectious node u
with minimal time-stamp of infection (all time-stamps but tD
u0 are initialized to ∞), removes
it from the infectious set and records its infector and infection time-stamp in the cascade.
Then, for each node v with time-stamp greater than the one of u, u attempts to infects v
according to the probability ku,v(zD
u ) (computed with eq 3). If it succeeds, v is inserted
14
u,v. If the new time t for v is lower than its stored time tD
in the set of infectious nodes and a time t is sampled for v from an exponential law with
parameter rD
v , this new time is
v , u is stored as the infector of v in the f rom table (used to build I D) and the
stored in tD
new state zD
v is computed according to its new infector u. The generation process outputs
a cascade structure (as described in the introduction of the previous section). From the
classical CTIC, the only changes are at lines 12, 14 and 19, respectively for the computation
of ku,v, ru,v and zD
v .
Algorithm 1: Cascade Generation Process
1 Input: Θ, U
2 for u ∈ U do
3
tD
u = ∞
4 end
5 U D = (); I D = (); tD
6 while Inf ectious 6= ∅ do
u0 = 0; f romu0 = 0; Inf ectious = {u0};
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
u ← arg min
x∈Inf ectious
tD
x ;
Inf ectious ← Inf ectious \ {u};
U D ← U D ⊕ u ;
I D ← I D ⊕ f romu ;
v > tD
for v ∈ U : tD
u do
x ∼ Bernouilli (ku,v(zu));
if x == 1 then
x ∼ Exp (ru,v);
t ← tD
if t < tD
u + t;
v then
tD
v ← t;
f romv ← U D − 1;
zv = fφ(zu, ω(f )
Inf ectious ← Inf ectious ∪ {v};
v );
end
end
end
24 end
25 Output: C D = (U D, (tD
u )u∈U , I D);
6.3 Learning Process
The learning process of our model is depicted in algorithm 2. In this algorithm, the function
makeBins first creates minibatches by ordering D in decreasing length and cutting this or-
dered list in bins of batchSize episodes each. Each bin contains 3 matrices with batchSize
rows (except in the last bin which contains matrices for the remaining D%batchSize
episodes):
• Inf : a matrix where the cell (i, j) contains the j-infected node in the i-th episode of
the bin, or −1 if the corresponding episode contains less than j infected nodes. The
width of the matrix is equal to the number of infected nodes in the longest episode in
the bin (the episode in the first row of the matrix);
• T imes: a matrix where the cell (i, j) contains the infection time-stamp of the j-infected
node in the i-th episode of the bin, or −1 if the corresponding episode contains less
15
than j infected nodes. The width of the matrix is equal to the number of infected
nodes in the longest episode in the bin (the episode in the first row of the matrix);
• N otInf : a binary matrix with U columns where the cell (i, j) equals 0 if the node j
is infected in the i-the episode of the bin, 1 otherwise;
At each epoch, the algorithm iterates on every bin. For each bin, it first initializes
the states of the infected nodes using a function initStates which produces a tensor z of
nbRows(Inf ) matrices nbCols(Inf ) × d whose each row is filled by z0 (with nbRows(X)
and nbCols(X) respectively the number of rows and columns in matrix X). For every step
t of infection in the bin, the prosess first determines in mask the rows of the matrices which
correspond to not ended episodes (T imes[:, t] refers to the column t of T imes). Then, if the
step is not the initial step t = 0, it uses functions computeLogA and computeLogB with
nodes previously infected for each episode Inf [mask, : t] associated to their corresponding
states z[mask, : t]. While the function computeLogA returns a nbRow(Inf [mask]) × t
matrix where the cell (i, j) contains the log-probability for the j-th node in the i-th episode
to infect Inf [i, t] at its infection time-stamp (using a matrix version of equation 5), the
function computeLogB returns a same shape matrix where the cell (i, j) contains the log-
probability that the j-th node in the i-th episode does not infect Inf [i, t] before its infection
time-stamp (using a matrix version of equation 6).
Then, ancestors at step t are sampled from categorial distributions parameterized by
P (ItD≤t, I<t) (deduced from logits A − B). From them, we compute the log-probability
for each infected at step t to be actually infected at their time-stamp of infection by its
corresponding sampled infector. (line 19, where sum(X, 1) is a function which returns the
vector of the sums of each row from X). This quantity is added to the accumulator ll.
Line 22 then computes the states for the nodes infected at step t according to the states
of the sampled ancestors in u (via the function computeStates which is a matrix version of
equation 2).
At the end of each iteration t, the log-likelihood that not infected nodes in N otInf [mask]
are actually not infected by infected nodes at step t is computed via computeLogG, which
is a matrix version of equation 9. This quantity is added to the accumulator ll.
At the end of the bin (when t == nbCols), a control variate baseline is computed
by maintaining a list bh of the quantity vectors considered in ∇ΘL(D). The baseline b
considered in the stochastic gradient for any episode D is thus equal to the average of
(logp(D) − 1) for this specific episode taken over the blength previous epochs.
Finally, the gradients are computed and the optimizer ADAM is used to update the pa-
rameters of the model. Note that this algorithm does not use the gradient update given in eq.
14. It is based on P (ItD≤t, I<t) and P (Dt, ItD<t, I<t) for every t ∈ {0, ..., nbCols(Inf )}
(rather than based on the simplification P (DtD<t, I<t) as given in eq. 13). This is
equivalent but greatly more efficient since in both cases P (ItD≤t, I<t) needs to be esti-
mated for sampling and P (Dt, ItD<t, I<t) is much easier to compute than P (DtD<t, I<t)
(P (Dt, ItD<t, I<t) involves a simple product while P (DtD<t, I<t) involves a sum of prod-
ucts).
6.4 Conditioned Models
Our experiments in tables 1 to 4 include results obtained with known starts of episodes
(columns 1, 2 and 3, for which τ > 1). For these cases, one need to be able to condition
the models according to right-censored episodes, which we note Dτ in the following (every
infected node in u ∈ U D with tD
u ≥ τ is reported as not infected in Dτ ). For the NLL
measure, one need to be able to compute the negative log-likelihood of the end of any episode
D given the beginning Dτ (which means estimating p(DDτ )). For the CE measure, one
need to estimate the probabilities of final infections in any episode D given its beginning
Dτ (i.e., estimating p(u ∈ U DDτ ) via Monte-Carlo simulations).
16
Algorithm 2: Learning Process
1 Input: D, U, batchSize, nbEpochs, Θ, b length
2 bins ← makeBins(D, U, batchSize);
3 for epoch ∈ {1, ..., nbEpochs} do
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
ibin ← 0;
for (Inf,Times,NotInf ) in bins do
ll ← (0)nbRows(Inf ); logq ← (0)nbRows(Inf );
z ← initStates(z0, nbRows(Inf ), nbCols(Inf ));
for t ∈ {0, ..., nbCols(Inf )} do
mask ← (T imes[:, t] >= 0);
if t > 0 then
A ← computeLogA(z[mask, : t], Inf [mask, : t], Inf [mask, t]);
B ← computeLogB(z[mask, : t], Inf [mask, : t], Inf [mask, t]);
# Sample from P (ItD≤t, I<t)
u ∼ Categorical(logits = (A − B));
logq[mask] ← logq[mask] + logP i[mask, u];
# Compute P (Dt, ItD<t, I<t)
H ← A[mask, u] − B[mask, u] + sum(B, 1);
ll[mask] ← ll[mask] + H;
z[mask, t] ← computeStates(u, z[mask, : t], Inf [mask, :
t], Inf [mask, t]);
end
ll[mask] ←
ll[mask] + computeLogG(z[mask, t], Inf [mask, t], N otInf [mask]);
end
bh[ibin] ← h[ibin] ⊕ (ll − logq − 1);
if epoch ≥ b length then
bh[ibin].pop(0);
end
b ← sum(bh[ibin], 1)/min(epoch + 1, b length);
[sum((ll − logq − 1 − b) ∇Θlogq + ∇Θ log ll)];
∇ΘL(D; Θ) ←
1
nbRows(Inf )
Θ ← ADAM (∇ΘL(D; Θ));
ibin ← ibin + 1;
end
37 end
For models RNN, CYAN and DAN which have deterministic hidden representations, the
conditioning on Dτ is direct:
it suffices to traverse the episode from the start to the last
infected node in Dτ to obtain the full representation of the input. Then, the model can
be normally used from it on the remaining of the test episode for modeling or generation
purposes (except for the time-stamp of the first next event for which one has to take into
account that it cannot happen before τ ).
For CTIC and EmbCTIC, the conditioning is also easy since future infections from τ only
depend on time-stamps of infections before τ without any need of trajectory modelling. For
simulation purposes and the CE measure, the algorithm 1 can be applied with the infection
time-stamps and the Inf ectious set initialized according to Dτ . Then, the only difference
17
is that infection delays are sampled from a truncated exponential in order to ensure that
new infections can not occur before τ . For the NLL measure, one need to reconsider the
computation of the infection probabilities from nodes infected before τ , which must take into
account that infections did not happened before τ . For each node v which is not infected
in Dτ , its probability aD
u,v of being infected by any infected node u in Dτ is divided by the
probability that u did not succeed in infecting v before τ :
aDDτ
u,v =
ku,vru,v exp−ru,v(tD
v −tD
u )
ku,v exp−ru,v (τ −tD
u ) +1 − ku,v
if tD
u < τ,
ku,vru,v exp−ru,v (tD
v −tD
u )
otherwise.
(16)
Also, for every v with tD
that u does not succeed in infecting v at tD
v ≥ τ and every u with tD
v as:
u < tD
v , we rewrite the probability bD
u,v
bDDτ
u,v =
ku,v exp−ru,v(tD
ku,v exp−ru,v (τ −tD
v −tD
u ) +1 − ku,v
u ) +1 − ku,v
1 − ku,v
ku,v exp−ru,v(τ −tD
u ) +1 − ku,v
ku,v exp−ru,v(tD
v −tD
u ) +1 − ku,v
if tD
u < τ and tD
v < ∞,
if tD
u < τ and tD
v = ∞,
otherwise.
These quantities are used to compute the conditionnal likelihood p(DDτ ):
p(DDτ ) = Yv∈U D ,tD
v ≥τ
hDDτ
v Yv6∈U D
gDDτ
v
(17)
(18)
= Qu∈U D bDDτ
where gDDτ
CTIC, the conditionnal hDDτ
u,v
v
v
and, similarly to eq.8 without the dependency in states z for
is given as:
hDDτ
v
=
bDDτ
x,v
Qx∈U ,tD
x <tD
v
Pu∈U ,tD
u <tD
v
aDDτ
u,v /bDDτ
u,v
(19)
At last, for the RINF measure, the only modification is that the statistic is computed solely
on nodes i ∈ U D such that tD
i ≥ τ .
For our model, beyond the use of conditionnal probabilities (with similar definitions than
those from eq.16, 17 and 19 but with k a function depending on the state z of the emitter such
as in the section 3.2), we must consider the conditionnal distribution of the ancestors vector
of nodes infected before τ , hereafter noted I τ , given the input Dτ . As done for learning, I τ
is sampled from our propositional distribution qDτ
<i) and the
measures are simple averages on a set of sampled I τ . Given S samples of I τ , the NLL is
thus computed as:
(I τ ) = QDτ −1
≤i, I τ
i Dτ
p(I τ
i=1
N LL = −(1/Dtest) XD∈Dtest
log
= −(1/Dtest) XD∈Dtest
log
1
S
1
S
S
Xs=1
S
Xs=1
p(DDτ , I τ,(s))
p(D, I (s)Dτ , I τ,(s))
qD(I (s)I τ,(s))
(20)
(21)
with qD(I (s)I τ,(s)) = qD(I (s))/qDτ
(I τ,(s)) and where p(D, I (s)Dτ , I τ,(s)) is computed same
manner as in section 3.2 using conditionnal versions of probability formulations (as given
above for CTIC). The last derivation is obtained according to samples of full ancestor vectors
18
I, where I (s) is an ancestor vector starting with I τ,(s) for the infections before τ . Similarly,
the CE measure considers marginal probabilities p(u ∈ U DDτ ) for every node u ∈ U defined
as averages on simulations performed given Dτ and sampled I τ,(s) as input of the generation
algorithm 1. Lastly, the INF measure is evaluated by considering:
IN F =
PD∈Dtest
1
(D − Dτ ) XD∈Dtest Xi∈{1,...,D−1},
t
U D
i
≥τ
where I (s) is an ancestor vector sampled from qD.
p(Ii = f r(i, D)D≤i, I (s)
<i )
(22)
19
|
1306.6259 | 2 | 1306 | 2013-10-08T13:20:54 | Highlighting Entanglement of Cultures via Ranking of Multilingual Wikipedia Articles | [
"cs.SI",
"cs.IR",
"physics.soc-ph"
] | How different cultures evaluate a person? Is an important person in one culture is also important in the other culture? We address these questions via ranking of multilingual Wikipedia articles. With three ranking algorithms based on network structure of Wikipedia, we assign ranking to all articles in 9 multilingual editions of Wikipedia and investigate general ranking structure of PageRank, CheiRank and 2DRank. In particular, we focus on articles related to persons, identify top 30 persons for each rank among different editions and analyze distinctions of their distributions over activity fields such as politics, art, science, religion, sport for each edition. We find that local heroes are dominant but also global heroes exist and create an effective network representing entanglement of cultures. The Google matrix analysis of network of cultures shows signs of the Zipf law distribution. This approach allows to examine diversity and shared characteristics of knowledge organization between cultures. The developed computational, data driven approach highlights cultural interconnections in a new perspective. | cs.SI | cs | Highlighting entanglement of cultures
via ranking of multilingual Wikipedia articles
Young-Ho Eom1, Dima L. Shepelyansky1,∗
1 Laboratoire de Physique Th´eorique du CNRS, IRSAMC, Universit´e de Toulouse, UPS,
F-31062 Toulouse, France
∗ E-mail: [email protected]
Abstract
How different cultures evaluate a person? Is an important person in one culture is also important
in the other culture? We address these questions via ranking of multilingual Wikipedia articles.
With three ranking algorithms based on network structure of Wikipedia, we assign ranking to
all articles in 9 multilingual editions of Wikipedia and investigate general ranking structure
of PageRank, CheiRank and 2DRank.
In particular, we focus on articles related to persons,
identify top 30 persons for each rank among different editions and analyze distinctions of their
distributions over activity fields such as politics, art, science, religion, sport for each edition.
We find that local heroes are dominant but also global heroes exist and create an effective net-
work representing entanglement of cultures. The Google matrix analysis of network of cultures
shows signs of the Zipf law distribution. This approach allows to examine diversity and shared
characteristics of knowledge organization between cultures. The developed computational, data
driven approach highlights cultural interconnections in a new perspective.
Dated: June 26, 2013
3
1
0
2
t
c
O
8
]
I
S
.
s
c
[
2
v
9
5
2
6
.
6
0
3
1
:
v
i
X
r
a
2
Introduction
Wikipedia, the online collaborative encyclopedia, is an amazing example of human collaboration
for knowledge description, characterization and creation. Like the Library of Babel, described
by Jorge Luis Borges [1], Wikipedia goes to accumulate the whole human knowledge. Since
every behavioral 'footprint' (log) is recorded and open to anyone, Wikipedia provides great
opportunity to study various types of social aspects such as opinion consensus [2, 3], language
complexity [4], and collaboration structure [5–7]. A remarkable feature of Wikipedia is its
existence in various language editions. In a first approximation we can attribute each language to
an independent culture, leaving for future refinements of cultures inside one language. Although
Wikipedia has a neutral point of view policy, cultural bias or reflected cultural diversity is
inevitable since knowledge and knowledge description are also affected by culture like other
human behaviors [8–11]. Thus the cultural bias of contents [12] becomes an important issue.
Similarity features between various Wikipedia editions has been discussed at [13]. However, the
cross-cultural difference between Wikipedia editions can be also a valuable opportunity for a
cross-cultural empirical study with quantitative approach. Recent steps in this direction, done
for biographical networks of Wikipedia, have been reported in [14].
Here we address the question of how importance (ranking) of an article in Wikipedia depends
on cultural diversity.
In particular, we consider articles about persons. For instance, is an
important person in English Wikipedia is also important in Korean Wikipedia? How about
French? Since Wikipedia is the product of collective intelligence, the ranking of articles about
persons is a collective evaluation of the persons by Wikipedia users. For the ranking of Wikipedia
articles we use PageRank algorithm of Brin and Page [15], CheiRank and 2Drank algorithms used
in [16–18], which allow to characterize the information flows with incoming and outgoing links.
We also analyze the distribution of top ranked persons over main human activities attributed to
politics, science, art, religion, sport, etc (all others), extending the approach developed in [17,19]
to multiple cultures (languages). The comparison of different cultures shows that they have
distinct dominance of these activities.
We attribute belongings of top ranked persons at each Wikipedia language to different cul-
tures (native languages) and in this way construct the network of cultures. The Google matrix
analysis of this network allows us to find interconnections and entanglement of cultures. We
believe that our computational and statistical analysis of large-scale Wikipedia networks, com-
bined with comparative distinctions of different languages, generates novel insights on cultural
diversity.
Method
We consider Wikipedia as a network of articles. Each article corresponds to a node of the network
and hyperlinks between articles correspond to links of the network. For a given network, we can
define adjacency matrix Aij. If there is a link (one or more quotations) from node (article) j to
node (article) i then Aij = 1, otherwise, Aij = 0. The out-degree kout(j) is the number of links
3
from node j to other nodes and the in-degree kin(j) is the number of links to node j from other
nodes.
Google matrix
The matrix Sij of Markov chain transitions is constructed from adjacency matrix Aij by nor-
malizing sum of elements of each column to unity (Sij = Aij/ Pi Aij, Pi Sij = 1) and replacing
columns with only zero elements (dangling nodes) by 1/N , with N being the matrix size. Then
the Google matrix of this directed network has the form [15, 20]:
Gij = αSij + (1 − α)/N .
(1)
In the WWW context the damping parameter α describes the probability (1 − α) to jump to
any article (node) for a random walker. The matrix G belongs to the class of Perron-Frobenius
operators, it naturally appears in dynamical systems [21]. The right eigenvector at λ = 1, which
is called the PageRank, has real non-negative elements P (i) and gives a probability P (i) to find
a random walker at site i. It is possible to rank all nodes in a decreasing order of PageRank
probability P (K(i)) so that the PageRank index K(i) sorts all N nodes i according their ranks.
For large size networks the PageRank vector and several other eigenvectors can be numerically
obtained using the powerful Arnoldi algorithm as described in [22]. The PageRank vector can
be also obtained by a simple iteration method [20]. Here, we use here the standard value of
α = 0.85 [20].
To rank articles of Wikipedia, we use three ranking algorithms based on network structure
of Wikipedia articles. Detail description of these algorithms and their use for English Wikipedia
articles are given in [17–19, 22].
PageRank algorithm
PageRank algorithm is originally introduced for Google web search engine to rank web pages
of the World Wide Web (WWW) [15]. Currently PageRank is widely used to rank nodes of
network systems including scientific papers [23], social network services [24] and even biological
systems [25]. Here we briefly outline the iteration method of PageRank computation. The
PageRank vector P (i, t) of a node i at iteration t in a network of N nodes is given by
P (i, t) = X
GijP (j, t − 1) , P (i, t) = (1 − α)/N + α X
AijP (j, t − 1)/kout(j) .
(2)
j
j
The stationary state P (i) of P (i, t) is the PageRank of node i. More detail information about
PageRank algorithm is described in [20]. Ordering all nodes by their decreasing probability P (i)
we obtain the PageRank index K(i).
The essential idea of PageRank algorithm is to use a directed link as a weighted 'recommenda-
tion'. Like in academic citation network, more cited nodes are considered to be more important.
In addition, recommendations by highly ranked articles are more important. Therefore high
PageRank nodes in the network have many incoming links from other nodes or incoming links
from high PageRank nodes.
4
CheiRank algorithm
While the PageRank algorithm uses information of incoming links to node i, CheiRank algorithm
considers information of outgoing links from node i [16–18]. Thus CheiRank is complementary
to PageRank in order to rank nodes in directed networks. The CheiRank vector P ∗(i, t) of a
node at iteration time t is given by
P ∗(i) = (1 − α)/N + α X
AjiP ∗(j)/kin(j)
(3)
j
We also point out that the CheiRank is the right eigenvector with maximal eigenvalue λ = 1
satisfying the equation P ∗(i) = Pj G∗
ijP ∗(j), where the Google matrix G∗ is built for the
network with inverted directions of links via the standard definition of G given above.
Like for PageRank, we consider the stationary state P ∗(i) of P ∗(i, t) as the CheiRank prob-
ability of node i at α = 0.85. High CheiRank nodes in the network have a large out-degree.
Ordering all nodes by their decreasing probability P ∗(i) we obtain the CheiRank index K ∗(i).
We note that PageRank and CheiRank naturally appear in the world trade network corre-
sponding to import and export in a commercial exchange between countries [26].
The correlation between PageRank and CheiRank vectors can be characterized by the cor-
relator κ [16–18] defined by
κ = N X
P (i)P ∗(i) − 1
i
(4)
The value of correlator for each Wikipedia edition is represented in Table 1. All correlators are
positive and distributed in the interval (1, 8).
2DRank algorithm
With PageRank P (i) and CheiRank P ∗(i) probabilities, we can assign PageRank ranking K(i)
and CheiRank ranking K ∗(i) to each article, respectively. From these two ranks, we can con-
struct 2-dimensional plane of K and K ∗. The two dimensional ranking K2 is defined by counting
nodes in order of their appearance on ribs of squares in (K, K ∗) plane with the square size grow-
ing from K = 1 to K = N [17]. A direct detailed illustration and description of this algorithm is
given in [17]. Briefly, nodes with high PageRank and CheiRank both get high 2DRank ranking.
Data description
We consider 9 editions of Wikipedia including English (EN), French (FR), German (DE), Ital-
ian (IT), Spanish (ES), Dutch (NL), Russian (RU), Hungarian (HU) and Korean (KO). Since
Wikipedia has various language editions and language is a most fundamental part of culture,
the cross-edition study of Wikipedia can give us insight on cultural diversity. The overview
summary of parameters of each Wikipedia is represented in Table 1.
The corresponding networks of these 9 editions are collected and kindly provided to us by
S.Vigna from LAW, Univ. of Milano. The first 7 editions in the above list represent mostly
spoken European languages (except Polish). Hungarian and Korean are additional editions
representing languages of not very large population on European and Asian scales respectively.
5
They allow us to see interactions not only between large cultures but also to see links on a small
scale. The KO and RU editions allow us to compare views from European and Asian continents.
We also note that in part these 9 editions reflect the languages present in the EC NADINE
collaboration.
We understand that the present selection of Wikipedia editions does represent a complete
view of all 250 languages present at Wikipedia. However, we think that this selection allows us
to perform the quantitative statistical analysis of interactions between cultures making a first
step in this direction.
To analyze these interactions we select the fist top 30 persons (or articles about persons)
appearing in the top ranking list of each of 9 editions for 3 ranking algorithms of PageRank,
CheiRank and 2DRank. We select these 30 persons manually analyzing each list. We attribute
each of 30 persons to one of 6 fields of human activity: politics, science, art, religion, sport,
and etc (here "etc" includes all other activities). In addition we attribute each person to one
of 9 selected languages or cultures. We place persons belonging to other languages inside the
additional culture WR (world) (e.g. Plato). Usually a belonging of a person to activity field and
language is taken from the English Wikipedia article about this person. If there is no such English
Wikipedia article then we use an article of a Wikipedia edition language which is native for such
a person. Usually there is no ambiguity in the distribution over activities and languages. Thus
Christopher Columbus is attributed to IT culture and activity field etc, since English Wikipedia
describes him as "italian explorer, navigator, and colonizer". By our definition politics includes
politicians (e.g. Barak Obama), emperors (e.g. Julius Caesar), kings (e.g. Charlemagne). Arts
includes writers (e.g. William Shakespeare), singers (e.g. Frank Sinatra), painters (Leonardo
da Vinci), architects, artists, film makers (e.g. Steven Spielberg). Science includes physicists,
philosophers (e.g. Plato), biologists, mathematicians and others. Religion includes such persons
as Jesus, Pope John Paul II. Sport includes sportsmen (e.g. Roger Federer). All other activities
are placed in activity etc (e.g. Christopher Columbus, Yuri Gagarin). Each person belongs only
to one language and one activity field. There are only a few cases which can be questioned,
e.g. Charles V, Holy Roman Emperor who is attributed to ES language since from early long
times he was the king of Spain. All listings of person distributions over the above categories are
presented at the web page given at Supporting Information (SI) and in 27 tables given in SI.
Unfortunately, we were obliged to construct these distributions manually following each
person individually at the Wikipedia ranking listings. Due to that we restricted our analysis
only to top 30 persons. We think that this number is sufficiently large so that the statistical
fluctuations do not generate significant changes. Indeed, we find that our EN distribution over
field activities is close to the one obtained for 100 top persons of English Wikipedia dated by
Aug 2009 [17].
To perform additional tests we use the database of about 250000 person names in English,
Italian and Dutch from the research work [14] provided to us by P.Arag´on and A.Kaltenbrunner.
Using this database we were able to use computerized (automatic) selection of top 100 persons
from the ranking lists and to compare their distributions over activities and languages with our
case of 30 persons. The comparison is presented in SI in figures S1,S2,S3. For these 3 cultures
we find that our top 30 persons data are statistically stable even if the fluctuations are larger for
CheiRank lists. This is in an agreement with the fact that the CheiRank probabilities. related
to the outgoing links, are more fluctuating (see discussion at [19]).
6
Of course, it would be interesting to extend the computerized analysis of personalities to a
larger number of top persons and larger number of languages. However, the database of persons
in various languages still should be cleaned and checked and also attribution of persons to various
activities and languages still requires a significant amount of work. Due to that we present here
our analysis only for 30 top persons. But we note that by itself it represents an interesting case
study since here we have the most important persons for each ranking. May be the top 1000
persons would be statistically more stable but clearly a person at position 30 is more important
than a one at position 1000. Thus we think that the top 30 persons already give an interesting
information on links and interactions between cultures. This information can be used in future
more extended studies of a larger number of persons and languages.
Finally we note that the language is the primary element of culture even if, of course,
culture is not reduced only to language.
In this analysis we use in a first approximation an
equivalence between language and culture leaving for future studies the refinement of this link
which is of course much more complex. In this approximation we consider that a person like
Mahatma Gandhi belongs to EN culture since English is the official language of India. A more
advanced study should take into account Hindi Wikipedia edition and attribute this person to
this edition. Definitely our statistical study is only a first step in Wikipedia based statistical
analysis of network of cultures and their interactions.
We note that any person from our top 30 ranking belongs only to one activity field and one
culture. We also define local heros as those who in a given language edition are attributed to
this language, and non-local heros as those who belong in a given edition to other languages. We
use category WR (world) where we place persons who do not belong to any of our 9 languages
(e.g. Pope John Paul II belongs to WR since his native language is Polish).
Results
We investigate ranking structure of articles and identify global properties of PageRank and
CheiRank vectors. The detailed analysis is done for top 30 persons obtained from the global
list of ranked articles for each of 9 languages. The distinctions and common characteristics of
cultures are analyzed by attributing top 30 persons in each language to human activities listed
above and to their native language.
General ranking structure
We calculate PageRank and CheiRank probabilities and indexes for all networks of considered
Wikipedia editions. The PageRank and CheiRank probabilities as functions of ranking indexes
are shown in Fig. 1. The decay is compatible with an approximate algebraic decrease of a
type P ∼ 1/K β, P ∗ ∼ 1/K ∗β with β ∼ 1 for PageRank and β ∼ 0.6 for CheiRank. These
values are similar to those found for the English Wikipedia of 2009 [17]. The difference of β
values originates from asymmetric nature between in-degree and out-degree distributions, since
PageRank is based on incoming edges while CheiRank is based on outgoing edges. In-degree
distribution of Wikipedia editions is broader than out-degree distribution of the same edition.
Indeed, the CheiRank probability is proportional to frequency of outgoing links which has a
more rapid decay compared to incoming one (see discussion in [17]). The PageRank (CheiRank)
7
probability distributions are similar for all editions. However, the fluctuations of P ∗ are stronger
that is related to stronger fluctuations of outgoing edges [19].
The top article of PageRank is usually USA or the name of country of a given language (FR,
RU, KO). For NL we have at the top beetle, species, France. The top articles of CheiRank are
various listings.
Since each article has its PageRank ranking K and CheiRank ranking K ∗, we can assign
two dimensional coordinates to all the articles. Fig. 2 shows the density of articles in the two
dimensional plane (K, K ∗) for each Wikipedia edition. The density is computed for 100 ×
100 logarithmically equidistant cells which cover the whole plane (K, K ∗). The density plot
represents the locations of articles in the plane. We can observe high density of articles around
line K = K ∗ + const that indicates the positive correlation between PageRank and CheiRank.
However, there are only a few articles within the region of top both PageRank and CheiRank
indexes. We also observe the tendency that while high PageRank articles (K < 100) have
intermediate CheiRank (102 < K ∗ < 104), high CheiRank articles (K ∗ < 100) have broad
PageRank rank values.
Ranking of articles for persons
We choose top 30 articles about persons for each edition and each ranking. In Fig. 2, they are
shown by red circles (PageRank), green squares (2DRank) and cyan triangles (CheiRank). We
assign local ranking RE,A (1 . . . 30) to each person in the list of top 30 persons for each edition
E and ranking algorithm A. An example of E = EN and A = P ageRank are given in Table 2.
From the lists of top persons, we identify the "fields" of activity for each top 30 rank person
in which he/she is active on. We categorize six activity fields - politics, art, science, religion,
sport and etc (here "etc" includes all other activities). As shown in Fig. 3, for PageRank,
politics is dominant and science is secondarily dominant. The only exception is Dutch where
science is the almost dominant activity field (politics has the same number of points). In case of
2DRank, art becomes dominant and politics is secondarily dominant. In case of CheiRank, art
and sport are dominant fields. Thus for example, in CheiRank top 30 list we find astronomers
who discovered a lot of asteroids, e.g. Karl Wilhelm Reinmuth (4th position in RU and 7th in
DE), who was a prolific discoverer of about 400 of them. As a result, his article contains a long
listing of asteroids discovered by him giving him a high CheiRank.
The change of activity priority for different ranks is due to the different balance between
incoming and outgoing links there. Usually the politicians are well known for a broad public,
hence, the articles about politicians are pointed by many articles. However, the articles about
politician are not very communicative since they rarely point to other articles.
In contrast,
articles about persons in other fields like science, art and sport are more communicative because
of listings of insects, planets, asteroids they discovered, or listings of song albums or sport
competitions they gain.
Next we investigate distributions over "cultures" to which persons belong. We determined
the culture of person based on the language the person mainly used (mainly native language).
We consider 10 culture categories - EN, FR, DE, IT, ES, NL, RU, HU, KO and WR. Here "WR"
category represents all other cultures which do not belong to considered 9 Wikipedia editions.
Comparing with the culture of persons at various editions, we can assign "locality" to each 30
8
top rank persons for a given Wikipedia edition and ranking algorithm. For example, as shown
in Table 2, George W. Bush belongs to "Politics", "English" and "Local" for English Wikipedia
and PageRank, while Jesus belongs to "Religion", "World" WR and "Non-local".
As shown in Fig. 4, regardless of ranking algorithms, main part of top 30 ranking persons
of each edition belong to the culture of the edition (usually about 50%). For example, high
PageRank persons in English Wikipedia are mainly English (53.3%). This corresponds to the
self-focusing effect discussed in [6]. It is notable that top ranking persons in Korean Wikipedia
are not only mainly Korean (56.7%) but also the most top ranking non Korean persons in
Korean Wikipedia are Chinese and Japanese (20%). Although there is a strong tendency that
each edition favors its own persons, there is also overlap between editions. For PageRank, on
average, 23.7 percent of top persons are overlapping while for CheiRank , the overlap is quite
low, only 1.3 percent. For 2DRank, the overlap is 6.3 percent. The overlap of list of top persons
implies the existence of cross-cultural 'heroes'.
To understand the difference between local and non-local top persons for each edition quanti-
tatively, we consider the PageRank case because it has a large fraction of non-local top persons.
From Eq. (2), a citing article j contributes hP (j)/kout(j)i to PageRank of a node i. So the
PageRank P (i) can be high if the node i has many incoming links from citing articles j or it has
incoming links from high PageRank nodes j with low out-degree kout(j). Thus we can identify
origin of each top person's PageRank using the average PageRank contribution hP (j)/kout(j)i
by nodes j to person i and average number of incoming edges (in-degree) kin(i) of person i .
As represented in Table 3, considering median, local top persons have more incoming links
than non-local top persons but the PageRank contribution of the corresponding links are lower
than links of non-local top persons. This indicates that local top persons are cited more than
non-local top persons but non-local top persons are cited more high weighted links (i.e. cited
by important articles or by articles which don't have many citing links).
Global and local heroes
Based on cultural dependency on rankings of persons, we can identify global and local heroes
in the considered Wikipedia editions. However, for CheiRank the overlap is very low and our
statistics is not sufficient for selection of global heroes. Hence we consider only PageRank and
2DRank cases. We determine the local heroes for each ranking and for each edition as top
persons of the given ranking who belongs to the same culture as the edition. Top 3 local heroes
for each ranking and each edition are represented in Table 4 (PageRank), Table 5 (CheiRank)
and Table 6 (2DRank), respectively.
In order to identify the global heroes, we define ranking score ΘP,A for each person P
and each ranking algorithm A. Since every person in the top person list has relative rank-
ing RP,E,A for each Wikipedia edition E and ranking algorithm A (For instance, in Table 2,
RN apoleon,EN,P ageRank = 1). The ranking score ΘP,A of a person P is give by
ΘP,A = X
(31 − RP,E,A)
E
(5)
According to this definition, a person who appears more often in the lists of editions and has
top ranking in the list gets high ranking score. We sort this ranking score for each algorithm.
9
In this way obtain a list of global heroes for each algorithm. The result is shown in Table 7.
Napoleon is the 1st global hero by PageRank and Micheal Jackson is the 1st global hero by
2DRank.
Network of cultures
To characterize the entanglement and interlinking of cultures we use the data of Fig. 4 and from
them construct the network of cultures. The image of networks obtained from top 30 persons
of PageRank and 2DRank listings are shown in Fig. 5 (we do not consider CheiRank case due
to small overlap of persons resulting in a small data statistics). The weight of directed Markov
transition, or number of links, from a culture A to a culture B is given by a number of persons
of a given culture B (e.g FR) appearing in the list of top 30 persons of PageRank (or 2DRank)
in a given culture A (e.g. EN). Thus e.g. for transition from EN to FR in PageRank we find
2 links (2 French persons in PageRank top 30 persons of English Wikipedia); for transition
from FR to EN in PageRank we have 3 links (3 English persons in PageRank top 30 persons
of French Wikipedia). The transitions inside each culture (persons of the same language as
language edition) are omitted since we are analyzing the interlinks between cultures. Then the
Google matrix of cultures is constructed by the standard rule for the directed networks: all links
are treated democratically with the same weight, sum of links in each column is renormalized
to unity, α = 0.85. Even if this network has only 10 nodes we still can find for it PageRank and
CheiRank probabilities P and P ∗ and corresponding indexes K and K ∗. The matrix elements
of G matrix, written in order of index K, are shown in Fig. 6 for the corresponding networks of
cultures presented in Fig. 5. We note that we consider all cultures on equal democratic grounds.
The decays of PageRank and CheiRank probabilities with the indexes K, K ∗ are shown in
Fig. 7 for the culture networks of Fig. 5. On a first glance a power decay like the Zipf law [27]
P ∼ 1/K looks to be satisfactory. The formal power law fit P ∼ 1/K z, P ∗ ∼ 1/(K ∗)z ∗
, done in
log − log-scale for 1 ≤ K, K ∗ ≤ 10, gives the exponents z = 0.85±0.09, z ∗ = 0.45±0.09 (Fig. 7a),
z = 0.88 ± 0.10, z ∗ = 0.77 ± 0.16 (Fig. 7b). However, the error bars for these fits are relatively
large. Also other statistical tests (e.g. the Kolmogorov-Smirnov test, see details in [28]) give
low statistical accuracy (e.g. statistical probability p ≈ 0.2; 0.1 and p ≈ 0.01; 0.01 for exponents
z, z ∗ = 0.79, 0.42 and 0.75, 0.65 in Fig. 7a and Fig. 7b respectively). It is clear that 10 cultures is
too small to have a good statistical accuracy. Thus, a larger number of cultures should be used
to check the validity of the generalized Zipf law with a certain exponent. We make a conjecture
that the Zipf law with the generalized exponents z, z ∗ will work in a better way for a larger
number of multilingual Wikipedia editions which now have about 250 languages.
The distributions of cultures on the PageRank - CheiRank plane (K, K ∗) are shown in Fig. 8.
For the network of cultures constructed from top 30 PageRank persons we obtain the following
ranking. The node WR is located at the top PageRank K = 1 and it stays at the last CheiRank
position K ∗ = 10. This happens due to the fact that such persons as Carl Linnaeus, Jesus,
Aristotle, Plato, Alexander the Great, Muhammad are not native for our 9 Wikipedia editions
so that we have many nodes pointing to WR node, while WR has no outgoing links. The next
node in PageRank is FR node at K = 2, K ∗ = 5, then DE node at K = 3, K ∗ = 4 and only
then we find EN node at K = 4, K ∗ = 7. The node EN is not at all at top PageRank positions
since it has many American politicians that does not count for links between cultures. After
10
the world WR the top position is taken by French (FR) and then German (DE) cultures which
have strong links inside the continental Europe.
However, the ranking is drastically changed when we consider top 30 2DRank persons. Here,
the dominant role is played by art and science with singers, artists and scientists. The world
WR here remains at the same position at K = 1, K ∗ = 10 but then we obtain English EN
(K = 2, K ∗ = 1) and German DE (K = 3, K ∗ = 5) cultures while FR is moved to K = K ∗ = 7.
Discussion
We investigated cross-cultural diversity of Wikipedia via ranking of Wikipedia articles. Even
if the used ranking algorithms are purely based on network structure of Wikipedia articles, we
find cultural distinctions and entanglement of cultures obtained from the multilingual editions
of Wikipedia.
In particular, we analyze raking of articles about persons and identify activity field of persons
and cultures to which persons belong. Politics is dominant in top PageRank persons, art is
dominant in top 2DRank persons and in top CheiRank persons art and sport are dominant. We
find that each Wikipedia edition favors its own persons, who have same cultural background,
but there are also cross-cultural non-local heroes, and even "global heroes". We establish that
local heroes are cited more often but non-local heroes on average are cited by more important
articles.
Attributing top persons of the ranking list to different cultures we construct the network of
cultures and characterize entanglement of cultures on the basis of Google matrix analysis of this
directed network.
We considered only 9 Wikipedia editions selecting top 30 persons in a "manual" style. It
would be useful to analyze a larger number of editions using an automatic computerized selection
of persons from prefabricated listing in many languages developing lines discussed in [14]. This
will allow to analyze a large number of persons improving the statistical accuracy of links between
different cultures.
The importance of understanding of cultural diversity in globalized world is growing. Our
computational, data driven approach can provide a quantitative and efficient way to understand
diversity of cultures by using data created by millions of Wikipedia users. We believe that our
results shed a new light on how organized interactions and links between different cultures.
Acknowledgments
We thank Sebastiano Vigna [29] who kindly provided to us the network data of 9 Wikipedia
editions, collected in the frame of FET NADINE project. We thank Pablo Arag´on and An-
dreas Kaltenbrunner for the list of persons in EN, IT, NL which we used to obtain supporting
Figs.S1,S2,S3.
11
Supporting Information
Supporting Information file presents Figures S1, S2, S3 showing comparison between probability
distributions over activity fields and language for top 30 and 100 persons for EN, IT, NK respec-
tively; tables S1, S2, ... S27 showing top 30 persons in PageRank, CheiRank and 2DRank for all
9 Wikipedia editions. All names are given in English. Supplementary methods, tables, ranking
lists and figures are available at http://www.quantware.ups-tlse.fr/QWLIB/wikiculturenetwork/;
data sets of 9 hyperlink networks are available at [29] by a direct request addressed to S.Vigna.
References
1. Borges JL (1962) The Library of Babel in Ficciones, Grove Press, New York
2. Kaltenbrunner A, Laniado D (2012) There is no deadline - time evolution of Wikipedia
discussions, Proc. of the 8th Intl. Symposium on Wikis and Open Collaboration, Wik-
iSym12, Linz
3. Torok J, Iniguez G, Yasseri T, San Miguel M, Kaski K, et al. (2013) Opinion, conflicts
and consensus: modeling social dynamics in a collaborative enviroment Phys. Rev. Lett.
110: 088701
4. Yasseri T, Kornai A, Kert´esz J (2012) A practical approach to language complexity: a
Wikipedia case study PLoS ONE, 7: e48386
5. Brandes U, Kenis P, Lerner U, van Raaij D (2009) Network analysis of collaboration
structure in Wikipedia Proc. 18th Intl. Conf. WWW, :731
6. Hecht B, Gergle D (2009) Measuring self-focus bias in community-maintained knowledge
repositories Proc. of the Fourth Intl Conf. Communities and technologies, ACM, New
York :11
7. Nemoto K, Gloor PA (2011) Analyzing cultural differences in collaborative innovation
networks by analyzing editing behavior in different-language Wikipedias Procedia - Social
and Behavioral Sciences 26: 180
8. Norenzayan A (2011) Explaining human behavioral diversity, Science, 332: 1041
9. Gelfand MJ, Raver JL, Nishii L, Leslie LM, Lun J et al. (2011) Differences between tight
and loose cultures: a 33-nation study, Science, 332: 1100
10. Yasseri T, Spoerri A, Graham M, Kert´esz J (2013) The most controversial topics in
Wikipedia: a multilingual and geographical analysis arXiv:1305.5566 [physics.soc-ph]
11. UNESCO World Report (2009) Investing in cultural diversity and intercultural dialogue,
Available: http://www.unesco.org/new/en/culture/resources/report/the-unesco-world-report-on-cultural-diversity
12
12. Callahan ES, Herriing SC (2011) Cultural bias in Wikipedia content on famous persons,
Journal of the American society for information science and technology 62: 1899
13. Warncke-Wang M, Uduwage A, Dong Z, Riedl J (2012) In search of the ur-Wikipedia:
universality, similarity, and translation in the Wikipedia inter-language link network, Pro-
ceedings of the Eighth Annual International Symposium on Wikis and Open Collaboration
(WikiSym 2012), ACM, New York No 20
14. Arag´on P, Laniado D, Kaltenbrunner A, Volkovich Y (2012) Biographical social networks
on Wikipedia: a cross-cultural study of links that made history, Proceedings of the Eighth
Annual International Symposium on Wikis and Open Collaboration (WikiSym 2012),
ACM, New York No 19; arXiv:1204.3799v2[cs.SI]
15. Brin S, Page L (1998) The anatomy of a large-scale hypertextual Web search engine Com-
puter Networks and ISDN Systems 30: 107
16. Chepelianskii AD (2010) Towards physical laws for software architecture arXiv:1003.5455
[cs.SE]
17. Zhirov AO, Zhirov OV, Shepelyansky DL (2010) Two-dimensional ranking of Wikipedia
articles, Eur. Phys. J. B 77: 523
18. Ermann L, Chepelianskii AD, Shepelyansky DL (2012) Toward two-dimensional search
engines, J. Phys. A: Math. Theor. 45: 275101
19. Eom YH, Frahm KM, Benc´zur A, Shepelyansky DL (2013) Time evolution of Wikipedia
network ranking arXiv:1304.6601 [physics.soc-ph]
20. Langville AM, Meyer CD (2006) Google's PageRank and Beyond: The Science of Search
Engine Rankings, Princeton University Press, Princeton
21. Brin M, Stuck G (2002) Introduction to dynamical systems, Cambridge Univ. Press, Cam-
bridge, UK
22. Ermann L, Frahm KM, Shepelyansky DL (2013) Spectral properties of Google matrix of
Wikipedia and other networks, Eur. Phys. J. D 86: 193
23. Chen P, Xie H, Maslov S, Redner S (2007) Finding scientific gems with Google´s PageRank
algorithm Jour. Informetrics, 1: 8
24. Kwak H, Lee C, Park H, Moon S (2010) What is Twitter, a social network or a news
media?, Proc. 19th Int. Conf. WWW2010, ACM, New York :591
25. Kandiah V, Shepelyansky DL (2013) Google matrix analysis of DNA sequences, PLoS
ONE 8(5): e61519
13
26. Ermann L, Shepelyansky DL (2011) Google matrix of the world trade network, Acta Phys-
ica Polonica A 120(6A), A158
27. Zipf GK (1949) Human behavior and the principle of least effort, Addison-Wesley, Boston
28. Clauset A, Shalizi CR, Newman MEJ (2009) Power-law distributions in empirical data,
SIAM Rev 51(4): 661
29. Vigna S, personal web page, Available: http://vigna.dsi.unimi.it/
)
K
P
(
10-2
10-4
10-6
10-8
10-10
10-12
10-14
10-16
)
*
K
(
*
P
(a)
14
EN
FR
DE
IT
ES
NL
RU
HU
KO
(b)
10-2
10-4
10-6
10-8
10-10
10-12
10-14
10-16
100 101 102 103 104 105 106 107
100 101 102 103 104 105 106 107
K
K*
Figure 1. PageRank probability P (K) as function of PageRank index K (a) and CheiRank
probability P ∗(K ∗) as function of CheiRank index K ∗ (b). For a better visualization each
PageRank P and CheiRank P ∗ curve is shifted down by a factor 100 (EN), 101 (FR), 102
(DE), 103 (IT), 104 (ES), 105 (NL), 106 (RU), 107 (HU), 108 (KO).
15
Figure 2. Density of Wikipedia articles in the PageRank ranking K versus CheiRank ranking
K ∗ plane for each Wikipedia edition. The red points are top PageRank articles of persons, the
green points are top 2DRank articles of persons and the cyan points are top CheiRank articles
of persons. Panels show: English (top-left), French (top-center), German (top-right), Italian
(middle-left), Spanish (middle-center), Dutch (middle-left), Russian (bottom-left), Hungarian
(bottom-center), Korean (bottom-right). Color bars shown natural logarithm of density,
changing from minimal nonzero density (dark) to maximal one (white), zero density is shown
by black.
16
Figure 3. Distribution of top 30 persons in each rank over activity fields for each Wikipedia
edition. Panels correspond to (a) PageRank, (b) 2DRank, (3) CheiRank. The color bar shows
the values in percents.
Figure 4. Distributions of top 30 persons over different cultures corresponding to Wikipedia
editions, "WR" category represents all other cultures which do not belong to considered 9
Wikipedia editions. Panels show ranking by (a) PageRank, (b) 2DRank, (3) CheiRank. The
color bar shows the values in percents.
Table 1. Considered Wikipedia networks from language editions: English (EN), French (FR),
German (DE), Italian (IT), Spanish (ES), Dutch (NL), Russian (RU), Hungarian (HU),
Korean (KO). Here NA is number of articles, NL is number of hyperlinks between articles, κ is
the correlator between PageRank and CheiRank. Date represents the time in which data are
collected.
Edition
NA
EN
FR
DE
IT
ES
NL
RU
HU
KO
3920628
1224791
1396293
917626
873149
1034912
830898
217520
323461
NL
92878869
30717338
32932343
22715046
20410260
14642629
17737815
5067189
4209691
κ
Date
3.905562 Mar. 2012
3.411864 Feb. 2012
3.342059 Mar. 2012
7.953106 Mar. 2012
3.443931 Feb. 2012
7.801457 Feb. 2012
2.881896 Feb. 2012
2.638393 Feb. 2012
1.084982 Feb. 2012
DE
IT
(a)
FR
EN
DE
IT
(b)
FR
ES
NL
EN
WR
RU
WR
KO
HU
KO
HU
17
ES
RU
NL
Pajek
Paje
Figure 5. Network of cultures obtained from 9 Wikipedia languages and the remaining world
(WR) selecting 30 top persons of PageRank (a) and 2DRank (b) in each culture. The link
width and darkness are proportional to a number of foreign persons quoted in top 30 of a given
culture, the link direction goes from a given culture to cultures of quoted foreign persons,
quotations inside cultures are not considered. The size of nodes is proportional to their
PageRank.
(a)
WR
FR
DE
EN
IT
RU
ES
KO
HU
NL
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
(b)
WR
EN
DE
IT
RU
ES
FR
NL
KO
HU
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
WR FR DE EN IT RU ES KO HU NL
WR EN DE IT RU ES FR NL KO HU
Figure 6. Google matrix of network of cultures from Fig. 5, shown respectively for panels
(a), (b). The matrix elements Gij are shown by color at the damping factor α = 0.85, index j is
chosen as the PageRank index K of PageRank vector so that the top cultures with
K = K ′ = 1 are located at the top left corner of the matrix.
100
)
*
K
(
*
P
,
)
K
P
(
10-1
(a)
10-2
100
100
)
*
K
(
*
P
,
)
K
P
(
10-1
(b)
101
10-2
100
18
101
K, K*
K, K*
Figure 7. Dependence of probabilities of PageRank P (red) and CheiRank P ∗ (blue) on
corresponding indexes K and K ∗. The probabilities are obtained from the network and Google
matrix of cultures shown in Fig. 5 and Fig. 6 for corresponding panels (a), (b). The straight
lines indicate the Zipf law P ∼ 1/K; P ∗ ∼ 1/K ∗.
10
W
R
(b)
*
K
(a)
*
K
10
W
R
9
8
7
6
5
4
3
2
1
E N
F R
D E
K O
R U
H U
N L
I T
E S
1
2
3
4
5
K
6
7
8
9
10
9
8
7
6
5
4
3
2
1
K O
H U
F R
E S
D E
I T
R U
N L
E N
2
1
3
4
5
K
6
7
8
9
10
Figure 8. PageRank versus CheiRank plane of cultures with corresponding indexes K and
K ∗ obtained from the network of cultures for corresponding panels (a), (b).
Table 2. Example of list of top 10 persons by PageRank for English Wikipedia with their
field of activity and native language.
19
REN,P ageRank
1
2
3
4
5
6
7
8
9
10
Person
Napoleon
Carl Linnaeus
George W. Bush
Barack Obama
Elizabeth II
Jesus
William Shakespeare
Aristotle
Adolf Hitler
Bill Clinton
Art
Culture
Field
FR
Politics
WR
Science
EN
Politics
EN
Politics
Politics
EN
Religion WR
EN
WR
DE
EN
Science
Politics
Politics
Locality
Non-local
Non-local
Local
Local
Local
Non-local
Local
Non-local
Non-local
Local
Table 3. PageRank contribution per link and in-degree of PageRank local and non-local
heroes i for each edition. [P (j)/k(j)out]L and [P (j)/k(j)out]N L are median PageRank
contribution of a local hero L and non-local hero N L by a article j which cites local heroes L
and non-local heroes N L respectively. [k(L)in] and [k(N L)in] are median number of in-degree
k(L)in and k(N L)in of local hero L and non-local hero N L, respectively. NLocal is number
local heroes in given edition.
Edition NLocal
[P (j)/k(j)out]L
[P (j)/k(j)out]N L
EN
FR
DE
IT
ES
NL
RU
HU
KO
16
15
14
11
4
2
18
12
17
1.43 × 10−8
3.88 × 10−8
3.48 × 10−8
7.00 × 10−8
5.44 × 10−8
7.77 × 10−8
6.67 × 10−8
21.1 × 10−8
16.6 × 10−8
<
<
<
<
<
<
<
<
<
2.18 × 10−8
5.69 × 10−8
4.29 × 10−8
7.21 × 10−8
8.58 × 10−8
14.4 × 10−8
10.2 × 10−8
32.3 × 10−8
35.5 × 10−8
[k(L)in]
[k(N L)in]
5.3 × 103 > 3.1 × 103
2.6 × 103 > 2.0 × 103
2.6 × 103 > 2.1 × 103
1.9 × 103 > 1.5 × 103
2.2 × 103 > 1.2 × 103
1.0 × 103 > 6.7 × 102
1.7 × 103 > 1.5 × 103
8.1 × 102 > 5.3 × 102
4.7 × 102 > 2.3 × 102
Table 4. List of local heroes by PageRank for each Wikipedia edition. All names are
represented by article titles in English Wikipedia. Here "William the Silent" is the third local
hero in Dutch Wikipedia but he is out of top 30 persons.
20
Edition
EN
FR
DE
IT
ES
NL
RU
HU
KO
1st
George W. Bush
Napoleon
Adolf Hitler
Augustus
Charles V, Holy Roman Emperor
William I of the Netherlands
Peter the Great
Matthias Corvinus
Gojong of the Korean Empire
2nd
Barack Obama
Louis XIV of France
Martin Luther
Dante Alighieri
Philip II of Spain
3rd
Elizabeth II
Charles de Gaulle
Immanuel Kant
Julius Caesar
Francisco Franco
Beatrix of the Netherlands William the Silent
Alexander Pushkin
Joseph Stalin
Szent´agothai J´anos
Sejong the Great
Stephen I of Hungary
Park Chung-hee
Table 5. List of local heroes by CheiRank for each Wikipedia edition. All names are
represented by article titles in English Wikipedia.
Edition
1st
C. H. Vijayashankar
Jacques Davy Duperron
Harry Pepl
Nduccio
Che Guevara
Hans Renders
EN
FR
DE
IT
ES
NL
RU
HU
KO
2nd
Matt Kelley
Jean Baptiste Ebl´e
Marc Zwiebler
Vincenzo Olivieri
Arturo Mercado
Julian Jenner
3rd
William Shakespeare (inventor)
Marie-Magdeleine Aym´e de La Chevreli`ere
Eugen Richter
Mina (singer)
Francisco Goya
Marten Toonder
Aleksander Vladimirovich Sotnik Aleksei Aleksandrovich Bobrinsky
Boris Grebenshchikov
Csernus Imre
Lee Jong-wook (baseball)
Kati Kov´acs
Kim Dae-jung
Pl´eh Csaba
Kim Kyu-sik
Table 6. List of local heroes by 2DRank for each Wikipedia edition. All names are
represented by article titles in English Wikipedia
Edition
1st
2nd
3rd
EN
FR
DE
IT
ES
NL
RU
HU
KO
Frank Sinatra
Fran¸cois Mitterrand
Adolf Hitler
Giusppe Garibaldi
Sim´on Bol´ıvar
Albert II of Belgium
Dmitri Mendeleev
Stephen I of Hungary
Paul McCartney
Jacques Chirac
Michael Jackson
Honor´e de Balzac
Otto von Bismarck Ludwig van Beethoven
Raphael
Benito Mussolini
Francisco Goya
Johan Cruyff
Peter the Great
S´andor Petofi
Fidel Castro
Rembrandt
Yaroslav the Wise
Franz Liszt
Gojong of the Korean Empire
Sejong the Great
Park Chung-hee
21
Table 7. List of global heroes by PageRank and 2DRank for all 9 Wikipedia editions. All
names are represented by article titles in English Wikipedia. Here, ΘA is the ranking score of
the algorithm A (5); NA is the number of appearances of a given person in the top 30 rank for
all editions.
2DRank global heroes
Carl Linnaeus
Aristotle
Rank PageRank global heroes ΘP R NA
1st
9
9
2nd
8
3rd
4th
9
9 Wolfgang Amadeus Mozart
5th
8
6th
6
7th
8th
8
7
9th
10th
6
William Shakespeare
Alexander the Great
259
239
235
228
200
161
119
111
110
108
Adolf Hitler
Julius Caesar
William Shakespeare
Pope John Paul II
Pope John Paul II
Ludwig van Beethoven
Micheal Jackson
Adolf Hitler
Julius Caesar
Napoleon
Jesus
Plato
Charlemagne
Pope Benedict XVI
Bob Dylan
Θ2D NA
119
5
6
93
5
85
80
4
5
75
4
71
4
69
66
4
3
57
56
3
|
1203.0135 | 1 | 1203 | 2012-03-01T10:32:02 | Optimal Mix of Incentive Strategies for Product Marketing on Social Networks | [
"cs.SI",
"physics.soc-ph"
] | We consider the problem of devising incentive strategies for viral marketing of a product. In particular, we assume that the seller can influence penetration of the product by offering two incentive programs: a) direct incentives to potential buyers (influence) and b) referral rewards for customers who influence potential buyers to make the purchase (exploit connections). The problem is to determine the optimal timing of these programs over a finite time horizon. In contrast to algorithmic perspective popular in the literature, we take a mean-field approach and formulate the problem as a continuous-time deterministic optimal control problem. We show that the optimal strategy for the seller has a simple structure and can take both forms, namely, influence-and-exploit and exploit-and-influence. We also show that in some cases it may optimal for the seller to deploy incentive programs mostly for low degree nodes. We support our theoretical results through numerical studies and provide practical insights by analyzing various scenarios. | cs.SI | cs |
Optimal Mix of Incentive Strategies for Product
Marketing on Social Networks
Pankaj Dayama1, Aditya Karnik1 and Y. Narahari2
1 Global General Motors R&D, India Science Lab, GM Technical Center (India),
Bangalore 560066, India
{pankaj.dayama,aditya.karnik}@gm.com
2 Department of Computer Science and Automation, Indian Institute of Science,
Bangalore 560012, India
[email protected]
Abstract. We consider the problem of devising incentive strategies for
viral marketing of a product. In particular, we assume that the seller can
influence penetration of the product by offering two incentive programs:
a) direct incentives to potential buyers (influence) and b) referral rewards
for customers who influence potential buyers to make the purchase (ex-
ploit connections). The problem is to determine the optimal timing of
these programs over a finite time horizon. In contrast to algorithmic per-
spective popular in the literature, we take a mean-field approach and
formulate the problem as a continuous-time deterministic optimal con-
trol problem. We show that the optimal strategy for the seller has a
simple structure and can take both forms, namely, influence-and-exploit
and exploit-and-influence. We also show that in some cases it may op-
timal for the seller to deploy incentive programs mostly for low degree
nodes. We support our theoretical results through numerical studies and
provide practical insights by analyzing various scenarios.
Keywords: Incentive Strategies, Social Networks, Viral Marketing
1
Introduction
A key research topic in multi-agent systems is to understand the effect of mi-
crodynamics/interactions between agents on macroscopic properties. Often the
agents are a part of a social structure such as a social network. A common ex-
ample is that of a social network that consists of potential buyers of a particular
new product offering in the market. These buyers interact with each other and
influence each others' purchase decisions through word-of-mouth and/or behav-
ior. This so-called social influence exerted by agents on their neighboring agents
in the network have a significant role to play in generating a network effect on
the sales of the product. The idea of viral marketing is to essentially exploit the
(macroscopic) network effects that result due to the microdynamics between the
agents in the network.
Viral marketing is receiving much attention by practicing marketers and aca-
demics alike. While not a new idea, it has come to the forefront because of multi-
ple effects - products have become more complex, making buyers to increasingly
rely on opinions of their peers; consumers have evolved to distrust advertising;
and Web2.0 has revolutionized the way people can connect, communicate and
share. With power shifting to consumers, it has become important for sellers
to devise effective viral marketing strategies [8]. This work is motivated by this
urgent need.
For social influence to work, there must be seeds, i.e., product advocates to
start with. The sellers, therefore, employ two basic strategies. The first is to
create advocates, by providing incentives to potential buyers to make an actual
purchase. These incentives are typically in the form of discounts, free goodies,
etc. The second is to reward product advocates who 'put in a good word' and
influence potential buyers to make the purchase. Thus, the latter program helps
to exploit the impact of social influence while making a purchasing decision
whereas the former program helps to directly influence the buying behavior by
offering discounts.
Since incentives come at a cost, a seller must balance the revenue she gener-
ates through these strategies and the expenditure she incurs in doing so. This
poses some non-trivial challenges. The first is determining incentives themselves,
since response of an individual is contingent on them (too low a referral reward
may not elicit recommendation from an individual since personal reputation is
usually at stake). Secondly, the two programs are not necessarily causally con-
nected. The reputation of a firm or a brand might create product advocates
without incentives, thereby, requiring a seller to launch a referral program di-
rectly. This necessitates careful 'timing' of these programs.
The objective of this paper is to shed some light on this practically important
and theoretically interesting problem. In particular, we seek to determine an
optimal timing of these programs over a finite time horizon.
1.1 Related Work
In recent years, problems such as these have attracted much attention. Several
papers investigate 'influence maximization' (see, for example, Domingos and
Richardson [7], Kempe, Kleinberg, and Tardos [11], Bharathi, Kempe, and Salek
[4], Chen, Yaun, and Zhang [6]), where the problem is to determine the set
of initial adopters who, through an influence process, can maximize the future
adoptions of the product. Auriol and Benaim [2] discuss a dynamic model of how
standards and norms emerge in decentralized economies. Hartline, Mirrokni, and
Sundararajan [10], Arthur, Motwani, Sharma, and Xu [1] consider the problem of
'revenue maximization' for viral marketing and are close in spirit to the problem
we consider in this paper.
In Hartline et al. [10] a model is proposed in which the purchase decision
of a buyer is influenced by individuals who own the product and the price at
which the product is offered. An optimal pricing policy is derived using dynamic
programming in a symmetric setting (i.e., identical buyers). In a general setting,
finding an optimal strategy is shown to be NP-hard and approximation algo-
rithms are considered. The authors suggest influence-and-exploit strategy where
selected buyers are given the product for free, and the seller extracts revenue
by making a random sequence of offers and a greedy pricing strategy for the
remaining buyers to compensate for the initial loss.
Arthur et al. [1] also considers a model in which a buyer's decision is influ-
enced by friends who own the product and price at which the product is offered.
Sales are assumed to cascade through the social network. The seller offers cash-
back to recommenders and also sets price for each buyer. The authors show that
determining an optimal strategy to maximize expected revenue is NP-hard and
propose a non-adaptive influence-and-exploit policy, which offers product to the
interior nodes of the max-leaf spanning tree of the network for free and later ex-
ploits their influence by extracting more revenue from the leaf nodes of the tree.
They show that the expected revenue generated from the non-adaptive strategy
is within a constant factor of the optimal revenue from an adaptive strategy.
1.2 Our Contributions
We consider a seller interested in selling a product to a population of N agents.
The product is assumed to be durable and free from network externalities. From
the seller's perspective, each agent assumes one of the following types at any
point in time: potential buyer (one who is yet to make a purchase), customer
(one who has purchased the seller's product) and competitor's customer (one
who has purchased a competing product3). A potential buyer makes a purchase
decision of her own volition (essentially under external influence) or under so-
cial influence. This decision-making is modeled probabilistically, by specifying
for both products (the seller's and the competitor's), probabilities of purchase
under external influence and social influence. The seller can influence the former
through direct incentives (which affect the price) and the latter through referral
rewards. The problem she faces is to roll out these programs so as to maximize
the profit, which is equal to the revenue obtained by customer acquisition mi-
nus the expenditure on direct incentives and referral rewards, over a given time
horizon T .
In practice sellers have limited knowledge about the social network underlying
the population, typically, in the form of a class-level statistical description of it.
A class comprises agents who are considered essentially identical on a variety
of factors (chosen by the seller), such as demographic, economic level, number
of social contacts and so on. In this paper we consider this set-up. However to
keep it simple, we assume heterogeneity only in terms of network connections
(in particular, probabilities of purchase under either external or social influence
are assumed to be the same for all agents); hence classes are based only on
the number of social contacts (degrees). The seller thus knows only the degree
distribution and degree-degree correlation of the social network.
3 All competitors are aggregated into one single virtual competitor.
This class-level statistical description of the agent population allows us to
approximate the stochastic evolution of the purchase dynamics by a deterministic
process described by ordinary differential equations (ODEs). This is formally
established as a mean-field limit, taking the number of agents N → ∞ [3]. With
an ODE limit, we pose the problem as a continuous time optimal control problem
and employ the well known Pontryagin's Maximum principle [12] to characterize
an optimal control. An optimal control specifies for each class the times at which
direct incentives and referral rewards programs are to be executed. The following
are our main results.
1. We show that an optimal control has a simple structure: the seller needs to
run each of the programs at most twice for a certain duration. Moreover,
it is non-adaptive (or open-loop). This simplifies the implementation and
practically can help a seller pre-allocate the budget for her campaign.
2. While influence-and-exploit strategy turns out to be optimal when social
influence is strong in the population, exploit-and-influence strategy can be
optimal when the seller has a good reputation.
3. In some settings, the seller may be better off incentivizing low degree nodes
as against the popular approach of targeting the influentials (high degree
nodes). This, we believe, provides some support to the findings reported in
[14] in reference to the influentials hypothesis.
The approach we have taken to address the problem is entirely different
from the ones in the literature. While a large size of the population presents a
challenge to the earlier approaches, it, in fact, aids us in migrating to a simpler
deterministic description of the dynamics. The assumption that agents of a class
are indistinguishable also fits in naturally with the popular marketing approach
of customer segmentation and allows a seller to customize incentives and referral
rewards as per these segments.
In contrast to earlier papers, we have also modeled competition. This is not
only close to reality but interestingly it allows to address some problems in com-
pletely different contexts. For example, in limiting the spread of misinformation
about an entity or an Internet virus, the objective is to maximize nodes with
correct information or security patches by immunizing them (akin to direct in-
centives) and/or incentivizing them to spread the information they have to their
neighbors (akin to referrals). Our results are, thus, applicable to these problems
as well (see [5] for discussion of the influence limitation problem).
2 Problem Formulation
Consider a population of N agents, indexed by i = 1, 2, . . . , N . The underlying
social network is specified by an undirected graph G = (V, E). Each agent is
identified with a node in V and (i, j) ∈ E means that i and j are social contacts
and they influence each other in decision-making.
si denotes the state of agent i. si can take three values: 0 (indicates potential
buyer), 1 (indicates customer) and −1 (indicates competitor's customer). Let
s := (s1, s2, . . . , sN ).
Each agent makes the purchase decision at a random time point, independent
of all others. It suffices to assume that time is discrete (denoted by n = 1, 2, . . .)
and at each time step, an agent is chosen uniformly randomly from the popu-
lation for a potential state change. Since there are no repeat purchases, 1 and
−1 are absorbing states. Therefore, the state change occurs only if the chosen
agent is a potential buyer. Suppose agent i is chosen at a time n. Then one of
the following happens if i is a potential buyer.
1. i buys the seller's product on her own with probability α (For example,
α = 0.08 means that there is 8% chance that a potential buyer will buy the
seller's product on her own).
2. i buys the competitor's product on her own with probability δ.
3. i selects one of her social contacts at random. If the selected contact is a
customer, i buys the seller's product under social influence with probability
β (For example, β = 0.1 means that there is 10% chance that a potential
buyer will buy the seller's product if she interacts with someone who has
already bought the product).
4. i selects one of her social contacts at random. If the selected contact is a
competitor's customer, i buys the competitor's product under social influ-
ence with probability γ.
Clearly, the state process {s(n), n ≥ 1} is a Markov chain.
Now from the seller's perspective, agents having the same degree are indis-
tinguishable and the network G is known only statistically, i.e., G is drawn from
an ensemble of random undirected graphs of size N , a given degree distribu-
tion P (k) (1 ≤ k ≤ K) and degree-degree correlation function P (k′k), which
denotes the probability that a given link from a node of degree k is to a node
of degree k′. Note that a number of well-known graphs such as homogeneous
random graphs, exponential random graphs (e.g., G(n, p) and Watts-Strogatz
network), scale-free networks can be represented in this framework. We assume
that K remains uniformly bounded as N → ∞.
Denote by ik, rk and θk the fraction of degree-k agents who are potential buy-
ers, customers and competitor's customers respectively (note that normalization
is with respect to the number of class-k agents; hence ik + rk + θk = 1). Let
xk := (ik, rk, θk) and x := (x1, . . . , xK ). From the above assumption, it follows
that {x(n), n ≥ 1} is a Markov chain (as seen by the seller).
The drift of x can be computed considering the four cases described above.
Table 1 shows the corresponding probabilities and the change in xk for degree
class-k. Consider as an example Case 3. The probability of a randomly selected
agent being a potential customer of degree k is P (k)ik. This agent randomly
chooses one of her k social contacts. The probability that this chosen one is
an existing customer is 1
agent buys the seller's product under the social influence from her contact with
j=1 Pk′∈K P (k′k)rk′ = Pk′∈K P (k′k)rk′ . The selected
probability β. Thus the probability of Case 3 is βP (k)ikPk′∈K P (k′k)rk′ . One
k Pk
agent changes her state from 0 (potential customer) to 1 (customer). Hence the
effect on xk is
(−1, 1, 0).
1
N Pk
We now make the dependence on the population size N explicit and denote
by F N (x) := [F N
k (x)]K
k=1 the drift of x. F N
k (x) is as follows.
1
N
−βik Pk′∈K P (k′k)rk′ −γik Pk′ ∈K P (k′k)θk′ −(α+δ)ik
βik Pk′ ∈K P (k′k)rk′ +αik
γik Pk′ ∈K P (k′k)θk′ +δik
Observe that (i) the number of transitions per agent per time slot is of the
order of 1
N (ii) the second moment of number of agent transitions per time
slot is bounded and (iii) F N (x) is a smooth function of 1
N and x. Let F (x) =
F N (x)
limN→∞
1/N . It then follows from Theorem 1 of [3] that the time evolution
of x(n) can be approximated by the following system of ODEs (with the same
initial conditions).
x = F (x)
(1)
More explicitly, for 1 ≤ k ≤ K
ik = −βikRk − γikΘk − (α + δ)ik
rk = βikRk + αik
θk = γikΘk + δik
where, Rk := Pk′∈K P (k′k)rk′ and Θk := Pk′∈K P (k′k)θk′ .
The seller offers direct incentives and referral rewards to increase α and
β respectively. We model this as follows. A referral reward of c results in an
increase of ǫ1 in β and a direct incentive of c′ causes α to increase by ǫ2. Thus,
for the duration of the referral reward program, social influence rate of (β +ǫ1) is
operational and the seller incurs a cost of c for every successful referral. Similarly,
Case Probability
1
2
3
4
αP (k)ik
δP (k)ik
βP (k)ik Pk′∈K P (k′k)rk′
γP (k)ik Pk′∈K P (k′k)θk′
Effect on xk
1
N P
1
k
N P
1
k
N P
1
k
N P
k
(−1, 1, 0)
(−1, 0, 1)
(−1, 1, 0)
(−1, 0, 1)
Table 1. Probability and effect on xk for different cases
if the direct incentive program is executed for some duration, the take-rate for
seller's product increases to (α + ǫ2) for that duration, incurring her a cost of c′
for every sale. We normalize c and c′ with respect to the product price. Thus the
price is fixed to 1. The seller's problem of maximizing her profit (revenue minus
cost) over a fixed time horizon T by optimally timing the two program can now
be stated formally as follows.
Let uk(t) (resp. vk(t)) denote the control variable indicating whether or not
the referral reward program (resp. direct incentive program) is offered to class-k
at time t. The cost incurred in running the referral reward program is
Z T
0
K
Xk=1
P (k)uk(t)c(β + ǫ1)ik(t)Rk(t)dt
(2)
Recall that the conversion rate of potential buyers under the program is c(β +
ǫ1)ik(t)Rk(t). The cost incurred in the direct incentives program is
Z T
0
K
Xk=1
P (k)vk(t)c′(α + ǫ2)ik(t)dt
(3)
Since the product price is unity, the revenue obtained is proportional to the
k=1 P (k)rk(T ). Denoting the total
number of customers at the end of horizon, PK
cost (2)+(3) by C(T ) the problem is
Maximize
K
Xk=1
P (k)rk(T ) − C(T )
subject to
ik = −(β + ukǫ1)ikRk − (α + vkǫ2)ik − γikΘk − δik
rk = (β + ukǫ1)ikRk + (α + vkǫ2)ik
θk = γikΘk + δik
for 1 ≤ k ≤ K and a given initial condition x(0).
Three remarks are in order. The assumption of heterogeneity only in the
number of social contacts is mainly to keep the formulation simple and high-
light the impact of network structure. Extending this formulation to a general
setting is straightforward and will be taken up in a longer version of the paper.
Our random interaction model essentially means that the social influence on a
potential buyer is the average influence from her neighbors. This, we believe, is
reasonable since we have also assumed presence of external influence (through
α) on agents4. In the above formulation we consider fixed rewards and incentives
pay-outs (c and c′). This simplifies implementation in practice. Calibration of c
and c′ can be carried out through numerical studies.
4 For the lack of clear empirical evidence, one may also consider total influence from
the neighbors. Mathematically, it is a simple modification to our formulation.
3 Structure of Optimal Control
In this section we mathematically prove the structural properties of an optimal
control. To keep the proof simple, we will assume that the network G is drawn
randomly from a set of regular networks of size N and degree k. This is without
loss of generality.
Let i(t), r(t) and θ(t) denote the fraction of population in states {0, 1, −1} at
time t respectively. Let u(t) ∈ {0, 1} denote whether or not the referral reward
program is offered at time t and let v(t) ∈ {0, 1} denote whether or not the
direct incentive program is offered at time t. The purchase dynamics under the
influence of these programs are given as follows:
i = −(β + uǫ1)ir − (α + vǫ2)i − γiθ − δi
r = (β + uǫ1)ir + (α + vǫ2)i
θ = γiθ + δi
(4)
(5)
(6)
From (4), (5), and (6), observe that i + r + θ = 0. Therefore, it suffices
to consider any two equations. Let Ω := {(i, r)i + r ≤ 1, i ≥ 0, r ≥ 0}. Let
x(t) := (i(t), r(t)) ∈ Ω denote the state variable.
The optimal control problem in this simpler setting is as follows.
Maximize r(T ) −Z T
0
cu(t)(β + ǫ1)i(t)r(t)dt
−Z T
0
c′v(t)(α + ǫ2)i(t))dt
(7)
subject to (4), (5) and the following constraints on state and control variables:
for all 0 ≤ t ≤ T , x(t) ∈ Ω, u(t) ∈ {0, 1} and v(t) ∈ {0, 1}.
Our main result is given in Proposition 1. It shows that an optimal strategy
for the seller is to deploy the two incentive programs for at most two distinct
time periods.
Proposition 1. 1. There exist τ1, τ2 (0 ≤ τ1 ≤ τ2 ≤ T ) such that u∗(t) = 0
for τ1 < t ≤ τ2 and u∗(t) = 1 else.
2. There exist τ3, τ4 (0 ≤ τ3 ≤ τ4 ≤ T ) such that v∗(t) = 0 for τ3 < t ≤ τ4 and
v∗(t) = 1 else.
Proof. i(0) > 0 otherwise there is no problem to solve. Observe that Ω is pos-
itively invariant. Therefore a solution starting from any initial point x(0) ∈ Ω
remains confined to Ω. This allows us to disregard state constraints from the
control formulation.
Let u(t), v(t) ∈ [0, 1] for all t ∈ [0, T ] (This relaxation allows us to establish
existence of an optimal control. We show that the optimal controls are indeed
'bang-bang', i.e., u∗(t), v∗(t) ∈ {0, 1} for all t). Writing the problem in Mayer
form, it can be seen that the state space (appropriately expanded with additional
variables) is bounded and positively invariant (thus, state trajectories remain
bounded for all admissible pairs); and the system is affine in controls (see (7),
(4) and (5)). Existence of an optimal control is now established by Filippov-
Cesari theorem.
From (4), (5), and (7), the Hamiltonian is written as follows.
H(x, p, u, v) = −cu(β + ǫ1)ir − c′v(α + ǫ2)i
−p1[(β + uǫ1)ir + (α + vǫ2)i + γiθ + δi]
+p2[(β + uǫ1)ir + (α + vǫ2)i]
(8)
p := (p1, p2) denotes co-state variables. Then according to Pontryagin's Maxi-
mum Principle, there exist continuous and piecewise continuously differentiable
co-state functions p1 and p2 that satisfy
p1 = −
∂H
∂i
= [cβ − (p2 − p1 − c)ǫ1]ru + [c′α − (p2 − p1 − c′)ǫ2]v
+(p1 − p2)(βr + α) + p1(γ(1 − 2i − r) + δ)
p2 = −
∂H
∂r
= [cβ − (p2 − p1 − c)ǫ1)]ui + (p1 − p2)βi − p1γi,
(9)
(10)
at all t ∈ [0, T ] where u and v are continuous and satisfy the following
transversality condition
p∗
1(T ) = 0, p∗
2(T ) = 1.
and also satisfy, for all t ∈ [0, T ], u(t) ∈ [0, 1] and v(t) ∈ [0, 1],
H(x∗(t), p∗(t), u∗(t), v(t)) ≥ H(x∗(t), p∗(t), u(t), v(t))
H(x∗(t), p∗(t), u(t), v∗(t)) ≥ H(x∗(t), p∗(t), u(t), v(t)).
From (8) and (12), we get the following form for controls.
0 if (p∗
u∗(t) = (cid:26) 1 if (p∗
v∗(t) = (cid:26) 1 if (p∗
0 if (p∗
2(t) − p∗
2(t) − p∗
2(t) − p∗
2(t) − p∗
1(t) − c)ǫ1 > cβ
1(t) − c)ǫ1 < cβ
1(t) − c′)ǫ2 > c′α
1(t) − c′)ǫ2 < c′α
(11)
(12)
(13)
(14)
In case of equality in the conditions specified in equations (13) and (14), u∗(t)
and v∗(t) may take any arbitrary values in [0, 1].
Let φ(t) := (p∗
We denote by H ∗
1(t) − c′)ǫ2 − c′α.
t the Hamiltonian along optimal state-control trajectory at
time t. The following lemma proves that Hamiltonian will always remain positive.
1(t) − c)ǫ1 − cβ and ψ(t) := (p∗
2(t) − p∗
2(t) − p∗
Lemma 1. H ∗
t > 0 ∀ t ∈ [0, T ].
Proof. From (8) and (11), we have
H ∗
T = [(1 − c)ǫ1 − cβ]i∗(T )r∗(T )u∗(T )
+[(1 − c′)ǫ2 − c′α]i∗(T )v∗(T )
+(βi∗(T )r∗(T ) + αi∗(T ))
r(t) is non-decreasing whereas i(t) ↓ 0 and i(t) > 0 for all t since i(0) > 0.
Therefore, H ∗
T > 0. The conclusion follows by noting that the Hamiltonian is
constant for autonomous systems.
⊓⊔
The lemma below shows that the co-state variables remain positive for the
whole duration.
Lemma 2. p∗
1(t), p∗
2(t) > 0 ∀ t ∈ [0, T ).
1(T ) = 0). Then p∗
2(τ ) > 0 otherwise H ∗
1(t) ≤ 0 for all t and let p∗
Proof. Suppose p∗
1(t) = 0 at t = τ (at least one τ exists
since p∗
τ < 0 since u∗(τ ) = 0. Observe
from (9) that p1 < 0 if p1 = 0. Strict inequality in (13) implies that at τ , u∗(·)
1(t1) ≤ 0
is continuous. Therefore,
implies p∗
1(T ) 6= 0 which violates (11). It follows that
1(t) > 0 for all t ∈ [0, T ). This in turn implies that p∗
p∗
2(t) > 0 for all t otherwise
H ∗
t < 0.
⊓⊔
p1 < 0 in the neighborhood of 0. Thus p∗
1(t) < 0 for all t > t1 and p∗
Lemma 3. p∗
2(t) > p∗
1(t) ∀ t ∈ [0, T ].
Proof. Suppose not. Let p∗
u∗(τ ) = 0. (8) then yields H ∗
2(t) < p∗
1(t) at t = τ . Then φ(τ ) < 0 and, therefore,
⊓⊔
τ < 0, a contradiction.
Let ζ(t) := (p∗
2(t) − p∗
1(t))i∗(t). The lemma that follows shows that ζ(t) is a
decreasing function.
Lemma 4.
ζ(t) < 0 ∀ t ∈ [0, T ].
Proof. From (4), (9), and (10) we get
ζ(t) = −[c(ǫ1 + β)u∗(t)r∗(t) + φ(t)u∗(t)i∗(t)
+c′(ǫ2 + α)v∗(t)
+p∗
2(t)(γ(1 − i∗(t) − r∗(t)) + δ)]i∗(t)
Lemma follows by noting that all terms inside the bracket are non-negative. ⊓⊔
Now consider φ(t). From (9), (10), and (8) we get
φ(t) = [
H ∗
t
i∗(t)
− φ(t)i∗(t)u∗(t) − (p∗
2(t) − p∗
1(t))βi∗(t)]ǫ1
2(t) − p∗
(p∗
exponentially (i∗(t) < i∗(0)e−(α+δ)t). H ∗
1(t))i∗(t) is monotonically decreasing (Lemma 4). From (4) i∗(t) ↓ 0
t is a positive constant (Lemma 1).
Assume that φ(t) = 0 at three points in time τ1, τ2, τ3. Therefore,
φ(τ ) > 0
for either τ = τ1 or τ = τ2. Without loss of generality, let us say φ(τ2) > 0. From
the above equation it follows that φ(τ3) > 0 which is not feasible as φ(τ −
3 ) > 0.
It follows that φ(t) = 0 at at most two points in time. Therefore, there exist
0 ≤ τ1 ≤ τ2 ≤ T such that u∗(t) = 1 for 0 ≤ t ≤ τ1 and τ2 < t ≤ T , and 0
elsewhere.
Similarly, one can show that there exist 0 ≤ τ3 ≤ τ4 ≤ T such that v∗(t) = 0
for τ3 < t ≤ τ4 and v∗(t) = 1 otherwise. The proposition is, thus, established.
Proposition 1 implies that both the referral reward and direct incentives
programs are to be deployed at most twice for certain durations, one in the
beginning and the other at the end. It may happen that both the durations are
of length 0 which means that a program is not deployed at all. On the other
hand, it could also get deployed over the complete time horizon T . This gives a
simple and elegant marketing strategy which is easy to implement for the seller.
The structure of the above optimal control is quite intuitive. In the case of
the referral reward program, the cost is proportional to the product of number of
potential buyers and customers. Hence to keep the cost low, rewards are declared
in the initial stage (when the number of customers is less) to motivate product
advocates and may also be paid at the end (when the number of potential buyers
is less) to acquire some additional customers.
In the case of direct incentives, the cost is proportional to the number of
potential buyers. If the initial take rate for the product is less, this program may
get executed at initial stages to quickly acquire customers whose social influence
can be exploited in the later stages; otherwise more agents may buy competitor's
product and attract other potential buyers. Towards the end of the campaign,
the number of potential buyers is less; hence direct incentives may be offered to
attract additional customers.
4 Numerical Results
The simple structure of optimal controls given by Proposition 1 allows one to
devise incentives programs quite easily by numerical optimization of τ 's. Here we
obtain an independent validation of optimal controls by discretizing (7), casting
it as a nonlinear constrained optimization problem and using a gradient descent
approach to find an optimal solution. (For discussion on various numerical so-
lution techniques for such problems refer to [12]). For all our experiments, the
time horizon T and discretization step-size are fixed at 10 and 0.1 respectively.
The NLP formulation is not convex. Therefore, we use a multi-start mechanism
to determine an optimal solution. Results are also verified using the commercial
package PROPT which uses pseudospectral methods for solving such problems.
In this paper, we will primarily investigate the initial condition i(0) = 1.
This captures the case when the seller and the competitor(s) enter the market
with substitutable products at around the same time (e.g., gaming technologies)
or when the seller introduces an independent product into the market (e.g., a
book). Of course, similar results can be obtained for the case where seller and/or
competitor already have some presence in the market (r(0) > 0 and/or θ(0) > 0).
We fix ǫ1 = ǫ2 = 0.05, γ = 0.1, δ = 0.1 for all numerical studies, and
consider β = 0.1, α = 0.08, c = 0.25 and c′ = 0.3 as the base scenario (These
parameter values are arbitrary and only roughly based on some available data).
The optimal marketing strategy is shown in Figure 1. It is optimal for the seller
to run both the incentive programs initially for some duration, stop and then
run the programs again towards the end. Note that the optimal strategy is open
loop; hence estimates of i and r are not required for implementation.
1
0.8
s
e
v
i
t
n
e
c
n
i
t
c
e
r
i
D
0.6
0.4
0.2
0
0
0
Direct incentives
Referral program
1
1
2
2
3
3
4
4
5
5
Time
6
6
7
7
8
8
9
9
1
0.8
0.6
0.4
m
a
r
g
o
r
p
l
a
r
r
e
f
e
R
0.2
0
10
10
Fig. 1. Optimal marketing strategy for the base scenario
It is, thus, possible for the seller to determine the timing of her incentives
programs numerically. Experimentation with different values of pay-outs c and
c′ (which essentially fix ǫ1 and ǫ2) can be used to understand trade-offs and
optimize these pay-outs.
In the following we undertake an investigation of two important questions
pertaining to the interplay between the two incentives programs and the impact
of network structure on the them. The former question is important because
influence-and-exploit strategy has received much attention in the literature. As
we show below, exploit-and-influence strategy can also come into play for some
parameter settings. The second question is linked to the so-called influentials hy-
pothesis which informally says that high degree agents (hubs) play significant role
in product diffusion, and, therefore, are natural targets for incentives (direct or
referral rewards). We show that in some cases the seller is better off incentivizing
low degree agents (more than high-degree ones). Thus, our results highlight the
need for a careful consideration of the network structure while making incentive
decisions.
1
0.8
s
e
v
i
t
n
e
c
n
i
t
c
e
r
i
D
0.6
0.4
0.2
0
0
0
Direct incentives
Referral program
1
1
2
2
3
3
4
4
5
5
Time
6
6
7
7
8
8
9
9
1
0.8
0.6
0.4
m
a
r
g
o
r
p
l
a
r
r
e
e
R
f
0.2
0
10
10
Fig. 2. Influence-and-exploit strategy is optimal when β is
increased to 0.13
1
0.8
s
e
v
i
t
n
e
c
n
i
t
c
e
r
i
D
0.6
0.4
0.2
0
0
0
Direct incentives
Referral program
1
1
2
2
3
3
4
4
5
5
Time
6
6
7
7
8
8
9
9
1
0.8
0.6
0.4
m
a
r
g
o
r
p
l
a
r
r
e
f
e
R
0.2
0
10
10
Fig. 3. Exploit-and-influence strategy is optimal when α is
increased to 0.09
4.1 Interplay between Referral and Direct Incentive Programs
When social influence is strong in the population, i.e., β is higher, the seller
needs to employ only direct incentives initially. For example, if β is set to 0.13
in the base scenario then it is optimal to offer referral rewards only at the end
and that too for a short period as shown in Figure 2. This can be seen as a
manifestation of the influence-and-exploit strategy. On the other hand, if the
seller has established a good reputation in the market, translating into a higher
value of α, an initial influence step through direct incentives may not even be
required. See from Figure 3 that when α = 0.09 in the base scenario, it is
optimal for the seller to offer direct incentives only at the end. In this case, for
most portion of the time horizon, the seller must exploit connections of existing
customers and only at the end must she impart direct influence on potential
buyers. We call it the exploit-and-influence strategy for the seller.
1
0.8
s
e
v
i
t
n
e
c
n
i
t
c
e
r
i
D
0.6
0.4
0.2
0
0
0
Direct incentives
Referral program
1
1
2
2
3
3
4
4
5
5
Time
6
6
7
7
8
8
9
9
1
0.8
0.6
0.4
m
a
r
g
o
r
p
l
a
r
r
e
e
R
f
0.2
0
10
10
Fig. 4. Influence-and-exploit strategy is optimal with pay-
outs: c = 0.3, c′ = 0.3
1
0.8
s
e
v
i
t
n
e
c
n
i
t
c
e
r
i
D
0.6
0.4
0.2
0
0
0
Direct incentives
Referral program
1
1
2
2
3
3
4
4
5
5
Time
6
6
7
7
8
8
9
9
1
0.8
0.6
0.4
m
a
r
g
o
r
p
l
a
r
r
e
f
e
R
0.2
0
10
10
Fig. 5. Exploit-and-influence strategy is optimal with pay-
outs: c = 0.25, c′ = 0.35
We also observe from Figures 4 and 5 that influence-and-exploit and exploit-
and-influence are optimal strategies for the seller if she incurs high per conversion
pay-outs for referral and incentive programs respectively.
4.2 Impact of Network Structure on Incentive Programs
Real-world networks show strong degree correlation amongst connected nodes.
Some networks show assortative mixing of nodes by degrees where high-degree
nodes have most of their connections to other high-degree nodes. Others show
disassortative mixing where high-degree nodes have most of their connections
to low-degree nodes ([13]). In this section, we examine the impact of network
structure on incentives programs.
We consider an undirected correlated network with nodes belonging to either
of two classes A and B with probability P (A) and P (B) respectively. Class A
nodes are of high degree, say kA and class B nodes are of low degree, say kB.
P (AB) is the probability that a given link from class B node points to a class
A node. P (BA) can be computed from the following balance equation:
kAP (BA)P (A) = kBP (AB)P (B)
(15)
We consider two types of network structures. One structure represents assor-
tative mixing whereas the other one represents disassortative mixing. To keep
things simple and derive key insights, we assume that the seller is optimizing im-
plementation of only one incentives program, namely, referral rewards program.
The seller can offer referral rewards to class A and/or class B nodes to increase
their social influence rate (β) by ǫ. As earlier, she incurs a per conversion cost
of c after normalizing with respect to product price.
We fix α = 0.1, δ = 0.1, β = 0.1, γ = 0.15, ǫ = 0.08, kA = 10, kB = 2, P (A) =
0.1, P (B) = 0.9 for our numerical studies. For disassortative network, we set
P (BA) = 0.9 whereas for assortative network, we set P (BA) = 0.1.
The optimal timing of referral reward program for disassortative network is
shown in Figure 6. The seller's optimal strategy is to offer referral rewards to
class B nodes for the complete duration whereas rewards to class A nodes are
offered initially for a short duration and then again towards the end for a short
duration. In this case, class B nodes have almost half of their connections going
to class A nodes. Also, major fraction of the population is from class B. So,
referral rewards are offered to class B nodes for entire duration as it increases
influence not only on class B nodes but also on class A nodes. Class A nodes are
not rewarded for the entire duration in order to control the cost.
In the case of assortative network, the optimal strategy changes completely
(see Figure 7). The seller offers referral rewards to class A nodes for the complete
duration whereas rewards to class B nodes are offered initially for some duration
and then again towards the end. In this case, nodes from both the classes are
well connected amongst themselves with very few connections going across the
classes. So, the optimal reward strategies for both the classes are essentially
independent. For this particular scenario, it turns out that it is optimal to offer
rewards to class A nodes for the entire duration as the cost incurred is not much.
Whereas in the case of class B nodes, referral rewards are discontinued for some
duration in the middle as the cost overshoots the potential revenue.
The results show that networks with different structures can result in different
optimal strategies for the seller. In some scenarios, the seller may be better off
incentivizing low degree nodes as against the popular approach of targeting the
influentials (high degree nodes), thus, providing some support to the finding in
[14]. In some scenarios, the seller may be better off targeting influentials thus
supporting the results in [9]. Thus, our results highlight the need for a careful
consideration of the network structure while making incentive decisions.
5 Conclusion
In this paper we have addressed the problem of optimal timing of two incentive
programs, namely, direct incentives and referral rewards, for product diffusion
A
−
m
a
r
g
o
r
p
l
a
r
r
e
e
R
f
1
0.8
0.6
0.4
0.2
0
0
0
Referral program−A
Referral program−B
1
1
2
2
3
3
4
4
5
5
Time
6
6
7
7
8
8
9
9
1
0.8
0.6
0.4
0.2
B
−
m
a
r
g
o
r
p
l
a
r
r
e
e
R
f
0
10
10
Fig. 6. Optimal marketing strategy on a network with disas-
sortative mixing
A
−
m
a
r
g
o
r
p
l
a
r
r
e
f
e
R
1
0.8
0.6
0.4
0.2
0
0
0
Referral program−A
Referral program−B
1
1
2
2
3
3
4
4
5
5
Time
6
6
7
7
8
8
9
9
1
0.8
0.6
0.4
0.2
B
−
m
a
r
g
o
r
p
l
a
r
r
e
f
e
R
0
10
10
Fig. 7. Optimal marketing strategy on a network with assor-
tative mixing
through social networks. Taking a deviation from the existing approaches, we
formulate the problem as a continuous-time deterministic optimal control prob-
lem. The optimal strategy for the seller is to deploy these programs in at most
two distinct time periods. The simplicity of this structure and non-adaptive na-
ture makes them ideal for implementation in practice. We further show that if
the seller has good reputation in the market, exploit-and-influence strategy can
be optimal whereas if social influence is strong in the population, influence-and-
exploit strategy can be optimal for the seller. In the case of correlated networks,
our numerical studies show that the seller need not necessarily offer more fre-
quent referral reward programs to high degree nodes to maximize her profit.
There are two immediate directions for future work: (i) extend heterogeneity
of agents to include their external and social influence probabilities and (ii)
devise procedures to estimate model parameters.
References
[1] D. Arthur, R. Motwani, A. Sharma, and Y. Xu. Pricing strategies for viral
marketing on Social Networks. In Proceedings of Workshop on Internet and
Network Economics, pages 101 -- 112, 2009.
[2] E. Auriol and M. Benaim. Standardization in decentralized economies.
American Economic Review, 90(3):550 -- 570, 2000.
[3] M. Benaim and J. Y. Le Boudec. A Class of Mean Field Interaction Models
for Computer and Communication Systems. Performance Evaluation, 65:
823 -- 838, 2008.
[4] S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization
in social networks. In Proceedings of Workshop on Internet and Network
Economics, pages 306 -- 311, 2007.
[5] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the Spread of Mis-
information in Social Networks. In Proceedings of the 20th International
Conference on World Wide Web, pages 665 -- 674, 2011.
[6] W. Chen, Y. Yaun, and L. Zhang. Scalable influence maximization in social
networks under the linear threshold model. In Proceedings of 10th Interna-
tional Conference on Data Mining, 2010.
[7] P. Domingos and M. Richardson. Mining the Network Value of Customers.
In 7th International Conference on Knowledge Discovery and Data Mining,
pages 57 -- 66, 2001.
[8] D. Godes, D. Mayzlin, Y. Chen, S. Das, C. Dellarocas, B. Pfeiffer, B. Libai,
S. Sen, M. Shi, and P. Verlegh. The Firm's Management of Social Interac-
tions. Marketing Letters, 16(3/4):415 -- 428, 2005.
[9] J. Goldenberg, S. Han, D. R. Lehmann, and J. W. Hong. The Role of Hubs
in the Adoption Processes. Journal of Marketing, 73:1 -- 13, March 2009.
[10] J. Hartline, V. S. Mirrokni, and M. Sundararajan. Optimal Marketing
Strategies over Social Networks. In Proceedings of 17th International Con-
ference on World Wide Web, pages 189 -- 198, 2008.
[11] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the Spread of Influence
through a Social Network. In Proceedings of Knowledge Discovery and Data
Mining, pages 137 -- 146, 2003.
[12] D. E. Kirk. Optimal Control Theory: An Introduction. Dover, 1970.
[13] M. E. J. Newman. Assortative Mixing in Networks. Physics Review Letters,
89(20), November 2002.
[14] D. Watts and P. S. Dodds.
Influentials, Networks, and Public Opinion
Formation. Journal of Consumer Research, 34, December 2007.
|
1609.09547 | 1 | 1609 | 2016-09-29T23:34:02 | Competitive Propagation: Models, Asymptotic Behavior and Multi-stage Games | [
"cs.SI",
"cs.MA",
"math.DS"
] | In this paper we propose a class of propagation models for multiple competing products over a social network. We consider two propagation mechanisms: social conversion and self conversion, corresponding, respectively, to endogenous and exogenous factors. A novel concept, the product-conversion graph, is proposed to characterize the interplay among competing products. According to the chronological order of social and self conversions, we develop two Markov-chain models and, based on the independence approximation, we approximate them with two respective difference equations systems.
Theoretical analysis on these two approximation models reveals the dependency of the systems' asymptotic behavior on the structures of both the product-conversion graph and the social network, as well as the initial condition. In addition to the theoretical work, accuracy of the independence approximation and the asymptotic behavior of the Markov-chain model are investigated via numerical analysis, for the case where social conversion occurs before self conversion.
Finally, we propose a class of multi-player and multi-stage competitive propagation games and discuss the seeding-quality trade-off, as well as the allocation of seeding resources among the individuals. We investigate the unique Nash equilibrium at each stage and analyze the system's behavior when every player is adopting the policy at the Nash equilibrium. | cs.SI | cs |
Competitive Propagation: Models, Asymptotic Behavior and
Multi-stage Games ∗
Wenjun Mei
Francesco Bullo †
June 28, 2021
Abstract
In this paper we propose a class of propagation models for multiple competing products over a social
network. We consider two propagation mechanisms: social conversion and self conversion, corresponding,
respectively, to endogenous and exogenous factors. A novel concept, the product-conversion graph, is
proposed to characterize the interplay among competing products. According to the chronological order
of social and self conversions, we develop two Markov-chain models and, based on the independence
approximation, we approximate them with two respective difference equations systems. Theoretical
analysis on these two approximation models reveals the dependency of the systems' asymptotic behavior
on the structures of both the product-conversion graph and the social network, as well as the initial
condition.
In addition to the theoretical work, accuracy of the independence approximation and the
asymptotic behavior of the Markov-chain model are investigated via numerical analysis, for the case
where social conversion occurs before self conversion. Finally, we propose a class of multi-player and multi-
stage competitive propagation games and discuss the seeding-quality trade-off, as well as the allocation
of seeding resources among the individuals. We investigate the unique Nash equilibrium at each stage
and analyze the system's behavior when every player is adopting the policy at the Nash equilibrium.
Keywords: competitive propagation, independence approximation, network structure, stability analysis,
multi-stage uncooperative game, seeding, product quality
1
Introduction
a) Motivation and problem description It is of great scientific interest to model some sociological phenomenon
as dynamics on networks, such as consensus, polarization, synchronization and propagation. Indeed, the
past fifteen years have witnessed a flourishing of research on propagation of diseases, opinions, commercial
products etc, collectively referred to as memes, on social networks. Much progress has been made both
statistically [9 -- 12] and theoretically [3, 18, 19, 32]. In a more recent set of extensions, scientists have begun
studying the simultaneous propagation of multiple memes, in which not only the interaction between nodes
(or equivalently referred to as individuals) in the network, but also the interplay of multiple memes, plays an
important role in determining the system's dynamical behaviors. These two forms of interactions together
add complexity and research value to the multi-meme propagation model.
This paper proposed a series of mathematical models on the propagation of competing products. Three
key elements: the interpersonal network, the individuals and the competing products, are modeled respec-
tively as a graph with fixed topology, the nodes on the graph, and the states of nodes. Our models are
based on the characterization of individuals' decision making behaviors under the social pressure. Two fac-
tors determine individuals' choices on which product to adopt: the endogenous factor and the exogenous
factor. The endogenous factor is the social contact between nodes via social links, which forms a tendency
∗This material is based upon work supported by, or in part by, the U. S. Army Research Laboratory and the U. S. Army
Research Office under grant number W911NF-15-1-0577, and the UCSB Institute for Collaborative Biotechnology under grant
W911NF-09-D-0001 from the U.S. Army Research Office. The content of the information does not necessarily reflect the position
or the policy of the Government, and no official endorsement should be inferred. This paper is related to an early conference
article [22]: this article treats a more general and different set of phenomena, with new results on theoretical analysis, complete
proofs and new simulation results.
†Wenjun Mei and Francesco Bullo are with the Department of Mechanical Engineering and with Center for Con-
trol, Dynamical Systems, and Computation, University of California, Santa Barbara, Santa Barbara, CA 93106, USA,
[email protected], [email protected]
1
of imitation, referred to as social pressure in this paper. The exogenous factor is what is unrelated to the
network, e.g., the products' quality.
In the microscopic level, we model the endogenous and exogenous factors respectively as two types
of product-adoption processes: the social conversion and the self conversion.
In social conversion, any
node randomly picks one of its neighbors and follows that neighbor's state with some given probability
characterizing how open-minded the node is. In the self conversion, each node independently converts from
one product to another with some given probability depending on the two products involved. Although
individuals exhibit subjective preferences when they are choosing the products, statistics on a large scale of
different individuals' behaviors often reveal that the relative qualities of the competing products are objective.
For example, although some people may have special affections on feature phones, the fact that more people
have converted from feature phones to smart phones, rather than the other way around, indicates that the
latter is relatively better. We assume that the transit probabilities between the competing products are
determined by their relative qualities and thus homogeneous among the individuals.
b) Literature review: Various models have been proposed to describe the propagation on networks, such
as the percolation model on random graphs [23, 24], the independent cascade model [6, 16, 20], the linear
threshold model [1, 2, 35] and the epidemic-like mean-field model [31, 33, 36]. The first two are stochastic
models while the linear threshold model is usually deterministic. The epidemic-like model is an ODE system
as the approximation of a Markov chain, which gives the dynamics of any node's state probability distribution.
As extensions to the propagation of a single meme, some recent papers have discussed the propagation
of multiple memes, e.g., see [4, 5, 8, 14, 15, 17, 25, 26, 28 -- 30, 34]. Some of these papers adopt a Susceptible-
Infected-Susceptible (SIS) epidemic-like model and discuss the long-term coexistence of multiple memes in
single/multiple-layer networks, e.g., see [5,25,26]. Some papers focus instead on the strategy of initial seeding
to maximize or prevent the propagation of one specific meme in the presence of adversaries [8, 14, 17, 28].
Among all these papers mentioned in this paragraph, our model is most closely related to the work by Stanoev
et. al. [29] but the social contagion process in [29] is different from our model and theoretical analysis on the
general model is not included
c) Contribution: Firstly we propose a generalized and novel model for the competitive propagation on
social networks. By taking into account both the endogenous and exogenous factors and considering the
individual variance as well as the interplay of the competing products, our model is general enough to describe
a large class of multi-meme propagation processes. Moreover, in the modeling of multi-meme contagions,
many models come across the problem of dealing with multiple contagions to one node by different memes at
a single time step, which is usually avoided by assuming the infinitesimal step length so that it only allows
for a single contagion at every step. Differently from these models, the problem of multiple contagions does
not occur in our model since we model the contagion process as the individual's initiative choice under the
social pressure, which is more suitable for the product-adoption process. In addition, compared with the
independent cascade model, in which individuals' choices are irreversible, our models adopt a more realistic
assumption that conversions from one product to another are reversible and occur persistently.
Secondly, we propose a new concept, the product-conversion graph, to characterize the interplay between
the products. There are two graphs in our model: the social network describing the interpersonal connections,
and the product-conversion graph defining the transitions between the products in self conversion, which in
turn reflect the products' relative quality.
Thirdly, starting from the description of individuals' behavior, we develop two Markov-chain competi-
tive propagation models different in the chronological order of the social conversion and the self conversion
processes. Applying the independence approximation, we propose two respective network competitive prop-
agation models, which are difference equations systems, such that the dimension of our problem is reduced
and some theorems in the area of dynamical systems can be applied to the analysis of the approximation
models.
Fourthly, both theoretical analysis and simulation results are presented on the dynamical properties of
the network competitive propagation models. We discuss the existence, uniqueness and stability of the
fixed point, as well as how the systems' asymptotic state probability distribution is determined by the
social network structure, the individuals' open-mindedness, the initial condition and, most importantly, the
structure of the product-conversion graph. We find that, if the product-conversion graph contains only
one absorbing strongly connected component, then the self conversion dominates the system's asymptotic
behavior; With multiple absorbing strongly connected components in the product-conversion graph, the
system's asymptotic state probability distribution also depends on the initial condition, the network topology
and the individual open-mindedness. In addition, simulation results are presented to show the high accuracy
of the independence approximation and reveal that the original Markov-chain model also exhibits the same
2
asymptotic behavior.
At last, based on the network competitive propagation model, and according to what actions can be taken
by the players, we propose two different models of multi-player and multi-stage non-cooperative games, in
which the players are the competing companies with bounded investment budgets. Each company can invest
on seeding, e.g., advertisement and promotion, or its product's quality. For each game model, we investigate
the unique Nash equilibrium at each stage. Theoretical analysis reveals some strategic insights on the
seeding-quality trade-off and the allocation of seeding resources. The insights are directive and realistic. We
also discuss the systems' behaviors if every player is adopting the policy at the Nash equilibrium.
d) Organization: The rest of this paper is organized as follows. Section II give the assumptions of
two Markov-chain propagation models. Section III and IV discuss the approximation of these two models
separately. In Section V, we discuss the multi-player and multi-stage competitive propagation games. Section
VI is the conclusion.
2 Model Description and Notations
The row-normalized adjacency matrix is denoted by A = (aij)n×n, where aij = 1
Ni
a) Social network as a graph: In this model, a social network is considered as an undirected, unweighted,
fixed-topology graph G = (V, E) with n nodes. The nodes are indexed by i ∈ V = {1, 2, . . . , n}. The
adjacency matrix is denoted by A = (aij)n×n with aij = 1 if (i, j) ∈ E and aij = 0 if (i, j) /∈ E.
j=1 aij.
The graph G = (V, E) is always assumed connected and there is no self loop, i.e., aii = 0 for any i ∈ V .
H1, H2, . . . , HR, propagating in the network. We consider a discrete-time model, i.e., t ∈ N, and assume
refer to all the states as "products". Denote by Di(t) the state of node i after time step t. For any t ∈ N,
Di(t) ∈ {H1, H2, . . . , HR}. For simplicity let Θ = {1, 2, . . . , R}, i.e., the set of the product indexes.
c) Nodes' production adoption behavior: Two mechanisms define the individuals' behavior: the social
conversion and the self conversion. The following two assumptions propose respectively two models different
in the chronological order of the social and self conversions.
aij with Ni =(cid:80)n
b) Competing products and the states of nodes: Suppose there are R competing products, denoted by
the products are mutually exclusive. We do not specify the state of adopting no product and collectively
Assumption 1 (Social-self conversion model). Consider the competitive propagation of R products in the
network G = (V, E). At time step t + 1 for any t ∈ N, suppose the previous state of any node i is Di(t) = Hr.
Node i first randomly pick one of its neighbor j and following j's previous state, i.e., Di(t + 1) = Dj(t), with
probability αi. If node i does not follow j's state in the social conversion, with probability 1 − αi, then node
i converts to product Hs with probability δrs for any s (cid:54)= r, or stay in Hr with probability δrr.
Assumption 2 (Self-social conversion model). At any time step t + 1, any node i with Di(t) = Hr converts
to Hs with probability δrs for any s (cid:54)= r, or stay in the state Hr with probability δrr. If node i stays in Hr in
the process above, then node i randomly picks a neighbor j and following Dj(t) with probability αi, or still
stay in Hr with probability 1 − αi.
Assumptions 1 and 2 are illustrated by Figure 1 and Figure 2 respectively. By introducing the parameters
δrs we define a directed and weighted graph with the adjacency matrix ∆ = (δrs)R×R, referred to as the
product-conversion graph. Figure 3 gives an example of the product-conversion graph for different smart
phone operation systems. Based on either of the two assumptions, ∆ is row-stochastic.
In this paper
we discuss several types of structures of the product-conversion graph, e.g., the case when it is strongly
connected, or consists of a transient subgraph and some isolated absorbing subgraphs. The parameter αi
characterizes node i's inclination to be influenced by social pressure. Define α = (α1, α2, . . . , αn)(cid:62) as the
individual open-mindedness vector. Assume 0 < αi < 1 for any i ∈ V .
d) Problem description: According to either Assumption 1 or Assumption 2, at any time step t + 1, the
probability distribution of any node's states depends on its own state as well as the states of all its neighbors
at time t. Therefore, the collective evolution of nodes' states is a Rn-state discrete-time Markov chain.
Define pir(t) as the probability that node i is in state Hr after time step t, i.e., pir(t) = P[Di(t) = Hr]. We
aim to understand the dynamics of pir(t). Since the Markov chain models have exponential dimensions and
are difficult to analyze, we approximate it with lower-dimension difference equations systems and analyze
instead the dynamical properties of the approximation systems.
e) Notations: Before proceeding to the next section, we introduce some frequently used notations in
Table 1.
3
Figure 1: Diagram illustration for the social-self conversion model
Figure 2: Diagram illustration for the self-social conversion model
4
Di(t)=HrrandomlypickneighborjDi(t+1)=Di(t)Di(t+1)=Dj(t)Di(t+1)=H1Di(t+1)=H2Di(t+1)=HR1 ↵i↵i r1 r2 rRsocial conversionself conversionDi(t+1)=H1Di(t+1)=HrDi(t)=HrDi(t+1)=HR r1 rr rRrandomlypickneighborj1 ↵i↵iDi(t+1)=Di(t)Di(t+1)=Dj(t)self conversionsocial conversionFigure 3: An example of the product-conversion graph for different smart phone operation systems.
Table 1: Notations frequently used in this paper
(cid:23) ((cid:22))
(cid:31) (≺)
1n, 0n
entry-wise no less(greater) than
entry-wise strictly greater(less) than
(1, 1, . . . , 1)(cid:62)
Rn×1
∈ Rn×1, (0, 0, . . . , 0)(cid:62)
∈
0n×m (0)n×m
Snm(a) The
set
Snm(a) The
set
{X ∈
{X ∈
xr The r-th column vector of the matrix
(cid:23)
(cid:23)
w(M ) The normalized dominant left eigenvec-
Rn×m X
0n×m, X1m = a} for any a ∈ Rn
Rn×m X
0n×m, X1m (cid:22) a} for any a ∈ Rn
tor for matrix M ∈ Rl×l if it has one
X ∈ Rn×m
x(i) The i-th row vector of the matrix X ∈
Rn×m
x(−i) The
the ma-
(cid:80)n
trix AX ∈ Rn×m,
i.e., x(−i) =
(x−i1, x−i2, . . . , x−im) where x−ir =
j=1 aijxjr
i-th row vector of
G(A) The graph with the adjacency matrix A
5
1Android2iOS3Blackberry4Blackberry 12 21 24 42 43 34 14 41 13 31 23 323 Network Competitive Propagation Model with Social-self con-
version
This section is based on Assumption 1. We first derive an approximation model for the time evolution of
pir(t), referred to as the social-self conversion network competitive propagation model (social-self NCPM),
and then analyze the asymptotic behavior of the approximation model and its relation to the social network
topology, the product-conversion graph, the initial condition and the individuals open-mindedness. Further
simulation work is presented in the end of this section.
3.1 Derivation of the social-self NCPM
Some notations are used in this section.
Notation 3. For the competitive propagation of products {H1, H2, . . . , HR} on the network G = (V, E),
(1) define the random variable X r
i (t) by
(cid:40)
1,
0,
X r
i (t) =
if Di(t) = Hr,
if Di(t) (cid:54)= Hr.
According to the mutual exclusiveness of the competing products, for any i ∈ V , if X r
for any s (cid:54)= r;
nodes except node i after time step t;
i (t) = 0
(2) Define the n − 1 tuple D−i(t) = (D1(t), . . . , Di−1(t), Di+1(t), . . . , Dn(t)), i.e., the states of all the
(3) Define the following notations for simplicity:
i (t) = 1, then X s
ij (t) = P[X r
P rs
i (t;−i) = P[X r
P r
i (t; s,−i) = P[X r
Γr
i (t) = 1 X s
i (t) = 1 D−i(t)],
i (t + 1) = 1 X s
j (t) = 1],
i (t) = 1, D−i(t)].
In the derivation of the network competitive propagation model, the following approximation is adopted:
Approximation 4 (Independence Approximation). For the competitive propagation of R products on the
network G = (V, E), when deriving the equation for pir(t), approximate the conditional probability P ms
ij (t)
by its corresponding total probability pim(t) for any m, s ∈ Θ and any i, j ∈ V .
With the independence approximation, the social-self NCPM is presented in the theorem below.
Theorem 5 (Social-self NCPM). Consider the competitive propagation based on Assumption 1, with the
social network and the product-conversion graph represented by their adjacency matrices A = (aij)n×n and
∆ = (δrs)R×R respectively. The probability pir(t) satisfies
ij (t)pjs(t)(cid:1)
ij (t)pjr(t) − P rs
pir(t + 1) − pir(t)
aij
αi
=
(cid:0)P sr
n(cid:88)
j=1
(cid:88)
(cid:88)
s(cid:54)=r
+
s(cid:54)=r
(1 − αi)(δsrpis(t) − δrspir(t)),
(1)
for any i ∈ V and r ∈ Θ. Applying the independence approximation, the approximation model for equa-
tion (1), i.e., the social-self NCPM, is
pir(t + 1)
= αi
n(cid:88)
j=1
R(cid:88)
s=1
δsrpis(t).
aijpjr(t) + (1 − αi)
(2)
6
Proof. By definition,
pir(t+1) − pir(t)
= E[X r
= E(cid:2)E[X r
i (t + 1) − X r
i (t)]
i (t + 1) − X r
i (t) D−i(t)](cid:3),
E[X r
where the conditional expectation is given by
i (t+1) − X r
i (t) D−i(t)]
= P[X r
i (t + 1) − X r
(cid:88)
− P[X r
i (t + 1) − X r
(cid:88)
i (t; s,−i)P s
Γr
s(cid:54)=r
−
Γs
i (t; r,−i)P r
=
s(cid:54)=r
i (t;−i)
i (t;−i).
i (t) = 1 D−i(t)]
i (t) = −1 D−i(t)]
According to Assumption 1,
(cid:88)
i (t; s,−i)P s
Γr
= αi
i (t;−i)
j (t)P s
aijX r
Therefore,
j
E[Γr
i (t; s,−i)P s
i (t;−i)] = αi
One the right-hand side of the equation above, E[P s
i (t;−i) + (1 − αi)δsrP s
i (t;−i).
aijE[X r
(cid:88)
j (t)P s
+ (1 − αi)δsrE[P s
i (t;−i)].
i (t;−i)] = pis(t). Moreover,
i (t;−i)]
j
E[X r
j (t)P s
i (t;−i)]
P[X s
(cid:88)
(cid:88)
· P[D−i−j(t) = d−i−j, X r
d−i−j
P[X s
=
=
i (t) = 1 D−i−j(t), X r
j (t) = 1]
j (t) = 1]
i (t) = 1, X r
j (t) = 1, D−i−j(t) = d−i−j]
d−i−j
= P sr
(cid:80)
ij (t) by pis(t) and pir(t) respectively and according to the equations (cid:80)
Apply the same computation to E[Γs
and P rs
i (t; r,−i)P r
ij (t)pjr(t).
i (t;−i)] and then we obtain equation (1). Replace P sr
ij (t)
s(cid:54)=r pis(t) = 1 − pir(t) and
s(cid:54)=r δrs = 1 − δrr, we obtain equation (2).
The derivation of Theorem 5 is equivalent to the widely adopted mean-field approximation in the modeling
of the network epidemic spreading [7, 27, 31]. Notice that the independence approximation neither neglects
the correlation between any two nodes' states, nor destroys the network topology, since pjr(t), pjs(t) and aij
all appear in the dynamics of pir(t).
3.2 Asymptotic behavior of the social-self NCPM
Define the map f : Rn×R → Rn×R by
According to equation (2), the matrix form of the social-self NCPM is written as
f (X) = diag(α) AX + (I − diag(α))X∆.
P (t + 1) = f(cid:0)P (t)(cid:1),
7
(3)
(4)
where P (t) = (pir(t))n×R. We analyze how the asymptotic behavior of system (4), i.e., the existence,
uniqueness and stability of the fixed point of the map f , is determined by the two graphs introduced in
our model: the social network with the adjacency matrix A, and the product-conversion graph with the
adjacency matrix ∆.
3.2.1 Structures of the social network and the product-conversion graph
Assume that the social network G( A) has a globally reachable node. As for the product-conversion graph, we
consider the more general case. Suppose that the product-conversion graph G(∆) has m absorbing strongly
connected components (absorbing SCCs) and a transient subgraph. Re-index the products such that the
product index set for any l-th absorbing SCCs is given by
Θ1 = {1, 2, . . . , k1}, and
Θl = {
ku + 1,
l−1(cid:88)
u=1
l−1(cid:88)
u=1
ku + 2, . . . ,
l(cid:88)
u=1
ku},
for any l ∈ {2, 3, . . . , m}, and the index set for the transient subgraph is Λ = {
2, . . . , R}. then the adjacency matrix ∆ of the product-conversion graph takes the following form:
(cid:20)
(cid:21)
¯∆
∆ =
Bk0×(R−k0)
0(R−k0)×k0
∆0
,
(5)
(cid:80)m
l=1 kl + 1, . . . ,(cid:80)m
l=1 kl +
where ¯∆ = diag[∆1, ∆2, . . . , ∆m] and B = [B1, B2, . . . , Bm], with Bl ∈ Rk0×k1 for any l ∈ {1, 2, . . . , m}, is
nonzero and entry-wise non-negative. Matrix ∆l = (δΘl
for any l ∈ {2, 3, . . . , m}, is the adjacency matrix of the l-th absorbing SCC, and is thus irreducible and
row-stochastic. The following definition classifies four types of structures of G(∆).
u=1 ku+r,(cid:80)l−1
rs = δ(cid:80)l−1
u=1 ku+s
rs )kl×kl , with δΘ1
rs = δrs and δΘl
Definition 6 (Four sets of product-conversion graphs). Based on whether the product-conversion graph
G(∆) has a transient subgraph and a single or multiple absorbing SCCs, we classify the adjacency matrix ∆
into the following four cases:
(i. Case 1 (single SCC): The graph G(∆) is strongly connected, i.e., ∆ = ∆1, with k1 = R;
(ii. Case 2 (single SCC + transient subgraph): The graph G(∆) contains one absorbing SCC and a transient
subgraph, i.e., ¯∆ = ∆1 and k0 ≥ 1;
with(cid:80)m
l=1 kl = R;
(iii. Case 3 (multi-SCC): The graph G(∆) contains m absorbing SCCs, i.e., ∆ = diag[∆1, ∆2, . . . , ∆m],
(iv. Case 4 (multi-SCC + transient subgraph): The graph G(∆) contains m absorbing SCCs and a transient
subgraph, with ∆ given by equation (5).
3.2.2 Stability analysis of the social-self NCPM
The following theorem states the distinct asymptotic behaviors of the social-self NCPM, with different
structures of the product-conversion graph.
Theorem 7 (Asymptotic behavior for social-self NCPM). Consider the social-self NCPM on a strongly
connected social network G( A), with the product-conversion graph G(∆). Assume that
(i. Each absorbing SCC G(∆l) of G(∆) is aperiodic;
(iii. For any r ∈ Λ,(cid:80)
s∈Λ δrs < 1, i.e., ∆01k0 ≺ 1k0.
(ii. For any ∆l, l ∈ {1, 2, . . . , m}, as least one column of ∆l is entry-wise strictly positive;
Then, for any P (0) ∈ SnR(1n), the solution P (t) to equation (4) has the following properties, depending
upon the structure of ∆:
8
(i. in Case 1, P (t) converges to P ∗ = 1n∆(cid:62) exponentially fast, where P ∗ is the unique fixed point in
SnR(1n) for the map f defined by equation (3). Moreover, the convergence rate is (∆) = αmax + (1 −
αmax)ζ(∆), where αmax = maxi αi and ζ(∆) = 1 −
r=1 mins δsr;
(cid:80)R
(ii. in Case 2, for any i ∈ V ,
lim
t→∞ pir(t) =
(cid:40)
0,
wr(∆1),
for any r ∈ Λ,
for any r ∈ Θ1;
(cid:1)w(cid:62)
(∆l),
(iii. in Case 3, for any l ∈ {1, 2, . . . , m} and i ∈ V ,
t→∞ pΘl(i)(t) =(cid:0)w(cid:62)
ir (t)(cid:1)
where M = diag(α) A + I − diag α and P Θl(t) = (cid:0)pΘl
(M )P Θl (0)1kl
lim
n×kl
pΘl(i)(t) being the i-th row of P Θl (t);
, with pΘl
ir (t) = pi,(cid:80)l−1
u=1 ku+r(t) and
(iv. in Case 4, for any l ∈ {1, 2, . . . , m} and i ∈ V ,
0,
γlwr(∆l),
where γl depends on A, Bl, P Θl (0), P Λ(0) and satisfies(cid:80)m
lim
t→∞ pir(t) =
for any r ∈ Λ,
for any r ∈ Θl,
l=1 γl = 1.
(cid:40)
Before proving the theorem above, a useful and well-known lemma is stated without the proof.
Lemma 8 (Row-stochastic matrices after pairwise-difference similarity transform). Let M ∈ Rn×n be row-
stochastic. Suppose the graph G(M ) is aperiodic and has a globally reachable node. Then the nonsingular
matrix
−1
Q =
1/n . . .
(cid:21)
1
. . .
. . .
−1
1/n 1/n
1
(cid:20)Mred 0n−1
c(cid:62)
1
satisfies
QM Q
−1 =
for some c ∈ Rn−1 and Mred ∈ R(n−1)×(n−1). Moreover, Mred is discrete-time exponentially stable.
Proof of Theorem 7: (1) Case 1:
Since matrix ∆ is row-stochastic, irreducible and aperiodic, according to the Perron-Frobenius theorem,
w(∆) ∈ RR is well-defined. By substituting P ∗, defined by p∗(i) = w(∆)(cid:62) for any i ∈ V , into equation (3),
we verify that P ∗ is a fixed point of f .
For any X and Y ∈ Rn×R, define the distance d(·,·) by d(X, Y ) = (cid:107)X − Y (cid:107)∞. Then (SnR(1n), d) is a
complete metric space. For any X ∈ SnR(1n), it is easy to check that f (X) (cid:23) 0n×R and
f (X)1R = diag(α) AX1R + (I − diag(α))X1R = 1n.
Therefore, f maps SnR(1n) to SnR(1n).
For any X ∈ SnR(1n), according to equation (3),
)(i)(cid:107)1
≤ αi(cid:107)x(−i) − p∗(−i)(cid:107)1
+ (1 − αi)(cid:107)(x(i) − p∗(i))∆(cid:107)1.
(cid:107)f (X)(i)−f (P
∗
9
(6)
The first term of the right-hand side of (6) satisfies
(cid:107)x(−i) − p∗(−i)(cid:107)1 =
≤
R(cid:88)
R(cid:88)
r=1
n(cid:88)
n(cid:88)
j=1
r=1
j=1
The second term of the right-hand side of (6) satisfies
(cid:107)(x(i) − p∗(i))∆(cid:107)1 =
aijxjr − wr(∆)
aijxjr − wr(∆)
∗
(cid:107)∞.
≤ (cid:107)X − P
R(cid:88)
r=1
R(cid:88)
s=1
(cid:0)xis − ws(∆)(cid:1)δsr.
If x(i) = p∗(i), then
If x(i) (cid:54)= p∗(i), since x(i)1R = p∗(i)1R = 1, both the set θ1 = {s xis ≥ ws(∆)} and the set θ2 = {s xis <
ws(∆)} are nonempty and
)(i)(cid:107)1 ≤ αi(cid:107)X − P
∗
∗
(cid:107)f (X)(i) − f (P
(cid:88)
(cid:0)xis − ws(∆)(cid:1) =
s∈θ1
(cid:107)∞.
(cid:1)
(cid:88)
(cid:0)ws(∆) − xis
R(cid:88)
s∈θ2
xis − ws(∆).
s=1
=
1
2
Therefore,
where
R(cid:88)
R(cid:88)
(cid:107)(x(i)−p∗(i))∆(cid:107)1
R(cid:88)
r=1
s=1
=
− 2
r=1
(cid:88)
s∈θ1
min{
xis − ws(∆)δsr
min{
(xis − ws(∆))δsr,
(ws(∆) − xis)δsr},
s∈θ1
(cid:88)
(cid:88)
(cid:88)
s∈θ2
s∈θ2
(xis − ws(∆))δsr,
(ws(∆) − xis)δsr}
(7)
1
2
≥
min
s
δsr(cid:107)x(i) − p∗(i)(cid:107)1.
(cid:17)
(cid:16)
R(cid:88)
1 −
r=1
min
δsr
s
(cid:107)(x(i) − p∗(i))∆(cid:107)1 ≤
(cid:107)x(i) − p∗(i)(cid:107)1.
Substituting the inequality above into (7), we obtain
Since(cid:80)R
is strictly positive,(cid:80)R
r=1 δsr = 1 for any s,(cid:80)R
r=1 mins δsr > 0. Therefore,
r=1 mins δsr is no larger than 1. In addition, since at least one column of ∆
0 ≤ ζ(∆) = 1 −
min
s
δsr < 1, and
R(cid:88)
r=1
10
This leads to
(cid:107)f (X)(i) − p∗(i)(cid:107)1 ≤
(cid:107)f (X) − f (P
∗
(cid:0)αi + (1 − αi)ζ(∆)(cid:1)
)(cid:107)∞ ≤ (∆)(cid:107)X − P
∗
(cid:107)∞.
X − P
∗
(cid:107)∞,
for any X ∈ SnR(1n) and 0 < (∆) < 1. This concludes the proof for Case 1.
For the transient subset Λ, define P Λ(t) = (cid:0)pΛ
ir(t)(cid:1)
(2) Case 2:
r ∈ {1, 2, . . . , k0}. Then,
P Λ(t + 1) = diag(α) AP Λ(t) + (I − diag(α))P Λ(t)∆0.
According to Assumption (iii) of Theorem 7,
k0(cid:88)
s=1
c =
max
r∈{1,2,...,k0}
δΛ
rs < 1,
and ∆01k0 ≤ c1k0.
n×k0
, with pΛ
ir(t) = pi,r+k1 (t), for any i ∈ V and
Therefore,
P Λ(t+1)1k0
(cid:16)
diag(α) A + c(cid:0)I − diag(α)(cid:1)(cid:17)
(cid:16)
Since ρ
diag(α) A + c(cid:0)I − diag(α)(cid:1)(cid:17)
(cid:22)
< 1, for any P Λ(0) ∈ Snk0 (1n), P Λ(t) → 0n×k0 exponentially fast.
P Λ(t)1k0 .
Define P Θ1(t) = (pir(t))n×k1. then we have
Since P Λ(t) converges to 0n×k0 exponentially fast, we have: 1) there exists C > 0 and 0 < ξ < 1 such that
P Θ1(t + 1)
= diag(α) AP Θ1 (t) +(cid:0)I − diag(α)(cid:1)P Θ1 (t)∆1
+(cid:0)I − diag(α)(cid:1)P Λ(t)B.
(cid:0)I − diag(α)P Λ(t)B(cid:1)
(cid:107)∞ ≤ Cξt;
2) (cid:107)P Θ1(t)1k1 − 1k1(cid:107)∞ → 0 exponentially fast, which implies d(cid:0)P Θ1 (t), Snk1 (1n)(cid:1)
(cid:107)
For any X ∈ Snk1 (1n), define map f by
f (X) = diag(α) AX +(cid:0)I − diag(α)(cid:1)X∆1.
→ 0 exponentially fast.
According to the proof for Case 1, there exists a unique fixed point P ∗ for the map f in Snk1 (1n), given by
p∗
ir = wr(∆1). Moreover, there exists 0 < < 1 such that, for any X ∈ Snk1 (1n),
(cid:107)X− P ∗(cid:107)∞ is continuous in Snk1(1n) \ P ∗ and d(cid:0)P Θ1 (t), Snk1(1n)(cid:1)
(cid:107)∞ ≤ (cid:107)X − P
(cid:107) f (X) − P
(cid:107)∞.
∗(cid:107)∞
(cid:107) f (X)− P
∗
∗
Since the function
T > 0 and 0 < η < 1 such that, for any t > T ,
→ 0, there exists
For t ∈ N much larger than T ,
(cid:107) f(cid:0)P Θ1 (t)(cid:1)
(cid:107)P Θ1(t) − P
(cid:107)∞
∗
∗
− P
(cid:107)∞ ≤ η(cid:107)P Θ1 (t) − P
∗
(cid:107)∞.
∗
≤ η(cid:107)P Θ1(t − 1) − P
= ηt−T(cid:107)P Θ1 (T ) − P
(cid:107)∞ + Cξt
∗
(cid:107)∞ + C
ξt − ηt−T ξT
.
η/ξ
11
Since 0 < η < 1, 0 < ξ < 1 as t → ∞, (cid:107)P Θ1(t) − P ∗
(cid:107)∞ → 0. This concludes the proof for Case 2.
(3) Case 3:
For any l ∈ {1, 2, . . . , m},
P Θl (t + 1)
= f(cid:0)P Θl (t)(cid:1)
=(cid:0)I − diag(α)(cid:1)P Θl (t)∆l + diag(α) AP Θl (t),
where ∆l1kl = 1kl since Θl is absorbing and strongly connected. Therefore,
P Θl (t + 1)1kl = M P Θl (t)1kl ,
where M = I−diag(α)+diag(α) A is row-stochastic and aperiodic. Moreover, the graph G(M ) has a globally
reachable node and therefore the matrix M has a normalized dominant left eigenvector w(M ). Applying
the Perron-Frobenius theorem,
t→∞ P Θl (t)1kl =(cid:0)w(cid:62)
lim
(cid:1)1n.
(M )P Θl (0)1kl
Let cl = w(cid:62)(M )P Θl (0)1kl . Following the same line of argument in the proof for Case 2, f maps
Snkl (cl1n) to Snkl (cl1n), and maps Snkl (cl1n) to Snkl(cl1n). Moreover, P ∗
∈ Rn×kl with p∗(i) = clw(cid:62)(∆l),
for any i ∈ V , is the unique fixed point of the map f in Snkl (cl1n). In addition, there exists 0 < < 1 such
that for any X ∈ Snkl (cl1n),
The function h(X) =
we have P Θl (t)1kl → cl1kl , which implies d(cid:0)P Θl (t), Snkl (cl1kl )(cid:1)
(cid:107) f (X)− P
(cid:107)X− P ∗(cid:107)∞ is continuous in Snkl (cl1n)\ P ∗. Since for any P Θl (0) ∈ Snkl (cl1n)\ P ∗,
→ 0 as t → 0. Therefore, there exists
(cid:107)∞ ≤ (cid:107)X − P
(cid:107) f (X) − P
∗
(cid:107)∞.
∗
0 < η < 1 and T > 0 such that for any t > T ,
∗(cid:107)∞
(cid:107) f(cid:0)P Θl(t)(cid:1)
∗
− P
(cid:107)∞ ≤ η(cid:107)P Θl (t) − P
∗
(cid:107)∞.
Therefore, P Θl (t) → P ∗ as t → ∞.
(4) Case 4:
P Θl (t + 1) = diag(α) AP Θl (t)
+(cid:0)I − diag(α)(cid:1)P Θl (t)∆l
+(cid:0)I − diag(α)(cid:1)P Λ(t)Bl.
for any l ∈ {1, 2, . . . , m}. Therefore,
(8)
where M = diag(α) A + I − diag(α) is row-stochastic and primitive. The vector φ(t) is a vanishing pertur-
bation according to the proof for Case 2.
Let x(t) = P Θl (t)1kl and y(t) = Qx(t) with Q defined in Lemma 8. Let yerr(t) = (y1(t), y2(t), . . . , yn−1(t))(cid:62),
P Θl (t + 1)1kl = M P Θl(t)1kl + φ(t),
where yi(t) = xi+1(t) − xi(t) for any i = 1, 2, . . . , n − 1. Then we have
−1y(t) + Qφ(t).
y(t + 1) = QM Q
with ϕi(t) =(cid:80)
Let ϕ(t) =(cid:0)ϕ1(t), ϕ2(t), . . . , ϕn−1(t)(cid:1)(cid:62)
Moreover,(cid:80)
yerr(t + 1) = Mredyerr(t) + ϕ(t).
The equation above is an exponentially stable linear system with a vanishing perturbation. Since ρ(Mred) <
1, yerr → 0n−1 as t → ∞, which implies that P Θl (t)1kl → γ1n and γl depends on M , Bl, P Θl (0) and P Λ(0).
l γl = 1 since P (t)1R = 1n. Following the same argument in the proof for Case 3, we obtain
j Qijφj(t). ϕ(t) is also a vanishing perturbation and
t→∞ pΘl(i)(t) = γlw(cid:62)
lim
(∆l).
12
3.2.3
Interpretations of Theorem 7
Analysis on Case 1 to 4 leads to the following conclusions: 1) The probability of adopting any product in the
transient subgraph eventually decays to zero; 2) For the product-conversion graph with only on absorbing
SCC G(∆1), the system's asymptotic product-adoption probability distribution only depends on w(∆1). In
this case, the self conversion dominates the competitive propagation process; 3) With multiple absorbing
SCCs in the product-conversion graph, the initial condition P (t) and the structure of the social network
G( A) together determine the fraction each absorbing SCC eventually takes in the total probability 1; 4)
In each absorbing SCC G(∆l), the asymptotic adoption probability for each product is proportional to its
corresponding entry of ∆l.
3.3 Further simulation work
a) Accuracy of the social-self NCPM solution: Simulation results have been presented to compare the solution
to the social-self NCPM with the solution to the original Markov chain model defined by Assumption 1. Let
the matrix ∆ take the following form
∆1
∆ =
0
0
0 ∆2
0
B1 B2 ∆0
=
0.6
0.3
0
0
.
0.4
0.7
0
0.8
0
0
1
0
0
0
0
0.2
(9)
The Markov-chin solution is computed by the Monte Carlo method. In each sampling, A, α and P (0) are
randomly generated and set identical for the Markov chain and the NCPM. The probability p12(t) is plotted
for both models on different types of social networks, such as the complete graph, the Erdos-R´enyi graph,
the power-law graph and the star graph. As shown in Figure 4 and Figure 5, the solution to the social-self
NCPM nearly overlaps with the Markov-chain solution in every plot, due to the i.i.d self conversion process.
b) Asymptotic behavior of the Markov chain model In Figure 6 and Figure 7, all the trajectories pir(t),
for the Markov-chain model on an Erdos-R´enyi graph with n = 5, p = 0.4 and randomly generated α, are
computed by the Monte Carlo method. Figure 6(a) corresponds to the structure of the product-conversion
graph defined by Case 4 in Definition 6 with
(cid:20)0.6
0.3
(cid:20)∆1
(cid:21)
0.4
0.7
(cid:21)
∆1 =
, ∆2 = 1, ∆0 = 0.2, B = [0 0.8 0].
The transient subgraph is only connected to SCC Θ1 and the intial adoption probability for H3 is 0. Fig-
ure 6(b) corresponds to the structure of the product-conversion graph defined by Case 3 in Defintion 6
with
∆ =
0
0 ∆2
, ∆1 =
0.4
0.7
, ∆2 =
(cid:21)
(cid:20)0.6
0.3
(cid:20)0.5
0.1
(cid:21)
0.5
0.9
.
The simulation results shows that, in these two cases the Markov-chain solutions converge exactly to the
values indicated by the social-self NCPM, regardless of the initial condition. The matrix ∆ used in Figure 7
is given by equation (9). As illustrated by Figure 7, the asymptotic adoption probabilities vary with the
initial condition in the Markov-chain model, in consistence with the results of Theorem 7.
4 Analysis on the Self-social Network Competitive Propagation
Model
In this section we discuss the network competitive propagation model based on Assumption 2, i.e, the case
in which self conversion occurs before social conversion at each time step. Similar to what we have done in
the last section, firstly we propose an approximation model, referred to as the self-social network competitive
propagation model (self-social NCPM), and then analyze the dynamical properties of this approximation
model.
The following theorem based on Approximation 4 gives the matrix form of the self-social NCPM.
13
(a) n = 5, p = 1
(b) n = 10, p = 0.5
(c) n = 50, p = 0.1
(d) n = 50, p = 1
Figure 4: Difference between the solutions to the social-self NCPM (blue dash) and the original Markov-chain
model (red) in complete graphs or Erdos-R´enyi graphs.
(a) power-law graph
(b) star graph
Figure 5: Difference between the solutions to the social-self NCPM (blue dash) and the original Markov-
chain model (red) in the power-law graph and the star graph. The power-law graph has 100 nodes, with the
degree distribution p(k) = 1010k−2.87. The star graph consists of 10 nodes with node 1 as the center.
14
0102030400.250.30.350.40.45tp12(t)0102030400.250.30.350.40.45tp12(t)0102030400.250.30.350.40.45tp12(t)0102030400.250.30.350.40.45tp12(t)0102030400.20.250.30.350.40.450.5tp12(t)0102030400.20.250.30.350.40.450.5tp12(t)(a) multi-SCC + transient subgraph
(b) multi-SCC
Figure 6: Asymptotic behavior of the Markov chain model with the production-conversion graphs defined
by Case 3 or Case 4 in Defintion 6. Every curve in this plot is a trajectory pir(t) for i ∈ V and r ∈ Θ. Here
xlr = w(cid:62)(M )P Θl (0)1kl wr(∆l).
(a) initial condition 1
(b) initial condition 2
Figure 7: Asymptotic behavior of the Markov chain model with the production-conversion graph consisting
of multiple SCCs and a transient subgraph. Every curve in this plot is a trajectory pir(t) for i ∈ V and
r ∈ Θ.
15
010203000.20.40.60.8tpir(t), i∈ V, r∈ Θ w2(∆1)w1(∆1)010203000.10.20.30.40.50.6tpir(t), i ∈ V. r ∈ Θx12x11x21x2202040608010000.20.40.6tpir(t), i ∈ V, r ∈ Θ02040608010000.10.20.30.40.50.6tpir(t), i ∈ V, r ∈ ΘTheorem 9 (Self-social NCPM). Consider the competitive propagation model based on Assumption 2, with
the social network and the product-conversion graph represented by their adjacency matrices A and ∆ re-
spectively. The probability pir(t) satisfies
pir(t + 1) − pir(t) =
s(cid:54)=r
(cid:88)
(cid:0)δsrpis(t) − δrspir(t)(cid:1)
(cid:88)
(cid:88)
n(cid:88)
n(cid:88)
δssαi
s(cid:54)=r
j=1
aijpis(t)P rs
ji (t)
+
−
δrrαi
aijpir(t)P sr
ji (t),
s(cid:54)=r
j=1
for any i ∈ V and r ∈ Θ. Applying the independence assumption, the matrix form of the self-social NCPM
is
P (t + 1)
= P (t)∆ + diag(α) diag(cid:0)P (t)δ(cid:1) AP (t)
(10)
with P (t) = (pir(t))n×R and δ = (δ11, δ22, . . . , δRR)(cid:62).
− diag(α)P (t) diag(δ),
It is straightforward to check that, for any P (t) ∈ SnR(1n), P (t + 1) is still in SnR(1n). According to the
Brower fixed point theorem, there exists at least one fixed point for the system (10) in SnR(1n). Since the
nonlinearity of equation (10) add much difficulty to the analysis of it, in the remaining part of this section
we discuss the special case when R = 2.
4.1 Existence and uniqueness of the fixed point
For simplicity, in this section, let p(t) = p2(t) =(cid:0)p12(t), p22(t), . . . , pn2(t)(cid:1)(cid:62)
always assume that δ22 ≥ δ11. Define the map h : Rn → Rn by
. Without loss of generality, we
h(x) = δ121n + (1 − δ12 − δ21)x
+ δ11 diag(α) Ax − δ22 diag(α)x
+ (δ22 − δ11) diag(α) diag(x) Ax.
Then the self-social NCPM for R = 2 is written as
p(t + 1) = h(p(t)),
(11)
(12)
and p1(t) is computed by p1(t) = 1n − p(t).
First we prove that the two-product self-social NCPM possesses a unique fixed point.
Lemma 10 (Invariant domain of map h). The map h defined by equation (11) is a continuous map from
[0, 1]n to [0, 1]n itself.
Proof. The map h is polynomial and hence continuous. Firstly, we prove that, for any x ∈ [0, 1]n, h(x) (cid:23) 0n.
Since
and
h(x) = δ12(1n − x) + δ11 diag(α) Ax
+ (1 − δ21)x − δ22 diag(α)x
+ (δ22 − δ11) diag(α) diag(x) Ax
(1 − δ21)x − δ22 diag(α)x (cid:23) (1 − δ21 − δ22)x = 0n,
16
Secondly, we prove that for any x ∈ [0, 1]n, h(x) (cid:22) 1n. Recall that x−i = ( Ax)i =(cid:80)
Moreover, since (cid:80)
the right-hand side of the expression of h is nonnegative. Therefore, for any x ∈ [0, 1]n, h(x) (cid:23) 0n.
j aijxj. That is,
x−i is the weighted average of all the xj's except xi and the value of x−i does not depend on xi since aii = 0.
j aij = 1 for any i ∈ V , x−i is also in the interval [0, 1]. According to equation (11),
rewrite the i-th entry of h(x) as
h(x)i = δ12 + δ11αix−i + ηixi,
where ηi = 1− δ12− δ21− δ22αi + (δ22− δ11)αix−i. The maximum value of ηi is 1− δ12− δ21− δ11αi, obtained
when x−i = 1. Therefore,
Then we have
ηixi ≤ max(1 − δ12 − δ21 − δ11αi, 0).
h(x)i ≤ δ12 + δ11αi + max(1 − δ12 − δ21 − δ11αi, 0)
= max(δ22, δ12 + δ11αi) < 1.
The inequality above leads to h(x) (cid:22) 1n for any x ∈ [0, 1]n.
Theorem 11 (Existence and uniqueness of the fixed point for two-product self-social NCPM). The map
h defined by equation (11), with parameters δ11, δ12, δ21, δ22, α1, . . . , αn all in the interval (0, 1) and
δ22 ≥ δ11, possesses a unique fixed point point p∗ in [0, 1]n.
Proof. According to Lemma 10, for any p(t) ∈ [0, 1]n, p(t + 1) is still in [0, 1]n. According to the Brower
fixed point theorem, there exists p∗ such that h(p∗) = p∗. This concludes the proof of the existence of a
fixed point.
Any fixed point of map h should satisfy h(p∗) = p∗, that is,
0n = δ121n + δ11 diag(α) Ap∗
where K = (δ12 + δ21)I + δ22 diag(α) is a positive diagonal matrix. Define a map T : Rn → Rn by
The the existence and uniqueness of the fixed point in [0, 1]n for the map h is equivalent to the existence
and uniqueness of the fixed point for the map T . Now we prove that T has a unique fixed point in [0, 1]n by
showing that T maps [0, 1]n to [0, 1]n and T is a contraction map.
complete metric space.
For any x and y ∈ [0, 1]n, define the distance d(x, y) by d(x, y) = (cid:107)x − y(cid:107)∞. Then ([0, 1]n, d) is a
According to equation (14), since K−1, diag(α), A, δ22 − δ11 and diag(x) are all nonnegative, for any x,
y ∈ [0, 1]n and x (cid:22) y, we have T (x) (cid:22) T (y). Moreover,
T (0n) = δ12K
−11n (cid:31) 0n,
and
Since
T (1n) = δ12K
= δ12K
−11n + δ11K
−11n + δ22K
−1α + (δ22 − δ11)K
−1α.
−1α
T (1n)i =
δ12 + δ22αi
δ12 + δ21 + δ22αi
< 1,
17
Therefore,
p∗
= δ12K
+ (δ22 − δ11) diag(α) diag(p∗
) Ap∗
− (δ12 + δ21)p∗
− δ22 diag(α)p∗
.
−11n + δ11K
−1 diag(α) Ap∗
−1 diag(α) diag(p∗
) Ap∗
,
+ (δ22 − δ11)K
T (x) = δ12K
−11n + δ11K
−1 diag(α) Ax
+ (δ22 − δ11)K
−1 diag(α) diag(x) Ax.
(13)
(14)
we have T (1n) ≺ 1n. Therefore, for any x ∈ [0, 1]n, T (x) ∈ [0, 1]n, i.e., T maps [0, 1]n to [0, 1]n.
Now we prove that T is a contraction map. For any x, y ∈ [0, 1]n,
T (x)i − T (y)i =
δ11αi
(x−i − y−i)
Ki
(δ22 − δ11)αi
+
Ki
(xix−i − yiy−i).
Moreover,
and
Therefore,
x−i − y−i ≤
aijxj − yj
n(cid:88)
n(cid:88)
j=1
j=1
≤ (
aij) max
j
xj − yj = (cid:107)x − y(cid:107)∞,
xix−i − yiy−i
≤ max(cid:0) max
y2
i − min
≤ 2(cid:107)x − y(cid:107)∞.
i
i
(cid:1)
x2
i , max
i
x2
i − min
i
y2
i
where i = (2δ22−δ11)αi
y. Let = maxi i. Then for any x, y ∈ [0, 1]n,
δ12+δ21+δ22αi
. It is easy to check that i < 1 for any i ∈ V and i does not depend on the x and
T (x)i − T (y)i ≤ i(cid:107)x − y(cid:107)∞,
Applying the Banach fixed point theorem, we know that the map T possesses a unique fixed point p∗ in
[0, 1]n. In addition, for any p(0), the sequence {p(t)}t∈N defined by p(t + 1) = T(cid:0)p(t)(cid:1) satisfies
(cid:107)T (x) − T (y)(cid:107)∞ ≤ (cid:107)x − y(cid:107)∞ with < 1.
t→∞ p(t) = p∗
lim
.
Theorem 11 not only proves the existence and uniqueness of the fixed point p∗ in [0, 1]n, but also implies
some properties of p∗ by introducing the map T . Two properties of p∗ are given below.
Corollary 12 (Lower and upper bound of the unique fixed point). For the two-product self-social NCPM
with δ22 ≥ δ11, the unique fixed point p∗ in [0, 1]n satisfies
1
2
1n (cid:22) p∗
(cid:22)
δ12
δ12 + δ21
1n.
(15)
Proof. One can easily check that when δ22 ≥ δ11, T ( 1
T maps S = {x ∈ Rn 1
point p∗ is in S.
2 1n (cid:22) x (cid:22) δ12
1n. Therefore,
1n} to S itself. Since T is a contraction map, the unique fixed
1n) (cid:22) δ12
2 1n) (cid:23) 1
2 1n and T (
δ12+δ21
δ12+δ21
δ12+δ21
δ12
This corollary has a meaningful interpretation. The condition δ22 ≥ δ11 is equivalent to δ12 ≥ δ21, which
means that the nodes in state H1 have a higher or equal tendency of converting to H2 than the tendency of
self conversion from H2 to H1. In this sense the product H2 is advantageous to H1 and therefore the fixed
point is in favor of H2, that is, p∗
The following corollary gives an upper bound for the difference between p∗
−i =(cid:80)
i and p∗
j aijp∗
j .
≥ 1
2 1n.
18
Corollary 13 (Difference between p∗
unique fixed point satisfies, for any i ∈ V ,
∗
i − p
i and p∗
p
−i). For the two-product self-social NCPM with δ22 ≥ δ11, the
∗
−i ≤
2 αi
1 − 1
αi
δ22 − δ11
δ22 + δ11
.
(16)
Proof. According to equation (13), we have
∗
∗
∗
i − C−ip
−i = δ12 − δ12p
Cip
i ,
where Ci = δ21 + δ22αi and C−i = δ11αi + (δ22 − δ11)αip∗
Firstly we point out that Ci > C−i because
i .
∗
Ci − C−i = δ21 + αi(δ22 − δ11)(1 − p
i ) > 0.
Moreover,
∗
−i
∗
i −p
p
=
=
i
δ12 − (δ12 + Ci − C−i)p∗
δ12 −
(cid:0)δ12 + δ21 + αi(δ22 − δ11)(1 − p∗
i )(cid:1)p∗
C−i
δ11αi + (δ22 − δ11)αip∗
i
i
.
2 ≤ p∗
2 αi
i ≤ δ12
δ22 − δ11
δ22 + δ11
1 − 1
αi
The right-hand side of the equation above with 1
δ12+δ21
achieves its maximum value
at p∗
i = 1
2 . This concludes the proof.
4.2 Stability of the unique fixed point
Notice that any sequence {p(t)}t∈N defined by p(t + 1) = T (p(t)) converging to p∗ does not necessarily lead
to the global stability of p∗ for the system (12). Further analysis is needed for the global or local stability
of the same fixed point p∗ in system (12).
First we consider a special case in which δ11 = δ22.
and for any initial condition p(0), the solution sequence {p(t)}t∈N computed by p(t + 1) = h(cid:0)p(t)(cid:1) converges
Proposition 14 (Global Stability for the two-product self-social NCPM with δ11 = δ22). For the two-product
self-social NCPM given by equation (12), if δ11 = δ22, then the system has a unique fixed point p∗ = 1
2 1n
to p∗ exponentially fast.
Proof. With δ11 = δ22, the map h becomes
h(cid:0)x(cid:1) = x + δ121n − 2δ12x + δ11 diag(α)(cid:0) Ax − x(cid:1).
One can easily check that p∗ = 1
Let p(t) = y(t) + 1
2 1n. Then the two-product self-social NCPM becomes
2 1n is a fixed point. According to Theorem 11, the fixed point is unique.
y(t + 1) = M y(t),
where M = (1 − 2δ12)I + δ11 diag(α) A − δ11 diag(α).
For any i ∈ V , if 1 − 2δ12 − δ11αi ≥ 0, then the i-th absolute row sum of M is equal to
n(cid:88)
j=1
Mij = 1 − 2δ12 − δ11αi + δ11αi = 1 − 2δ12 < 1,
19
and, if 1 − 2δ12 − δ11αi < 0, the i-th absolute row sum satisfies
Mij = 2δ12 + δ11αi + δ11αi − 1 < 1.
n(cid:88)
(cid:80)n
j=1
Since ρ(M ) ≤ (cid:107)M(cid:107)∞ = maxi
p∗ = 1
2 1n is exponentially stable for any initial condition p(t) ∈ [0, 1]n.
j=1Mij, the spectral radius of M is strictly less than 1. The fixed point
For the case δ22 > δ11, we give two propositions on the sufficient conditions, which are inequalities on
the parameters α, δ11 and δ22, for the local stability and global stability respectively. By "global stability"
we mean the stability of p∗ for any p(0) ∈ [0, 1]n.
Proposition 15 (Sufficient condition on local stability for two-product self-social NCPM with δ22 > δ11).
Consider the two-product self-social NCPM (12) on the connected network represented by the adjacency
matrix A. Suppose δ22 > δ11. Then the unique fixed point p∗ is locally stable as long as
αi <
8δ11δ22
(δ22 − δ11)2 + 8δ11δ22
.
(17)
Proof. Let p(t) = y(t) + p∗. Then system (12) becomes
y(t + 1) = M y + (δ22 − δ11) diag(α) diag(y(t)) Ay(t).
The right-hand side of the equation above is a linear term M y(t) with a constant matrix M , plus a quadratic
term. The matrix M can be decomposed as M = M − δ12I and M = M (1) + M (2) is further decomposed
into a diagonal matrix M (1) and a matrix M (2) in which all the diagonal entries are 0. Since
M (1) = (1 − δ12)I − δ22 diag(α)
+ (δ22 − δ11) diag(α) diag( Ap∗
)
is a positive diagonal matrix, and
M (2) = δ11 diag(α) A + (δ22 − δ11) diag(α) diag(p∗
) A
, 1
N2
, . . . , 1
Nn
is a matrix with all the diagonal entries being zero and all the off-diagonal entries being nonnegative, the
matrix M = M (1) + M (2) is nonnegative and, thereby, the matrix M is thus a Metzler matrix.
Since A = diag( 1
N1
)A, the matrix M can be written in the form DA+E, where A is symmetric
and D, E are positive diagonal matrix. One can easily prove that all the eigenvalues of any matrix in the
form M = DA + E are real since M is similar to the symmetric matrix D
The local stability of p∗ is equivalent to the inequality ρ(M ) < 1, which is in turn equivalent to the
First we prove λmax( M ) < 1 + δ12. Since A is irreducible and α (cid:31) 0n, p∗
intersection of the following two conditions: λmax( M ) < 1 + δ12 and λmin( M ) > −1 + δ12.
(cid:31) 0n, we have Mij > 0 if and
only if aij > 0 for any i (cid:54)= j. In addition, Mii > 0 for any i ∈ V . Therefore, M is irreducible, aperiodic and
thus primitive. According to the Perron-Frobenius theorem, λmax( M ) = ρ( M ). We have ρ( M ) ≤ (cid:107) M(cid:107)∞
and for any i ∈ V ,
2 (A + D−1E)D
1
2 .
1
(cid:1).
∗
∗
−i + p
i ) − αi
j
(cid:88)
Mij = 1 − δ21 + (δ22 − δ11)(cid:0)αi(p
(cid:88)
Mij ≤ 1 − δ21 +
1 − δ21 ≤
(δ12 − δ21)2
δ12 + δ21
j
αi < 1 + δ12.
According to Corollary 12, for any i ∈ V ,
Therefore,
λmax( M ) ≤ 1 − δ21 +
(δ12 − δ21)2
δ12 + δ21
αi < 1 + δ12.
20
Now we prove λmin( M ) > −1 + δ12. According to the Gershgorin circle theorem,
For any i ∈ V ,
Mii−
(cid:88)
Mij).
j(cid:54)=i
( Mii −
i
λmin( M ) ≥ min
(cid:88)
Mij
j(cid:54)=i
= 1 − δ21 − δ22αi + (δ22 − δ11)αi
(cid:88)
j
∗
j
aijp
According to Corollary 13,
∗
i
− δ11αi − (δ22 − δ11)αip
= 1 − δ21 − αi(δ22 + δ11)
∗
∗
−i).
i − p
− αi(δ22 − δ11)(p
p
∗
i − p
∗
−i ≤
2 αi
1 − 1
αi
δ22 − δ11
δ22 + δ11
.
Moreover, inequality (17) is necessary and sufficient to
Therefore,
Mii−
1 − 1
αi
(cid:88)
Mij
2 αi
δ22 − δ11
δ22 + δ11
<
1 − αi
αi
δ22 + δ11
δ22 − δ11
.
j(cid:54)=i
> 1 − δ21 − αi(δ22 + δ11) − (1 − αi)(δ22 + δ11)
= −1 + δ12,
for any i ∈ V . That is to say, the inequality (17) is sufficient to ρ(M ) < 1, i.e., the local stability of p∗.
From the proof we know that, around the unique fixed point, the linearized system is y(t + 1) = M y(t),
where M is a Metzler matrix and is Hurwitz stable. Usually the Metzler matrices are presented in continuous-
time network dynamics models, for example, the epidemic spreading model [13, 21]. In the proof of Propo-
sition 15, we provide an example for which the Metzler matrix appears in a stable discrete-time system.
In the proposition below, a sufficient condition on the global stability of p∗ is given.
Proposition 16 (Sufficient condition on global stability for two-product self-social NCPM with δ22 > δ11).
Consider the two-product self-social NCPM on the connected network with adjacency matrix A. Suppose
δ22 > δ11. If
αi <
δ22 + δ11
3δ22 − δ11
,
(18)
then
(i. for any initial condition p(0) ∈ [0, 1]n, the sequence {p(t)}t∈N defined by p(t + 1) = f(cid:0)p(t)(cid:1) satisfies
(cid:0) max(i, Kii + Ki − 1)(cid:1), where i and
p(t) → p∗ exponentially fast as t → ∞;
(ii. and moreover, the convergence rate is upper bounded by maxi
Ki are respectively defined by i = (2δ22 − δ11)αi/Ki, and Ki = δ12 + δ21 + δ22αi.
Proof. Observe that the maps h and T satisfy the following relation:
h(x) = KT (x) + (I − K)x,
21
for any x ∈ [0, 1]n, where K = (δ12 + δ21)I + δ22 diag(α). For any x, y ∈ [0, 1]n,
h(x)i−h(y)i
= Ki
(cid:0)T (x)i − T (y)i
(cid:1) + (1 − Ki)(xi − yi).
We estimate the upper bound of h(x)i − h(y)i in terms of (cid:107)x − y(cid:107)∞ in two cases.
Case 1: δ12 + δ21 + δ22αi < 1 for any i, i.e, αi < δ11
δ22
for any i. First we point out that
δ11
δ22
+ 1 −
1
δ22
δ22
+ 1 − 1
δ11 + δ22
<
3δ22 − δ11
T (x)i − T (y)i ≤ i(cid:107)x − y(cid:107)∞,
always holds as long as δ11 < δ22. Then recall that, for any x, y ∈ [0, 1]n,
where i = (2δ22−δ11)αi
Ki
< 1. Therefore,
h(x)i − h(y)i ≤ (Kii + 1 − Ki)(cid:107)x − y(cid:107)∞,
for any i ∈ V . The coefficient Kii + 1 − Ki is always strictly less than 1 because it is a convex combination
of i < 1 and 1. Therefore, h is a contraction map.
. In this case, for any
such i,
Case 2: There exists some i such that δ12 + δ21 + δ22αi ≥ 1, i.e., αi ≥ δ11
h(x)i − h(y)i ≤ (Kii + Ki − 1)(cid:107)x − y(cid:107)∞.
δ22
+ 1 − 1
δ22
If
then we have
αi <
δ11 + δ22
3δ22 − δ11
,
Kii + Ki − 1 = (3δ22 − δ11)αi + δ12 + δ21 − 1
< δ11 + δ22 + δ12 + δ21 − 1
= 1.
Therefore, h is also a contraction map.
Combining Case 1 and Case 2 we conclude that if αi < δ11+δ22
3δ22−δ11
for any i ∈ V , then h is a contraction
map. According to Lemma 10, h maps [0, 1]n to [0, 1]n. Therefore, according to the Banach fixed point
theorem, for any initial condition p(0) ∈ [0, 1]n, the solution p(t) converges to p∗ exponentially fast and the
(cid:0) max(i, Kii + Ki − 1)(cid:1).
convergence rate is upper bounded by maxi
Figure 8 plots the right-hand sides of inequalities (17) and (18), respectively, as functions of the ratio
, for the case when 0 < δ11
, the sufficient condition
δ22
δ11
δ22
we propose for the global stability is more conservative than the sufficient condition for the local stability.
< 1. One can observe that, for a large range of δqq
δ22
One major difference between the self-social and the social-self NCPM in the asymptotic property is
that, in the self-social NCPM, every individual's state probability distribution is not necessarily identical.
Moreover, distinct from the social-self NCPM, for any of the four cases of G(∆) defined in Definition 6,
the asymptotic behavior of the self-social NCPM depends on not only the structure of G(∆), but also the
structure of the social network G( A) and the individual open-mindedness α.
5 Non-cooperative Multi-stage Competitive Propagation Games
In this section, based on the social-self NCPM given by equation (4), we propose two types of non-cooperative,
multi-player and multi-stage games. The players are the R companies, each of which has a product competing
in the social network. At each time step, based on the system's current product-adoption probability
distribution, all the companies make decisions on the allocation of their investments, with limited budget, to
maximize the probability that their products are adopted after the current time step. In the first subsection
we discuss the model in which each company can invest both on seeding, e.g., advertisement and promotion,
and on the product's quality; Then, in the second subsection, we discuss the model in which the products'
quality is fixed and the companies can only invest on seeding.
All the notations in Table 1 and the previous sections still apply and, in Table 2, we introduce some
additional notations and functions exclusively for this section.
22
X(t)
w(t)
c
gr(w)
ψr(x(i); γ) ψr
Table 2: Notations and functions used in Section V
(cid:0)xir(t)(cid:1)
seeding matrix at time t. X(t) =
n×R, where xir(t) ≥ 0 is com-
pany r's investment on seeding for in-
dividual i. xr(t) is the r-th column of
X(t) and x(i)(t) is the i-th column of
X(t)
the quality investment vector at time
t. w(t) ∈ RR×1, and each entry
wr(t) ≥ 0 is company r's investment
at time t on product Hr's quality
the budget vector. c ∈ RR×1 and c (cid:31)
0R. entry cr is the budget limit for
company r
: R1×R≥0 → R≥0 defined by
ψr(x(i); γ) = xir/(x(i)1R + γ), with
model parameter γ > 0
gr : RR×1≥0 → R≥0 defined by gr(w) =
wr/1(cid:62)
Rw, if wr > 0; gr(w) = 0, if
wr = 0
(cid:22) c(cid:62)
}
Ωr
n X + w(cid:62)
Ω the set of all the players' possible ac-
tions. Ω = {(X, w)X (cid:23) 0n×R, w (cid:23)
0R, 1(cid:62)
the action space for company r. Ωr =
{(xr, wr) xr (cid:23) 0R, wr ≥ 0, 1(cid:62)
βr(t) βr(t) = (cid:0)β1r(t), . . . , βnr(t)(cid:1)(cid:62)
n xr +
wr ≤ cr}
Apr(t)
=
23
Figure 8: This figure illustrates how the conditions for the local stability and global stability change with
the ratio δ11/δ22. Curve (1) is 8δ11δ22/((δ22) − δ11)2 + 8δ11δ22), i.e, corresponding to the condition for local
stability. Curve (2) is (δ22 + δ11)/(3δ22 − δ11), corresponding to the condition for global stability. Curve (3)
is δ11/δ22.
5.1 Model 1: competitive seeding-quality game
a) Model set-up: The multi-stage competitive seeding-quality game is formalized as follows.
a.1) Players: The players are the R companies. Each company r has a product Hr competing on the
network.
n xr(t) + wr(t) ≤ cr.
a.2) Players' actions: At each time step, each company r has two types of investments. The investment
on seeding, i.e., xr(t), changes the individuals' product-adoption probability in the social conversion process,
while the investment on quality, i.e., wr(t), influences the product-conversion graph. The total investment
is bounded by a fixed budget cr, i.e., 1(cid:62)
(cid:16)
a.3) Rules: We model the effect of investment on seeding as follows. For any individual i ∈ V , each
(cid:0)x(i)(t); γ(cid:1) for any i ∈ V and r ∈ Θ. The probability that individual i picks individual j in
company r's investment xir(t) creates a "virtual node" in the network, who is always adopting the prod-
uct Hr. In the social conversion process, the probability that individual i picks any company r's virtual
node is ψr
aij. As for the investment on prod-
the social conversion process is then given by
uct quality, we assume that the product-conversion graph is associated with a rank-one adjacency matrix
c, which is specified later in this subsection. With each company r's action (cid:0)xr(t), wr(t)(cid:1) at time t, the
[δ11n, δ21n, . . . , δR1n] and δr = gr(w(t)) is determined by all the companies' investments on product quality.
We exclude the non-realistic case when w = 0R by imposing an additional condition on the budget vector
dynamics of the product-adoption probabilities P (t) ∈ Rn×R≥0
n(cid:88)
(cid:0)x(i); γ(cid:1)(cid:17)
(cid:80)R
is given by
s=1 ψs
1 −
pir(t) = αi
x(i)(t)1R + γ
γ
aikpkr(t − 1)
(cid:0)x(i)(t); γ(cid:1) + (1 − αi)gr
(cid:0)w(t)(cid:1),
k=1
+ αiψr
for any i ∈ V and r ∈ Θ.
adoption probability of Hr, i.e., ur
(cid:0)X(t), w(t)(cid:1) = 1(cid:62)
a.4) Pay-offs: At each time step t, the pay-off for any company r, denoted by ur
(19)
(cid:0)X(t), w(t)(cid:1), is the total
n pr(t), where pr(t) is the r-th column vector of P (t).
24
00.20.40.60.8100.20.40.60.81δ11/δ22(1)(2)(3)any r,
Any Nash equilibrium(cid:0)X∗(t), w∗(t)(cid:1) at stage t for the multi-stage game defined above satisfies that, for
for any(cid:0)X(t), w(t)(cid:1)
wr(t) (cid:54)= w∗
(t), w∗
∈ Ω such that xs(t) = x∗
s (t) for any s (cid:54)= r, and xr(t) (cid:54)= x∗
b) Theoretical Analysis of Nash equilibrium and system's dynamical behavior: The following theorem
gives a closed-form expression of the Nash equilibrium at each stage and the system's asymptotic behavior
when every player is adopting the policy at the Nash equilibrium.
(cid:0)X(t), w(t)(cid:1),
s(t) and ws(t) = w∗
(t)(cid:1)
(cid:0)X
r(t) and
≥ ur
r (t).
(20)
ur
∗
Theorem 17 (Competitive seeding-quality game). Consider the R-player multi-stage game described above
in this subsection. Further assume that the budget limit cr for any company r satisfies
(cid:110)
(cid:111)
.
cr > max
nγ
1(cid:62)
n (1n − α)
1(cid:62)
n α
n
, (
mini αi − 1)γ
i) at each time step t + 1, the Nash equilibrium(cid:0)X∗(t + 1), w∗(t + 1)(cid:1) is given by
Then we have the following conclusions:
∗
ir(t + 1) =
x
∗
r (t + 1) =
w
αi
n
(cid:18)
αiγ
cr +
n
1(cid:62)
n α
n
1 −
(cid:19)(cid:0)cr + 1(cid:62)
1(cid:62)
n βr(t) − βir(t)γ,
n βr(t)γ(cid:1),
(21)
(22)
(23)
(25)
(26)
(27)
and x∗
ir(t) > 0, w∗
ii) if(cid:0)X(t), w(t)(cid:1) =(cid:0)X∗(t), w∗(t)(cid:1) for any t ∈ N and P (0) ∈ SnR(1n), then P (t), for t ≥ 1, is a rank-one
(cid:3). Moreover, for any r ∈ Θ, as t → ∞, pr(t) converges to
matrix of the form (cid:2)p1(t)1n, p2(t)1n, . . . , pR(t)1n
r (t) > 0 for any i ∈ V, r ∈ Θ;
cr/1(cid:62)
Rc exponentially fast with the rate nγ/(1(cid:62)
Rc + nγ).
Proof. Since we only discuss time step t + 1 in this proof, for simplicity of notations and without causing
any confusion, we use xir (wr, x∗
r resp.) for xir(t + 1) (wr(t + 1), x∗
ir(t + 1), w∗
r (t + 1) resp.).
ir, w∗
If company r knows the actions of all the other companies at time step t + 1, i.e., (xs, ws), for any s (cid:54)= r,
the optimal response for company r is the solution to the following optimization problem:
− 1(cid:62)
minimize
(x,w)∈Ωr
subject to 1(cid:62)
n x + w − cr ≤ 0.
n pr(t + 1)
(24)
n xr + µrwr − µrcr, for any i ∈ V and r ∈ Θ.
∂Lr
∂xir
n pr(t + 1) + µr1(cid:62)
The solution to the optimization problem (24) satisfies
Let xir = xir + βir(t)γ and Lr(xr, wr, µr) = −1(cid:62)
(cid:80)
((cid:80)R
= −αi
= −1(cid:62)
= 1(cid:62)
∂Lr
∂wr
∂Lr
∂µr
According to equation (20), (x∗
r, w∗
n x∗
s, w∗
s ) for any s (cid:54)= r. One immediate result is that 1(cid:62)
s(cid:54)=r xis
s=1 xis)2
s(cid:54)=r ws
(1(cid:62)
Rw)2
n xr + wr − cr = 0.
n (1n − α)
(cid:80)
+ µr = 0,
+ µr = 0,
(x∗
equation (25), we have that, at the Nash equilibrium at time step t + 1,
r ) is the solution to the optimization problem (24) with (xs, ws) =
r − cr = 0 for any r ∈ Θ. Then, according to
r + w∗
1
õr
=
(cid:80)n
k=1
(cid:113)
(cid:80)
s(cid:54)=r x∗
ks
1
αk
25
R(cid:88)
s=1
(cid:0)cs − w
n βsγ(cid:1),
∗
s + 1(cid:62)
and therefore,
for any r, τ ∈ Θ. The equation above leads to
=
R(cid:80)
s=1
is
ks
αi
αi
k=1
k=1
αk
αk
s(cid:54)=r
(cid:113)
n(cid:80)
(cid:80)
(cid:114)
(cid:80)
s(cid:54)=r x∗
x∗
(cid:113)
(cid:80)
(cid:113)
(cid:80)
(cid:80)n
s(cid:54)=r x∗
(cid:80)
(cid:80)
s(cid:54)=r x∗
s(cid:54)=τ x∗
(cid:80)
(cid:80)
s(cid:54)=r x∗
s(cid:54)=r x∗
(cid:80)R
(cid:80)R
s=1 x∗
s=1 x∗
=
js
js
is
is
is
is
is
s(cid:54)=r x∗
ks
=
is
=
=
k=1
k=1
(cid:80)n
(cid:80)n
(cid:80)
(cid:80)
s(cid:54)=τ x∗
s(cid:54)=τ x∗
(cid:115)(cid:80)
(cid:114) αi
(cid:80)
s(cid:54)=r x∗
s(cid:54)=r x∗
(cid:0)cr − w
αj
js
is
is
n βs(t)γ(cid:1) .
s=1
αi
x∗
s + 1(cid:62)
R(cid:80)
(cid:0)cs − w∗
(cid:113)
(cid:80)
(cid:113)
(cid:80)
(cid:80)n
s(cid:54)=τ x∗
s(cid:54)=τ x∗
(cid:113)
(cid:80)
(cid:113)
(cid:80)
s(cid:54)=r x∗
s(cid:54)=τ x∗
(cid:80)R
(cid:80)R
s=1 x∗
s=1 x∗
2
x∗
x∗
αk
αk
αk
k=1
=
=
ks
ks
ks
js
jr
is
ir
,
.
,
x∗
x∗
ir
jr
=
αi
αj
,
is
js ⇒
n βr(t)γ(cid:1).
∗
r + 1(cid:62)
(28)
(29)
The right-hand side of the equation above does not depend on the product index r. Therefore,
Since the right-hand side of the equation above does not depend on the individual index i, we have
for any r, τ ∈ Θ. Combine the equation above with equation (28) and then we obtain
for any r ∈ Θ. Therefore,
αi
1(cid:62)
n α
Combining equation (29) and (26), we obtain
∗
ir =
x
cr − w∗
r + 1(cid:62)
w∗
r
n βr(t)γ
=
cτ − w∗
τ + 1(cid:62)
w∗
τ
n βτ (t)γ
= η,
n α/1(cid:62)
for any r, τ ∈ Θ and some constant η. Substitute the equation above back into equation (26), we solve
that η = 1(cid:62)
n (1n − α). Therefore, we obtain equation (23) and by substituting equation (23) into
equation (29) we obtain equation (22). Moreover, one can check that equation (21) guarantees x∗
ir > 0 and
w∗
r > 0 for any i ∈ V and r ∈ Θ. This concludes the proof for Conclusion i).
Substituting euqation (22) and (23) into the dynamical system (19), after simplification, we have
Therefore, pr(t + 1) =(cid:0)cr + nγpr(t)(cid:1)/(1(cid:62)
pr(t + 1) =
to all the results in Conclusion ii).
cr + 1(cid:62)
1(cid:62)
Rc + nγ
n
Apr(t)γ
1n = pr(t + 1)1n.
Rc + nγ) for any t ≥ 1. One can check that the equation above leads
c) Interpretations and Remarks: The basic idea of seeding-quality trade-off in the competitive seeding-
quality game is similar to the work by Fazeli et. al. [14] but our model is essentially different from [14] in
that our model is multi-stage, and takes the products, rather than the individuals, as the players. Moreover,
our model is based on a different network propagation dynamics.
Theorem 17 provides some strategic insights on the investment decisions and the seeding-quality trade-off.
c.1) Interpretation of βir(t): By definition, βir(t) is the average probability, among all the neighbors of
k=1 alkβkr(t)/n is a convext
individual i, of adopting product Hr at time step t, while 1(cid:62)
combination of all the entries of βr(t) and characterizes the current overall acceptance of product Hr.
l=1
n βr(t)/n =(cid:80)n
(cid:80)n
26
c.2) Seeding-quality trade-off: According to equation (23), at the Nash equilibrium, the investment on
Hr's product quality monotonically decreases with 1(cid:62)
n βr. This observation
implies that: 1) in a society with relatively low open-mindedness, the competing companies should relatively
emphasize more on improving their products' quality, rather than seeding, and vice versa; 2) for products
which are currently not widely adopted, seeding is relatively more efficient than improving the product's
quality.
n α/n, and increases with 1(cid:62)
c.3) Allocation of seeding resources among the individuals: According to equation (22), for any company
r, at the Nash equilibrium at each time step t + 1, the investment on seeding for any individual i, i.e.,
xir(t + 1), increases with individual i's open-mindedness, since it is easier for a more open-minded individual
to be influence by seeding. Moreover, if we rewrite equation (22) as
∗
ir(t + 1) =
x
αi
n
cr +
αiγ
n
βkr(t) − (1 −
αi
n
)γβir(t),
one would observe that x∗
ir(t) monotonically decreases with βir(t), which denotes the average probability of
adopting Hr among individual i's neighbors. A possible explanation is that, with large βir(t), individual i is
very likely to be converted to Hr due to her neighbors, and thereby the seeding for individual i is relatively
not necessary. Once again we rewrite equation (22) as
(cid:88)
k(cid:54)=i
n(cid:88)
(cid:88)
l=1
αiγ
n
n(cid:88)
k(cid:54)=i
l=1
∗
ir(t + 1) =
x
αi
n
cr +
alipir(t)
+
αiγ
n
alkpkl(t) − γ
n(cid:88)
k=1
aikpkr(t).
with (cid:80)n
others, and (cid:80)n
l=1 alipir(t), in which (cid:80)n
On the right-hand side of the equation above, only the second term contains pir(t). Therefore, x∗
ir(t) increases
l=1 ali is individual i's in-degree, reflecting i's potential of influencing the
l=1 alipir(t) characterizes individual i's potential of converting other individuals to product
Hr.
c.4) Nash equilibrium on the boundary: Without equation (21), the right-hand sides of equation (22)
and (23) could be non-positive. In this case, the analysis becomes more complicated and the Nash equilibrium
would be on the boundary of Ω, i.e., some of the x∗
c.5 Preset quality: In order to make the quality function gr(w) smooth at w = 0R, we can modify its
definition as gr(w; ξ, u) = (wr + ξru)/(1T
Rw + u), where u > 0 and xi (cid:31) 0R are model parameters and
1T
Rξ = 1. The parameter ξr characterizes product Hr's preset relative quality. Based on the same argument
of the proof for Theorem 17, one can check that, for the Nash equilibrium at which all the individuals'
investments on both seeding and quality are positive, w∗
n αξr/n is equal to the right-hand side of
equation (23) and thereby any company r's investment on quality decreases with Hr's preset relative quality.
r (t + 1) + u1(cid:62)
ir(t) or w∗
r (t) should be 0.
5.2 Model 2: competitive seeding game
In this subsection we consider the case when the products' relative quality is fixed and the competing
companies can only invest on seeding. The model set-up is the same with the game proposed in Section
n xr ≤ cr. The dynamics of
P (t) =(cid:0)pir(t)(cid:1)
V.A, except that the action for any company r is xr ∈ Rn×1≥0 , constrained by 1(cid:62)
n×R, with seeding actions X(t), is given by
pir(t + 1) = αi
γβir(t) + xir(t)
x(i)(t)1R + γ
R(cid:88)
s=1
+ (1 − αi)
pis(t)δsr.
(30)
The following theorem gives the closed-form expression of the unique Nash equilibrium at each time step
and the system's dynamical behavior if all the companies are adopting the policies at the Nash equilibrium.
Theorem 18 (Competitive propagation game with seeding only). Consider the competitive seeding game
described in this subsection. Assume that cr > (1(cid:62)
n α/ mini αi − 1)γ for any r ∈ Θ. Then we have:
27
i) at each time step, the Nash equilibrium X∗(t) is given by
x∗
r(t) =
cr + 1(cid:62)
n βr(t)γ
1(cid:62)
n α
α − γβr(t),
and x∗
r(t) (cid:31) 0n, for any r ∈ Θ;
ii) if X(t) = X∗(t) for any t ∈ N, then the matrix form of system (30) is given by
P (t + 1) = diag(α)
n ) AP (t)
1nc(cid:62) + γ(1n1(cid:62)
1(cid:62)
n c + nγ
+ (I − diag(α))P (t)∆.
∈ SnR(1n) for the system above, and, for any P (0) ∈ SnR(1n),
n c + nγ) + (1− αi)ζ(∆),
(31)
Moreover, there exists a unique fixed point P ∗
P (t) converges to P ∗ exponentially fast with the convergence rate η = maxi αinγ/(1(cid:62)
where 0 ≤ ζ(∆) = 1 −
r=1 mins δsr ≤ 1.
(cid:80)R
Proof of Conclusion i) in Theorem 18 is similar to the proof of Conclusion i) in Theorem 17. As for
Conclusion ii) in Theorem 18, following the same line of argument in the proof of Case 1 in Theorem 7 and
applying the Banach fixed point theorem, one can check that equation (31) defines a contraction map.
Interpretations on the allocation of seeding investments among the individuals, for the competitive
seeding-quality game proposed in the previous subsection, also applies to the competitive seeding game
proposed in this subsection. One main difference in dynamical property between these two game-theoretic
models is that, in the competitive seeding game defined in Section V.B, the matrix P (t) does not become a
rank-one matrix with all the players adopting the policies at the Nash equilibrium, and moreover, the fixed
point P ∗ for system (31) depends not only on the budgets vector c, but also on α and A.
5.3 Simulation illustration
Simulation work has been conducted for the two game-theoretic models analyzed in this section, on a
competitive propagation system with R = 2, n = 5 and A being strongly connected. The model parameters
are set as α = (0.8, 0.85, 0.75, 0.84, 0.76)(cid:62), γ = 100, c1 = 600, c2 = 900, such that the conditions on cr in
Theorem 17 and 18 are satisfied. For the competitive seeding game, ∆ is randomly generated. Figure 9(a)
shows that, for the competitive seeding-quality game, the average probability of adopting H1 (H2 resp.)
converges to c1/(c1 + c2) (c2/(c1 + c2) resp.), as predicted by Theorem 17. In addition, Figure 9(b) shows
that, for the competitive seeding game, the average probability of adopting H1 (or H2 resp.) also converges.
Moreover, one can observe, from both Figure 9(a) and 9(b), that the company adopting the Nash policy,
with the other company just randomly allocating the investment, has higher pay-off than in the case in which
both sides are adopting the policies at the Nash equilibrium.
6 Conclusion
This paper discusses a class of competitive propagation models based on two product-adoption mechanisms:
the social conversion and the self conversion. Applying the independence approximation we propose two
difference equations systems, referred to as the social-self NCPM and the self-social NCPM respectively.
Theoretical analysis reveals that the structure of the product-conversion graph plays an important role
in determining the nodes' asymptotic state probability distributions. Simulation results reveal the high
accuracy of the independence approximation and the asymptotic behavior of the original social-self Markov
chain model. Based on the social-self NCPM, we propose a class of multi-stage competitive propagation
games and discuss the trade-off between seeding and quality at the unique Nash equilibrium. One possible
future work is the deliberative investigation on the Nash equilibrium on the boundary. Another open problem
is the stability analysis of the self-social NCPM with R > 2. Simulation results support the claim that, for
the self-social NCPM with R > 2, there also exists a unique fixed point P ∗ and, for any initial condition
P (0) ∈ SnR(1n), the solution P (t) to equation (10) converges to P ∗. We leave this statement as a conjecture.
28
(a) competitive seeding-quality game
(b) competitive seeding game
Figure 9: Evolution of the average adoption probabilities 1(cid:62)
n pr(t)/n for the two game models proposed in
Section V. The solid curves represent the average adoption probability for product H1, while the dash curves
represents the average adoption probability for product H2. The blue curves correspond to the case in which
both companies are adopting the Nash policies, while the red curves correspond to the case when company
1 is adopting the Nash policy but company 2 is randomly allocating the investment on seeding and product
quality.
References
[1] D. Acemoglu, A. Ozdaglar, and E. Yildiz. Diffusion of innovations in social networks. In IEEE Conf.
on Decision and Control, pages 2329 -- 2334, Orlando, FL, USA, December 2011.
[2] E. M. Adam, M. A. Dahleh, and A. Ozdaglar. On threshold models over finite networks, 2013. Available
at http://arxiv.org/pdf/1211.0654.
[3] M. E. Alexander and S. M. Moghadas. Bifurcation analysis of an SIRS epidemic model with generalized
incidence. SIAM Journal on Applied Mathematics, 65(5):1794 -- 1816, 2005.
[4] K. Apt and E. Markakis. Diffusion in social networks with competing products. Lecture Notes in
Computer Science, 6982:212 -- 223, 2011.
[5] A. Beutel, B. A. Prakash, R. Rosenfield, and C. Faloutsos. Winner takes all: competing viruses or ideas
on fair-play networks. In ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining, pages 426 -- 434, New York, USA, 2012.
[6] S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks.
In
X. Deng and F. Chung Graham, editors, Internet and Network Economics, volume 4858 of Lecture
Notes in Computer Science, pages 306 -- 311. Springer, 2007.
[7] M. Busch and J. Moehlis. Homogeneous assumption and the logistic behavior of information propaga-
tion. Physical Review E, 85(2):026102, 2012.
[8] T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen. Maximizing influence in a competitive social
network: a follower's perspective. In International Conference on Electronic Commerce, pages 351 -- 360,
Minneapolis, MN, USA, 2007.
[9] D. Centola. The spread of behavior in an online social network experiment. Science, 329(5996):1194 --
1197, 2010.
[10] N. A. Christakis and J. H. Fowler. The spread of obesity in a large social network over 32 years. New
England Journal of Medicine, 357(4):370 -- 379, 2007.
29
[11] N. A. Christakis and J. H. Fowler. Social network sensors for early detection of contagious outbreaks.
PLOS ONE, 5(9):e12948, 2010.
[12] L. Coviello, Y. Sohn, A. D. I. K. Kramer, C. Marlow, M. Franceschetti, N. A. Christakis, and J. H.
Fowler. Detecting emotional contagion in massive social networks. PLOS ONE, 9(3):e90315, 2014.
[13] A. Fall, A. Iggidr, G. Sallet, and J.-J. Tewa. Epidemiological models and Lyapunov functions. Mathe-
matical Modelling of Natural Phenomena, 2(1):62 -- 68, 2007.
[14] A. Fazeli, A. Ajorlou, and A. Jadbabaie. Competitive diffusion in social networks: Quality or seeding?
arXiv preprint arXiv:1503.01220, 2015.
[15] A. Fazeli and A. Jadbabaie. Game theoretic analysis of a strategic model of competitive contagion and
product adoption in social networks. In IEEE Conf. on Decision and Control, pages 74 -- 79, Maui, HI,
USA, December 2012.
[16] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying
process of word-of-mouth. Marketing Letters, 12:211 -- 223, 2001.
[17] S. Goyal, H. Heidari, and M. Kerans. Competitive contagion in networks. Games and Economc Behavior,
2014. in press.
[18] A. Gray, D. Greenhalgh, L. Hu, X. Mao, and J. Pan. A stochastic differential equation SIS epidemic
model. SIAM Journal on Applied Mathematics, 71(3):876 -- 902, 2011.
[19] H. W. Hethcote. The mathematics of infectious diseases. SIAM Review, 42(4):599 -- 653, 2000.
[20] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network.
In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 137 -- 146,
2003.
[21] A. Khanafer, T. Ba¸sar, and B. Gharesifard. Stability properties of infected networks with low curing
rates. In American Control Conference, pages 3579 -- 3584, Portland, OR, USA, June 2014.
[22] W. Mei and F. Bullo. Modeling and analysis of competitive propagation with social conversion. In
IEEE Conf. on Decision and Control, pages 6203 -- 6208, Los Angeles, CA, USA, December 2014.
[23] M. E. J. Newman. Spread of epidemic disease on networks. Physical Review E, 66(1):016128, 2002.
[24] R. Pastor-Satorras and A. Vespignani. Epidemic spreading in scale-free networks. Physical Review
Letters, 86(14):3200 -- 3203, 2001.
[25] B. A. Prakash, A. Beutel, R. Rosenfield, and C. Faloutsos. Interacting viruses in networks: Can both
In 21st International Conference on World Wide Web, pages 1037 -- 1046, New York, USA,
survive?
2012.
[26] F. D. Sahneh and C. Scoglio. Competitive epidemic spreading over arbitrary multilayer networks.
Physical Review E, 89:062817, 2014.
[27] F. D. Sahneh, C. Scoglio, and P. Van Mieghem. Generalized epidemic mean-field model for spreading
processes over multilayer complex networks. IEEE/ACM Transactions on Networking, 21(5):1609 -- 1620,
2013.
[28] S. Shirazipourazad, B. Bogard, H. Vachhani, A. Sen, and P. Horn. Influence propagation in adversarial
setting: how to defeat competition with least amount of investment. In ACM International Conference
on Information and Knowledge Management, pages 585 -- 594, Maui, HI, USA, 2012.
[29] A. Stanoev, D. Trpevski, and L. Kocarev. Modeling the spread of multiple concurrent contagions on
networks. PLOS ONE, 9(6):e95669, 2014.
[30] F. Uekermann and K. Sneppen. Spreading of multiple epidemics with cross immunization. Physical
Review E, 86(3), 2012.
30
[31] P. Van Mieghem, J. Omic, and R. Kooij. Virus spread in networks.
IEEE/ACM Transactions on
Networking, 17(1):1 -- 14, 2009.
[32] W. Wang and X. Zhao. An epidemic model with population dispersal and infection period. SIAM
Journal on Applied Mathematics, 66(4):1454 -- 1472, 2006.
[33] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos. Epidemic spreading in real networks: An
eigenvalue viewpoint. In IEEE Int. Symposium on Reliable Distributed Systems, pages 25 -- 34, October
2003.
[34] L. Weng, A. Flammini, A. Vespignani, and F. Menczer. Competition among memes in a world with
limited attention. Scientific Reports, 2(335):1 -- 8, 2012.
[35] E. Yildiz, D. Acemoglu, A. Ozdaglar, and A. Scaglione. Diffusions of innovations on deterministic
topologies. In IEEE Int. Conf. on Acoustics, Speech and Signal Processing, pages 5800 -- 5803, Prague,
Czech Republic, May 2011.
[36] M. Youssef and C. Scoglio. An individual-based approach to SIR epidemics in contact networks. Journal
of Theoretical Biology, 283(1):136 -- 144, 2011.
31
|
1906.05063 | 2 | 1906 | 2019-08-21T06:21:34 | Multi-spatial Scale Event Detection from Geo-tagged Tweet Streams via Power-law Verification | [
"cs.SI"
] | Compared with traditional news media, social media nowadays provides a richer and more timely source of news. We are interested in multi-spatial level event detection from geo-tagged tweet streams. Specifically, in this paper we (1) examine the statistical characteristic for the time series of the number of geo-tagged tweets posted from specific regions during a short time interval, e.g., ten seconds or one minute; (2) verify from over thirty datasets that while almost all such time series exhibit self-similarity, those that correspond to events, especially short-term and unplanned outbursts, follow a power-law distribution; (3) demonstrate that these findings can be applied to facilitate event detection from tweet streams. We propose two algorithms---Power-law basic and Power-law advanced, where Power-law basic only checks the existence of power-law distributions in the time series from tweet streams at multi-spatial scales, without looking into the content of each tweet, and Power-law advanced integrates power-law verification with semantic analysis via word embedding. Our experiments on multiple datasets show that by considering spatio-temporal statistical distributions of tweets alone, the seemingly naive algorithm of Power-law basic achieves comparable results with more advanced event detection methods, while the semantic analysis enhanced version, Power-law advanced, can significantly increase both the precision and the recall. | cs.SI | cs | Multi-spatial Scale Event Detection from
Geo-tagged Tweet Streams via Power-law
Verification
Yi Han, Shanika Karunasekera, Christopher Leckie, Aaron Harwood
School of Computing and Information Systems
The University of Melbourne
{yi.han, karus, caleckie, aharwood}@unimelb.edu.au
Parkville, Australia
9
1
0
2
g
u
A
1
2
]
I
S
.
s
c
[
2
v
3
6
0
5
0
.
6
0
9
1
:
v
i
X
r
a
Abstract -- Compared with traditional news media, social media
nowadays provides a richer and more timely source of news. We
are interested in multi-spatial level event detection from geo-
tagged tweet streams. Specifically, in this paper we (1) examine
the statistical characteristic for the time series of the number
of geo-tagged tweets posted from specific regions during a short
time interval, e.g., ten seconds or one minute; (2) verify from
over thirty datasets that while almost all such time series exhibit
self-similarity, those that correspond to events, especially short-
term and unplanned outbursts, follow a power-law distribution;
(3) demonstrate that these findings can be applied to facilitate
event detection from tweet streams. We propose two algorithms --
Power-law basic and Power-law advanced, where Power-law basic
only checks the existence of power-law distributions in the
time series from tweet streams at multi-spatial scales, without
looking into the content of each tweet, and Power-law advanced
integrates power-law verification with semantic analysis via
word embedding. Our experiments on multiple datasets show
that by considering spatio-temporal statistical distributions of
tweets alone, the seemingly naive algorithm of Power-law basic
achieves comparable results with more advanced event detection
methods, while the semantic analysis enhanced version, Power-
law advanced, can significantly increase both the precision and
the recall.
Index Terms -- self-similarity, power-law distribution, multi-
spatial event detection
I. INTRODUCTION
Social media, especially Twitter, has become an increasingly
more popular source of news. Compared with traditional forms
of media, such as TV and newspapers, it often provides more
timely information about various type of incidents. We are
interested in real-life event detection at multi-spatial levels
from geo-tagged tweet streams.
We initially investigated using Poisson models to monitor
the fluctuations in the time series of the number of geo-
tagged tweets posted within a bounding box during a short
time interval, e.g., ten seconds to one minute. However, our
experimental results observe a relatively high false positive
rate for this Poisson model based event detection method.
This observation motivates us to reexamine the properties of
these time series. Specifically, this paper aims to answer the
following questions:
Section III: What are the statistical characteristics of the
time series? A draw of several time series at different time
scales, i.e., the number of tweets posted every 1, 10, 60,
1000 seconds, shows that burstiness persists over all these
scales, which indicates self-similarity [1], [2]. In order to
verify this finding, we collect 33 tweet datasets of different
types, generate the corresponding time series by counting
the number of tweets posted every minute, and check self-
similarity using three popular methods [3], [4]: aggregate
variance, R/S and Whittle (please refer to Section II for a more
detailed description on self-similarity and the three methods).
Our results suggest that all the time series are self-similar.
Section IV: Can the time series be better characterised
by other models than the Poisson process? The existence
of self-similarity suggests that Poisson models are inadequate
to capture the underlying dynamics in tweet streams. Instead,
we examine whether a power-law distribution can be validated
from these time series, and find that when an event occurs, it
is indeed more likely to observe a power-law distribution in
the time series generated from geo-tagged tweet streams.
Section V: Can the answers to the previous two questions
be applied for event detection from geo-tagged tweet
streams? We propose two event detection methods -- Power-
law basic and Power-law advanced: (1) Power-law basic only
checks the existence of power-law distributions in the tweet
stream at multi-spatial scales, without looking into the content
of each tweet, or using any other information except the geo-
location. Our experiments demonstrate that when combined
with a Quad-tree [5], [6], this seemingly naive approach can
achieve comparable performance with Geoburst [7]1, a widely
cited event detection algorithm that considers temporal, spatial
and semantic information; (2) Power-law advanced improves
the algorithm by incorporating semantic analysis via word
embedding, and our results suggest that it can significantly
increase both the precision and the recall.
The remainder of this paper is organised as follows: Sec-
tion II provides background information on self-similarity and
1Although the improved versions exist (Geoburst+ [8], TrioVec [9]), we do
not use them as baselines in this work as they are supervised approaches.
power-law distributions; Section III describes the collected
datasets, and checks whether the generated time series exhibit
self-similarity; Section IV verifies the power-law hypothesis;
Section V proposes two multi-spatial event detection algo-
rithms, Power-law basic and Power-law advanced; Section VI
summarises related work in event detection from social media;
and Section VII concludes the paper and gives directions for
future work.
II. BACKGROUND ON SELF-SIMILARITY & POWER-LAW
DISTRIBUTIONS
In this section, we briefly introduce the fundamental con-
cepts in self-similarity and power-law distributions, including
their definitions and the methods to verify them.
A. Self-similarity
A straightforward way to visualise a power-law distribution
is to draw a log-log plot of the complementary cumulative
distribution function (CCDF), and a roughly straight line is
expected to be seen in the plot. However, this is only a neces-
sary but not sufficient condition for a power-law distribution.
In order to validate that a time series X follows a power-
law distribution, we first fit a power-law model to X, and then
run the Kolmogorov-Smirnov (KS) test [14]. If the p-value of
this significance test is below 0.05, the power-law hypothesis
is rejected. Note that if a time series follows a power-law
distribution,
its log-log transformed CCDF is expected to
be qualitatively similar at different scales, and hence it also
exhibits self-similarity.
III. VERIFICATION OF SELF-SIMILARITY IN TWEET
STREAMS
k
k
Unlike traditional Poisson traffic, where short-term fluctu-
ations average out over a longer period of time, self-similar
traffic maintains burstiness at all time scales.
= 1
m
m·k
1) Definition: Before giving the definition of self-similarity,
we first introduce the concept of an aggregated process: given
a process X = (Xi
: i = 1, 2, 3, ...), its aggregated process
is X(m) = (X(m)
, k = 1, 2, 3, ...), where m is the block size,
X(m)
j=m·(k−1)+1 Xj. In other words, X(m) partitions the
original series X into non-overlapping segments of size m, and
then averages over each segment.
A process X is called exactly second-order self-similar [1],
[2] with parameter H = 1− β/2, 0 < β < 1, if Rm(k) = R(k) ∼
k−β as k → ∞, where Rm(·) and R(·) are the autocorrelation
functions for X(m) and X, respectively. The parameter H is
called the Hurst parameter [10], [11], and for a self-similar
process, H ∈ (0.5, 1).
2) Methods to Test Self-similarity: SELFIS [3], [4] is a
popular tool for testing self-similarity. It provides a number of
methods to calculate the Hurst parameter, and the following
three widely used methods are selected in this paper.
• Aggregate variance. A sufficient condition of
self-
similarity is Vm = V · m−β, m ∈ Z >1 = {2, 3, ...}, where
V (Vm) is the variance of X (X(m)). Therefore, if a log-
log plot of Vm/V is drawn against m, then a straight line
with slope β larger than −1 indicates self-similarity, and
H = 1 − β/2.
• R/S. For a self-similar process,
its rescaled adjusted
range or R/S statistic can be represented by the relation:
limn→∞ E( R
S (n)) = C · nH,
where C is a finite positive constant, and n is the number
of points in the process. Therefore, in the log-log plot of
S against n, the slope is an estimate of H.
R
• Whittle. The Whittle method applies maximum likelihood
estimation to the spectral density function of X. It not
only estimates H, but also produces a confidence interval.
B. Power-law Distribution
A power-law probability distribution [12], [13] takes the
form of p(x) ∝ x−α, where α is a positive constant often
known as the exponent or scaling parameter.
streams, we have collected the following datasets:
In order to study the statistical characteristic of tweet
• D1− D30 (public) -- A collection of 30 datasets associated
with real-world events from 2012 to 2016, each of which
contains from around 2×105 to nearly 3×107 tweets [15].
• D31 (public) -- Twitter event detection dataset, which con-
tains more than 120 million tweets (although the majority
of these tweets are not associated with any event). The
ground truth for 506 events and associated tweets are
given [16].
• D32 -- Twitter dataset shared by the authors of [8], which
includes 9.5 million geo-tagged tweets from New York
between 2014-08-01 and 2014-11-30.
from Melbourne between 2014 and 2018.
• D33 -- Over 920 thousand geo-tagged tweets collected
These datasets cover different types of tweets: D1 − D30
contain tweets that are only associated with specific events, the
majority of which have worldwide impact; D31 contains tweets
that both do and do not correspond to (mostly) local or less
influential events, with the ground truth provided; D32 & D33
include all geo-tagged tweets from a region during a certain
period of time.
Note that because the original datasets of D1 − D31 only
include tweet ids, we have used a tool called "twitter-dataset-
collector" [17] to download all the tweets. Since these datasets
consist of hundreds of millions of tweets, it is infeasible to use
the Twitter API to collect them due to the rate limit -- it takes
a significant amount of time to retrieve all the tweets. Instead,
the tool crawls the webpages and reconstructs the original
tweets. However, some tweets have already been deleted, and
hence are not retrievable in this way. Even for those obtained
tweets, the collected information is not as rich as in what the
API returns. For example, most of the tweets do not have any
location information, and the rest only have a location label --
normally a city/town name, rather than specific coordinates.
In addition, the second is truncated in the publication time.
For each of the above datasets, we count the number of
tweets posted every minute, generate the corresponding time
series, and test whether they exhibit self-similarity using three
methods: aggregate variance, R/S and Whittle.
A. Self-similarity in D1 − D30
We start with the 30 datasets of real-world events with wide
impact. As can be seen from Fig. 1a, all the estimates of the
Hurst parameter are within the range of 0.5 and 1, which
indicates that the corresponding time series are self-similar.
Since we are more interested in geo-tagged tweets, we further
examine the tweets that have a location label. The results in
Fig. 1b suggest that these time series are self-similar too.
Among the 30 events, eleven of them are relatively short-
term (from a few days to a couple of weeks), unplanned
outbursts: Boston marathon bombing, Ferguson unrest, Gaza
under attack, Ottawa shooting, Sydney siege, Charlie Hebdo
shooting, Germanwings crash, Paris attacks, Brussels airport
explosion, Cyprus hijacked plane and Lahore blast. This is
the type of event that we are mostly interested in detecting
from tweet streams. Therefore, for these eleven datasets, we
extract tweets from close to where the events occurred, as
those tweets will be most helpful in event detection. The
results in Fig. 1c show that the corresponding time series
exhibit self-similarity as well. Note that for the event of "Gaza
under attack", insufficient data are collected locally, and hence
it is not included.
B. Self-similarity in D31
Next we examine the 506 events in the dataset of D31, the
majority of which are local or less influential compared to
those in D1− D30. The tool SELFIS requires that a time series
should have a minimum length of 64 -- in our case, since we
count the number of tweets posted every minute, this means
the event needs to last for at least 64 minutes (suggested by
the collected data). However, quite a number of events in D31
do not meet this requirement, and hence are not considered. In
addition, we also remove events that have less than 50 tweets,
or whose time series have a maximum value of less than 10 --
never did 10 or more tweets get posted about the event within
one minute. Finally, 62 events satisfy all three requirements,
and the estimates of the Hurst parameter for the corresponding
time series are shown in Fig. 2.
As can be seen from the figure, five out of the 186 estimates
are below 0.5. We believe that these outliers can be due to a
lack of data for the five events: three of the time series have
only 64 data points, while the other two have 128. For all
events the length of whose time series is equal to or larger
than 256, the estimates are all within the rage of 0.5 and 1.
We also calculate the Hurst parameter for the time series
of the whole dataset of D31, since the majority of the 120
million tweets are not associated with the 506 events, and the
estimates are also between 0.5 and 1.
C. Self-similarity in D32 & D33
We further test self-similarity in the datasets of geo-tagged
tweets collected from New York and Melbourne. The statistics
in Table I suggest that the time series generated from these
two datasets also show self-similarity. Specifically, we not only
check the overall case (level 0), but also zoom into sub-regions
by recursively dividing the area into four equal parts (levels 1
(a) All tweets.
(b) Tweets with a location label.
(c) Local tweets (tweets close to where the event occurred),
i.e., for the events of (1) Boston marathon bombing, (2)
Ferguson unrest, (4) Ottawa shooting, (5) Sydney siege, (6)
Charlie Hebdo shooting, (7) Germanwings crash, (8) Paris
attacks, (9) Brussels airport explosion, (10) Cyprus hijacked
plane and (11) Lahore blast, only the tweets from Mas-
sachusetts, Ferguson, Ottawa, Sydney, Paris, France, Paris,
Brussels, Cyprus, Lahore or Punjab are counted.
Fig. 1: Hurst parameter estimates for D1 − D30. Events: 1.
Boston marathon bombing; 2. Ferguson unrest; 3. Gaza under
attack; 4. Ottawa shooting; 5. Sydney siege; 6. Charlie Hebdo
shooting; 7. Germanwings crash; 8. Paris attacks; 9. Brussels
airport explosion; 10. Cyprus hijacked plane; 11. Lahore blast;
12. Euro 2012; 13. Ebola outbreak; 14. Hong Kong protests;
15. Refugee Welcome; 16. Panama papers; 17. Hurricane
Sandy; 18. Typhoon Hagupit; 19. Hurricane Patricia; 20. Nepal
Earthquake; 21. Sismo Ecuador; 22. Mexican election 2012;
23. Obama and Romney 2012; 24. Superbowl 2012; 25. SXSW
2012; 26. US election 2012; 27. Indyref 2014; 28. St. Patrick's
Day 2014; 29. Brexit; 30. Irish election 2016.
to 3). The results indicate that in the city and all sub-region
levels, their corresponding time series are self-similar. Table I
lists part of the statistics.
51015202530Dataset Id (D1-30)00.20.40.60.81Hurst parametery = 0.5Aggregate VarianceR/SWhittle51015202530Dataset Id (D1-30)00.20.40.60.81Hurst parametery = 0.5Aggregate VarianceR/SWhittleBoston linebombingFerguson unrestOttawa shootingSydney linesiegeCharlie hebdoshootingGermanwinscrashParis attacksBrussels airportexplosionCyprus hijackedplaneLahore lineblast00.20.40.60.81Hurst parametery = 0.5Aggregate VarianceR/SWhittleFig. 2: Hurst parameter estimates for D31. Out of the 506
events, 62 of them meet all the three requirements: (1) lasting
for a minimum of 64 minutes, (2) having at least 50 tweets, and
(3) the maximum value in the time series is not smaller than
10. For a detailed description of the events, please refer [16].
TABLE I: Hurst parameter estimates for D32 − D33. Level 0:
the whole area; Level 1: dividing the whole city into four equal
sub-regions: 1-1, 1-2, 1-3, 1-4; Level 2: dividing sub-region
1-1 into four equal parts: 2-1, 2-2, 2-3, 2-4; Level 3: dividing
sub-region 2-1 into four equal parts: 3-1, 3-2, 3-3, 3-4.
(a) Tweets with a location label. For Events 12 (Euro 2012),
23 (Obama and Romney), 24 (Superbowl 2012), 25 (SXSW
2012), 26 (US election) and 28 (St. Patrick's Day 2014), the
original p-values of 0.0 are replaced with 0.001, in order for
them to be plotted.
Level
0
1: 1-1
1: 1-2
1: 1-3
1: 1-4
2: 2-1
2: 2-2
2: 2-3
2: 2-4
3: 3-1
3: 3-2
3: 3-3
3: 3-4
0.68
0.90
0.90
0.92
0.90
0.88
0.90
0.90
0.89
0.85
0.86
0.84
0.87
D32: New York
D33: Melbourne
Aggregate
Variance
Aggregate
Variance
R/S Whittle
0.68
0.78
0.80
0.80
0.79
0.80
0.81
0.82
0.82
0.82
0.82
0.84
0.82
0.97
0.89
0.84
0.84
0.87
0.85
0.82
0.77
0.79
0.82
0.77
0.71
0.75
R/S Whittle
0.75
0.72
0.72
0.66
0.67
0.70
0.71
0.66
0.65
0.67
0.68
0.65
0.59
0.60
0.57
0.57
0.55
0.56
0.56
0.56
0.55
0.55
0.55
0.55
0.56
0.54
0.90
0.87
0.87
0.79
0.82
0.85
0.85
0.77
0.78
0.81
0.80
0.76
0.72
In summary, our results in this section demonstrate that self-
similarity widely exists in different types of Twitter datasets,
in terms of the number of tweets posted every minute. This
conclusion can be extended to different time intervals due to
the self-similarity. For example, for D32 & D33, since each
tweet's exact publication time (to the precision of a second) is
known, we also check the time series of the number of tweets
posted every 10 and 100 seconds, and the results also indicate
self-similarity.
IV. EXISTENCE OF POWER-LAW DISTRIBUTION IN EVENT
TWEET STREAMS
In this section, we first examine whether the generated time
series from Twitter datasets follow a power-law distribution. If
this is the case, it explains self-similarity -- a time series that
follows a power-law distribution is also self-similar. Second,
we reveal an important finding that when an event occurs it
is much more likely to observe a power-law distribution in
the tweet stream, compared with when no event occurs. This
(b) Local tweets (tweets with a location label that is close to
where the event occurred) only.
Fig. 3: P-values of the significance test for D1 − D30. A p-
value of less than 0.05 indicates that the power-law hypothesis
should be rejected.
finding suggests that the existence of a power-law distribution
can be used to help event detection from tweet streams.
Recall that in order to test the power-law hypothesis, we fol-
low the approach introduced in Section II: run the significance
test, calculate the p-value for the fitted power-law model, and
reject the hypothesis if the p-value is smaller than 0.05.
A. Power-law Distribution in D1 − D30
We still start with the 30 datasets of real-world events
(D1 − D30). However, we only check the existence of power-
law distribution for tweets with a location label, which are
useful in local event detection.
Fig. 3 shows the p-values for the time series of (1) the
tweets with a location label (Fig. 3a), and (2) the tweets that
are close to where the 10 short-term and unplanned outbursts
have occurred (Fig. 3b). We can see that in the first case, 24
out of 30 time series pass the significance test, while in the
second case, all the 10 time series are with a p-value larger
than 0.05. This indicates that when an event occurs, there is
high probability that a power-law distribution can be detected
in the geo-tagged tweet stream from the surrounding areas.
B. Power-law Distribution in D31
We continue the test of a power-law distribution for the
dataset D31 of over 500 events to further verify the above
123456789111214151617182022232527293031323536373941454649515253545657596061626364667185919296113119146 157 177 178 188 426 440 475 481Event ID00.20.40.60.81Hurst parametery = 0.5 Aggregate Variance R/S Whittle51015202530Event ID10-310-210-1100p-valuey = 0.05Boston linebombingFerguson unrestOttawa shootingSydney linesiegeCharlie hebdoshootingGermanwinscrashParis attacksBrussels airportexplosionCyprus hijackedplaneLahore lineblast10-210-1100p-valuey = 0.05TABLE II: Percentage of test windows where a power-law
distribution can be observed at different spatial scales in the
datasets of D32 − D33.
D32: New York D33: Melbourne
Level 0: overall
Level 1: sub-region 1-1
Level 1: sub-region 1-2
Level 1: sub-region 1-3
Level 1: sub-region 1-4
Level 2: sub-region 2-1
Level 2: sub-region 2-2
Level 2: sub-region 2-3
Level 2: sub-region 2-4
Level 3: sub-region 3-1
Level 3: sub-region 3-2
Level 3: sub-region 3-3
Level 3: sub-region 3-4
48.1
17.1
10.7
12.2
14.0
11.4
7.0
17.1
11.8
10.8
9.9
21.2
10.6
5.2
0.2
0.6
0.0
0.0
0.1
0.2
0.0
0.0
0.1
0.0
0.0
0.0
dataset, and run the significance test on the corresponding time
series. The results are listed in Table II. We believe the high
percentage for D32 (New York) at Level 0 is because there
are significantly more tweets in this dataset, which contains
too much noise and leads to false positives. In fact, as can be
seen in Table II, if we zoom into a sub-region of New York,
and generate the time series by counting the tweets only from
there, the percentage decreases quickly.
The above experimental results suggest that for a collected
set of tweets, if a considerable portion of them are about
a certain event, then a power-law distribution is likely to
be observed in the corresponding time series. Therefore, we
propose to use the existence of a power-law distribution to
help detect or verify events from geo-tagged tweet streams. In
the next section, we test this idea by building a simple event
detection algorithm that ignores the content of a tweet, but
only counts the number of tweets posted during a short time
period at different geographic scales, and checks whether it
follows a power distribution.
V. APPLICATION IN EVENT DETECTION
This section aims to apply the previous finding of the
correlation between the occurrence of an event and a power-
law distribution in tweet streams for event detection. We
first propose an algorithm Power-law basic and show that by
checking power-law distributions alone, it can achieve com-
parable results to more complex algorithms that use semantic
analysis in addition to spatial clustering, e.g., Geoburst [7],
a popular state-of-the-art event detection algorithm. Then we
integrate semantic analysis with power-law verification, and
show that this improved version, Power-law advanced, can
achieve significantly better performance.
Fig. 4: P-values of the significance test for D31. For Events
1, 8, 22, 45 and 52, the original p-values of 0.0 are replaced
with 0.001, in order for them to be shown in the figure.
finding. Note that we only examine the tweets associated with
an event according to the provided ground truth. In addition,
although most of the tweets in D31 do not have a location
label, the majority of the events are regional, and hence it is
likely that most of the tweets are posted close to where the
events have occurred.
As can be seen from Fig. 4, 52 out of the 62 time series pass
the significance test. The above statistics in Figs. 3-4 indicate
that when an event happens, it is likely that the time series
corresponding to the geo-tagged tweets from surrounding
areas follows a power-law distribution, and hence exhibits
self-similarity.
Up till now, we have only considered tweets of certain
events. However, can a power-law distribution be observed as
well when no event occurs (i.e., false positives)? In order to an-
swer this question, we randomly extract 100 two-hour intervals
from all tweets with a location label, remove those tweets that
are associated with any of the 506 events, and check whether
a power-law distribution can be detected within the 100 time
series corresponding to the remaining tweets, where each time
series counts the number of tweets posted every minute during
the two-hour interval. The result shows that only 21 of the
time series follow a power-law distribution -- the percentage is
much lower than when an event occurs.
Finally, we consider the overall case where all tweets are
mixed together, no matter if they are associated with any event
or not, and check whether a power-law distribution can be
detected to further examine the probability of false positives.
Specifically, we extract 1000 two-hour intervals (potentially
with overlap) randomly from all tweets with a location label,
and then validate the existence of a power-law distribution in
the generated time series. In this case, 25.0% of them pass
the significance test, which is also obviously lower than the
percentage when an event occurs.
C. Power-law Distribution in D32 & D33
In order to verify the last observation in the above subsec-
tion, i.e., the overall case, we further test datasets D32 & D33,
both of which include all geo-tagged tweets from a certain
area, not just specific to any events. We take the same approach
by randomly selecting 1000 two-hour windows from each
A. Power-law Basic: Power-law based Multi-scale Spatial
Event Detection
We start with a brief problem definition of event detec-
tion from tweet streams. For a certain region R, given a
stream of tweets T = {t1, t2, ..., tn} and a query window
W = {tn−m+1, tn−m+2, ..., tn} (m is the number of tweets in W)
123456789111214151617182022232527293031323536373941454649515253545657596061626364667185919296113119146157177178188426440475481Event ID10-310-210-1100P-valuey = 0.05that represents currently observed tweets, the aim is to identify
a set of tweets Ti ⊆ W that are associated with an event as
close to where and when the event occurs as possible.
To solve the above problem, we propose to create a Quad-
tree (QT) for each W, the root of which represents the whole
region R. If m exceeds the predefined threshold ms, QT
divides R into four equally sized sub-regions, and the process
continues until the number of tweets in each leaf node is
not larger than the threshold, or the depth of QT reaches the
maximum value, i.e., the size of a sub-region has to be larger
than a certain value. Once the Quad-tree is built, the detection
will be run at all levels, which mitigates the impact of the
arbitrary division of space.
As shown in Algorithm 1, we check for the existence of a
power-law distribution in each node of QT: for a node N, (1)
collect tweets from all children nodes recursively (note that
once a node is divided, it does not hold any tweet itself, as all
its tweets are moved to one of the four child nodes); (2) divide
the query window into multiple time intervals of d seconds,
and count the number of tweets posted in each interval to
generate the time series S (here d does not need to be 60 as
in our previous experiments, e.g., a time series of tweets posted
every 30 seconds should still follow a power-law distribution);
(3) fit a power-law model to S; (4) run the significance test
and calculate the p-value; (5) reject the power-law hypothesis
if the p-value is less than 0.05, otherwise create a new event
with all the tweets and append it to the final result; (6) repeat
(1)-(5) for each child node at the lower levels, so that an event
can be detected as close to where it happens as possible.
1) Delay in the Validation of a Power-law Distribution:
An important question is: how many data points need to be
observed (nmin), i.e., the minimum length of the time series,
or the delay, to verify a power-law distribution? The answer
impacts two important parameters in the above algorithm: the
length of the query window, l (in seconds; l is different from
m, which is the number of tweets in a query window), and the
length of the time interval, d (in seconds), since nmin = l/d.
For example, if nmin = 100 and l = 600, then in order to
obtain 100 data points from each query window, the algorithm
divides the window into 100 intervals, i.e., counts the number
of tweets posted every 6 seconds.
Our experiments on datasets D1 − D31 suggest that when
l and d are chosen properly, so that
the majority of the
elements in the time series are above zero, then the power-
law distribution can be verified using the first 60 data points,
i.e., nmin = 60. Normally, a larger value of nmin contributes
to a lower false positive rate, but too large a value causes
few events to be found, which decreases the precision. In the
following experiments, we set 60 ≤ nmin ≤ 300 and 1200 ≤
l ≤ 3600. A more detailed sensitivity analysis is given in the
next subsection.
B. Experimental Verification
In order to demonstrate the performance of Algorithm 1,
we have tested it against Geoburst on three datasets (we did
15
16
17
18
19
20
21
22
Algorithm 1: Power-law basic: power-law based multi-
scale spatial event detection
Input
: Geo-tagged tweets in the query window, W;
Maximum depth of the Quad-tree (QT), D;
Threshold for splitting a node in QT, ms;
Length of the query window, l;
Time interval to count tweets, d (seconds)
Output : Event list, E
Create an empty Quad-tree QT;
for tweet t in W do
1 Phase 1: Build Quad-tree
2
3
4
5
if child nodes != NULL then
Insert t into one of the child nodes based on
t's coordinates;
6
7
8
9
10
else if the number of tweets in the current node
≥ ms && QT's depth < D then
Split the current node into four nodes;
Move all tweets including t into one of the
four child nodes according to the
coordinates;
else
Insert t into the current node;
for node N in QT do
11 Phase 2: Multi-scale spatial event detection f(N, l)
12
13
14
Collect tweets from all children nodes recursively;
Generate the time series S: divide l into multiple
intervals of d seconds and count the number of
tweets posted during each interval;
Fit a power-law model to S;
Run the significance test, and calculate the
p-value for the fitted model;
if p-value < 0.05 then
Reject the power-law hypothesis;
else
Create a new event, append all tweets from
children nodes to it, and insert it to E;
// Detect events at lower levels recursively
for N(cid:48) in child nodes do
E .add( f (N(cid:48), l))
23 return E
not choose the improved versions of Geoburst+ [8] and Tri-
oVecEvent [9] because they use supervised approaches, while
both Geoburst and our method use unsupervised approaches.
In addition, the purpose here is just a proof of concept that
power-law verification can be used for event detection):
• All geo-tagged tweets from Melbourne in Jan 2017, with
a size of 23.3K;
• All geo-tagged tweets from Los Angeles between 9
February and 22 February 2019, with a size of 13.2K;
• All geo-tagged tweets from Sydney between 12 February
and 5 April 2019, with a size of 28.4K.
These three datasets have different levels of event density:
Melbourne > LA > Sydney, and we intend to check the
performance of our method in all these settings. Specifically,
the Melbourne dataset contains the event of "Melbourne car
attack" [18], which is the type of event that we are most
interested in detecting.
The reason why we do not use D31, although it provides the
ground truth, is the lack of accurate location information and
publication time: the location is normally a city/town name,
and the publication time only has a precision of a minute. As
a result, in order to generate a time series with a minimum
length of 60, it is necessary to collect tweets for 60 minutes,
and since the Quad-tree cannot divide the root node due to the
missing coordinates, the algorithm always needs to check the
power-law distribution at level 0 against hundreds of thousands
of tweets from worldwide, which contains too much noise.
1) Quantitative Analysis: Depending on the density of the
data, the parameters are chosen as follows to ensure that there
are an appropriate number of tweets in each query window,
and sufficient elements in the generated time series are above
zero: (1) for the dataset collected from Melbourne, each query
window is set to 30 minutes, i.e., l = 1800, nmin is set to
80, and ms = 15; (2) for the dataset collected from LA, l =
1200, nmin = 150, and ms = 50; (3) for the dataset collected
from Sydney, l = 3600, nmin = 100, and ms = 50. To make
the results comparable, we set the query window to be of
the same length for Geoburst, and all other parameters take
the default values in the code shared by the author. For each
of the three datasets, we run both algorithms on consecutive
query windows covering the whole period. For example, the
Melbourne dataset lasts 31 days, so there are 31×48 = 1488
query windows.
Fig. 5 presents the performance comparison between the
two algorithms, which suggests that even though Power-law
basic does not check the content of each tweet, it achieves
comparable performance with Geoburst,
in terms of both
precision and recall. Note that since the ground truth of the
three datasets are not given, it is difficult to calculate the
true recall. Therefore, we adopt a similar approach as in [8],
[9] and calculate the pseudo recall = Ntrue/Ntot al, where
Ntrue is the number of true events detected by a method, and
Ntot al is the number of true events detected by all methods,
plus the events hand-picked by us that occurred during the
query periods within the chosen cities, including festivals,
sport games, natural disasters, etc. Note also that the validity
of each event is checked manually.
However, we are not claiming that it is sufficient to detect
events just by checking the existence of a power-law distribu-
tion, and we further improve the algorithm in Section V-C.
Sensitivity analysis on nmin. Fig. 6 shows how nmin im-
pacts the number of different events detected and the precision
for the dataset of Melbourne, when l is set to 30 minutes and
ms = 15. As nmin first increases, both the reported events and
false positives decrease, and the false positive count decreases
(a) Precision.
(b) Recall.
Fig. 5: Performance comparison of the three event detection
algorithms.
Fig. 6: Sensitivity analysis on nmin for the Melbourne dataset.
The length of the query window l is set to 30 minutes, so
nmin = 60, 80, 90, 100, 120, 150 corresponds to counting the
number of tweets every 30, 22.5, 20, 18, 15, 12 seconds.
faster, so the precision improves. However, as nmin gets too
large, i.e., counting the number of tweets too frequently, too
many elements of the generated time series become zero,
causing too few events to be detected, and the precision drops.
Sensitivity analysis on ms. We further analyse the impact
of ms. Specifically, Fig. 7 shows for the dataset of Melbourne,
when l = 1800 and nmin = 80, how the number of different
events detected and the total detection time change with ms.
A small ms value means a larger depth of the Quad-tree, and
since the detection is running at each node, the total detection
time will be longer, but meanwhile more events are likely to
be found.
MelbourneLos AngelesSydney00.20.40.60.81Precision Power-law basic Geoburst Power-law advancedMelbourneLos AngelesSydney00.20.40.60.81Recall Power-law basic Geoburst Power-law advanced60 80 90 100120150nmin24681012No. of different events detected0.50.60.70.80.9PrecisionNo. of different events detectedPrecisionFig. 7: Sensitivity analysis on ms for the Melbourne dataset.
The length of the query window l is set to 1800 (30 minutes),
and nmin is set to 80.
C. Power-law Advanced: Combining Semantic Analysis with
Power-law Verification
In order to further improve the performance of the proposed
method, we investigate how semantic information can be
incorporated to the event detection algorithm.
A common class of existing methods that use semantic
information is clustering based approaches, where the first step
is to cluster posts/tweets according to their semantic, spatial,
temporal, frequency information, etc., and then generate a list
of event candidates. Once the candidates are found, the second
step is to remove non-event clusters among them. Our finding
in this paper suggests that checking the existence of a power-
law distribution can be used in the second step to test whether
a cluster of tweets are about a real event or not.
In order to demonstrate the feasibility of the above ap-
proach, we design an algorithm Power-law Advanced that
combines fastText (the latest word embedding tool developed
by Facebook) [19], BIRCH (Balanced Iterative Reducing and
Clustering using Hierarchies) [20], and power-law verification,
where fastText is for embedding the tweets so that semantically
similar tweets would also end up close in the vector space,
and BIRCH is for clustering the generated vectors. These two
methods are chosen for demonstration purposes only, and they
can be replaced by other alternatives.
In addition, sliding windows are used: the algorithm keeps
the latest NSW query windows, performs event detection, and
discards the oldest window while collecting new tweets. In the
following experiment, NSW is set to 6, and the size of a query
window is set to 30 minutes.
Specifically, the algorithm (Algorithm 2: Power-law Ad-
vanced) works as described below (also see Fig. 8 for an
illustration):
• Embedding. The same NLP tool [21] as mentioned in
[7] is used to extract entities and noun phrases from
the tweets. These generated keywords are then embedded
with the fastText algorithm, and each tweet is represented
by the average value of the vectors from all its keywords.
A pre-trained fastText model is used in our experiment,
and it is re-trained incrementally with the new tweets [22].
The re-training is done in parallel, and hence does not
delay the detection. Note that the spatial and temporal
Fig. 8: An illustration of Power-law Advanced.
information is not included in the embedding since the
Quad-tree and sliding windows ensure the similarity in
terms of space and time.
• Clustering. Once the tweets are embedded into vectors,
we use the BIRCH algorithm to cluster the vectors. The
most important parameter in BIRCH is the threshold of
the cluster radius. In our experiment we do not directly
set a fixed value. Instead, we start with a value close to
zero, and increase it by a small step size until either (1)
less than 5% of all items are in small clusters, i.e., clusters
with a size less than 10, or (2) over half of the items are
in the largest cluster, whichever occurs first.
• Power-law detection. The third step is to detect any
power-law distribution within each cluster. Note that a
Quad-tree is still built and maintained, and the detection
is run at all levels of the Quad-tree to mitigate the impact
of the arbitrary division of space.
• Verification. If any event candidate is found in the last
step, we further collect tweets from the verification win-
dow which is set to 5 minutes in our experiment, and
repeat the above three steps. The only difference is that
the keywords are no longer used, and the original text
of each tweet is directly embedded -- the rationale is to
ensure that both the keywords and texts are semantically
close within a cluster. Each event candidate from the last
step is then checked against each cluster found in this
step. If any two of them share more than half of the
tweets, they are considered as a match. If no match is
found for a candidate, it will be removed. The verification
process is done three times, and an event candidate has
to pass all three of them.
• Final clean-up. To further decrease the false positive
rate, the last step extracts the top X(= 10) hashtags and
mentions for each cluster, and if more than half of the
tweets contain any of these hashtags or mentions, the
cluster is finally considered as an event.
We test the above algorithm on the same three datasets,
and as can be seen in Fig. 5, this semantic analysis enhanced
power-law verification method increases both the precision and
the recall in most cases.
101520304050ms56789No. of different events detected891011121314Total detection time (s)No. of different events detectedTotal detection timeSliding windowsCurrent query window3 verification windowsClusterClusterMatchMatchEvent candidates found within the sliding windowsEvent candidates found after adding verification windowsAlgorithm 2: Power-law advanced: integrating power-law
verification with semantic analysis
: same as Power-law basic
Input
Output : Event list, E
1 Extract entities and noun phrases using the NLP tool [21]
for each tweet;
E .add(Power-law basic(·));
2 Call fastText to embed the extracted keywords;
3 Cluster the generated vectors using BIRCH;
4 for Cluster c found in the last step do
5
6 for i = 0; i < 3 && E is not NULL do
7
8
9
10
Call fastText to directly embed the text of each tweet;
Cluster the generated vectors using BIRCH;
for Cluster c(cid:48) found in the last step do
E(cid:48).add(Power-law basic(·));
Remove e;
for Remaining event candidate e ∈ E do
if there is no match in E(cid:48) then
11
12
13
14 for Remaining event candidate e ∈ E do
15
16
K ← Extract the top X(= 10) hashtags and mentions;
if More than half of the tweets in e does not contain
any element in K then
17
Remove e;
18 return E
In summary, this section has demonstrated that the naive
algorithm of checking the existence of a power-law distribution
can achieve comparable results against more advanced event
detection methods, and its performance can be significantly
improved by integrating with semantic analysis.
VI. RELATED WORK
This section briefly reviews the previous work on event
detection from social media. Specifically, we take a similar
approach as [23] and summarise two types of algorithms:
clustering based and anomaly based. In addition, multiscale
event detection is also considered.
A. Clustering based Event Detection
This type of detection method takes into consideration all
or a subset of temporal, spatial, semantic, frequency and user
information to cluster the tweets [7] -- [9], [24] -- [31]. However,
since the generated clusters may correspond to non-events,
normally another step is taken to eliminate false positives, e.g.,
by ranking the candidates based on certain criteria, or training
a classifier to decide whether a candidate is a real event.
For example, for each pair of tweets, Geoburst [7] uses the
Epanechnikov kernel to calculate their geographical impact,
and uses the random-walk-with-restart algorithm to to obtain
the semantic impact. In this way, they identify a list of clusters
of geographically close and semantically coherent tweets, i.e.,
event candidates. Finally, historical activities are used to rank
these candidates and the top K events are returned. As the
improved versions, (1) Geoburst+ [8] replaces the ranking
algorithm in Geoburst with a candidate classification module,
which learns the latent embeddings of tweets and keywords.
Then together with the activity timeline, the module extracts
spatial unusualness and temporal burstiness to characterise
each candidate event; (2) TrioVecEvent [9] learns multimodal
embeddings of the location, time and text, and then performs
online clustering using a Bayesian mixture model.
B. Anomaly based Event Detection
This type of method aims to identify abnormal observations
in word usage, spatial activity, sentiment
levels, etc. For
example, Valkanas and Gunopulos [32], [33] use sentiment
analysis for event detection, which is based on the idea that
the sentiment level fluctuates as people respond to an event to
express their opinions. Another example is to detect peaks in
Twitter hashtags using a Discrete Wavelet Transformation [34],
since these peaks are likely to correspond to real-world events.
Specifically, only the hashtags are used, and all the remaining
tweet
is discarded. In addition, Vavliakis et al. [35]
propose Latent Dirichlet Allocation based event detection for
MediaEval Benchmark 2012 [36], where the dataset contains
167,000 images from Flickr. They detect peaks in the number
of photos assigned to each topic, and identify an event for a
topic if it receives an unexpectedly high number of photos.
text
C. Multiscale Event Detection
Running event detection on a fixed spatial resolution may
not help in finding events at different scales. For example,
using low resolution spatial data might only capture events
occurring on the state or the country level, while high res-
olution data can help detect events at community or city
scales. Therefore, another stream of work intends to detect
events at different space resolutions, to better adapt to the
unpredictability of real-life events [37] -- [39]. For example,
Dong et al. [37] explore the properties of the wavelet transform
for the detection of events at different spatio-temporal scales.
In addition, Visheratin et al. [39] build a convolutional quad-
tree, which instead of dividing a region into four sub-regions
of equal size, uses a convolutional neural network to decide a
more appropriate division.
VII. CONCLUSIONS AND FUTURE WORK
In this paper, we have (1) verified in more than 30 datasets
the existence of self-similarity in the time series of the number
of geo-tagged tweets posted within a short
time interval
from a certain region; (2) demonstrated that a power-law
distribution is much more likely to be observed when an event
occurs in tweet streams; (3) proposed two event detection
algorithms: Power-law basic and Power-law advanced. Power-
law basic is based on the validation of power-law distributions
at multi-spatial scales, without checking the content of each
tweet, or using any information other than the geo-location.
Experimental results on multiple datasets show that it can
achieve comparable performance with Geoburst, a widely
cited event detection algorithm. Power-law advanced improves
the algorithm by incorporating semantic analysis via word
embedding, and our results demonstrate that it can significantly
increase both the precision and the recall.
For future work, we will further study the self-similar
patterns in tweet streams. Our current result explains why
when an event occurs the corresponding time series shows
self-similarity -- it follows a power-law distribution. However,
we have not examined why the tweet count time series still
exhibits self-similarity when there is no event.
In addition, as a separate direction, we will explore other
potential ways for embedding and clustering to futher improve
the performance of the event detection algorithm. Specifically,
in terms of embedding, we are considering (1) dispensing with
the Quad-tree and directly embed the location information;
(2) representing a tweet using other methods rather than the
average value of the vectors for each word that it contains.
ACKNOWLEDGEMENT
This research is funded in part by the Defence Science and
Technology Group, Edinburgh, South Australia, under contract
MyIP:7293.
REFERENCES
[1] M. Crovella and A. Bestavros, "Explaining world wide web traffic self-
similarity," Boston University, Tech. Rep., 1995.
[2] W. Willinger, M. S. Taqqu, W. E. Leland, and D. V. Wilson, "Self-
similarity in high-speed packet traffic: Analysis and modeling of ethernet
traffic measurements," Statistical Science, vol. 10, 1995.
[3] T. Karagiannis and M. Faloutsos, "SELFIS: A tool for self-similarity
and long-range dependence analysis," in 1st Workshop on Fractals and
Self-Similarity in Data Mining: Issues and Approaches (IN KDD), 2002.
[4] T. Karagiannis, M. Faloutsos, and M. Molle, "A user-friendly self-
similarity analysis tool," SIGCOMM Comput. Commun. Rev., vol. 33,
no. 3, pp. 81 -- 93, 2003.
[5] R. A. Finkel and J. L. Bentley, "Quad trees a data structure for retrieval
on composite keys," Acta Inf., vol. 4, no. 1, pp. 1 -- 9, 1974.
[6] H. Samet, "The quadtree and related hierarchical data structures," ACM
Comput. Surv., vol. 16, no. 2, pp. 187 -- 260, 1984.
[7] C. Zhang, G. Zhou, Q. Yuan, H. Zhuang, Y. Zheng, L. Kaplan, S. Wang,
and J. Han, "GeoBurst: Real-time local event detection in geo-tagged
tweet streams," in Proceedings of SIGIR. ACM, 2016, pp. 513 -- 522.
[8] C. Zhang, D. Lei, Q. Yuan, H. Zhuang, L. Kaplan, S. Wang, and J. Han,
"GeoBurst+: Effective and real-time local event detection in geo-tagged
tweet streams," ACM Trans. Intell. Syst. Technol., vol. 9, no. 3, pp.
34:1 -- 34:24, 2018.
[9] C. Zhang, L. Liu, D. Lei, Q. Yuan, H. Zhuang, T. Hanratty, and J. Han,
"TrioVecEvent: Embedding-based online local event detection in geo-
tagged tweet streams," in Proceedings of
the 23rd ACM SIGKDD.
ACM, 2017, pp. 595 -- 604.
[10] H. Hurst and A. S. of Civil Engineers Hydraulics Division,
Long-term Storage Capacity of Reservoirs. American Society of
Civil Engineers, 1950. [Online]. Available: https://books.google.com.
au/books?id=aKj4HAAACAAJ
[11] H. Hurst, R. Black, and Y. Simaika, Long-term storage: an
[Online]. Available: https:
experimental study.
//books.google.ru/books?id=7QgSMwEACAAJ
Constable, 1965.
[12] A. Clauset, C. R. Shalizi, and M. E. J. Newman, "Power-law distri-
butions in empirical data," SIAM Review, vol. 51, no. 4, pp. 661 -- 703,
2009.
[13] Y. Virkar and A. Clauset, "Power-law distributions in binned empirical
data," The Annals of Applied Statistics, vol. 8, no. 1, pp. 89 -- 119, 2014.
[14] W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery,
Numerical Recipes 3rd Edition: The Art of Scientific Computing. Cam-
bridge University Press, 2007.
[15] A. Zubiaga, "A longitudinal assessment of the persistence of twitter
datasets," Journal of the Association for Information Science and Tech-
nology, vol. 69, no. 8, pp. 974 -- 984, 2018.
[16] A. J. McMinn, Y. Moshfeghi, and J. M. Jose, "Building a large-scale
corpus for evaluating event detection on twitter," in Proceedings of the
22nd ACM CIKM. ACM, 2013, pp. 409 -- 418.
[17] P.
Symeon,
"Twitter-dataset-collector,"
https://github.com/socialsensor/twitter-dataset-collector, 2019.
[18] "January
Available:
Melbourne car attack&oldid=894478928
[Online].
https://en.wikipedia.org/w/index.php?title=January 2017
2017 melbourne
attack,"
2019.
[19] P. Bojanowski, E. Grave, A. Joulin, and T. Mikolov, "Enriching word
car
vectors with subword information," arXiv:1607.04606 [cs], 2016.
[20] T. Zhang, R. Ramakrishnan, and M. Livny, "BIRCH: An efficient data
clustering method for very large databases," in Proceedings of ACM
SIGMOD '96. ACM, 1996, pp. 103 -- 114, montreal, Canada.
[21] A. Ritter,
"Twitter NLP tools.
to aritter/twitter nlp
development by creating an account on GitHub," 2011. [Online].
Available: https://github.com/aritter/twitter nlp
contribute
[22] QinLuo, "Library for
fast
ericxsun/fastText,"
ericxsun/fastText
2019.
text
representation and classification.:
https://github.com/
[Online]. Available:
[23] N. Panagiotou, I. Katakis, and D. Gunopulos, "Detecting events in
online social networks: Definitions, trends and challenges," in Solving
Large Scale Learning Tasks. Challenges and Algorithms.
Springer
International Publishing, 2016, pp. 42 -- 84.
[24] H. Becker, M. Naaman, and L. Gravano, "Beyond trending topics: Real-
world event identification on twitter," in ICWSM 2011, 2011.
[25] R. Li, K. H. Lei, R. Khadiwala, and K. C.-C. Chang, "TEDAS: A twitter-
based event detection and analysis system," in Proceedings of the 28th
IEEE ICDE.
IEEE Computer Society, 2012, pp. 1273 -- 1276.
[26] O. Ozdikis, P. Senkul, and H. Oguztzn, "Semantic expansion of tweet
contents for enhanced event detection in twitter," in ASONAM, 2012,
pp. 20 -- 24.
[27] H. Abdelhaq, C. Sengstock, and M. Gertz, "EvenTweet: Online localized
event detection from twitter," Proc. VLDB Endow., vol. 6, no. 12, pp.
1326 -- 1329, 2013.
[28] G. Fuchs, N. Andrienko, G. Andrienko, S. Bothe, and H. Stange,
"Tracing the german centennial flood in the stream of tweets: First
lessons learned," in Proceedings of GEOCROWD '13. ACM, 2013,
pp. 31 -- 38.
[29] M. Walther and M. Kaisser, "Geo-spatial event detection in the twitter
stream," in Advances in Information Retrieval. Springer Berlin Heidel-
berg, 2013.
[30] W. Xie, F. Zhu, J. Jiang, E. Lim, and K. Wang, "TopicSketch: Real-time
bursty topic detection from twitter," IEEE Transactions on Knowledge
and Data Engineering, vol. 28, no. 8, pp. 2216 -- 2229, 2016.
[31] H. Wei, H. Zhou, J. Sankaranarayanan, S. Sengupta, and H. Samet, "De-
tecting latest local events from geotagged tweet streams," in Proceedings
of the 26th ACM SIGSPATIAL. ACM, 2018, pp. 520 -- 523.
[32] G. Valkanas and D. Gunopulos, "Event detection from social media
data," IEEE Data Eng. Bull., vol. 36, no. 3, pp. 51 -- 58, 2013. [Online].
Available: http://sites.computer.org/debull/A13sept/p51.pdf
[33] -- -- , "How the live web feels about events," in Proceedings of the 22nd
ACM CIKM. ACM, 2013, pp. 639 -- 648.
[34] M. Cordeiro and R. Frias, "Twitter event detection: combining wavelet
analysis and topic inference summarization," in Doctoral Symposium on
Informatics Engineering, DSIE, 2011.
[35] K. N. Vavliakis, F. A. Tzima, and P. A. Mitkas, "Event detection via
LDA for the MediaEval2012 SED task," in MediaEval, 2012.
[36] (2019) MediaEval
2012.
[Online].
Available:
http://www.
multimediaeval.org/mediaeval2012/
[37] X. Dong, D. Mavroeidis, F. Calabrese, and P. Frossard, "Multiscale event
detection in social media," Data Min. Knowl. Discov., vol. 29, no. 5, pp.
1374 -- 1405, 2015.
[38] J. Capdevila, G. Pericacho, J. Torres, and J. Cerquides, "Scaling
DBSCAN-like algorithms for event detection systems in twitter," in
Algorithms and Architectures for Parallel Processing.
Springer In-
ternational Publishing, 2016, pp. 356 -- 373.
[39] A. A. Visheratin, K. D. Mukhina, A. K. Visheratina, D. Nasonov, and
A. V. Boukhanovsky, "Multiscale event detection using convolutional
quadtrees and adaptive geogrids," in Proceedings of LENS '18. ACM,
2018, pp. 1 -- 10.
|
1809.03648 | 2 | 1809 | 2019-09-09T05:36:33 | Who Started It? Identifying Root Sources in Textual Conversation Threads | [
"cs.SI"
] | In textual conversation threads, as found on many popular social media platforms, each particular user text comment either originates a new thread of discussion, or replies to a previous comment. An individual who makes an original comment ---termed as the "root source''---is a topic initiator or even an information source, and identifying such individuals is of particular interest. The reply structure of comments is not always available (e.g. in the proliferation of a news event), and thus identifying root sources is a nontrivial task. In this paper, we develop a generative model based on marked multivariate Hawkes processes, and introduce a novel concept, "root source probability", to quantify the uncertainty in attributing possible root sources to each comment. A dynamic-programming-based algorithm is then derived to efficiently compute root source probabilities. Experiments on synthetic and real-world data show that our method identifies root sources that match ground truth and human intuition. | cs.SI | cs |
Who Started It?
Identifying Root Sources in Textual Conversation Threads
Wei Zhang*, Fan Bu†, Derek Owens-Oas†, Katherine Heller†, and Xiaojin Zhu*
*Department of Computer Science, University of Wisconsin-Madison
†Department of Statistical Science, Duke University
Abstract
In textual conversation threads, as found on many popular social media platforms, each
particular user text comment either originates a new thread of discussion, or replies to a
previous comment. An individual who makes an original comment -- termed as the "root
source" -- is a topic initiator or even an information source, and identifying such individuals
is of particular interest. The reply structure of comments is not always available (e.g. in the
proliferation of a news event), and thus identifying root sources is a nontrivial task. In this
paper, we develop a generative model based on marked multivariate Hawkes processes, and
introduce a novel concept, root source probability, to quantify the uncertainty in attributing
possible root sources to each comment. A dynamic-programming-based algorithm is then
derived to efficiently compute root source probabilities. Experiments on synthetic and real-
world data show that our method identifies root sources that match ground truth and human
intuition.
1 Introduction
Textual conversation threads -- individual textual utterances made sequentially by a group in-
volved in discussion, in a conversational manner -- are widely observed on social media, in online
forums, and in daily conferences and debates. Every textual comment can be thought of as either
original or a response, where an original comment may prompt a new branch of discussion in the
conversation. The individual responsible for an original comment is thus a topic initiator who
potentially shifts the direction of discussion, or even an information source for the community.
On the Internet, a term "original poster (OP)" has been developed for those "topic-initiating" indi-
viduals, in order to attribute credit when novel ideas or meaningful talking points are brought up,
or to lay blames when misinformation is spread. In a news-related user community on Twitter, for
example, a journalist exposing the Facebook-Cambridge Analytica data scandal may be the OP
for many follow-up posts and discussions, whereas the National Rifle Association account might
be an OP of a series of tweets regarding gun violence.
In this paper, we use the term "root source" instead of "OP" to accommodate general textual
conversation threads, and tackle the task of identifying possible root sources for each comment.
Learning root sources is of great interest to a wide audience including sociologists, psychologists
and policy makers, and helps solve problems such as credit attribution, rumor tracing, and social
power inference Danescu-Niculescu-Mizil et al. (2012).
1
Identifying root sources in general conversation threads, however, presents two major chal-
lenges. First, although one can pin down the root sources by back-tracing the direct reply struc-
ture to the earliest posts for cascades on online platforms (e.g., Twitter), such clear structure,
unfortunately, is almost never available in offline textual conversation threads (e.g., court room
transcriptions). Thus, one has to infer the hidden reply structure in order to identify root sources.
Second, even though each comment only corresponds to one root comment and thus one root
source, there could exist multiple root sources during the whole conversation, as individuals may
intermittently start new topics, attempting to alter and lead the direction of discussion.
We propose to achieve the goal of root source identification in textual conversation threads
using multivariate Hawkes processes (MHPs) with textual marks, a class of mutually-exciting
point processes. This model leverages three key aspects of textual conversation threads: (a)
temporal locality -- individuals tend to respond to recent comments; (b) individual heterogeneity --
different individuals can have drastically different intrinsic comment rates and tendencies to reply;
(c) vocabulary inheritance -- an individual tends to adopt certain vocabulary words from those
whom he/she is responding to. To quantify the uncertainty of identified root sources for each
comment, we introduce a novel concept, root source probability, and develop an algorithm to
compute root source probabilities for all comments efficiently. This allows us to, for example,
identify an individual information generator in conversation with high probability.
in identifying root sources.
Main Contributions:
• A generative model based on marked MHPs is proposed. The model captures the three listed
essential aspects of textual conversation threads: temporal locality, individual heterogeneity,
and vocabulary inheritance.
• A novel concept, root source probability, is introduced. It quantifies the posterior uncertainty
• An efficient, dynamic-programming algorithm is derived to compute root source probabilities.
The rest of the paper is organized as follows. Necessary background is provided in Sec. 2,
and the parameterization of the marked MHPs model is described in Sec. 3. Sec. 4 formally
defines root source probability and derives an efficient computation algorithm. Sec. 5 explains
the parameter estimation procedure for the model, and Sec. 6 discusses related work. Finally,
experiments are presented in Sec. 7, followed by conclusions in Sec. 8.
is a coupling of S counting processes N(t) (cid:44)(cid:2)N (s)(t)(cid:3)
2 Background
2.1 Marked Multivariate Hawkes Processes
An S-dimensional multivariate Hawkes process (MHP) Hawkes (1971b,a); Embrechts et al. (2011)
s∈[S], each of which counts up the number
of events occurring on source s before time t. We use [n] as a shorthand for the set {1, . . . , n}
for any positive integer n and (cid:44) for "is defined as". A sample of an MHP is a sequence of events
e1, e2, . . ., where the i-th event ei (cid:44) (ti, si) consists of a timestamp ti and a dimension/source la-
bel si, indicating when and from which source the event occurs. The history, Ht− = {ei : ti < t},
is the set of events that occur strictly before t, for any t > 0. The conditional intensity λ(s)(tHt−)
2
for the s-th process of the MHP, for s ∈ [S], takes the form
λ(s)(tHt−) (cid:44) µ(s)(t) +
λ(s)
i (t),
(1)
(cid:88)
ti<t
where µ(s)(·) and λ(s)
the previous event ei, respectively.
i (·) are the base intensity and the excited intensity of source s attributed to
An important extension of MHPs is marked MHPs, which introduce to each event ei a mark
xi. It is often assumed that mark xi is drawn, conditioned on ti and si, from a mark density
P (·ti, si,Hti−). As the notation suggests, in the most general case the mark density may depend
on timestamp ti and source label si of the i-th event, as well as all historical events before ti, i.e.
Hti−.
2.2 Branching Structure
An equivalent view of MHPs is Poisson clustering processes Rasmussen (2011). The Poisson
clustering processes start with S inhomogeneous Poisson processes (IPPs), each of which is asso-
ciated with a base intensity µ(s)(t) and forms its own cluster. Then the IPPs corresponding to the
base intensities begin to generate events, which are called immigrants. Whenever an immigrant
i (·), which further generates
ei is generated, it adds to each cluster s a new IPP with intensity λ(s)
the so-called offsprings. Eventually, the sample comprises all the events -- both immigrants and
offsprings -- from all the clusters.
This Poisson clustering point of view introduces a latent branching structure, defined by the
parental relationship between events in the sample. Specifically, let the one-hot vector zi (cid:44)
[zij]i−1
j=0 ∈ {0, 1}i be the parent variable for event ei, such that zi0 = 1 if ei is an immigrant
from µ(si)(·), and zij = 1 if ei is an offspring from λ(si)
(·). Based on the superposition property
of Poisson processes, the distribution of zi conditioned on timestamp ti, source label si, and the
history Hti− is
j
P (ziti, si,Hti−) =
µ(si)(ti)
λ(si)
λ(si)(tiHti−)
λ(si)(tiHti−)
0
(ti)
j
zi0 = 1,
zij = 1,
o.w.
(2)
An important property of the branching structure is that an MHP can be viewed as a forest
with S trees. This is because the "parent" of each event ei is either an earlier event ej or the base
intensity µ(s) (i.e. ei originates directly from source s). Therefore, given a branching structure,
each event can be traced back to its "root", the source from which it originates, as illustrated in
Figure 1.
Given the nature of the branching structure, a more definitive form for the mark density
P (·ti, si,Hti−) is often considered, in order to emphasize a direct dependency of the mark of
an event on its parent event Rasmussen (2011). Conditioned on the parent variable zi, the mark
xi of each event ei is assumed to be drawn from
P (·ti, si, zi,Hti−) (cid:44)
zi0 = 1,
zij = 1,
(3)
(cid:26)f (·ti, si)
f (·ti, si, ej)
3
µ(1)(t)
µ(2)(t)
µ(3)(t)
Figure 1: A branching structure for a MHP. Immigrants and offsprings are pointed by solid and
dashed arrows, respectively. Events sharing the same root source are represented with the same
marker. For example, all red circles trace back to and thus share the same root source -- source
3 -- even though they are made by different sources.
where f (·ti, si) and f (·ti, si, ej) are two parameterized probability densities. Combining (2)
and (3) and marginalizing out the parent variable zi lead to
P (xiti, si,Hti−) =
µ(si)(ti)
λ(si)(tiHti−)
f (xiti, si)
(cid:88)
j<i
+
λ(si)
j
(ti)
λ(si)(tiHti−)
f (xiti, si, ej),
(4)
which implies that this mark density is in fact a mixture with weights proportional to the different
intensity components.
Unless stated otherwise, in the remaining paper we shall focus on the marked MHP, of which
the conditional intensities and mark density are of the forms specified in (1) and (4), respectively.
3 Modeling Conversational Textual Cascades with Marked MHPs
In this section, we propose a specific parameterization of marked MHPs to characterize the gen-
erative process of textual conversation threads.
Suppose there are S individuals participating in a conversation. We denote the i-th comment
by ei (cid:44) (ti, si, xi), indicating that it is made by individual si at time ti with textual content xi.
We represent the content xi as a bag-of-words vector for a vocabulary of V tokens. Let n be the
total number of comments observed in time window [0, T ], and define HT (cid:44) {ei : i ∈ [n]}. Note
that, in the rest of the paper, depending on the context, the words "event" and "comment", and
"source" and "individual" may be used interchangeably.
There are four components of a marked MHP that require a concrete parameterization: base
intensity µ(s)(·), exciting intensity λ(s)
i (·), mark density for immigrants f (·ti, si), and mark den-
sity for offsprings f (·ti, si, ei). Furthermore, it is desired that the parameterization reflects the
key aspects (discussed in Sec. 1) of textual conversation threads -- temporal locality, individual
heterogeneity, and vocabulary inheritance.
4
We adopt the following factorized forms for µ(s)(·) and λ(s)
i (·):
(5)
µ(s)(t) (cid:44) ρs ¯µ(s)(t),
i (t) (cid:44) αs,siβ(xi)κ(s)(ti, t).
λ(s)
(6)
Here ρs and ¯µ(s)(·) are the multiplier and shape function of the base intensity of source s, respec-
tively; the matrix A (cid:44) [αss(cid:48)]ss(cid:48) characterizes the strength of mutual excitation between sources;
the function β(·) quantifies the impact of different textual contents; and κ(s)(·,·)'s are normalized
t κ(s)(t, t(cid:48))dt(cid:48) = 1 for s ∈ [S] and t > 0. Individual heterogeneity is
reflected by the source-specific choice of ρ and A, as well as ¯µ(·) and κ(·), and temporal locality
is reflected by the decaying property of the kernels κ(·).
decay kernels such that(cid:82) ∞
Next, we specify the mark densities based on the multinomial distribution and its mixture.
Specifically, let Multi(m, θ) be the multinomial distribution parameterized by m and θ. Condi-
tioned on the text length Li for event ei, we consider the mark densities
f (·ti, si) (cid:44) Multi(Li, θ(si)),
where γ ∈ (0, 1) is a scalar parameter, and x (cid:44) x/(cid:80)
f (·ti, si, ej) (cid:44) Multi(Li, (1 − γ)θ(si) + γ xj),
v∈[V ] xv is the normalized bag-of-words
vector for any x. Note that f (·ti, si, ej) is equivalent to a word-level multinomial mixture; that
is, each token made by individual si is drawn i.i.d. from Multi(1, θ(si)) with probability 1 − γ
and from Multi(1, xj) with probability γ. Thus, vocabulary inheritance is captured through this
word-level mixture design.
The graphical model of the above parameterization is included in Appendix A.1.
4 Root Source Probability
4.1 Overview
The parental relationship for events of marked MHPs is analogous to the direct replying relation-
ship for comments. From the viewpoint of the branching structure (as in Sec. 2.2), a comment
that initiates a new topic is an immigrant event, and one that replies to existing comments is an
offspring event. Therefore, inference about a marked MHP translates into identifying root sources
in textual conversation threads. This motivates us to consider the following (informally defined
for now) quantity for each event ei:
P r(s is the root source of eiHT ),
(7)
which is in the form of a probability to address the uncertainty of root source identification. We
name this novel quantity root source probability.
We propose to tackle the task of identifying root sources with a two-stage approach: first,
estimate the parameters of the S-dimensional marked MHP model specified in Sec. 3; second,
apply the learned model to compute the root source probability in (7) for each event ei and source
s.
The first stage, parameter estimation, will be explained in Sec. 5. We shall describe the second
stage in the next subsection by formally defining the root source probability and then stating an
efficient procedure to compute it. To facilitate narration, we provide a list of notation in Table 1.
5
Notation
S
Ns(t)
ei = (ti, si, xi)
t
µ(·)
λ(·)
zI
δ·,·
ri
r(s)
i
V
A
γ
θ(s)
a(s)
ρ , bρ
a(s)
α , bα
Description
the number of dimension/sources
the counting process of the s-th dimension.
i-th event
time
base intensity
intensity
branch structure
Kronecker delta function
root source probability
s-root probability
vocabulary size
influence matrix
word inheritance rate
vocabulary parameter
Bayesian prior parameter for base rate
Bayesian prior parameter for infectivity
Table 1: Table of notation and parameters.
6
4.2 Definition and Computation
Suppose that a sample HT of n events is observed for a marked MHP in time window [0, T ]. Let
I ⊆ [n] be an index set over events in HT , and zI (cid:44) [zi]i∈I be the collection of parent variables
which collectively define the branching structure over all events [ei]i∈I. Define Z(I) as the space
be a partition for Z(I) such
of all possible zI's. For event index i ∈ I, let Z (1)
that
, . . . ,Z (S)
,Z (2)
i
i
i
Z (s)
i
(I) (cid:44) {zI ∈ Z(I) s is the root source
of ei according to zI}.
We define the root source probability as follows.
Definition 1. Given an S-dimensional (marked) multivariate Hawkes process with sample HT of
n events, the s-root probability of event ei is defined as
P (z[n]HT ),
(8)
(cid:44) (cid:88)
r(s)
i
z[n]∈Z (s)
i
([n])
and ri (cid:44) [r(s)
i
]s∈[S] is called the root source probability of event ei.
i
This definition seems to indicate that the computation of root source probability is intractable
even for a single event, as it requires summing over all the posterior probabilities of all branching
structures in Z (s)
([n]), the size of which grows factorially with the number of events n. However,
it is actually feasible to carry out efficient computation for all events, given certain independence
properties of the marked MHPs:
1. All parent variables [zi]i∈[n] are mutually independent conditioned on HT ;
2. The parent variables of the existing events z[i] and the future events HT\Hti are independent
Let Ht (cid:44) {ei : ti ≤ t} be the historical events up to1 timestamp t for any t > 0. Then,
conditioned on Hti for any i ∈ [n].
Furthermore, the following proposition shows that root source probabilities for all events in
Both properties can be easily verified from the generative procedure of the marked MHP described
in Sec. 2.2. They further imply that P (z[i]Ht) = P (z[i]Hti), for any i ∈ [n] and t ≥ ti.
HT can be computed recursively.
Proposition 1. Given an S-dimensional marked MHP with a sample HT of n events, the root
source probability ri for any i ∈ [n] satisfies
(cid:88)
+
i ∝ δsi,sµ(s)(ti)f (xiti, si)
r(s)
r(s)
j λ(si)
j
(ti)f (xiti, si, ej),
(9)
where δx,y (cid:44) I(x = y) is the Kronecker delta function.
j<i
Thus, the root source probabilities for all events in HT can be efficiently computed via dy-
namic programming. The proof of this proposition is in Appendix A.2.
1This notation Ht can include events occurring at t, slightly different from Ht−.
7
5 Parameter Estimation
The parameters for the model described in Sec.3 are Θ (cid:44) {ρ, A, θ, γ}. Given the observed event
sequence HT , parameters are estimated through maximizing the marginal log-likelihood
L(Θ) (cid:44) log P (HTΘ)
(cid:16) (cid:88)
= log
z[n]∈Z([n])
(cid:17)
P (HT , z[n]Θ)
.
Evaluation of L(Θ), however, is intractable since the size of Z([n]) grows factorially with the
number of events n.
To address this issue, we adopt the variational expectation-maximization (EM) method Beal
and Ghahramni (2003), following prior works He et al. (2015); Yang et al. (2013); Hoffman
et al. (2013). The main idea of variational EM is to approximate the posterior distribution
P (z[n]HT , Θ) with a proposed distribution Q, construct a lower bound surrogate L for L, and
maximize L over Θ and Q alternatively.
The complete likelihood for an event sequence HT and branching structure z[n] is Rasmussen
(2011)
(cid:35)
P (HT ,z[n]Θ) = exp
−
λ(s)(tHt−) dt
(cid:34)
(cid:90) T
(cid:88)
0
s
(cid:105)zi0
µ(si)(ti)f (xiti, si)
λ(si)
j
(ti)f (xiti, si, ej)
(cid:105)zij
.
× n(cid:89)
× n(cid:89)
i=1
(cid:104)
(cid:89)
i=1
j<i
(cid:104)
n(cid:89)
We adopt the mean-field variational approach and choose the proposed distribution Q to be the
fully factorized multinomial,
Q(z[n]) (cid:44)
Multi(zi1, ηi),
(10)
where ηi ∈ [0, 1]i is the parameter for the i-th multinomial. We then construct a lower-bound
surrogate for L(Θ) using the evidence lower bound:
i=1
L(Θ) ≥EQ[log P (HT , z[n]Θ)]
− EQ[log Q(z[n])] (cid:44) L(Θ, η).
Since L(Θ, η) has a tractable, closed form (see Appendix A.3), we are able to estimate Θ by
solving the following optimization problem:
L(Θ, η).
max
Θ,η
(11)
We maximize (11) by block-coordinate ascent with the following updates for each parameter
block.
8
Update η Maximizing (11) with respect to ηi's leads to the following closed-form updates: for
i ∈ [n] and j ∈ [i − 1],
ηi0 ∝ µ(si)(ti)f (xiti, si),
ηij ∝ λ(si)
(ti)f (xiti, si, ej).
j
Update ρ and A with Empirical Bayes When prior knowledge about unknown parameters
is available, reference priors are often adopted to improve model performance Robbins (1964).
We adopt independent Gamma priors on ρ and A, i.e., ρs ∼ Gamma(a(s)
ρ , bρ) and αs,s(cid:48) ∼
α , bα). Combining such priors and maximizing the likelihood surrogate L(Θ, η) with
Gamma(a(s)
respect to ρs and αs,s(cid:48), we obtain the following updates (see Appendix A.4 for details):
j<i δsi,sδsj ,s(cid:48)ηij
.
κ(si)(ti, t) dt
ρs =
αs,s(cid:48) =
,
i=1
a(s)
a(s)
i=1 δsi,sηi0
0 ¯µ(s)(t) dt
ρ − 1 +(cid:80)n
bρ +(cid:82) T
(cid:80)
α − 1 +(cid:80)n
i=1 δsi,s(cid:48)β(xi)(cid:82) T
bα +(cid:80)n
n(cid:88)
S(cid:88)
V(cid:88)
V(cid:88)
δsi,sg(s)
max
θ,γ
v=1
s=1
i=1
ti
s.t.
v=1
Update θ and γ To obtain the updates for θ and γ, one needs to solve the following sub-
optimization problem:
where
i,v (θ, γ),
v = 1,∀s ∈ [S],
θ(s)
(cid:104)
(1 − γ)θ(s)
i,v (θ, γ) (cid:44) ηi0xi,v log θ(s)
g(s)
v
+
ηijxi,v log
v + γ xj,v
(cid:88)
j<i
(12)
(13)
(cid:105)
.
We only sketch the optimization strategy for (12) here and include more details in Appendix
j,v ∈ (0, 1) to each logarithm term in the
i,v . We then replace
i,v 's with their lower bounds in (12), and optimize the new objective. One can show that the
A.5. Apply Jensen's Inequality with a coefficient ξ(s)
summation of (13); this allows us to construct g(s)
all g(s)
choice of ξ(s)
i,v , a lower bound for each g(s)
j,v as
where θ(s) and γ is the current estimate of θ(s) and γ, respectively, yields the closed-form updates
δsi,s
ηi0xi,v +
ηij(1 − ξ(s)
j,v )xj,v
(cid:44)
ξ(s)
j,v
γ xj,v
(1 − γ)θ(s)
v + γ xj,v
,
θ(s)
v ∝(cid:88)
(cid:80)n
(cid:80)n
γ =
i=1
i
(cid:104)
(cid:80)
(cid:80)
j<i
i=1
j<i
(cid:88)
j<i
(cid:80)V
(cid:80)V
9
v=1 ηijxj,vξ(si)
j,v
v=1 ηijxi,v
.
(cid:105)
,
6 Related Work
In recent years there has been growing interest in developing computational methods to enhance
the understanding of real-world, social interactions within groups. Danescu-Niculescu-Mizil et al.
(2011) developed a probabilistic framework to examine whether the phenomenon of linguistic ac-
commodation holds for Twitter conversations. Danescu-Niculescu-Mizil et al. (2012) studied the
ability of the change of linguistic style markers to reveal social power difference in textual cas-
cades. Blundell et al. (2012) proposed a non-parametric Bayesian model to infer latent groups
from interaction data, which is further extended by Tan et al. (2016) to allow time-varying re-
ceptivity of each person. Other works such as Guo et al. (2015); Kawabata et al. (2016); Lin-
derman and Adams (2014) focused on the problem of "who influences whom?" -- inferring the
direct influence among individuals. Our work studies a novel question for textual conversation
threads -- "who started it?" -- and provides a principled way to answer this question.
On the other side, various methods, mostly non-parametric Lewis and Mohler (2011); Zhou
et al. (2013); Bacry et al. (2012); Bacry and Muzy (2014); Xu et al. (2016); Hansen et al. (2015);
Reynaud-bouret and Schbath (2010); Lemonnier and Vayatis (2014) have been proposed to es-
timate the excitation kernel matrix for multivariate Hawkes processes. While these methods
perform well empirically in estimating the trigger kernels, in the context of textual conversa-
tion threads, they can only answer the question of "who influences whom?", which is different
from ours. Moreover, these methods only consider the unmarked MHPs; for textual conversa-
tion threads, however, one has to design an appropriate mark density to reflect subtle but critical
linguistic adaptations, as what we do in our model.
7 Experiments
This section aims to empirically evaluating the proposed two-stage approach for root source iden-
tification (see Sec. 4.1) by answering the following questions: (Q1) How accurate is the parameter
estimation procedure? (Q2) Can the root source probabilities computed with the estimated MHP
model reliably identify the root sources? (Q3) How does our method perform on real-world data
with the ground-truth reply structure? (Q4) How can our method provide insight into real-world
conversation threads without the ground truth? We shall answer Q1 and Q2 with experiments
on a synthetic dataset in Sec. 7.1, and then answer Q2 -- Q4 with experiments on two real-world
datasets in Sec. 7.2.
7.1 Synthetic Data
Experimental Setup We consider a synthetic dataset generated by a marked MHP with S = 5
sources. Every source s has the same base intensity function with ¯µ(s)(t) = 1 and ρs = 0.1, and
ν (t(cid:48) − t)} with ν = 10. The excitation matrix
the same exponential kernel κ(s)(t, t(cid:48)) = 1
A is set to be symmetric with diagonal and off-diagonal entries 0.4 and 0.1, respectively, and the
mark impact function β(x) is set to constant 1. The five dimensions have average text lengths
of 10, 20, 30, 40, and 50, respectively; they also have a vocabulary inheritance rate of γ = 0.3
and vocabulary parameters θ(s) ∼ Dir(1). The total vocabulary size is V = 5000, and the total
number of events is n = 10000.
ν exp{− 1
10
Parameter Recovery (Q1) First examine the reduction in the relative square errors (RSEs) for
excitation matrix A and for vocabulary parameters θ(s)'s when the number of events increases. As
shown in Figure 2, in both cases the RSEs decrease with more events observed, which verifies the
effectiveness of the parameter estimation procedure. Overall, estimation for A is more accurate
than that for θ(s)'s, which is reasonable since the dimension of θ(s)'s is much larger. Also,
RSEs for θ(s)'s are smaller for sources with longer text, suggesting that it is easier to recover the
vocabulary parameters for vocal, loquacious individuals.
(a) Excitation matrix A
(b) Vocabulary parameter θ(∗)
Figure 2: Relative error of the estimated parameters on the synthetic data with varying sample
size
Root Source Identification (Q2) Now validate the ability of our method to identify root sources.
To the best of our knowledge, no existing work provides a direct estimation of root source prob-
abilities under the novel setting of this work; therefore, we validate the capacity of our method
(RP FIT) via comparison with the following baseline families:
• Heuristic running window baselines: use the normalized counts of comments from each source
over the M most recent events as an estimate of root source probabilities. Set M = 1, 10, and
∞ (denoted as RW 1, RW 10, and RW inf, respectively).
• Sub-model baselines: compute root source probabilities with temporal info only (RP TEMP FIT)
and with textual info only (RP MARK FIT). That is, root source probabilities are calculated us-
ing the following simplified recursive equations:
(cid:88)
i ∝ δsi,sµ(s)(ti) +
(cid:88)
¯r(s)
i ∝ δsi,sf (xiti, si) +
r(s)
j<i
¯r(s)
j λ(si)
j
(ti),
j f (xiti, si, ej).
r(s)
j<i
Our method, as well as these baselines, are all compared with an oracle where the root source
probabilities are computed using the true model parameters (RP TRUE).
Figure 3 shows the accuracy of the root sources identified by the different methods, compared
against the true root sources (i.e., the root sources constructed by tracing the true branching struc-
ture). The RP-based methods outperform all other baselines in all cases, and as the sample size
increases RP FIT converges to RP TRUE, the oracle method.
7.2 Real Data
Data Our model is also evaluated on the following two real-world datasets:
11
200040006000800010000# of events0.010.020.03(A)200040006000800010000# of events0.00.51.01.5((*))dim 1dim 2dim 3dim 4dim 5Figure 3: Accuracy of root source identification for each method on the synthetic data.
• Reddit: A collection of comments on 2016 US Election results, extracted from the website
• 12 Angry Men: A transcript of the 1957 legal-themed film, 12 Angry Men. Consider each
reddit.com Pushshift (2017). Consider each post as an event and each user as a source.
juror as a source and each utterance as an event.
We defer more details on data collection and processing to Appendix B.1.
One distinction between the two datasets is the availability of the ground-truth root sources.
Since the direct replying relationship between posts are observed for the Reddit dataset, we are
able to construct the ground-truth root sources and use them to quantitatively evaluate model
performance. The 12 Angry Men dataset -- which exemplifies a more realistic and practical ap-
plication of our method to real-world, off-line textual conversation threads -- does not offer the
replying structure for utterances; hence, we provide a comprehensive qualitative analysis of our
method on this dataset.
Experimental Setup We choose the baseline intensity shape function as ¯µ(s)(t) ≡ 1 for both
ν (t(cid:48) − t)} with hyperparameters ν = 450
datasets, and excitation kernels κ(s)(t, t(cid:48)) = 1
and ν = 8 for Reddit and 12 Angry Men, respectively. Other experimental setup is detailed in
Appendix B.2.
ν exp{− 1
Evaluation Metrics For Reddit, we quantify model performance in root source identification
with the following metrics: (a) total predicted log-probability of the true root sources, given by
root source probabilities; (b) top-k accuracy, the proportion of true root sources ranked at top k
by root source probabilities (k = 1, 10).
Results on Reddit (Q2, Q3) Table 2 compares the performance of RP FIT with the three afore-
mentioned running window baselines. Our model, RP FIT, attains the best results on all three
metrics. The comparable Top-1 accuracy of RW 1 with RP FIT is simply due to the specificity
of the dataset -- a large number of posts are original comments, so the author is the root source -- but
for those comments with possibly different true root sources, RP FIT performs better.
12
10002000500010000# of events0.20.40.60.8accRP_TRUERP_FITRP_TEMP_FITRP_MARK_FITRW_1RW_10RW_infMethod Log-Prob. Top-1 Acc. Top-10 Acc.
0.77
RW 1
RW 10
0.77
0.30
RW inf
0.79
RP FIT
-2300.28
-2807.71
-1807.84
-852.15
0.74
0.11
0.04
0.74
Table 2: Model performance evaluated on Reddit.
It is notable that RP FIT far outperforms RW 1 and RW 10 in total log-probability, because
the baselines only consider sources that are temporally close, but our method also leverages tex-
tual information and accounts for the uncertainty in identification.
the sum over the s-root probabilities for all events, i.e.,(cid:80)n
Results on 12 Angry Men (Q4) As ground truth is not available for 12 Angry Men, we qual-
itatively analyze our model with a proxy task -- inferring social power in conversation threads
Danescu-Niculescu-Mizil et al. (2012). We hypothesize that the social power of an individual
can be reflected by his/her ability to initiate conversational topics; as a result, for individual s,
, may be a good measure for
social power. We verify this hypothesis by ranking all jurors in the film using this measure and
show the top five jurors in Table 3. Juror 8 and Juror 3 are ranked as the top two, which exactly
matches the film plot: the two jurors are the protagonist and antagonist, both heavily engaging
in the discussion and frequently bringing up new talking points. The model also correctly ranks
Juror 1 among the top, who serves as foreman and is responsible for maintaining order in the jury
room.
i=1 r(s)
i
Rank Source
Juror 8
Juror 3
Juror 7
Juror 1
Juror 10
1
2
3
4
5
Power Role
269.89
53.34
40.29
36.99
35.78
insists acquittal
insists conviction
serves as foreman
Table 3: The top five most influential jurors in 12 Angry Men ranked by the root source probability
measure.
We also investigate the "mini-conversations" found by our model; each mini-conversation is
defined as a collection of the comments rooted by a comment that initiates a new topic and is
13
constructed by treating the learned variational variables ηi's in (10) as a proxy of the branching
structure. We observe that many of these mini-conversations agree with human intuition and
exhibit clear vocabulary inheritance. In the mini-conversation shown in Figure 4, for example,
the word "witness", the phrase "could they be wrong" and the word "people" are repeated, which
verifies the model assumption that a response comment may inherit words from the comment it
replies to.
Juror 8
Juror 12
Actually those two witnesses
were the entire case for the
prosecution. Supposing they
are wrong...
Could they be wrong?
They are only people. People
make mistakes.
Could they be wrong?
What do you mean suppos-
ing they're wrong? What's the
point of having witness at all?
Those people sat on the stand
under oath!
Well, no. I don't think so.
Figure 4: Vocabulary inheritance in 12 Angry Men.
8 Conclusion
We address the problem of identifying root sources in textual conversation threads. We propose a
marked multivariate Hawkes process model to describe the dynamics of textual cascades, and then
introduce a novel concept, root source probability, to quantify the uncertainty of identified root
sources. An efficient, dynamic-programming-based algorithm is derived to compute root source
probabilities, and a parameter estimation procedure based on variational inference is developed.
Experiments on synthetic and real-world datasets show that the proposed method can identify root
sources that agree with both ground truth and human intuition.
14
References
E. Bacry and J. Muzy. Second Order Statistics Characterization of Hawkes Processes and Non-
parametric Estimation. arXiv.org, 2014.
E. Bacry, K. Dayri, and J. F. Muzy. Non-parametric Kernel Estimation for Symmetric Hawkes
Processes. Application to High Frequency Financial Data. The European Physical Journal B,
85(5):1, 2012.
M. J. Beal and Z. Ghahramni. The Variational Bayesian EM Algorithm for Incomplete Data: With
Application to Scoring Graphical Model Structures. Bayesian Statistics, 7:453 -- 464, 2003.
C. Blundell, J. Beck, and K. A. Heller. Modelling Reciprocating Relationships with Hawkes
Processes. In Advances in Neural Information Processing System (NeurIPS), pages 2600 -- 2608,
2012.
C. Danescu-Niculescu-Mizil, M. Gamon, and S. T. Dumais. Mark My Words! Linguistic Style
In Proceedings of the 20th International Conference on
Accommodation in Social Media.
World Wide Web (WWW), page 745, New York, New York, USA, 2011. ACM Press.
C. Danescu-Niculescu-Mizil, L. Lee, B. Pang, and J. M. Kleinberg. Echoes of Power: Language
Effects and Power Differences in Social Interaction. In Proceedings of the 21st International
Conference on World Wide Web (WWW), New York, New York, USA, 2012. ACM Press.
P. Embrechts, T. Liniger, and L. Lin. Multivariate Hawkes Processes: An Application to Financial
Data. Journal of Applied Probability, 48(A):367 -- 378, 2011.
F. Guo, C. Blundell, H. M. Wallach, and K. Heller. The Bayesian Echo Chamber: Modeling Social
Influence via Linguistic Accommodation. In Proceedings of the 18th International Conference
on Artificial Intelligence and Statistics (AISTATS), 2015.
N. R. Hansen, P. Reynaud-bouret, and V. Rivoirard. Lasso and Probabilistic Inequalities for
Multivariate Point Processes. Bernoulli, 21(1):83 -- 143, Feb. 2015.
A. G. Hawkes. Spectra of Some Self-Exciting and Mutually Exciting Point Processes. Biometrika,
58(1):83 -- 90, 1971a.
A. G. Hawkes. Point Spectra of Some Mutually Exciting Point Processes. Journal of the Royal
Statistical Society. Series B (Methodological), 58(1):83 -- 90, 1971b.
X. He, T. Rekatsinas, J. R. Foulds, L. Getoor, and Y. Liu. HawkesTopic - A Joint Model for
In Proceedings of the
Network Inference and Topic Modeling from Text-Based Cascades.
32nd International Conference on Machine Learning (ICML), 2015.
M. D. Hoffman, D. M. Blei, C. Wang, and J. Paisley. Stochastic Variational Inference. Journal of
Machine Learning Research, 14(1):1303 -- 1347, 2013.
K. Kawabata, V. Berisha, A. Scaglione, and A. LaCross. A Convex Model for Linguistic Influence
in Group Conversations. In INTERSPEECH, pages 1442 -- 1446. ISCA, 2016.
15
R. Lemonnier and N. Vayatis. Nonparametric Markovian Learning of Triggering Kernels for
In Advances in
Mutually Exciting and Mutually Inhibiting Multivariate Hawkes Processes.
Knowledge Discovery and Data Mining, pages 161 -- 176. Springer Berlin Heidelberg, Berlin,
Heidelberg, 2014.
E. Lewis and G. Mohler. A Nonparametric EM algorithm for Multiscale Hawkes Processes.
Journal of Nonparametric Statistics, (1):1 -- 20, 2011.
S. W. Linderman and R. P. Adams. Discovering Latent Network Structure in Point Process
In Proceedings of the 31st International Conference on Machine Learning (ICML),
Data.
pages 1413 -- 1421, Feb. 2014.
Pushshift. Reddit Comment Data, 2017. URL https://files.pushshift.io/reddit/
comments/.
J. G. Rasmussen. Bayesian Inference for Hawkes Processes. Methodology and Computing in
Applied Probability, 15(3):623 -- 642, Dec. 2011.
P. Reynaud-bouret and S. Schbath. Adaptive Estimation for Hawkes Processes; Application to
Genome Analysis. The Annals of Statistics, 38(5):2781 -- 2822, Oct. 2010.
H. Robbins. The Empirical Bayes Approach to Statistical Decision Problems. The Annals of
Mathematical Statistics, 35(1):1 -- 20, 1964.
X. Tan, S. A. Z. Naqvi, A. Y. Qi, K. A. Heller, and V. Rao. Content-based Modeling of Reciprocal
Relationships Using Hawkes and Gaussian Processes. In Proceedings of the 32nd Conference
on Uncertainty in Artificial Intelligence (UAI), 2016.
H. Xu, M. Farajtabar, and H. Zha. Learning Granger Causality for Hawkes Processes. In Proceed-
ings of the 33rd International Conference on Machine Learning (ICML), pages 1717 -- 1726,
2016.
S.-H. Yang, H. Zha, S. Yang, and H. Zha. Mixture of Mutually Exciting Processes for Viral
Diffusion. In Proceedings of the 30th International Conference on Machine Learning (ICML),
pages 1 -- 9, 2013.
K. Zhou, H. Zha, L. Song, and 2013. Learning Triggering Kernels for Multi-dimensional Hawkes
Processes. In Proceedings of the 30th International Conference on Machine Learning (ICML),
2013.
16
A Technical Details
A.1 Graphical Model for the Proposed Marked MHP
Figure 5: The graphical model for the proposed marked MHP for modeling group conversation
A.2 Proof of Proposition 1
Proof. First, the space Z (s)
([i]) and Z({i+
1, . . . , n}). Given the conditional independence of z[i] and z{i+1,...n} for any i, we marginalize
the latter term from (8), yielding
([n]) can be rewritten as the Cartesian product of Z (s)
i
i
P (z[i]Hti).
(14)
(cid:88)
r(s)
i =
z[i]∈Z (s)
i
([i])
([i]) belongs to exactly one of the following two cases:
i
Note that z[i] ∈ Z (s)
1. zi0 = 1 and si = i.
2. zij = 1 and z[i−1] ∈ Z (s)
j ([i − 1]) for some j < i.
(cid:88)
Thus the right hand side of (14) can be rewritten as
(cid:88)
z[i−1]∈Z([i−1])
δsi,sP (z[i−1]Hti−)P (zi0 = 1Hti)
(cid:88)
P (z[i−1]Hti−)P (zij = 1Hti).
+
j<i
z[i−1]∈Z (s)
j
([i−1])
Since(cid:80)
z[i−1]∈Z (s)
j
([i−1])
P (z[i−1]Hti−) is indeed r(s)
(cid:88)
i = δsi,sP (zi0 = 1Hti) +
r(s)
j
, we have
j P (zij = 1Hti).
r(s)
Finally, since
j<i
P (ziHti) = P (ziti, si, xi,Hti−)
∝ P (ziti, si,Hti−)P (xizi, ti, si,Hti−),
17
𝑗:𝑡$<𝑡&𝑠=1,⋯,𝑆𝑠=1,⋯,𝑆𝑗:𝑡$<𝑡& 𝑡$ 𝜆$(0) 𝑠$ 𝑡& 𝑠& z& 𝛾 x& x$ 𝜌(0) 𝜽(0)𝐿& A 𝜅 dwith (2) -- (4) we have
i ∝ δsi,sP (zi0 = 1ti, si,Hti−)f (xiti, si) +
r(s)
(cid:88)
j P (zij = 1ti, si,Hti)f (xiti, si, ej)
r(s)
∝ δsi,sµ(si)(ti)f (xiti, si) +
j<i
(ti)f (xiti, si, ej).
r(s)
j λ(si)
j
(cid:88)
j<i
A.3 The Variational Lower Bound L(Θ, Q)
The complete likelihood is
P (HT , z[n]Θ) = exp
λ(s)(tHt−) dt
λ(si)(tiHti−)
(cid:88)
s
(cid:32)
× n(cid:89)
−
(cid:90) T
(cid:32)
0
i=1
µ(si)(ti)
λ(si)(tiHti−)
f (xiti, si)
(cid:33) n(cid:89)
(cid:33)zi0 ×(cid:89)
i=1
j<i
(cid:32) λ(si)
j
(ti)
λ(si)(tiHti−)
(cid:33)zij .
f (xiti, si, ej)
Then the complete log likelihood with the parameterization specified in the paper becomes:
ti
κ(ti, t) dt
zij log(cid:2)αsi,sj κ(tj, ti)f (xiti, si, ej)(cid:3) .
+
+
i=1
ρs
s
0
s
i=1
zi0 log
αs,siβ(xi)
n(cid:88)
(cid:90) T
¯µ(s)(t) dt −(cid:88)
= −(cid:88)
log P (HT , z[n]Θ)
(cid:104)
(cid:105)
n(cid:88)
ρsi ¯µ(si)(ti)f (xiti, si)
(cid:90) T
n(cid:88)
(cid:88)
(cid:2)log P (HT , z[n]Θ)(cid:3) − EQ
(cid:2)log Q(z[n])(cid:3)
¯µ(s)(t) dt −(cid:88)
= −(cid:88)
n(cid:88)
(cid:104)
n(cid:88)
ηij log(cid:2)αsi,sj κ(tj, ti)f (xiti, si, ej)(cid:3) − n(cid:88)
n(cid:88)
Therefore the variational lower bound L(Θ, Q) is
L(Θ, Q) (cid:44)EQ
(cid:105)
ρsi ¯µ(si)(ti)f (xiti, si)
(cid:90) T
(cid:90) T
(cid:88)
αs,siβ(xi)
ηi0 log
i=1
j<i
+
+
s
i=1
ρs
s
0
i=1
ti
i=1
j<i
i=1
κ(ti, t) dt
(cid:16)
ηi0 log ηi0 +
(cid:17)
.
ηij log ηij
(cid:88)
j<i
A.4 Derivation of Updates for ρ and A with Empirical Bayes Priors
The modified lower bound using Gamma priors ρs ∼ Gamma(a(s)
is
ρ , bρ) and αs,s(cid:48) ∼ Gamma(a(s)
α , bα)
L(Θ, Q)
18
κ(ti, t) dt
ηij log(cid:2)αsi,sj κ(tj, ti)f (xiti, si, ej)(cid:3)
α − 1) log αs,s(cid:48) − bααs,s(cid:48)
(a(s)
(cid:105)
.
s
= −(cid:88)
n(cid:88)
− n(cid:88)
(cid:88)
i=1
i=1
+
+
s
0
ti
+
ρs
s
i=1
i=1
j<i
ηi0 log
(cid:90) T
(cid:90) T
(cid:88)
αs,siβ(xi)
n(cid:88)
(cid:88)
n(cid:88)
¯µ(s)(t) dt −(cid:88)
(cid:104)
(cid:105)
ρsi ¯µ(si)(ti)f (xiti, si)
ηi0 log ηi0 +
(cid:105)
(cid:104)
(cid:88)
(cid:88)
ρ − 1 +(cid:80)n
bρ +(cid:82) T
α − 1 +(cid:80)n
(cid:80)
i=1 δsi,s(cid:48)β(xi)(cid:82) T
bα +(cid:80)n
ρ − 1) log ρs − bρρs
(a(s)
0 ¯µ(s)(t) dt
i=1 δsi,sηi0
ηij log ηij
αs,s(cid:48) =
ρs =
a(s)
a(s)
(cid:104)
i=1
j<i
+
s
s(cid:48)
,
j<i δsi,sδsj ,s(cid:48)ηij
κ(si)(ti, t) dt
ti
.
Taking first order derivatives regarding ρs and αs,s(cid:48) gives the modified updates
(cid:105) ≥ (1 − ξ(s)
(cid:34)
(cid:88)
i,v (θ, γ) as
ηijxi,v
A.5 Derivation of Updates for Θ and γ
For any coefficient ξ(s)
j,v ∈ (0, 1), applying Jensen's inequality, we have
(cid:104)
(1 − γ)θ(s)
log
v + γ xj,v
j,v ) log
(1 − γ)θ(s)
1 − ξ(s)
v
j,v
+ ξ(s)
j,v log
γ xj,v
ξ(s)
j,v
,
(15)
which leads to a lower bound of g(s)
i,v (θ, γ) ≥ ηi0xi,v log θ(s)
(cid:88)
g(s)
(cid:104)
=
ηi0xi,v +
v +
j<i
ηijxi,v(1 − ξ(s)
j,v )
(1 − ξ(s)
j,v ) log
(cid:105)
(cid:35)
+ ξ(s)
j,v log
γ xj,v
ξ(s)
j,v
(1 − γ)θ(s)
1 − ξ(s)
v
j,v
(cid:88)
(cid:88)
j<i
+
ηi0xi,v +
(cid:44)(cid:104)
Define
g(s)
j,v
log θ(s)
v
(16)
j<i
ηijxi,v[(1 − ξ(s)
j,v log γ] + const.
j,v ) log(1 − γ) + ξ(s)
(cid:105)
(cid:88)
log θ(s)
v +
ηijxi,v(1 − ξ(s)
j,v )
ηijxi,v[(1 − ξ(s)
j,v ) log(1 − γ) + ξ(s)
j,v log γ].
j<i
j<i
Solving the optimization problem
max
θ,γ
n(cid:88)
S(cid:88)
V(cid:88)
s=1
i=1
s.t.
V(cid:88)
v=1
δsi,sg(s)
i,v (θ, γ),
v = 1,∀s ∈ [S],
θ(s)
v=1
19
leads to the updates
θ(s)
v ∝(cid:88)
(cid:80)n
(cid:80)n
γ =
i=1
i
(cid:88)
(cid:80)V
(cid:80)V
j<i
(cid:80)
(cid:80)
j<i
i=1
j<i
δsi,s[ηi0xi,v +
ηij(1 − ξ(s)
j,v )xi,v],
v=1 ηijxi,vξ(si)
j,v
v=1 ηijxi,v
.
We choose ξ(s)
j,v to be
ξ(s)
j,v =
γ xj,v
(1 − γ)θ(s)
v + γ xj,v
,
(17)
where θ(s) and γ are the current estimate of θ(s) and γ, respectively. This is because this choice
makes the inequality in (16) tight with the old estimates and thus guarantees that the objective
function increases monotonically.
B Experimental Details
B.1 Data Collection and Processing
Reddit Our Reddit data are constructed from the data dump provided by the website Pushshift
(2017). We consider a very popular article, on the politics subreddit, titled, "2016 Election Day
Returns Megathread", and extract all comments occurring on the thread from November 8 through
November 15 of 2016. This interval begins when the thread opened, on Election Tuesday. We
then filter out the authors who commented less than 5 times. Comments that respond to deleted
comments are also discarded. As all the comments have already organized in tree hierarchies, we
define the root source (as known as O.P) of each comment to be the user of its first level parent
comment.
12 Angry Men The transcript of the film 12 Angry Men is obtained from https://github.
com/richardkwo/bayesian-echo-chamber/tree/master/data. We label each
juror with his juror ID in the film.
B.2 Detailed Experimental setup
α = Ns, bα = T /(1−c).
Empirical Bayes We set the hyperparameters a(s)
Here Ns is the total number of events on source s, and c is the expected proportion of baseline
events. We choose c = 1/10 to encourage original posts.
ρ = Ns, bρ = T /c, a(s)
Inference Algorithm Scalability
B.3
Algorithm running time is recorded in the synthetic data experiments. As shown in Figure 6,
model training time scales linearly with the number of events, support our claim of the efficiency
of the proposed dynamic programming algorithm for computing all the root source probabilities.
20
Figure 6: Training time scales linearly with the number of events.
B.4 Qualitative Analysis on Reddit
We also provide qualitative analysis on Reddit data similar to that on 12 Angry Men. Table 4
shows the top five most influential users in Reddit ranked by the root source probability measure.
Our power measure aligns well with the rankings by Reddit Gold, a virtual coin awarded by other
users to valued comments. Figure 7 shows incidences of vocabulary inheritance in the text of
Reddit comments. We visualize comments of which the root sources are correctly identified by
our model. Note inheritance of the word "DNC" in the first branch and the statement "Hillary is
president" in the second branch.
Rank Source
User E
User S1
User S2
User S3
User R
1
2
3
4
5
Power Gold Gold Rank
15.94
11.66
10.38
10.32
10.20
385
72
44
73
73
2
17
28
16
15
Table 4: The top five most influential users in Reddit ranked by the root source probability mea-
sure.
21
200040006000800010000# of events500010000running time(s)My god, this is what
happens when ed-
ucation is under-
funded.
Clinton is still win-
ning. Don't quit yet.
I'm just appalled its
even this close.
This is what the
DNC gets for their
Centrism fetish.
Going even further
left would not have
heled the DNC.
Obviously - painfully
so! - you are dead,
dead wrong.
Election Day Mega-
thread
Bernie Sanders is
the most populaer
congressman. Pe-
riod. Almost at his-
torical levels. Just
saying.
And Hillary is pres-
ident. What's your
point?
What reality are you
watching? I'm cur-
rently witnessing the
apocalypse.
Stop being so dra-
matic. Go to bed.
Wake up, Hillary
is president. Bet
money, kiddo.
Figure 7: Vocabulary inheritance in Reddit. Note inheritance of the word "DNC" in the first
branch and the statement "Hillary is president" in the second branch.
22
|
1208.2518 | 1 | 1208 | 2012-08-13T08:05:18 | Software systems through complex networks science: Review, analysis and applications | [
"cs.SI",
"cs.SE",
"physics.soc-ph"
] | Complex software systems are among most sophisticated human-made systems, yet only little is known about the actual structure of 'good' software. We here study different software systems developed in Java from the perspective of network science. The study reveals that network theory can provide a prominent set of techniques for the exploratory analysis of large complex software system. We further identify several applications in software engineering, and propose different network-based quality indicators that address software design, efficiency, reusability, vulnerability, controllability and other. We also highlight various interesting findings, e.g., software systems are highly vulnerable to processes like bug propagation, however, they are not easily controllable. | cs.SI | cs | Software Systems through Complex Networks Science:
Review, Analysis and Applications
Lovro Šubelj
University of Ljubljana
Marko Bajec
University of Ljubljana
Faculty of Computer and Information Science
Tržaška cesta 25, SI-1000 Ljubljana, Slovenia
Faculty of Computer and Information Science
Tržaška cesta 25, SI-1000 Ljubljana, Slovenia
[email protected]
[email protected]
2
1
0
2
g
u
A
3
1
]
I
S
.
s
c
[
1
v
8
1
5
2
.
8
0
2
1
:
v
i
X
r
a
ABSTRACT
Complex software systems are among most sophisticated
human-made systems, yet only little is known about the
actual structure of 'good' software. We here study differ-
ent software systems developed in Java from the perspec-
tive of network science. The study reveals that network
theory can provide a prominent set of techniques for the
exploratory analysis of large complex software system. We
further identify several applications in software engineering,
and propose different network-based quality indicators that
address software design, efficiency, reusability, vulnerability,
controllability and other. We also highlight various interest-
ing findings, e.g., software systems are highly vulnerable to
processes like bug propagation, however, they are not easily
controllable.
Categories and Subject Descriptors
D.2.8 [Software Engineering]: Metrics -- complexity mea-
sures, performance measures, software science
General Terms
Theory, algorithms, experimentation.
Keywords
Software systems, Software engineering, Software networks,
Network analysis.
1.
INTRODUCTION
Complex software systems are among most sophisticated
systems ever created by human. Nevertheless, only little is
known about the actual structure and quantitative proper-
ties of large software systems [6]. For instance, in the context
of software engineering, one is interested in how 'good' soft-
ware looks like. Commonly adopted approaches and tech-
niques fail to give a comprehensive answer [5, 7], moreover,
there is also a lack of a simple but yet rigorous framework for
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
SoftwareMining '12 , August 12, Beijing, China
Copyright 2012 ACM 978-1-4503-1560-9/12/08 ...$15.00.
software analysis (to our knowledge). The above dilemma
was denoted software law problem [6], which urges towards
identifying (physical) laws obeyed by software systems that
could be used in practical applications.
Networks possibly provide the most adequate framework
for the analysis of the structure of complex systems like
software projects1. Also, due to their simple and intelli-
gible form, analysis of different networks has already pro-
vided several significant discoveries in the last decade [46,
3, 16, 23]. Note that the adoption of software networks is
not novel [35, 27, 19, 39], however, network analysis is still
only rarely used in software engineering. The main purpose
of this study is thus to highlight different techniques devel-
oped in the field of network analysis, and to expose their
use in software comprehension, development and engineer-
ing. We review most of the past work on different types of
software networks, whereas we also include network analysis
techniques proposed just recently [23, 44]. (Note that the
main focus of the paper is merely a review, rather than a de-
tailed comparison of network analysis techniques with other
approaches.)
The study in the paper analyses software networks on dif-
ferent levels of granularity. First, we address the macro-
scopic properties of software networks like scale-free and
small-world phenomena [46, 3] that are related to the struc-
ture and design of the entire project, or projects, represented
by the network. Second, we analyze the microscopic prop-
erties of individual nodes, with special emphasis on differ-
ent dynamical processes occurring on software networks like
bug propagation [2, 30]. The above can be related to soft-
ware quality, complexity, reusability, robustness, vulnerabil-
ity and controllability. Third, we also identify mesoscopic
structural modules within software networks [16, 44] and
show their applicability in the context of software abstrac-
tion and refactoring. The paper thus exposes network analy-
sis as a prominent set of techniques for software engineering.
The rest of the paper is structured as follows. Section 2
introduces software networks used in the study. Section 3
analyzes different characteristics of adopted networks and
discusses their use in software engineering. Some applica-
tions of the presented techniques are given in Section 4, while
Section 5 concludes the paper.
2. SOFTWARE NETWORKS
Various types of networks have been proposed for the
analysis of the structure of complex software systems. For
1Throughout the paper, the term project refers to a reposi-
tory of software code.
Figure 1: (left) A simple Java class and the corresponding part of class dependency network. Direction
of links is (mostly) just the opposite to the flow of information. (right) Class dependency network of java
(circles) and javax (triangles) namespaces of Java language.
Network
Project
Table 1: Properties of class dependency networks used in the study.
A
153
267
357
778
1054
1889
1518
flmng
colt
jung
org
weka Weka 3.6.6 (data mining framework)
javax
Java 1.6.0.7 (javax namespace) [39]
Java 1.6.0.7 (java namespace) [39]
java
Flamingo 4.1 (GUI components) [39]
Colt 1.2.0 (scientific computation) [39]
JUNG 2.0.1 (network analysis) [39]
Java 1.6.0.7 (org namespace) [39]
k
3.82
5.93
4.54
10.07
8.60
6.63
13.26
n
141
243
317
709
953
1595
1516
m
269
720
719
3571
4097
5287
10049
LCC
0.88
0.94
0.96
0.69
0.98
0.44
1.00
P
18
21
41
50
84
118
56
instance, software architecture maps [35], software mirror
graphs [6], class, method and package collaboration graphs [17],
subrutine call graphs [27], inter-package dependency net-
works [21], software class diagrams [37] and class depen-
dency networks [39], to name just a few. Networks mainly
divide whether they are constructed from source code, byte
code or program execution traces, and due to the level of
software architecture represented by the nodes, and the set
of interdependencies represented by the links.
For consistency with some previous work [4, 17, 47, 39],
we construct networks from the source code of different Java
projects2 (Table 1). Due to the object-oriented view of
Java language, nodes in the network can represent either
project packages, software classes, methods and functions
or individual lines of code. We here adopt class dependency
networks [39], where nodes represent classes and links cor-
respond to different dependencies among them (Figure 1).
The latter is based on the following reasons. First, as net-
works are constructed merely from the signatures of differ-
ent classes, and functions and fields therein, they are only
mildly influenced by the subjective nature of each individual
developer. (This can be more adequately modeled by, e.g.,
text mining applied to the names of different programming
constructs [20].) Second, mesoscopic structures of class de-
pendency networks coincide with project packages [39, 44],
which enables various applications in software engineering
(Section 4). Third, such networks relate to the information
flow between different parts of software project, and also co-
incide with the human comprehension of the object-oriented
software systems.
Note that class dependency networks address only the
inter-class structure of the software project, whereas the
intra-class dependencies are disregarded. However, similarly
as above, the latter reflect also the programming style of a
particular developer, rather than the intrinsic structure of
the software project alone. Nevertheless, future work will
extend the study to inter- and intra-class dependencies us-
ing to concepts of interdependent or coupled networks [26,
15].
Formally, let a project consist of classes A = {A1, A2, . . .}
and let P be the set of software packages (bottom-most
level of the package hierarchy). Corresponding class depen-
dency network is then a directed graph G(N, L), with nodes
N = {1, . . . , n} and links L (m = L). Node i corresponds
to a class Ai, however, since isolated nodes are discarded in
the analysis, n ≤ A. A directed link (i, j) ∈ L represent
some dependency between classes Ai and Aj:
inheritance
(Ai inherits or implements Aj), parameter (Ai contains a
method, function or constructor that takes Aj as parame-
ter), return (Ai contains a method or function that returns
Aj) and field (Ai contains a field of type Aj). Denote k
to be the average degree in the network (i.e., average num-
ber of links incident to a node). Furthermore, let kin and
kout be the average in-degree and out-degree of the nodes,
k = kin + kout. Hence, kout
corresponds to a number of
other classes required to implement the functionality of a
respective class Ai, while kin
corresponds to the number of
i
classes that use (depend on) Ai. Last, denote LCC to be
the fraction of nodes in the largest connected component3.
Table 1 shows properties of class dependency networks
used in the study. Networks were selected thus to represent
a diverse set of software systems including utility libraries
i
2Networks are available from http://lovro.lpt.fri.uni-lj.si/.
3All networks in figures are reduced to LCC-s.
Figure 2: Degree distributions of weka, javax and java networks.
Table 2: Different statistics for class dependency networks used in the study.
Network
flmng
colt
jung
org
weka
javax
java
γ
3.0
2.7
2.5
2.2
3.0
2.6
2.4
C
0.25
0.41
0.37
0.57
0.39
0.38
0.69
D
0.31
0.47
0.42
0.62
0.43
0.44
0.73
CER
0 .03
0 .02
0 .01
0 .01
0 .01
0 .00
0 .01
l
4.05
3.44
4.19
2.68
2.91
3.88
2.18
E
0.03
0.03
0.02
0.03
0.01
0.02
0.02
lER
3 .47
3 .16
3 .88
2 .81
3 .39
3 .16
3 .09
nd/n
0.38
0.30
0.48
0.39
0.12
0.30
0.17
(e.g., flmng and colt networks), complete frameworks (e.g.,
jung and weka networks) and also the core of Java language
itself (i.e., java network).
Software networks are compared against Erdos-R´enyi ran-
dom graphs [12], where a link are placed between each pair
of n nodes with probability k/(n − 1), where k = 2m/n for
some n and m.
3. ANALYSIS AND DISCUSSION
3.1 Scale-free networks -- software complexity
and reusability
k!
Simple random graphs experience a Poisson degree dis-
tribution pk, pk ∼ λke−λ
. On the contrary, pk of most
real-world networks including software networks follows a
power-law form pk ∼ k−γ [3, 35, 31, 9], where γ is a scale-
free exponent, γ > 1. The latter can be clearly observed by
a straight line with slope −γ in a log-log plot (Figure 2).
Networks with power-law degree distributions are denoted
scale-free, while γ can be directly related to the spreading
processes occurring on networks [32] (e.g., bug propagation).
For γ ∈ (2, 3), even a very small fraction of faulty nodes can
already render the entire system inapplicable [30, 32]. Un-
fortunately, the latter applies for all software networks used
here (Table 2).
Scale-free networks are usually considered an artifact of
Yule's process or rich get richer phenomena [3]. For class
dependency networks, this refers to the fact that highly used
classes are, obviously, well known among developers, and
would thus also be more commonly adopted in the future.
However, power-laws should thus emerge merely in the in-
degree distribution pin
k that refers to the number of times
each class is used [36, 4] (Figure 2). More precisely, scale-
free nature of pin
k is a result of high code reusability. On
the other hand, out-degree distribution pout
is related to
software complexity, since classes with high kout
encompass
k
i
most complex functionality. Here, complexity refers to the
number of other classes needed to implement the function-
ality of the respective class. For example, most commonly
reused class in java network is String, whereas FileDialog
is the most complex one (Table 3).
k and highly truncated pout
Well developed software project should thus exhibit scale-
free pin
k . Next, lower γ indicates
higher code reuse, which also decreases the probability of
fault propagation throughout the system. Last, classes with
very high kout
, and also kin
, should be implemented with
i
extra care (see Section 3.3).
i
3.2 Small-world networks -- software structure
and design
Software networks exhibit small-world phenomena [46] (see
[27, 38] and Table 2), which refers to high clustering C [46]
and very short average distance between the nodes l [1] (also
known as six degrees of separation [25]). C measures tran-
sitivity in the network, and is defined as the probability
that two neighbors of a node are also linked, C ∈ [0, 1].
i(cid:54)=j dij, where dij is the distance between i in
l =
j in the respective undirected network (i.e., number of links
in the shortest path). Small-world networks most commonly
refer to C (cid:29) CER and l ≈ lER [46], where CER and lER are
the values for a corresponding random graph.
(cid:80)
n(n−1)
1
Clustering of software networks can be related to intrinsic
characteristics of the underlying systems [43]. For instance,
visualization classes usually experience very high clustering,
while clustering is almost zero for I/O classes [43, 40].
Average distance l is an important indicator of the struc-
tural design of the project, or projects, represented by the
network. More precisely, since l ≈ lER, l (cid:29) lER indicates
that the underlying software system has divided into several
independent parts with rather different functionality (Fig-
ure 3). Note also that software networks should never be
combined with the core of the language, since the latter
Figure 3: A random graph, jung network, jung & colt network and jung & java network. Average distance
between the nodes l equals 3.88, 4.19, 5.37 and 2.18. Node symbols correspond to clustering D [33] that ranges
between 0 (triangles) and 1 (circles).
Figure 4: weka, javax and java networks with highlighted seed nodes.
completely obscures its structure and dynamics.
1
ij, where d(cid:48)
(cid:80)
i(cid:54)=j 1/d(cid:48)
It ought to be mentioned that software networks are small-
world only in the undirected case [19]. The contrary would
imply a cyclic flow of information within the software project.
For instance, high-level Java class String does not use the
functionality of a lower-level FileDialog. Let E be the ef-
ficiency of network information flow [22] defined as E =
ij is the distance from i to j in
n(n−1)
a (directed) network, E ∈ [0, 1]. Small-worlds should result
in high flow efficiency E, however, software networks have
E ≈ 0 (Table 2).
Well designed software project should thus experience C (cid:29)
CER, l ≈ lER and E ≈ 0. Also, one should be wary of
l (cid:29) lER throughout the project development.
3.3 Network nodes -- software vulnerability and
control
In the context of spreading processes on software net-
works [28, 45] (e.g., bug propagation) and network robust-
ness [2, 32] (i.e., software vulnerability), one is interested
into so called seed nodes that could originate the propaga-
tion of faults through the entire system4. Centrality metrics
that measure nodes influence are commonly regarded as a
prominent indicator of seed nodes [13, 14]. Denote DCi
to be the degree centrality defined as DCi = ki/(n − 1),
where ki is the degree of node i, DCi ∈ [0, 1]. Next, denote
CCi to be the harmonic closeness centrality defined as the
4Although a poor implementation of any software class al-
ready makes the system vulnerable, the problem is even am-
plified in the case of, e.g., highly reused classes.
(cid:80)
i(cid:54)=j 1/d(cid:48)
As ki ≈ kin
average inverse of distance from i to the rest of the nodes,
ij, CCi ∈ [0, 1]. Last, denote BCi to be
CCi = 1
n−1
the betweenness centrality defined as the fraction of shortest
paths between the nodes that go through i, BCi ∈ [0, 1].
i
for software networks, DCi actually identi-
fies classes with the highest code reuse or, equivalently, high
in-degree kin
(Table 3). Similar set of influential classes is re-
i
ported by BCi (Table 4). On the other hand, CCi identifies
classes that somewhat coincide with high complexity classes
identified in Section 3.1. BCi (and DCi) thus reveals classes
whose faulty implementation could influence the entire sys-
tem, whereas CCi exposes classes that are most prone to
an arbitrary fault within the system. The former commonly
reside in the core of the respective software network, while
the latter are found in the periphery (Figure 4).
Extra care should be put in the development of classes
with high BCi, while high CCi classes can be adopted for
an effective, and also efficient, software testing.
Network controllability has just recently been proposed for
the analysis of directed real-world networks [24, 23]. Here,
one is particularly interested in the number of driver nodes
nd that one has to govern in order guide the entire sys-
tem [23] (i.e., gain control over the output of the system
under the assumption of simple linear transformations). For
scale-free networks with pin
γ > 2 [23]. Note that, contrary to seed nodes (Table 4)
and general belief, driver nodes tend to avoid high degree
nodes [23, 11].
k equal to pout
k , nd/n ≈ ek(γ−2)/(2−2γ),
Most software network are not highly controllable, since
one would have to manage 30-50% of classes in order to con-
Table 3: Hubs (i.e., nodes with very high degree) within weka, javax and java networks.
weka
javax
java
Node
Instances
Instance
Capabilities
ClassAssigner
Filter
Classifier
kin
i
541
381
304
0
0
0
kout
i
5
4
4
19
19
18
Node
JComponent
Accessible
ComponentUI
JTable
JTextPane
JMenu
kin
i
235
222
175
6
0
1
kout
i
11
1
2
37
30
26
Node
String
Class
Object
FileDialog
Frame
Dialog
kin
i
1308
1288
1228
0
4
5
kout
i
7
4
1
59
58
57
Table 4: Seed nodes (i.e., very influential nodes) within weka, javax and java networks.
weka
Node
PredictionAppender
Classifier
Filter
Instances
RevisionHandler
Instance
javax
java
CCi BCi
0.00
0.03
0.03
0.01
0.00
0.03
0.51
0.01
0.26
0.00
0.01
0.13
Node
DefaultCellEditor
JTable
JTextPane
JComponent
Accessible
PrintService
CCi BCi
0.00
0.10
0.10
0.12
0.08
0.09
0.23
0.04
0.18
0.01
0.02
0.17
Node
FileDialog
Dialog
Frame
String
Object
Class
CCi BCi
0.00
0.09
0.09
0.00
0.00
0.09
0.36
0.02
0.32
0.02
0.02
0.26
trol the entire project (Table 2). Nevertheless, due to high
density, the core of Java language can be controlled through
merely 17% of classes in java namespace. For comparison,
nd/n equals ≈ 80% for regulatory networks, ≈ 50% for the
Internet, ≈ 30% for power grids and on-line social networks,
while, interestingly, it is below 3% for corporate ownership
networks [23].
Controllability of a software system can be limited by de-
creasing k or γ, which is achieved by decreasing code com-
plexity and increasing code reuse (Section 3.1).
3.4 Network modules -- software aggregation
and modularity
Packages of the software system reflect in different struc-
tural modules within class dependency networks [39, 44].
For instance, visualization classes commonly aggregate into
communities of densely connected nodes [16], whereas dif-
ferent parsers, transformers or plugins often arrange into
functional modules [43] that correspond to (disconnected)
groups of nodes with common linkage patterns. Otherwise,
clear community structure signifies highly modular struc-
ture of the respective software system, while well supported
functional modules are related to clear functional roles of
the classes within the project [39, 44, 43].
Table 5 compares software packages against network mod-
ules identified with MO [8] and CP [42, 41] community de-
tection approaches, and MM [29] and GP [44, 43] struc-
tural module identification algorithms. Analysis reveals that
general structural modules including communities and func-
tional modules most accurately model the package structure
of the software systems in this study.
4. APPLICATIONS
Due to space limitations, the following section only briefly
describes different applications of network analysis techniques
presented in Section 3. Future work will focus on a more
detailed examination and development of supporting imple-
mentations that could be easily applied in practice.
4.1 Software project abstraction
Figure 5 shows an application of network structural mod-
ule detection to software project abstraction. One can iden-
tify an entire hierarchy of modules that is consistent with the
package hierarchy, while also enclosing class dependencies
that go beyond packages decided by the developers. Besides
better comprehension, revealed hierarchy enables the predic-
tion of dependencies between the classes of a project [43].
4.2 Software packages refactoring
Network module detection algorithms can also be applied
for refactoring of software packages [39, 43]. One can adopt
a community detection algorithm to reveal highly modular
structure (Figure 6, (left)) or a functional module detec-
tion algorithm to identify the underlying functional struc-
ture (Figure 6, (middle)). General structural module detec-
tion algorithms partition software classes according to both
modular and functional links that are present among the
dependencies of the project (Figure 6, (right)).
4.3 Software packages prediction
Table 6 shows classification accuracies for the prediction
of software packages for the classes of different systems. Let
i be a node corresponding to class Ai. Package of Ai is
then predicted to be the most likely package considering
nodes within the same structural module as i. The nodes
are weighted according to Jaccard similarity [18], which is
defined as Γi ∩ Γj/Γi ∪ Γj, where j is a similar node and
Γi is the neighborhood of node i. Structural modules are
identified with the algorithm in [44, 43].
On average, one can predict software packages with ≈
80% probability for most classes of the systems considered,
whereas complete package hierarchy can be precisely identi-
fied for over 60% of the software classes (Table 6).
4.4 Software quality indicators
Table 7 and Table 8 show software project and class qual-
ity indicators identified in the study. Indicators can be em-
ployed to assess project structure and design, code complex-
Figure 5: (left) jung network where node symbols represent high-level packages of JUNG framework: visu-
alization (circles), io (triangles), graph (squares) and algorithms (diamonds). (right) Hierarchy of structural
modules revealed with the algorithm in [43].
Figure 6: (left) Communities representing highly modular structure of the software system [42, 41]. (mid-
dle) Functional modules that represent highly functional partitioning of the system [44, 43]. (right) General
structural modules conveying modular and functional links (bottom-most level of the hierarchy in Figure 5).
Table 5: Normalized mutual information [10] (NMI) between software packages and identified network mod-
ules, NMI ∈ [0, 1]. Number of modules is shown in small font.
Network
16
flmng
colt
jung
org
weka
javax
19
39
47
81
107
MO
CP
MM
GP
0.580
0.519
0.614
0.503
0.558
0.704
14
10
13
11
26
59
0.609
0.473
0.650
0.537
0.410
0.761
27
20
30
30
49
155
0.521
0.533
0.661
0.378
0.430
0.392
16
19
39
39
63
89
0.610
0.530
0.680
0.536
0.314
0.747
26
26
41
33
28
192
Table 6: Classification accuracy (CA) for software package prediction, CA ∈ [0, 1]. (l∞ is the number of levels
of the package hierarchy, whereas l is the average level for a software class. Value under Pi corresponds to
CA for the i-th level of the hierarchy.)
Network
flmng
colt
jung
org
weka
javax
l
2.65
3.35
2.97
3.50
3.02
3.11
l∞
4
4
4
7
6
5
P
P4
P3
0.566 ←
0.572
0.654 ← 0 .756
0.617 ←
0.663
0.616
0.616
0 .714
0 .736
0.692
0.684
0.626
0.631
0 .816
P2
0 .793
0.942
0 .857
0.989
0.871
0.982
P1
1.000
1.000
1.000
1.000
1.000
1.000
Table 7: Software project quality indicators presented in the study. For each indicator, we give the range
and the expected value of a well designed software system (based on Section 3).
Comment
Quality indicator Expected value
pin
k
kin
pout
k
kout
D
l − lER
E
nd/n
γ
∼ k−γin
(cid:29) 0
(cid:28) k−γout
(cid:28) n
(cid:29) 0, (cid:28) 1
≤ 0
≈ 0
(cid:29) 0
(cid:28) 3
Range
γin > 1
γout > 1
∞
∞
[0, 1]
∞
[0, 1]
[0, 1]
> 1
High code reusability (Section 3.1).
Low code complexity (Section 3.1).
Characteristics of the project domain [43].
Well structured and designed project (Section 3.2).
Low efficiency of information flow (Section 3.2).
Low project controllability (Section 3.3).
Low project vulnerability, high robustness (Section 3.1).
Table 8: Software class indicators presented in the study. For each indicator, we give the range and the
expected value of highly influential, most vulnerable or high complexity classes (based on Section 3).
Class indicator Expected value Range
Comment
DC, BC
CC
kin
kout
(cid:29) 0
(cid:29) 0
[0, 1]
∞
Highly influential seed classes (Section 3.3).
Highly vulnerable seed classes (Section 3.3).
Highly influential hub classes (Section 3.1).
High complexity hub classes (Section 3.1).
ity and reusability, controllability and vulnerability, infor-
mation flow, and other. Due to space limitations, compari-
son with other approaches for measuring software quality is
omitted (e.g., metrics of coupling and cohesion [34]).
5. CONCLUSIONS
The paper conducts a comprehensive study of software
networks constructed from Java source code. First, we ad-
dress macroscopic network properties that are related to
structural design of the corresponding software project. Next,
we analyze the networks on a microscopic level of nodes, to
highlight most influential and vulnerable software classes.
Last, we analyze mesoscopic network structural modules
and expose their applicability in project refactoring. Among
other, we show that software systems are highly vulnerable
to processes like bug propagation, however, they are not eas-
ily controllable. On the other hand, Java language can be
controlled through merely 17% of java namespace. We also
identify several network-based quality indicators that can be
employed to assess software project design, reusability, ro-
bustness, controllability and other. The study thus exposes
network analysis as a prominent set of tools for software
systems engineering.
6. ACKNOWLEDGMENTS
This work has been supported by the Slovene Research
Agency ARRS within Research Program No. P2-0359.
7. REFERENCES
[1] R. K. Ahuja, T. L. Magnanti, and J. B. Orlin.
Network flows: Theory, algorithms, and applications.
Prentice-Hall, Upper Saddle River, NJ, 1993.
[2] R. Albert, H. Jeong, and A. L. Barabasi. Error and
attack tolerance of complex networks. Nature,
406(6794):378 -- 382, 2000.
[3] A. L. Barab´asi and R. Albert. Emergence of scaling in
random networks. Science, 286(5439):509 -- 512, 1999.
[4] G. Baxter, M. Frean, J. Noble, M. Rickerby, H. Smith,
M. Visser, H. Melton, and E. Tempero. Understanding
the shape of java software. In Proceedings of the ACM
International Conference on Object-Oriented
Programming, Systems, Languages, and Applications,
pages 397 -- 412, 2006.
[5] B. Beizer. Software testing techniques. Van Nostrand
Reinhold Co., New York, NY, USA, 1990.
[6] K. Cai and B. Yin. Software execution processes as an
evolving complex network. Information Sciences,
179(12):1903 -- 1928, 2009.
[7] E. M. Clarke, O. Grumberg, and D. Peled. Model
checking. MIT Press, 2000.
[8] A. Clauset, M. E. J. Newman, and C. Moore. Finding
community structure in very large networks. Physical
Review E, 70(6):066111, 2004.
[9] G. Concas, M. Marchesi, S. Pinna, and N. Serra.
Power-laws in a large object-oriented software system.
IEEE Transactions on Software Engineering,
33(10):687 -- 708, 2007.
[10] L. Danon, A. D´ıaz-Guilera, J. Duch, and A. Arenas.
Comparing community structure identification.
Journal of Statistical Mechanics: Theory and
Experiment, P09008, 2005.
[11] M. Egerstedt. Complex networks: Degrees of control.
Nature, 473(7346):158 -- 159, 2011.
[12] P. Erdos and A. R´enyi. On random graphs i.
Publicationes Mathematicae Debrecen, 6:290 -- 297,
1959.
[13] L. Freeman. A set of measures of centrality based on
betweenness. Sociometry, 40(1):35 -- 41, 1977.
[14] L. C. Freeman. Centrality in social networks:
Conceptual clarification. Social Networks,
1(3):215 -- 239, 1979.
[15] J. Gao, S. V. Buldyrev, H. E. Stanley, and S. Havlin.
Networks formed from interdependent networks.
Nature Physics, 8(1):40 -- 48, 2012.
[16] M. Girvan and M. E. J. Newman. Community
[35] S. Valverde, R. F. Cancho, and R. V. Sol´e. Scale-free
structure in social and biological networks.
Proceedings of the National Academy of Sciences of
United States of America, 99(12):7821 -- 7826, 2002.
[17] D. Hyland-Wood, D. Carrington, and S. Kaplan.
Scale-free nature of java software package, class and
method collaboration graphs. In Proceedings of the
International Symposium on Empirical Software
Engineering, pages 1 -- 10, 2006.
[18] P. Jaccard. ´Etude comparative de la distribution
florale dans une portion des alpes et des jura. Bulletin
del la Soci´et´e Vaudoise des Sciences Naturelles,
37:547 -- 579, 1901.
[19] G. A. Kohring. Complex dependencies in large
software systems. Advances in Complex Systems,
12(6):565 -- 581, 2009.
[20] A. Kuhn, S. Ducasse, and T. Gırba. Semantic
clustering: Identifying topics in source code.
Information and Software Technology, 49(3):230 -- 243,
2007.
[21] N. LaBelle and E. Wallingford. Inter-package
dependency networks in open-source software. e-print
arXiv:cs/0411096v1, 2004.
[22] V. Latora and M. Marchiori. Efficient behavior of
small-world networks. Physical Review Letters,
87(19):198701, 2001.
[23] Y. Liu, J. Slotine, and A. Barabasi. Controllability of
complex networks. Nature, 473(7346):167 -- 173, 2011.
[24] A. Lombardi and M. Hornquist. Controllability
analysis of networks. Physical Review E, 75(5):056110,
2007.
[25] S. Milgram. The small world problem. Psychology
Today, 1(1):60 -- 67, 1967.
[26] P. J. Mucha, T. Richardson, K. Macon, M. A. Porter,
and J. Onnela. Community structure in
time-dependent, multiscale, and multiplex networks.
Science, 328(5980):876 -- 878, 2010.
networks from optimal design. Europhysics Letters,
60(4):512, 2002.
[36] S. Valverde and R. V. Sol´e. Logarithmic growth
dynamics in software networks. Europhysics Letters,
72(5):858 -- 864, 2005.
[37] S. Valverde and R. V. Sol´e. Network motifs in
computational graphs: A case study in software
architecture. Physical Review E, 72(2):026107, 2005.
[38] S. Valverde and R. V. Sol´e. Hierarchical small worlds
in software architecture. Dynamics of Continuous,
Discrete and Impulsive Systems - Series B, 14:1 -- 11,
2007.
[39] L. Subelj and M. Bajec. Community structure of
complex software systems: Analysis and applications.
Physica A: Statistical Mechanics and its Applications,
390(16):2968 -- 2975, 2011.
[40] L. Subelj and M. Bajec. Generalized network
community detection. In Proceedings of the ECML
PKDD Workshop on Finding Patterns of Human
Behaviors in Network and Mobility Data, pages 66 -- 84,
Athens, Greece, 2011.
[41] L. Subelj and M. Bajec. Robust network community
detection using balanced propagation. European
Physical Journal B, 81(3):353 -- 362, 2011.
[42] L. Subelj and M. Bajec. Unfolding communities in
large complex networks: Combining defensive and
offensive label propagation for core extraction.
Physical Review E, 83(3):036103, 2011.
[43] L. Subelj and M. Bajec. Clustering assortativity,
communities and functional modules in real-world
networks. e-print arXiv:12023188v1, 2012.
[44] L. Subelj and M. Bajec. Ubiquitousness of link-density
and link-pattern communities in real-world networks.
European Physical Journal B, 85(1):32, 2012.
[45] J. Wang and Y. Liu. Modeling software faults
propagation. Europhysics Letters, 92(6):60009, 2010.
[27] C. R. Myers. Software systems as complex networks:
[46] D. J. Watts and S. H. Strogatz. Collective dynamics of
Structure, function, and evolvability of software
collaboration graphs. Physical Review E, 68(2), 2003.
'small-world' networks. Nature, 393(6684):440 -- 442,
1998.
[28] G. M. Narayan, K. Gopinath, and V. Sridhar.
[47] L. Wen, D. Kirk, and R. G. Dromey. Software systems
Structure and interpretation of computer programs. In
Proceedings of the IEEE International Symposium on
Theoretical Aspects of Software Engineering, 2008.
as complex networks. In Proceedings of the IEEE
International Conference on Cognitive Informatics,
pages 106 -- 115, 2007.
[29] M. E. J. Newman and E. A. Leicht. Mixture models
and exploratory analysis in networks. Proceedings of
the National Academy of Sciences of United States of
America, 104(23):9564, 2007.
[30] R. Pastor-Satorras and A. Vespignani. Epidemic
spreading in scale-free networks. Physical Review
Letters, 86(14):3200 -- 3203, 2001.
[31] A. Potanin, J. Noble, M. Frean, and R. Biddle.
Scale-free geometry in OO programs. Communications
of the ACM, 48(5):99 -- 103, 2005.
[32] S. Sinha. Few and far between. Physics, 4:81, 2011.
[33] S. N. Soffer and A. V´azquez. Network clustering
coefficient without degree-correlation biases. Physical
Review E, 71(5):057101, 2005.
[34] W. P. Stevens, G. J. Myers, and L. L. Constantive.
Structured design. IBM Systems Journal,
38(2):231 -- 256, 1999.
|
1504.01637 | 1 | 1504 | 2015-04-07T15:17:52 | Local Variation of Collective Attention in Hashtag Spike Trains | [
"cs.SI",
"cs.CY"
] | In this paper, we propose a methodology quantifying temporal patterns of nonlinear hashtag time series. Our approach is based on an analogy between neuron spikes and hashtag diffusion. We adopt the local variation, originally developed to analyze local time delays in neuron spike trains. We show that the local variation successfully characterizes nonlinear features of hashtag spike trains such as burstiness and regularity. We apply this understanding in an extreme social event and are able to observe temporal evaluation of online collective attention of Twitter users to that event. | cs.SI | cs | Local Variation of Collective Attention in Hashtag Spike Trains
Ceyda Sanli and Renaud Lambiotte
CompleXity and Networks, naXys, Department of Mathematics
University of Namur, 5000 Namur, Belgium
5
1
0
2
r
p
A
7
]
I
S
.
s
c
[
1
v
7
3
6
1
0
.
4
0
5
1
:
v
i
X
r
a
Abstract
In this paper, we propose a methodology quantifying
temporal patterns of nonlinear hashtag time series. Our
approach is based on an analogy between neuron spikes
and hashtag diffusion. We adopt the local variation,
originally developed to analyze local time delays in
neuron spike trains. We show that the local variation
successfully characterizes nonlinear features of hashtag
spike trains such as burstiness and regularity. We apply
this understanding in an extreme social event and are
able to observe temporal evaluation of online collective
attention of Twitter users to that event.
Introduction
Hashtag diffusion in Twitter social network is nonlinear in
time. Pairwise or higher order temporal correlations, bursts,
and regular patterns are observed in data analysis. The dis-
tribution of time delays between two successive hashtag ac-
tivities gives a power-law scaling with fat tails (Domenico
et al. 2013), on the contrary to an exponential distribution
suggested for an independent Poisson process. A potential
reason addressed is that earlier hashtags influence coming
hashtags such that past hashtags can both cooperate and
compete with present hashtags (Myers and Leskovec 2012;
Coscia 2013). Heterogeneity of individual online user be-
havior in micro scale and self-organized cascades (Cheng et
al. 2014) due to unequal selection (Ratkiewicz et al. 2010;
Weng et al. 2012; Gleeson et al. 2014; Coscia 2013; Cetin
and Bingol 2014; Gleeson et al. 2015) in the hashtag pool
in macro scale, and the underlying cyclic rhythm of twit-
ting habit (Myers and Leskovec 2014; Franca et al. 2014;
Mollgaard and Mathiesen 2015; Sanli and Lambiotte 2015)
are further factors driving time-dependent hashtag propaga-
tion. Although preserving highly nonlinear nature, building
tools to characterize hashtag time-series, except obtaining
the distribution functions, has not been considered in detail,
yet.
protests
Extreme
(Borge-Holthoefer
elections
and
2011;
Gonzalez-Bailon et al. 2011), announcement of scien-
tific innovations (Domenico et al. 2013), and panic events
Copyright c(cid:13) 2015, Association for the Advancement of Artificial
Intelligence (www.aaai.org). All rights reserved.
et
al.
social
events
such
as
Figure 1: Hashtag spike trains of #ledebat in different days
covering extreme social events such as the debate of the
French presidential election-2012 held on May 2 and the
election held on May 6, and a regular day between them, e.g
May 4. The upper row represents the dynamics in the debate
day. Collective attention during the debate gives tremendous
amount of activity on the hashtag and so we observe a con-
tinuous series on the contrary to the distinguished spikes be-
fore 4 pm. The middle row is for a regular day after the de-
bate, followed by the spike train in the election day in the
below row. A decay in the activity on the hashtag #ledebat
is visible from the top to the bottom and the process suggests
highly nonlinear characteristics in each day.
such as crisis (Kenett et al. 2014) and earthquakes (Sasahara
et al. 2013) artificially deform Twitter network and en-
courage massive amount of hashtag activity in a short time
window, as shown in Figure 1. The resultant emergent on-
line behavior is both empirically (Yang and Leskovec 2011;
Mollgaard and Mathiesen 2015) and theoretically (Moll-
gaard and Mathiesen 2015) studied and distinct temporal
properties of collective attention are quantified. These
8 am12 pm 4 pm 8 pm 0 am4 am0 amhourdebate dayregular dayelection dayhashtag spike trains: #ledebatproperties are significantly important to be able to predict
these extreme, but rare social events (Kenett et al. 2014;
Miotto and Altmann 2014).
Our main motivation is to establish a systematic method-
ology to distinguish real noisy hashtag signals to indepen-
dent random signals and to extract temporal patterns from
the real signals. We apply an approach called the local varia-
tion LV , originally introduced to analyze noisy neuron spike
trains and to detrend for salient dynamics of neurons (Shi-
nomoto, Shima, and Tanji 2003; Miura, Okada, and ichi
Amari 2006; Omi and Shinomoto 2011). After convincing
the usage of LV in semantic analysis, which has been per-
formed extensively in our recent work (Sanli and Lambiotte
2015), we present a promising study on evaluation of col-
lective attention by performing LV on a political election.
Remarkable difference in LV in rush period suggests that
local nonlinear features could predict extreme social events.
Data Set
Data Collection
The data is collected via publicly open Twitter API. A fine
time window, between April 30, 2012 and May 10, 2012,
is determined on purpose to be able to cover two social
events such as the political debate on the French presiden-
tial election-2012 held on May 2 and the election day held
on May 6. Having 10 days data helps us to visualize activity
in regular days, both between and after these extreme events,
and compare the difference in hashtag dynamics. During this
period, all twitting activity, but only the users addressed in
France is considered not to deal with time differences be-
tween countries and regions and other potential social events
held on in the same period. The time resolution is 1 second
and no language selection is applied.
We examine 295,697 unique hashtags out of 2,942,239
tweets include at
least one hashtag, which is 30% of
all tweets. 228,525 online users, almost half of the to-
tal online users, are associated with hashtag diffusion.
The network in the period contains hashtags directly re-
lated to the debate, election, and two candidates Fran-
cois Hollande and Nicolas Sarkozy for the presidency of
France. Ranking them by the number of appearance (fre-
quency) or equivalently popularity p, from the most pop-
ular to the least, we have #ledebat (180946), #hollande
(143636), #sarkozy (116906), #votehollande (99908),
#avecsarkozy (67549), #ledebat
[in French],
#france2012 (20635), #presidentielle (13799), and many
others with lesser p. The numbers inside the parenthesis
present the corresponding p. These popular hashtags are at
the top of the others in the pool, e.g. 0.0001% of all hash-
tags.
(66668)
Real Hashtag Spike Trains
Single hashtag diffusion in time can be represented as a
spike train, as shown in Figure 1. Each spike represents that
the corresponding hashtag used at that time without spec-
ifying ways and users. Having the resolution 1 second, the
spike time of multiple events occurring in a second cannot be
N−1(cid:88)
(cid:18) ∆τi+1 − ∆τi
(cid:19)2
3
distinguished and therefore in this situation only one appear-
ance is counted. We construct spike trains for all hashtags
observed in the data ordering from the earliest appearance
time to the latest time, e.g. . . . , τi−1, τi, τi+1, . . . . Each
hashtag has a unique number of (exact) appearance, popu-
larity p.
Randomized Hashtag Spike Trains
To be able to compare real dynamics with an artificial and in-
dependent one, the randomized version of real hashtag spike
trains is established serving as a null model. First, all spikes
coming from any hashtags are combined, giving a single
merged hashtag spike train. Uniforming spike appearance,
one spike at a spike time, is still valid. Children randomized
hashtag spike trains are obtained by uniformly permuting the
matrix T of the spike times of the merged train by p times,
the number of spikes of the desired real train we compare.
We apply randperm(T , p) in Matlab and have p times uni-
formly distributed unique independent random spike times,
e.g. . . . , τ r
i−1, τ r
i , τ r
i+1, . . . .
Local Variation
The local variation LV , specifically defined to quantify non-
linear neural time-series and to uncover temporal patterns
in neuron spike trains, is defined at spike time τi (Omi and
Shinomoto 2011)
,
i=2
LV =
N − 2
∆τi+1 + ∆τi
(1)
∆τi+1 = τi+1 − τi and ∆τi = τi − τi−1. ∆τi+1 quantifies
forward delay and ∆τi represents backward waiting time.
Importantly, the denominator normalizes the quantity such
as to account for local variations of the rate at which events
take place.
By definition, LV takes values in the interval [0:3]. Fur-
thermore, it is derived that LV is on average equal to 1, (cid:104)LV (cid:105)
= 1, if the underlying process described by an independent
Poisson distribution, which the distribution of the inter-spike
intervals gives an exponential function (Shinomoto, Shima,
and Tanji 2003). Here, the brackets describe the average
taken over the given distribution. All other situations can
be generalized by Gamma processes (Shinomoto, Shima,
and Tanji 2003; Miura, Okada, and ichi Amari 2006) and
(cid:104)LV (cid:105) should be significantly different than 1. For instance,
(cid:104)LV (cid:105) ≈ 3 if the hashtag spike trains are extremely bursty
(irregular), on the other hand (cid:104)LV (cid:105) ≈ 0 while the trains
present regular (homogeneous) temporal patterns (Sanli and
Lambiotte 2015).
Figure 2 shows the results of our LV analysis, for both
real and randomized hashtag spike trains. The probability
distribution of P (LV ) of the calculated values of LV on the
two data sets, with classifying hashtag groups in popular-
ity p, presents distinct behavior. Whereas (cid:104)LV (cid:105) = 1 for any
groups of p for the randomized trains, suggesting Poisson
processes, (cid:104)LV (cid:105) never indicates 1 for the real trains. The
randomization dampens nonlinearity of the real trains, tem-
poral correlations, burstiness, and regularity in series and
construct statistically stationary and independent processes,
time-series.
Empirical Application: Collective Attention
We now utilize LV for more practical purposes and ask: Can
LV predict extreme social events? Our investigation will be
presented below is far from a complete understanding. How-
ever, we will be able to capture temporal evaluation of on-
line emergent behavior as a result of collective attention of
twitting on the French presidential election-2012, in the first
week of May 2012.
We specifically compare hashtag diffusion in extreme
days, the debate day (May 2) and the election day (May 6)
with the dynamics in a regular day between these events,
e.g. May 4. Instead of considering all hashtags in the pool, as
done in the previous Section, we concentrate on topic related
hashtags such as #ledebat (180946), #hollande (143636),
#sarkozy (116906), #votehollande (99908), #avecsarkozy
(67549), and #ledebat (66668) [in French]. The numbers in
the parenthesis indicate p of the corresponding hashtag.
Local variation LV is obtained for these topic-oriented
hashtag spike trains. The trains are constructed separately
for the three days. LV for each train and for each day is cal-
culated considering time window with duration 1 hour. Fig-
ure 3 presents the results in the debate (left), regular (mid-
dle), and election (right) days. The top row [Figure 3(a)]
shows LV (t) in the days in hour resolution. The below row
[Figure 3(b)] summarizes the twitting activity as the tweets
including listed hashtags in the legend versus time, again in
hour resolution.
Rush hours in online communications during the debate
and the announcement of the election result are highlighted
in the shaded yellow rectangle and with the yellow vertical
line, respectively. Significant decays in LV (t) for both the
debate and election days, synchronizing perfectly with the
peak of the counts, indicate regular activation of the online
users on the discussion of the election and so describe no
burstiness, LV (t) ≈ 0. This trend is not observed at all for
the regular day and mainly the cyclic rhythm of Twitter net-
work (Sanli and Lambiotte 2015) characterize the values of
LV (t). While large amount of fluctuations present in inac-
tive hours [0 am:6 am], the rest of the day (cid:104)LV (t)(cid:105) ≈ 1
suggesting time-dependent Poisson processes. These results
are preliminary, but promising since the stages of collective
attention are clearly visible on LV (t).
Discussion and Future Work
The main purpose of this paper is to establish a tool for noisy
social time-series and uncover nonstationary features and
temporal patterns, specifically in an online emergent limit.
Our comparative test on the real and randomized data sets
shows that the local variation LV , a metric introduced to
quantify the fluctuations of neuron spike trains as compared
to a local characteristic time, works successfully in hashtag
spike trains, as well. This encourages us to develop further
tools, for instance to predict extreme online events by eval-
uating the early noisy signal prior to an extreme event. As
an example, we consider the week of the French presidential
election-2012. This fine time window is well suitable for our
Figure 2: Probability density function of local variation LV ,
P (LV ), of hashtag spike trains (Sanli and Lambiotte 2015).
(a) Real hashtag spike trains. We observe a clear shift, to the
higher values of LV , in the peak positions while decreas-
ing hashtag popularity p, which indicates that the process
becomes bursty (irregular). In any p, the mean values never
gives 1, none of the real signal is Poisson process. (b) Ran-
domized hashtag spike trains. Independent of p, all curves
suggest fluctuations around 1, as expected for temporarily
independent signals. To satisfy a better visualization, the re-
sults are grouped based on ranking p from the most popular
to the least popular ones: High p, red and orange symbols,
moderate p, yellow and green symbols, and low p, blue and
purple symbols.
yet time-dependent events. Therefore, we characterize time-
dependent Poissons in Figure 2(b), P (LV ) fluctuates around
1. However, all nonlinearities are present in the real data,
and so in P (LV ). Describing regular patterns for popular
hashtags (high p), red and orange symbols, the trains be-
come bursty (irregular) due to local temporal correlations
for moderate, yellow and green symbols, and for low popu-
larity, blue and purple symbols. The trend is captured in the
shift of the peak positions of P (LV ) from small LV to large
LV decreasing p in Figure 2(a). Consequently, we find that
not only for neurons but also for hashtags LV is a success-
ful tool to characterize salient dynamics in nonlinear social
051015202530012345051015202530<p >=91127<p> =18553<p> = 1678<p> = 318<p> = 174<p> = 117<p> = 86<p> = 68<p> = 56<p> = 47<p> = 41<p> = 35<p >=91127<p> =18553<p> = 1678<p> = 318<p> = 174<p> = 117<p> = 86<p> = 68<p> = 56<p> = 47<p> = 41<p> = 35LVP( )LVP( )LVReal activity(a)Random activity(b)Figure 3: Characterizing temporal evaluation of collective attention. From left to right, the debate (May 2, 2012), a regular
day (May 4, 2012), and the election day (May 6, 2012) are shown. (a) The local variation of LV (t) on the topic-related
hashtags about the debate and the election. The shaded yellow rectangle covers the debate hours and the yellow line indicates
the announcement of the election. Significant decays in LV (t), in left and right windows, match well with the schedule of the
events. However, no remarkable trend is observed in the regular day (middle panel). (b) Counting tweets, including at least
one of the hashtags addressed in the legends, per hour. The activity increase in time coincides successfully with the decays in
LV (t), indicating that the collective attention homogenizes the hashtag propagation and so the hashtag spike trains in this limit
present temporal regularity.
aim and we find that LV is sensitive enough to distinguish
collective attention period, users are active homogeneously
in time, from the preceding period where temporal hetero-
geneity is present and therefore a prediction would be satis-
fied by performing better statistics in the decay of LV (t).
We obtain LV (t) is almost 0 in rush periods. Such artifi-
cial regularity originates from our assumption due to lack
of time resolution below 1 second. Although we observe
heterogeneity in hashtag spike trains in rush hours in the
empirical data, uniforming spike appearance setting to 1 in
any spike time creates unnatural homogeneity in emergent
limit. To resolve this, the trains should be constructed pre-
serving the heterogeneity in the data and so LV must be
re-introduced for nonuniform number of spikes at different
spike times in a train.
Acknowledgments
C. Sanli acknowledges supports from the EU 7th Framework
OptimizR Project and FNRS. This paper presents research
results of the Belgian Network DYSCO, funded by the In-
teruniversity Attraction Poles Programme, initiated by the
Belgian State, Science Policy Office.
References
Borge-Holthoefer, J.; Rivero, A.; Garcia, I.; Cauhe, E.; Fer-
rer, A.; Ferrer, D.; Francos, D.; Iniguez, D.; Perez, M. P.;
Ruiz, G.; Sanz, F.; Serrano, F.; Vinas, C.; Tarancon, A.; and
Moreno, Y. 2011. Structural and dynamical patterns on on-
line social networks: The spanish may 15th movement as a
case study. PLoS ONE 6(8):e23883–1–8.
Cetin, U., and Bingol, H. O. 2014. Attention competition
with advertisement. Phys. Rev. E 90:032801–1–7.
Cheng, J.; Adamic, L.; Dow, P. A.; Kleinberg, J. M.; and
Leskovec, J. 2014. Can cascades be predicted? In Proceed-
ings of the 23rd International Conference on World Wide
Web, WWW '14, 925–936. New York, NY, USA: ACM.
Coscia, M. 2013. Competition and success in the meme
In International
pool: A case study on quickmeme.com.
AAAI Conference on Weblogs and Social Media (ICWSM).
Domenico, M. D.; Lima, A.; Mougel, P.; and Musolesi, M.
2013. The anatomy of a scientific rumor. Sci. Rep. 3:2980–
1–9.
Franca, U.; Sayama, H.; McSwiggen, C.; Daneshvar, R.; and
Bar-Yam, Y. 2014. Visualizing the "Heartbeat" of a City
with Tweets. ArXiv e-prints.
00.511.522.53 #ledebat#hollande#sarkozy#votehollande#avecsarkozy#ledebat(a)debate day0 am3 am6 am9 am12 pm3 pm6 pm9 pm 0 am05001000150020002500300035004000(b) 0 am3 am6 am9 am12 pm3 pm6 pm9 pm 0 am #hollande#sarkozy0 am3 am6 am9 am12 pm3 pm6 pm9 pm 0 amregular dayelection day#ledebat#hollande#sarkozy#votehollande#avecsarkozy#ledebathour hour hour L (t)Vtweet count/hourannouncement of the result at 7 pm debateat 7-11 pmGleeson, J. P.; Ward, J. A.; O'Sullivan, K. P.; and Lee, W. T.
2014. Competition-induced criticality in a model of meme
popularity. Phys. Rev. Lett. 112:048701–1–5.
Gleeson, J. P.; O'Sullivan, K. P.; Banos, R. A.; and Moreno,
Y. 2015. Determinants of Meme Popularity. ArXiv e-prints.
Gonzalez-Bailon, S.; Borge-Holthoefer, J.; Rivero, A.; and
Moreno, Y. 2011. The dynamics of protest recruitment
through an online network. Sci. Rep. 1:197–1–7.
Kenett, D. Y.; Morstatter, F.; Stanley, H. E.; and Liu, H.
2014. Discovering social events through online attention.
PLoS ONE 9(7):e102001–1–7.
Miotto, J. M., and Altmann, E. G. 2014. Predictability of
extreme events in social media. PLoS ONE 9(11):e111506–
1–7.
Miura, K.; Okada, M.; and ichi Amari, S. 2006. Estimating
spiking irregularities under changing environments. Neural
Comput. 18:2359–2386.
Mollgaard, A., and Mathiesen, J. 2015. Emergent user be-
havior on Twitter modelled by a stochastic differential equa-
tion. ArXiv e-prints.
Myers, S., and Leskovec, J. 2012. Clash of the contagions:
Cooperation and competition in information diffusion.
In
Data Mining (ICDM), 2012 IEEE 12th International Con-
ference on, 539–548.
Myers, S. A., and Leskovec, J. 2014. The bursty dynamics
In Proceedings of the
of the twitter information network.
23rd International Conference on World Wide Web, WWW
'14, 913–924. New York, NY, USA: ACM.
Omi, T., and Shinomoto, S. 2011. Optimizing time his-
tograms for non-poissonian spike trains. Neural Comput.
23:3125–3144.
Ratkiewicz, J.; Fortunato, S.; Flammini, A.; Menczer, F.; and
Vespignani, A. 2010. Characterizing and modeling the dy-
namics of online popularity. Phys. Rev. Lett. 105:158701–
1–4.
Sanli, C., and Lambiotte, R. 2015. Local variation of hashtag
spike trains and popularity in Twitter. ArXiv e-prints.
Sasahara, K.; Hirata, Y.; Toyoda, M.; Kitsuregawa, M.; and
Aihara, K. 2013. Quantifying collective attention from tweet
stream. PLoS ONE 8(4):e61823–1–10.
Shinomoto, S.; Shima, K.; and Tanji, J. 2003. Differences
in spiking patterns among cortical neurons. Neural Comput.
15:2823–2842.
Weng, L.; Flammini, A.; Vespignani, A.; and Menczer, F.
2012. Competition among memes in a world with limited
attention. Sci. Rep. 2:335–1–8.
Yang, J., and Leskovec, J. 2011. ACM International Con-
ference on Web Search and Data Mining (WSDM).
|
1505.04560 | 1 | 1505 | 2015-05-18T09:09:01 | On the Formation of Circles in Co-authorship Networks | [
"cs.SI",
"physics.soc-ph"
] | The availability of an overwhelmingly large amount of bibliographic information including citation and co-authorship data makes it imperative to have a systematic approach that will enable an author to organize her own personal academic network profitably. An effective method could be to have one's co-authorship network arranged into a set of "circles", which has been a recent practice for organizing relationships (e.g., friendship) in many online social networks.
In this paper, we propose an unsupervised approach to automatically detect circles in an ego network such that each circle represents a densely knit community of researchers. Our model is an unsupervised method which combines a variety of node features and node similarity measures. The model is built from a rich co-authorship network data of more than 8 hundred thousand authors. In the first level of evaluation, our model achieves 13.33% improvement in terms of overlapping modularity compared to the best among four state-of-the-art community detection methods. Further, we conduct a task-based evaluation -- two basic frameworks for collaboration prediction are considered with the circle information (obtained from our model) included in the feature set. Experimental results show that including the circle information detected by our model improves the prediction performance by 9.87% and 15.25% on average in terms of AUC (Area under the ROC) and P rec@20 (Precision at Top 20) respectively compared to the case, where the circle information is not present. | cs.SI | cs | On the Formation of Circles in Co-authorship Networks
Tanmoy Chakraborty1 ∗, Sikhar Patranabis2, Pawan Goyal3, Animesh Mukherjee4
Dept. of Computer Science & Engg., Indian Institute of Technology, Kharagpur, India -- 721302
{1its_tanmoy,2sikharpatranabis,3pawang,4animeshm}@cse.iitkgp.ernet.in
5
1
0
2
y
a
M
8
1
]
I
S
.
s
c
[
1
v
0
6
5
4
0
.
5
0
5
1
:
v
i
X
r
a
ABSTRACT
The availability of an overwhelmingly large amount of bib-
liographic information including citation and co-authorship
data makes it imperative to have a systematic approach that
will enable an author to organize her own personal academic
network profitably. An effective method could be to have
one's co-authorship network arranged into a set of "circles",
which has been a recent practice for organizing relationships
(e.g., friendship) in many online social networks.
In this paper, we propose an unsupervised approach to au-
tomatically detect circles in an ego network such that each
circle represents a densely knit community of researchers.
Our model is an unsupervised method which combines a va-
riety of node features and node similarity measures. The
model is built from a rich co-authorship network data of
more than 8 hundred thousand authors.
In the first level
of evaluation, our model achieves 13.33% improvement in
terms of overlapping modularity compared to the best among
four state-of-the-art community detection methods. Fur-
ther, we conduct a task-based evaluation -- two basic frame-
works for collaboration prediction are considered with the
circle information (obtained from our model) included in
the feature set. Experimental results show that including
the circle information detected by our model improves the
prediction performance by 9.87% and 15.25% on average in
terms of AU C (Area under the ROC) and P rec@20 (Pre-
cision at Top 20) respectively compared to the case, where
the circle information is not present.
1.
INTRODUCTION
Now-a-days, public repositories of bibliographic datasets
such as DBLP and Google Scholar allow us access to a
stream of scientific articles published by authors from differ-
ent domains. An author, we wish to analyze, might be asso-
ciated with overwhelming volumes of information in terms of
her collaborations and publications, which in turn leads to
∗First two authors have equal contributions.
Permission to make digital or hard copies of all or part of this work for personal or
classroom use is granted without fee provided that copies are not made or distributed
for profit or commercial advantage and that copies bear this notice and the full cita-
tion on the first page. Copyrights for components of this work owned by others than
ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re-
publish, to post on servers or to redistribute to lists, requires prior specific permission
and/or a fee. Request permissions from [email protected].
SIGKDD'15, August 10 -- 13, 2015, Sydney, Australia.
Copyright 2015 ACM 978-1-4503-2956-9/14/08 ...$15.00.
http://dx.doi.org/10.1145/2623330.2623707.
both information overload and high computational complex-
ity. Moreover from an author's perspective, it could become
painstakingly difficult to keep track of the entire set of aca-
demic relationships she has with her collaborators at any
point of time.
Present Work: Problem definition.
In this article,
we study the problem of automatically discovering an au-
thor's academic circles. In particular, given a single author
with her co-authorship network, our goal is to identify her
circles, each of which is a subset of her coauthors. Some
examples of real-world circles in an author's co-authorship
network are shown in Figure 1. The "owner" of such a net-
work (the "ego") may wish to form circles based on common
bonds and attributes among her coauthors (the "alters").
An author could have several reasons behind initiating a
new collaboration. Some common tendencies exhibited by
authors include collaborations with the people from her own
Institute or with people sharing the same research interest
with her. Therefore, the problem of deciding upon a sin-
gle dimension to both characterize the circles and categorize
the coauthors appropriately becomes extremely challenging.
Moreover, circles are author-specific, as each author orga-
nizes her personal network of coauthors independent of all
other authors with whom she is not connected. This leads to
a problem of designing an automatic method that organizes
an author's academic network, more precisely, categorizes
her surrounding neighborhoods into meaningful circles.
Figure 1:
(Color online) A hypothetical example
showing an ego network of an author u with labeled
circles. Alters might belong to multiple groups and
form overlapping circles.
Present Work: Motivation of the work. The problem
of detecting ego-centric circles in a co-authorship network
is useful in many aspects. The collaborators of a particular
researcher might have interests aligned with different topics,
and the set of collaborators the researcher is currently work-
ing with is a reflection of her current topic of interest. Thus,
by understanding circles around her co-authorship network,
she might discover that she might be interested in reading
papers about a certain topic that she has not been inter-
ested in before. This result in turn helps in personalized
paper recommendations. On the other hand, if one is inter-
ested to start a new collaboration in a particular field with
very famous researcher (usually having less opportunity for
new collaboration), a more successful attempt could be to
first establish a collaboration to one of the coauthors of the
famous researcher who happens to belong to a circle that is
most aligned to the field of interest. Therefore, the circle
information could lead to the design of a meaningful collab-
oration prediction system. Moreover, one can also discover
the collaboration pattern of a researcher by observing the
temporal evolution of the ego-centric circles of an author.
Present Work: An unsupervised approach for cir-
cle detection. In this work, we propose an unsupervised
method to learn the major dimensions of author profile sim-
ilarity that lead to densely linked circles. In practice, since
the topological evidence in such small ego networks is less,
the traditional community finding algorithms fail to discover
meaningful circles from it [15, 16]. Here, we intend the fol-
lowing two conditions to be satisfied during circle detection:
first, we expect the circles to be formed by densely con-
nected sets of alters. Different circles might overlap, i.e.,
alters might belong to multiple circles simultaneously. Sec-
ond, we expect that the members of the same circle share
common properties or traits [18]. We model the similarity
between alters as a function of common profile information.
We then propose an unsupervised method to learn precisely
which dimensions of profile similarity lead to densely linked
circles. In each iteration, our model tries to learn the con-
nectivity between alters from the actual graph and updates
the circle memberships accordingly. Once the optimal con-
dition is encountered, the model outputs the circles. We
make our experimental codes available in the spirit of repro-
ducible research: http://cnerg.org/circle.
Summary of the evaluation. The entire experiment is
conducted on a massive dataset of computer science domain
constituting more than 8 hundred thousand authors. Some
interesting observations from the extensive analysis of the
detected ego-centric circles are as follows: (i) the highly-
cited authors tend to form more number of large and highly
cohesive circles, (ii) the highly-cited authors seem to coau-
thor with a group of people having a specific research inter-
est in a particular time period and then leave this group to
form another such group of coauthors; (iii) the highly-cited
authors tend to spawn circles that have alters in very similar
fields, whereas authors with medium-citations spawn more
diverse circles. To evaluate the quality of the detected cir-
cles, we compare our model with four state-of-the-art over-
lapping community detection algorithms in terms of stan-
dard overlapping modularity measure and achieve an im-
provement of 13.33% over the best baseline method. Fur-
ther, we conduct a task based evaluation where we show that
including the circle information detected by our model in the
feature set improves the performance of the existing collab-
oration prediction models (liner regression and supervised
random walks) by 9.87% and 15.25% respectively in terms
of AU C (Area under the ROC curve) and P rec@20, com-
pared to the case where the circle information is not present.
With respect to the best baseline which gives the circle infor-
mation, our model achieves average improvement of 3.35%
and 6.26% respectively in terms of AU C and P rec@20.
2. RELATED WORK
We broadly divide the related work into two subparts: re-
search on the ego structure of a co-authorship network and
research on discovering local circles in an ego network.
Research exploring ego structure in co-authorship
network. One of the most interesting yet curiously un-
derstudied aspects is the analysis of the structural proper-
ties of the ego-alter interactions in co-authorship networks.
Eaton et al.
[8] found that the productivity of an author
is associated with centrality degree confirming that scien-
tific publishing is related with the extent of collaboration;
Borner et al. [6] presented several network measures that in-
vestigated the changing impact of author-centric networks.
Yan and Ding [21] analyzed the Library and Information
Science co-authorship network in relation to the impact of
their researchers, finding important correlations. Abbasi et
al. extensively studied the relationship between scientific
impact and co-authorship pattern, discovering significant
correlations between network indicators (density and ego-
betweenness) and performance indicators such as g-index
[1] and citation counts [2]. McCarty et al. [17] attempted to
predict the h-index evolution through ego networks, observ-
ing that this factor increases if one can choose to coauthor
articles with authors already having a high h-index.
Research on discovering local circles in ego network
McAuley and Leskovec [15, 16] were the first who explored
social circles in ego networks. They mapped this problem
as a multi-membership node clustering problem and devel-
oped a model for detecting circles that combines network
structure as well as user profile information from Google+,
Facebook and Twitter. They remarked that these local cir-
cles can not be discovered using traditional community de-
tection algorithms [19] because of the dearth of information
on topological structure in the ego network of each author
[9, 16]. According to them, under such circumstances topic-
modeling techniques [3, 5] are the best to uncover "mixed
memberships" of nodes to multiple groups. This, to the best
of our knowledge, is the first attempt to detect local circles
(groups of coauthors with similar features) centered around
each ego/author in a co-authorship network and to use this
information further to enhance the performance of existing
collaboration prediction models.
3. AN UNSUPERVISED MODEL FOR DIS-
COVERING EGO-CENTRIC CIRCLES
Our model for detecting ego-centric circles applies to any
general ego network, where each node is considered as an
ego and the set of her one-hop neighbor nodes constitute
the set of alters. The ego is said to spawn the ego network,
but is not considered as a part of the network. Our method
intends to discover circles in this ego network in an unsuper-
vised fashion, leveraging properties specific to nodes as well
as properties of the network. Our model requires each node
to have a profile, which is essentially the feature vector char-
acterizing the node in a feature space. Two nodes are said
to be similar if their feature vectors are similar, as evaluated
by an appropriate similarity metric. Although exact profile
details and the similarity metrics will vary depending on the
nature of the network, some general assumptions made by
our model are as follows:
• Alters of the same ego, that have similar profiles should
be in the same circles while those with dissimilar profiles
should be in different circles.
• Alters that share an edge are more likely to be part of the
same circle than disconnected alters.
• While it should be possible to label each circle by some
common property of its member nodes, a circle may actu-
ally have more than one label.
In our earlier example of
a co-authorship network, two or more circles may contain
authors from the same field, but may be different in some
other attribute such as the authors from the same Institute
as shown in Figure 1.
• Circles may overlap and may even contain other smaller
circles.
We now describe the algorithm for circle formation in
more details. The input to our algorithm is an ego network
G =< V, E >. Each node v ∈ V has an N -dimensional pro-
file vector Fv = {f1v, f2v, f3v, ..., fNv}, where fiv denotes
the value of the ith feature of the node v. The ego node
u, often referred to as the center node, is responsible for
spawning the ego network, but does not itself feature as a
part of the network. So the ego network of u is essentially
the subgraph induced by the alters of u. Let D(x, y) be the
Euclidean distance between the profile vectors of nodes x
and y given by Equation 1.
terms of their circle membership, denoted by β(x, y). Let
β1(x, y) and β2(x, y) be defined as follows.
β1(x, y) = XCj :{x,y}⊆Cj
β2(x, y) = XCj :{x,y}*Cj
(Sim(x, y) − τj + λ)−1
(3)
(Sim(x, y) − τj + λ)−1
(4)
Note that {x, y} ⊆ Cj if both x and y are members of
the circle Cj , while {x, y} * Cj if Cj does not contain one
or both of x and y. The constant λ is kept large enough
to ensure that no term in the summation is negative and
may simply be taken as the maximum of all threshold val-
ues, i.e., max{τ1, τ2, ..., τK}. Note that β1(x, y) is high if x
and y share common circles with very high thresholds, while
β2(x, y) is high if x and y do not share common circles with
high thresholds.
Now, we define the closeness estimator β(x, y) as follows.
β(x, y) = exp{[β1(x, y)]2 − [β2(x, y)]2}
(5)
Note that β(x, y) is purely a circle-membership based sim-
ilarity metric for the pair (x, y), and increases with increase
in the number and threshold values of the common circles
which x and y are part of. Thus, the closeness estimator em-
phasizes not only the common circle memberships of nodes
but also the thresholds of the circles they are part of.
From the closeness information so estimated, the prob-
ability that the pair (x, y) forms an edge in G is modeled
by:
p((x, y) ∈ E) =
β(x, y)
1 + β(x, y)
(6)
D(x, y) = D(y, x) = vuut
N
Xi=1
(fix − fiy)2
(1)
Similarly, for the node-pair (x, y) which does not belong
to E, the probability is estimated as follows:
The aim of the method is to identify a set of circles C=
{C1, C2,.....,CK }. Given a circle Cj ∈ C and a node y ∈ V ,
we define the distance of y from Cj , say D′(Cj, y), as the
average distance of y from all other nodes in Cj . Also, the
profile similarity measure between a pair of nodes x and
y, denoted by Sim(x, y) is defined to be the reciprocal of
D(x, y). Analogously, the similarity between node y and
circle Cj, denoted by Sim′(Cj, y) is defined to be the recip-
rocal of D′(Cj, y). We shall demonstrate the merit of this
profile similarity measure in Sections 4 and 6.
Each circle Cj in our model has a similarity threshold
parameter τj associated with it such that if node y ∈ V is
in Cj then the following constraint is satisfied:
p((x, y) /∈ E) = 1 − p((x, y) ∈ E) =
1
1 + β(x, y)
(7)
Quite evidently, p(x, y) increases with increase in β(x, y)
and is normalized using add-one smoothing [12]. Thus we
get a predicted probability of existence for each possible edge
in the network given C and τ . The rationale underlying the
prediction is that the closeness of a pair of nodes (x, y) is
proportional to the similarity of their profiles as well as the
number and similarity thresholds of common circles that
they are a part of. Now the model must ensure that this
predicted network indeed corresponds to the real network,
for which we present the following analysis.
Sim′(Cj, y) ≥ τj
(2)
Assuming independent generation of each edge in the graph,
the joint probability of G and C can be written as
Based on our assumption that nodes within a common
circle at any point of time have a higher probability of form-
ing an edge in the network, our model predicts the circles
estimated at each step to be cliques, and distinct circles not
to share any edge at all. Given a set of K circles C= {C1,
C2,.....,CK }, along with a set of threshold parameters τ =
{τ1, τ2,...,τK } in any iteration of the algorithm, we define
a closeness estimator for a pair of nodes (x, y) ∈ V × V in
Pτ (G; C) = Y(x,y)∈E
p((x, y) ∈ E) Y(x,y) /∈E
p((x, y) /∈ E)
(8)
We define the following notation 9 for ease of expression:
φ(x, y) = log (β(x, y)) = ([β1(x, y)]2 − [β2(x, y)]2)
(9)
Taking logarithm of Equation 8, and using notation 9 we
can express the log likelihood of G given C and τ as:
lτ (G; C) = log (Pτ (G; C))
= X
(x,y)∈E
= X
(x,y)∈E
= X
(x,y)∈E
log (p((x, y) ∈ E)) + X
(x,y) /∈E
log (p((x, y) /∈ E))
log (β(x, y)) − X
(x,y)∈V ×V
log(1 + β(x, y))
φ(x, y) − X
(x,y)∈V ×V
log(1 + exp{φ(x, y)})
(10)
The model thus attempts to identify a set of circles C that
maximizes lτ (G; C). In Section 4 we describe how this may
be achieved by optimizing τ . Also, in Section 6, we describe
how this generic model can be applied to co-authorship net-
works in particular.
4. UNSUPERVISED LEARNING OF MODEL
PARAMETERS
In this section, we describe the method used to find the
set of circles C by maximizing the log likelihood in Equation
10. Algorithm 1 summarizes the steps of a single iteration
of the algorithm.
Initially, each node is in a different circle with a very high
threshold value. At each iteration t, for each node y ∈ V
we alter the circle membership of y by randomly adding it
to some circles it previously did not belong to and deleting
it from some circles it belonged to. This is similar to the
concept of perturbing the solution in simulated annealing
[14]. The circle thresholds are then updated accordingly
such that the constraint in Equation 2 is not violated.
The general idea is that larger the number of circles a node
y is already part of after time step t, lesser is the extent to
which the circle membership of y is disturbed in time step
t + 1.
We denote by Ct the set of circles and by τt the cor-
responding set of thresholds after time step t, where Ct
= {C1(t), C2(t),...,CK (t)} and τt = {τ1(t), τ2(t),...,τK (t)}.
Also, let the log likelihood of G given Ct and τt be lτ (G; Ct).
The following are the main steps of the algorithm to update
the circle in time step t + 1:
Step 1: For each node y ∈ V , we capture the circle mem-
bership of y at time t by defining two sets S1y,t and S2y,t:
S1y,t = {Cj(t)Cj(t) ∈ Ct ∧ y ∈ Cj (t)}
S2y,t = {Cj(t)Cj(t) ∈ Ct ∧ y /∈ Cj (t)}
(11)
(12)
Step 2: Now we intend to compute the number of circles
to add y to and to remove y from, given by the two variables
- AddCircle(y, t + 1) and RemoveCircle(y, t + 1):
AddCircle(y, t + 1) = (cid:24) K1 + S1y,t
RemoveCircle(y, t + 1) = (cid:24) K2 + S1y,t
S1y,t
S1y,t
(cid:25)
(cid:25)
(13)
(14)
Here, K1 is a randomly chosen integer with 1 ≤ K1 <
S2y,t, such that the value of AddCircle(y, t + 1) is less
than or equal to S2y,t, i.e., the number of circles that y
is currently not part of. Similarly, K2 is a randomly cho-
sen integer with 1 ≤ K2 < S1y,t such that the value
of RemoveCircle(y, t + 1) is less than or equal to S1y,t,
i.e., the number of circles that y is currently part of. Note
that both AddCircle(y, t + 1) and RemoveCircle(y, t + 1)
are low for high values of S1y,t. This ensures that the more
the number of circles y is currently part of, lesser is the dis-
turbance to the circle membership of y (and vice versa).
Step 3: Add y to AddCircle(y, t+1) many randomly cho-
sen circles from S2y,t and remove y from RemoveCircle(y, t+
1) many randomly chosen circles from S1y,t. The corre-
sponding circles are updated accordingly.
Step 4: Once Steps 1, 2 and 3 are over for each node, we
have the set Ct+1 containing the augmented circles. Next,
we update the corresponding thresholds by setting τj(t + 1)
corresponding to the circle Cj(t + 1) to the minimum value
such that for each node y ∈ Cj(t + 1) the constraint in
Equation 2 is not violated. Thus the updated τj(t + 1) for
Cj(t + 1) is given by:
τj(t + 1) = min{Sim′(Cj(t + 1), y)y ∈ Cj (t + 1)}
(15)
Step 5: If the threshold τj(t + 1) for Cj(t + 1) falls below
a constant lower limit τL, we discard Cj (t + 1). The value of
τL is empirically determined. In our experiments, we tested
over a wide range of τL and set it to 0.2 for best results (see
Figure 3).
Step 6: We then compute the log likelihood lτt+1 (G; Ct+1)
using Equation 10. If lτt+1 (G; Ct+1) > lτt (G; Ct), then re-
tain newly computed sets Ct+1 and τt+1; else set Ct+1 = Ct
and τt+1 = τt.
The process continues till we reach a maxima and the log
likelihood does not increase any further for sufficiently many
iterations. We then report the set of circles so obtained as
the optimal set of circles. Note that the maximum number
of circles after any iteration of the algorithm is V and the
maximum number of nodes in any circle is also V . So the
running time of each iteration of the algorithm is O(V +
Ct) = O(V ). Also, any change to the set of circles is
accepted only if the overall likelihood increases and so the
method converges to a local maxima after a finite number
of steps. For practical applications, the method is assumed
to reach a local maxima if the likelihood function does not
increase for V iterations.
5. A LARGE PUBLICATION DATASET
We have crawled one of the largest publicly available data-
sets from Microsoft Academic Search (MAS) which houses
over 4.1 million publications and 2.7 million authors. We
collected all the papers specifically published in the com-
puter science domain and indexed by MAS. The crawled
dataset contains more than 2 million distinct papers by more
than 8 hundred thousand authors, which are further dis-
tributed over 24 fields of computer science domain. The
co-authorship network constructed from this dataset has au-
thors as nodes and edges between authors who have written
at least one paper together.
Ego network: The next step is the construction of ego
networks from the co-authorship network. We consider the
ego networks corresponding to each node (author) present
in our dataset, thus obtaining 821,633 ego networks. An
illustrative example of an ego network is shown in Figure 1.
However, in this experiment we consider only the induced
Ct+1 ← Ct
τt+1 ← τt
for all y ∈ V do
Algorithm 1 Iteration for Updating Circles
1: procedure CircleUpdate(t, Ct, τt, lτt (G; Ct))
2:
3:
4:
5:
6:
7:
8:
9:
S1y,t = {Cj (t)Cj(t) ∈ Ct ∧ y ∈ Cj (t)}
S2y,t = {Cj (t)Cj(t) ∈ Ct ∧ y /∈ Cj (t)}
K1 ← random(1, S2y,t)
K2 ← random(1, S1y,t)
AddCircle(y, t + 1) ← l K1+S1y,t
S1y,t m
RemoveCircle(y, t + 1) ← l K2+S1y,t
S1y,t m
Randomly choose CAC , CRC :
CAC ⊆ S2y,t, CAC = AddCircle(y, t + 1)
for all Cj(t) ∈ CAC do
Cj (t + 1) ← Cj(t + 1) ∪ {y}
CRC ⊆ S1y,t, CRC = RemoveCircle(y, t + 1)
for all Cj(t) ∈ CRC do
Cj (t + 1) ← Cj(t + 1) r {y}
for all Cj(t + 1) ∈ Ct+1 do
τj(t + 1) ← min{Sim′(Cj(t + 1), y)y ∈ Cj (t + 1)}
if τj (t + 1) < τL then
.
Ct+1 ← Ct+1 r {Cj (t + 1)}
τt+1 ← τt+1 r {τj (t + 1)}
Compute lτt+1 (G; Ct+1) [Eq. 10]
if lτt+1 (G; Ct+1) > lτt (G; Ct) then
Return { Ct+1, τt+1}
else
Return { Ct, τt}
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
subgraph of the alters for an ego and exclude the ego and its
attached edges from the ego network, as mentioned earlier.
6. FEATURE EXTRACTION
Profile information of each author node in the ego net-
work is represented as a feature vector consisting of a set
of features. These features can be divided into two broad
categories -- general and ego-centric features. Having these
two separate categories, the feature set emphasizes the fact
that members of common circles should not only have high
feature similarity with each other but also share similar re-
lationships with the ego.
Given an author x with all her publications, and the set of
fields of research F = {r1, r2, ....., r24}1, we define the ver-
satility vector V (x) of an author x as {ri,x; ri ∈ F } such
that ri,x is the fraction of publications of x in field ri. Also,
given a set of decades DEC = {1960-1970, 1971-1980, 1981-
1990, 1991-2000, 2001-2009}, we define the persistence vec-
tor D(x) for x as {dj,x; 1 ≤ j ≤ 5}, where dj,x denotes the
number of papers published by x in decade DEC(j). We
also define the major field of work R(x) for x, where she has
maximum number of publications.
The general features capture independent characteristics
of each author in the ego network and are listed below:
• The normalized number of citations the author has re-
ceived (size 1)
• The normalized number of citations per paper that the
author has received (size 1)
• The normalized h-index of the author (size 1)
• The normalized number of coauthors of the author (size
1)
• The versatility vector of the author (size 24)
• The normalized number of papers written by the author
(size 1)
1Note that there are 24 research fields present in our dataset.
• The persistence vector of the author (size 5)
• The major field of the author (size 1)
On the other hand, the ego-centric features capture the
relationship of an alter with its ego. Such features include:
• The fraction of papers coauthored by the alter with the
ego in each of the five decades (size 5)
• The fraction of papers coauthored by the alter with the
ego in each of the 24 fields (size 24)
• The normalized number of common coauthors that the al-
ter has with the ego (size 1)
• The fraction of papers authored by the alter in the major
field of the ego (size 1)
• The fraction of papers authored by the ego in the major
field of the alter (size 1)
Thus the dimension of the feature vector containing all
the above listed features is 67. Using the profile informa-
tion for each node, our model computes the probability of
edge existence between each pair of nodes (x, y), given by
p(x, y) as described in Equation 6. We calculate this prob-
ability from the extent of similarity of node-pair (x, y), i.e.,
Sim(x, y). In order to verify that the node similarity indeed
helps identify edges between similar authors with high prob-
ability of collaboration, we perform two small experiments.
We first check the conditional probability that given a node-
pair (x, y) with similarity Sim(x, y) = Wxy in G(V, E), the
node-pair indeed materializes as an edge in the real network.
)
y
x
W
E
∈
)
y
,
x
(
(
P
(a)
1
0.8
0.6
0.4
0.2
0
0
0.2
0.4
0.6
x 104
(b)
6
4
2
y
x
f
o
s
e
g
d
e
g
n
i
t
s
i
x
e
#
W
t
h
g
i
e
w
1
0.8
Pair−wise vertex similarity, W
0.2
0
0
xy
0.4
0.6
0.8
1
Figure 2: (a) Conditional probability of edge exis-
tence between authors with a given similarity Wxy
between their profiles; (b) actual number of edges
with a given edge weight in the network.
Plot shown in Figure 2(a) confirms that our similarity
measure is indeed proportional to the conditional probability
of edge existence. We also observe the number of edges in a
network having a particular edge weight Wxy in Figure 2(b).
Most of the edges are in the range 0.55 − 0.75, indicating
that this is the most common profile similarity range among
pair-wise authors. Very few edges exist in the range 0 −
0.3, which indicates that collaboration between authors with
very dissimilar profiles is quite rare. This value also seems
quite low for the range 0.9 − 1.0, which might be due to the
fact that it is extremely rare to have authors with nearly
similar profiles.
7. EVALUATION OF DETECTED CIRCLES
In this section, we intend to evaluate the quality of the
circles detected by our proposed methodology. Evaluation
is especially important to judge the quality of the detected
circles. We compare the circles detected by our model with
that obtained from four other recent overlapping community
detection algorithms, namely BIGCLAM [22], SLPA [20],
c
i
r
t
n
e
c
−
o
g
e
f
o
r
e
b
m
u
N
r
o
h
t
u
a
r
e
p
s
e
l
c
r
i
c
15
10
5
0
0
(a)
100
200
300
c
i
r
t
n
e
c
−
o
g
e
f
o
e
z
i
s
.
g
v
A
s
e
l
c
r
i
c
25
20
15
10
5
0
0
100
(b)
s
e
l
c
r
i
c
c
i
r
t
n
e
c
−
o
g
e
f
o
r
e
b
m
u
N
f
o
t
r
a
p
a
s
i
r
o
h
t
u
a
n
a
(d)
(c)
80
60
40
20
−
o
g
e
f
o
s
s
e
n
h
s
i
u
q
i
l
c
.
g
v
A
s
e
l
c
r
i
c
c
i
r
t
n
e
c
0.2
0.1
300
100
200
No of citations per author
0
0
200
300
0
0
100
200
300
Figure 4: (Color online) Author-specific characterization of detected ego-centric circles. The following are
plotted against the number of citations per author : (a) the number of circles centered around an author,
(b) the average size of the circles centered around an author, (c) the number of ego-centric circles an author
is a part of and (d) the average cliquishness of the circles centered around an author.
Figure 3: (Left) Change in overlapping modularity
Qov with the increase in τL; (Right) comparison of
the baseline algorithms with our method.
OSLOM [13] and COPRA [10]. We also detect the circles
using the coordinate ascent method (CA) [15, 16]. Since we
intend to show that research field of the authors is not the
proper information for creating the circles, we also compare
our output with the circles obtained simply from research
fields. For comparison, we use overlapping modularity Qov
[11] which is probably the most widely used measure for
evaluating the goodness of a community structure without
a ground-truth.
First, to show the change in Qov with respect to the
threshold τL as described in Section 4, we plot this qual-
ity function in Figure 3 by varying τL from 0.05-0.5. We
observe that Qov reaches maximum at τL = 0.2. Then for
each competing algorithm, we measure the value of Qov for
each ego and take an average over all the egos present in
our dataset. The table adjacent to Figure 3 shows that our
method outperforms the traditional topology based commu-
nity finding algorithms in detecting meaningful circles. Our
method achieves Qov of 0.68 which is 6.25% higher than
coordinate ascent method, 13.33% higher than BIGCLAM,
15.25% higher than OSLOM, 17.24% higher than COPRA,
and 21.42% higher than SLPA. We notice that research field
based circles are the worst among the detected circles (see
Section 9 for more discussion).
8. ANALYSIS OF EGO-CENTRIC CIRCLES
In this section, we intend to characterize the ego-centric
circles obtained from our unsupervised model. In particular,
we study the properties of the ego-centric circles at two lev-
els of granularity: author-specific analysis and circle-specific
analysis.
8.1 Author-specific Analysis
Here we study how the circles in the ego networks of the
highly-cited authors differ from those of the low-cited au-
thors. Figure 4(a) shows the number of ego-centric circles
appearing in the ego network of each author. Note that
in all of the experiments, we categorize authors into three
groups: authors receiving more than 100 citations as highly-
cited authors (proportion: 5.21%), authors receiving cita-
tions between 30-100 as medium-cited authors (proportion:
28.75%), and authors receiving less than 30 citations as low-
cited authors (proportion: 66.04%). We notice a rise in the
number of circles with the increase of citations. The pos-
sible reason could be that since the authors accumulating
high citations tend to have high number of collaborators,
the number of alters in their ego networks is also high, and
thus more number of ego-centric circles are detected for the
highly-cited authors.
In Figure 4(b), we plot the average size (measured in terms
of the number of nodes) of the ego-centric circles for the
authors in different citation range. Once again, the average
size of the circles increases with the increase of citations per
author. It essentially indicates that for the highly-cited egos,
the alters are not only high in number but also form large
cohesive groups.
Since each author is also an alter in her neighbors' ego
networks, she might be a part of multiple such ego-centric
circles. Figure 4(c) shows the number of such ego-centric
circles to which an author belongs to. This plot highly cor-
relates with Figure 4(a), and shows that since highly-cited
authors have more number of alters in their ego networks,
each of them also belongs to multiple local circles of her
neighbors' ego networks.
Further, we measure the degree of cliquishness (the ratio of
the number of existing edges in the circle and the maximum
number of possible edges in the circle) of each ego-centric cir-
cle. For each ego, we measure the average cliquishness of her
surrounding circles in the ego network. Figure 4(d) shows
that the average value of cliquishness initially decreases with
the increase of the number of citations per author, then it
starts increasing. The reason could be that since both the
number and the size of the ego-centric circles for low-cited
authors are less, the maximum number of possible edges
within a circle is also less, which in turn acts as the reason
of high cliquishness for low-cited authors. In the middle cita-
tion zone, both the number and the average size of the circles
are moderate. However, the number of edges that material-
ize within these circles is less as compared to the maximum
number of possible edges, thus accounting for the sparseness
of these circles. Therefore, the value of cliquishness of cir-
cles spawned by authors in the middle range of citations is
comparatively low. However, the value of cliquishness starts
increasing for the authors having citations more than 100.
c
S
e
z
i
s
f
o
s
e
l
c
r
i
c
f
o
%
6
4
2
0
0
(a)
50
100
Size of a circle, S
c
c
C
s
s
e
n
h
s
i
h
q
i
l
c
f
o
s
e
l
c
r
i
c
f
o
%
8
6
4
2
(b)
s
e
l
c
r
i
c
f
o
1
0.8
0.6
0.4
0.2
0
(c)
c
s
e
l
c
r
i
c
N
g
n
i
v
a
h
s
o
g
e
f
o
%
50
100
Size of a circle, S
c
(d)
12
10
8
6
4
2
0
0
60
No of ego−centric circles, N
c
20
40
c
S
e
z
i
s
f
o
s
s
e
n
h
s
i
u
q
i
l
c
g
v
A
0
0
1
Cliquishness of a circle, C
c
0.5
Figure 5: (Color online) Circle-specific characteristics of detected ego-centric circles: (a) distribution of
the size of the ego-centric circles, (b) distribution of the cliquishness of the ego-centric circles, (c) average
cliquishness of the circles having a particular size, and (d) percentage of egos surrounded by a particular
number of ego-centric circles.
This signifies that for the highly-cited authors, despite the
apparently large size of circles, the probability that an edge
actually materializes in the real network tends to increase.
This explains the formation of dense ego-centric cliques sur-
rounding the ego in the high-citation range.
8.2 Circle-specific Analysis
Now we look into some of the characteristic features spe-
cific to an ego-centric circle. In Figure 5(a), we plot the per-
centage of ego-centric circles having a particular size Sc. It
follows a Gaussian distribution at the beginning along with
a heavy tail at the end. We observe that around 65.26%
circles have sizes ranging between 4-30. However, the flat
tail at the end shows that more than 15% circles have size
greater than 50. Figure 5(b) shows the distribution of the
cliquishness (Cc) of the ego-centric circles. Surprisingly, it
again follows a Gaussian distribution with mean ∼ 0.44 and
variance ∼ 0.02. We notice that around 59.28% circles have
cliquishness values ranging between [0.4, 0.6] which is quite
high. Further inspection reveals that low-degree egos are
surrounded by small-size circles and therefore their cliquish-
ness value is quite high. To get a clear idea of the relation be-
tween the size and the cliquishness of the ego-centric circles,
we plot in Figure 5(c) the average cliquishness of the circles
having a specific size. The value of cliquishness Cc gradually
decreases with the increase of the size Sc till Sc=40, which
is followed by a sharp increase. As mentioned earlier, the
increase of cliquishness at the end once again emphasizes
that the large-size circles centered around the highly-cited
authors are relatively dense. Finally, we plot the percentage
of egos surrounded by a specific number of circles in Figure
5(d). As expected, we observe that the plot has a declining
trend from the very beginning, which once again highlights
our previous observation that most of the low-cited authors
have a low degree in the co-authorship network, and spawn
only a few ego-centric circles. Since the co-authorship net-
work is mostly dominated by low-degree authors, most of
the egos are fringed by a small number of local circles.
9.
INTERPRETATION OF EGO-CENTRIC
CIRCLES
In co-authorship network, most intuitive ground-truth com-
munities are often assumed to be different areas of research
[7] in a particular domain. Therefore, one can interpret each
ego-centric circle as a group of coauthors working in a spe-
cific research area. Since we know the major research area
of each author in the dataset, for each ego we further group
its coauthors based on only their major research area such
that each circle corresponds to an area and constitutes coau-
(a)
Circles detected by the model
Field−based circles
s
s
e
n
h
s
i
u
q
i
l
c
.
g
v
A
0.3
0.25
0.2
0.15
0.1
0.05
0
0
4000
2000
10000
Authors (arranged in decreasing order of the
cliquishness of circles detected by our model)
6000
8000
y
t
i
e
n
e
g
o
m
o
h
.
g
v
A
)
e
c
n
a
i
r
a
v
h
t
i
w
(
1
0.8
0.6
0.4
0.2
0
(b)
Range 1
Range 2
Range 4
Different citation ranges of authors
Range 3
Figure 6: (Color online) (a) Comparison of cliquish-
ness of area-based circles and the circles detected
by our model, (b) average homogeneity of the ego-
centric circles detected by our model for the authors
categorized into four zones as per number of cita-
tions: Range 1 (>200), Range 2 (>100 & <=200),
Range 3 (>30 & <=100) and Range 4 (<=30).
thors working on this area. Then we measure the average
cliquishness of the research field based circles for each au-
thor vis-a-vis that of the ego-centric circles detected by our
model. Essentially, we intend to cross-validate our hypothe-
sis that considering a single dimensional feature vector of an
author such as the field information is not an appropriate
way of encircling alters; rather each circle might represent
individual dimension of cohesiveness among its constituent
nodes as shown in Figure 1. In Figure 6(a), we plot the av-
erage cliquishness of field-based circles vis-a-vis that of the
circles detected by the model surrounding each author. As
expected, the cliquishness of the detected circles is signifi-
cantly higher than that of the field-based circles. Therefore,
we conclude that the field-based circles might not appropri-
ately group highly cohesive nodes, rather the circles detected
by our model seem to be more representative and meaning-
ful.
We further mark each of the detected circles by that field
which is also the major research area for most of its con-
stituent coauthors. Then for each ego, we measure the frac-
tion of circles belonging to each of the 24 fields. There-
fore, each ego/author can now be represented by a vector
of size 24 whose ith entry represents the fraction of ego-
centric circles marked by field i. Figure 7 shows three heat
maps corresponding to highly-cited, medium-cited and low-
cited authors. For the sake of brevity, we only plot val-
ues for 1000 authors from each citation range although the
results are similar for other authors. We observe that for
highly-cited authors, ego-centric circles are mostly marked
by few fields, which indicates that the highly-cited authors
tend to collaborate with people from similar research area.
If this is true, then the immediate question would be why
D
I
r
o
h
t
u
A
(a)
200
400
600
800
1000
Highly−cited
1
0.8
0.6
0.4
0.2
0
5
10
15
20
(b)
200
400
600
800
Medium−cited
0.08
0.06
0.04
0.02
5
1000
24 fields in computer science
10
15
20
0
(c)
200
400
600
800
1000
Low−cited
0.1
0.05
0
5
10
15
20
Figure 7:
(Color online) Heat maps representing
the fraction of ego-centric circles marked by each
of the 24 fields for highly-cited, medium-cited and
low-cited authors. For each author, the elements in
the horizontal axis are sorted in descending order.
the coauthors having same research interest are encircled
into different groups by our model. Further inspection re-
veals that along with the field, each group also represents
the time of collaboration. For instance, the ego network of
Author 12 (one of the highly-cited authors) is shown in Fig-
ure 8(a). One group of her ego network encircles authors
in Data Mining who have coauthored with her during 1997 --
2000. Another such group constitutes authors from Machine
Learning, who have collaborated with her during 2000 -- 2003.
Therefore, the field of research and the time of collaboration
act as two major dimensions in this case.
Next for the medium-cited authors, the heat map in Fig-
ure 7(b) shows that the distribution of circles into different
fields seems to be much more uniform as compared to Figure
7(a). The example shown in Figure 8(b) also corroborates
with the hypothesis that with the decrease of citations, the
ego-centric circles tend to become even more complicated
to be interpreted distinctly. From Figure 8(b), we notice
that the time duration of collaboration corresponding to
the circles are overlapping and, therefore, it is very hard
to distinguish these circles. The result is even more clut-
tered for low-cited authors as shown in Figures 7(c) and
8(c). These results thus lead to a general conclusion that
the highly-cited authors seem to coauthor with a group of
people having a specific research interest in a particular time
period and then move to another such group of coauthors;
whereas this tendency is not so prominent for medium- and
low-cited authors. However, we posit that there might be
other dimensions (such as the name of the Institute where
the author belongs to) that might help us interpret these
circles more clearly.
Homogeneity of ego-centric circles. We define a field-
based homogeneity for ego-centric circles to verify if, in most
cases, authors from the same field tend to form communi-
ties and whether the circles spawned by our unsupervised
approach are able to capture this tendency. Given a circle
C, we define FC,i to be the fraction of authors in C with
major field fi. One can easily infer that a uniform distribu-
tion FC,i implies that the circle is homogeneous with respect
to the field of work while a skewed distribution (with ma-
jority of authors in one or two fields) characterizes a more
field-specific circle. In particular, we define the homogene-
ity coefficient H(C) for circle C in terms of the entropy of
the circle with respect to the distribution across different
2The names of the authors are anonymized in order to main-
tain privacy.
fields as in Equation 16. Greater the entropy, lesser is the
homogeneity and vice versa.
H(C) =
1
1 − P24
i=1 FC,i log(FC,i)
(16)
Figure 6(b) captures the average homogeneity of circles in
the ego-network of authors in four different citation ranges.
We note that the homogeneity is highest for the authors
with very high citation ranges (> 200) and has low variance,
indicating that highly-cited authors tend to spawn circles
that have alters in very similar fields, whereas authors with
medium citations (30−100) spawn more diverse circles. The
authors with low citations (≤ 30) exhibit higher degree of
homogeneity than those in the medium range, but this may
be attributed to the fact that they spawn very small-sized
circles.
10. TASK BASED EVALUATION
We further evaluate the quality of the circles through a
task based evaluation framework -- the task of collaboration
prediction. We choose two supervised learning models: lin-
ear regression (LR) [4] and supervised random walks (SRW)
[4]. Then we demonstrate that inclusion of the ego-centric
circles detected by our model as a feature in the feature
set would eventually enhance the performance of this model
with respect to the one in which the circle information is
missing.
10.1 Problem Definition
For our problem, we assume a temporal graph GT =
(VT , ET ) where VT represents a set of nodes such that each
node ut ∈ VT is associated with a time stamp t indicating
its first appearance in GT , and each edge eti,tj = (uti , vtj )
connects two nodes uti and vtj (such that uti ,vtj ∈ VT and
ti <= tj ). Each node ut is also associated with a feature
vector fut at time stamp t, whose entires might change over
time. Now, given a longitudinal snapshot of the graph GT
from the beginning till time T
, say GT ′ = (VT ′ , ET ′ ), the
collaboration prediction problem aims at predicting the col-
laborations which are going to appear among the vertices in
VT ′ within ∆t time period after T
This task is very challenging due to extreme sparsity of
real networks where each node is connected to only a very
small fraction of all other nodes in the network (the presence
of high proportion of negative evidences in the dataset).
10.2 Feature Set
.
′
′
We use a set of node- and edge-level features for the learn-
ing models. The following set of node-level features (denoted
by N ) are used. Each feature is normalized by the maximum
value of the corresponding feature so that the values range
between 0 to 1.
• Normalized number of citations received by an author
• Normalized h-index of an author
• Normalized number of coauthors of an author
• Fraction of papers by an author in each of the 24 fields
• Normalized number of papers written by an author
• Fraction of papers published by an author in each of the
five decades (between 1960-2009)
Further, given an edge e = (x, y) in the co-authorship net-
work, we additionally use the following edge-level features
(denoted by E). Each feature is appropriately normalized
Figure 8: (Color online) Examples of ego-networks from three citation zones. Individual nodes have different
colors corresponding to different areas of research. If the color of all the nodes in a circle is same as the color
of the circle, the value of homogeneity is 1. Time period (ti − tj) associated with each circle indicates that
the ego has written a paper first (last) time with anyone of its constituent coauthors at year ti (tj ).
to a value between 0 and 1.
• Fraction of papers coauthored by x and y in each of the
five decades
• Normalized number of common coauthors of x and y
• Fraction of papers authored by x in the major field of y
• Fraction of papers authored by y in the major field of x
We refer to the combined set of both node- and edge-
level features by N E. We provide this set N E of node and
edge attributes as an input to the learning model which then
takes care of determining how to combine them with the
network structure to make predictions [4]. Note that if we
take the dataset till t for training the model, all the features
mentioned above will be calculated based on the statistics
of each vertex till t in order to avoid information leakage.
10.3 Evaluation Methodology
In order to demonstrate that predictions are robust ir-
respective of the time stamp considered for dividing the
dataset into training and test sets, we run the competing
models in three different time periods: (i) the dataset till
1995 is considered for training and the accuracies of the
models are measured by comparing the new edges formed
between 1996-1999, (ii) similarly, the dataset till 2000 for
training and 2001-2004 for checking the accuracy, and (iii)
the dataset till 2005 for training and 2006-2009 for checking
the accuracy.
In each time stamp, we evaluate the methods on the test
set, considering two performance metrics: the Area under
the ROC curve (AU C) and the Precision at Top 20 (P rec@20),
i.e., for each node s, what fraction of top 20 nodes sug-
gested by each model actually receive links from s later.
This measure is particularly appropriate in the context of
link-recommendation where we present a user with a set of
suggested coauthors and aim that most of them are correct.
10.4 Performance Evaluation
We compare the predictive performance of two learning
models including the circle information in three different
time periods as mentioned in Section 10.3. We iterate each
of these collaboration prediction models using different sets
of features: (i) only node-level features (Model: N), (ii) only
edge-level features (Model: E), (iii) both node and edge level
features (Model: NE), (iv) besides node and edge level fea-
tures, including a binary feature B that checks whether a
pair of nodes (x, y) belong to at least one common ego-
centric circle or not (Model: NEB), and (v) besides node-
level and edge-level features and the binary circle informa-
tion, including a numeric feature C indicating the number
of common circles a pair of nodes (x, y) is a part of (Model:
NEBC). The circles are detected by our model, the coordi-
nate ascent method (CA) [15, 16] and BIGCLAM separately.
Table 1 shows the performance of these two prediction
models with different feature sets. We notice that edge fea-
tures are more effective than node features, and the per-
formance improves incrementally after combining different
features together. A general observation is that inclusion
of circle information in the feature set improves the perfor-
mance of both the prediction models irrespective of the time
periods. For instance, it improves the performance by 9.87%
and 15.25% on average in terms of AU C and P rec@20 re-
spectively compared to the case, where the circle information
is not present (N E).
We further observe that the inclusion of circle information
detected by our model significantly outperforms the case
where the circles are obtained by BIGCLAM and CA in each
time stamp. Including the binary circle information (N EB)
from our model achieves an average AUC improvement of
2.16% and 3.51% respectively for LR and SRW models (sim-
ilarly, in terms of P rec@20, the improvement is 3.75% and
2.94% respectively for LR and SRW models) compared to
BIGCLAM (CA).
Further, including the count of common circles for a node
pair (N EBC) in the feature set leads both LR and SRW
to achieve even better performance. We observe an aver-
age AUC improvement of 3.41% (1.11%) and 3.31% (0.57%)
respectively for LR and SRW models using our circle infor-
mation as compared to that obtained from BIGCLAM (CA)
(similarly, in terms of P rec@20, the improvement is 6.35%
(5.14%) and 6.16% (3.22%) respectively for LR and SRW
models).
11. CONCLUSIONS AND FUTURE WORK
Circles allow us to organize the overwhelming volumes of
data generated by an author's personal academic network.
In this work, we proposed a simple yet effective method
of detecting ego-centric circles in co-authorship networks.
However, the proposed method is applicable to any general
ego network given a suitable set of features. Our model is un-
supervised and combines node attributes and node similari-
ties to identify circles that resemble communities in real net-
works. Experiments with four state-of-the-art overlapping
community detection algorithms showed that our method
outperformed these baseline algorithms. Further, a task
based evaluation achieved a superior performance after in-
clusion of the circle information detected by our model.
In future, we would like to develop a semi-supervised ver-
sion of our algorithm that makes use of manually labeled
Table 1: Comparison of BIGCLAM (BIG), coordinate ascent method (CA) [15, 16] and our model (CIRC)
after including their detected circle information into the feature set of Linear Regression (LR) and Supervised
Random Walks (SRW) frameworks across three time periods and different feature sets (N: node-level, E:
edge-level, NE: node- and edge-level, NEB: adding the binary circle information to NE, NEBC: adding the
numerical circle information to NEB).
Time
period
N
E
NE
1996-1999
2001-2004
2006-2009
Average
0.5872
0.5890
0.5916
0.5893
0.5914
0.5907
0.5891
0.5904
0.6451
0.6528
0.6436
0.6472
Linear Regression (LR)
BIG
0.6569
0.6529
0.6439
0.6512
NEB
CA
0.6689
0.6437
0.6510
0.6545
CIRC
0.6791
0.6659
0.6509
0.6653
BIG
0.6989
0.6845
0.6905
0.6913
Supervised Random Walks (SRW)
NEBC
CA
0.7195
0.7011
0.7001
0.7069
CIRC
0.7235
0.7012
0.7198
0.7148
N
E
NE
0.6332
0.6419
0.6360
0.6370
0.6478
0.6514
0.6608
0.6533
0.7659
0.7591
0.7609
0.7620
BIG
0.7908
0.8067
0.8001
0.7992
NEB
CA
0.7895
0.8035
0.8101
0.8101
CIRC
0.8275
0.8249
0.8295
0.8273
BIG
0.7971
0.8098
0.8111
0.8060
NEBC
CA
0.8296
0.8149
0.8279
0.8279
CIRC
0.8303
0.8356
0.8321
0.8327
Area Under the ROC Curve (AUC)
Time
period
N
E
NE
1996-1999
2001-2004
2006-2009
Average
0.137
0.141
0.147
0.142
0.124
0.143
0.142
0.136
0.152
0.156
0.161
0.156
Linear Regression (LR)
BIG
0.155
0.162
0.162
0.160
NEB
CA
0.161
0.159
0.165
0.162
CIRC BIG
0.164
0.158
0.175
0.169
0.179
0.171
0.166
0.173
NEBC
CA
0.173
0.175
0.178
0.175
CIRC
0.177
0.185
0.189
0.184
Supervised Random Walks (SRW)
N
E
NE
0.165
0.158
0.161
0.161
0.172
0.163
0.169
0.168
0.201
0.198
0.199
0.199
BIG
0.205
0.200
0.208
0.204
NEB
CA
0.209
0.210
0.209
0.209
CIRC BIG
0.207
0.210
0.215
0.209
0.211
0.212
0.210
0.211
NEBC
CA
0.215
0.220
0.217
0.217
CIRC
0.223
0.225
0.224
0.224
P rec@20
data. Although most authors may not want to label the
circles manually, it would be highly desirable to make use
of the information from those few who do. Additionally, we
would also like to apply the proposed method on the other
datasets.
12. ACKNOWLEDGMENTS
The first author is financially supported by Google India
PhD fellowship.
13. REFERENCES
[1] A. Abbasi, K. S. K. Chung, and L. Hossain.
Egocentric analysis of coauthorship network structure,
position and performance. Inf. Process. Manage.,
48(4):671 -- 679, July 2012.
[2] A. Abbasi, R. T. Wigand, and L. Hossain. Measuring
social capital through network analysis and its
influence on individual performance. Libr Inform Sci
Res, 36(1):66 -- 73, 2014.
[3] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P.
Xing. Mixed membership stochastic blockmodels. J.
Mach. Learn. Res., 9:1981 -- 2014, June 2008.
[4] L. Backstrom and J. Leskovec. Supervised random
walks: predicting and recommending links in social
networks. In WSDM, pages 635 -- 644, 2011.
[5] R. Balasubramanyan and W. W. Cohen. Block-lda:
Jointly modeling entity-annotated text and
entity-entity links. In SDM, pages 450 -- 461, 2011.
[6] K. Borner, L. Dall'Asta, W. Ke, and A. Vespignani.
Studying the emerging global brain: Analyzing and
visualizing the impact of co-authorship teams:
Research articles. Complex., 10(4):57 -- 67, Mar. 2005.
[7] T. Chakraborty, S. Sikdar, N. Ganguly, and
A. Mukherjee. Citation interactions among computer
science fields: a quantitative route to the rise and fall
of scientific research. SNAM, 4(1), 2014.
[8] J. P. Eaton, J. C. Ward, A. Kumar, and P. H.
Reingen. Social-structural foundations of publication
productivity in the Journal of Consumer Research. J
Consum Res, 11(10):199 -- 210, 2002.
[9] S. Fortunato. Community detection in graphs. Physics
Reports, 486(3-5):75 -- 174, 2010.
[10] S. Gregory. Finding overlapping communities in
networks by label propagation. New Journal of
Physics, 12(10):103018, 2010.
[11] K. C. H. Shen, X. Cheng and M. B. Hu. Detect
overlapping and hierarchical community structure in
networks. Physica A, 388(8):1706 -- 1712, 2009.
[12] D. Jurafsky and J. H. Martin. Speech and Language
Processing: An Introduction to Natural Language
Processing, Computational Linguistics, and Speech
Recognition. Prentice Hall PTR, USA, 2000.
[13] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and
S. Fortunato. Finding statistically significant
communities in networks. PLoS ONE, 6(4):e18961,
2011.
[14] J. Liu and T. Liu. Detecting community structure in
complex networks using simulated annealing with
-means algorithms. Physica A, 389(11):2300 -- 2309,
2010.
[15] J. J. McAuley and J. Leskovec. Learning to discover
social circles in ego networks. In NIPS, pages 548 -- 556,
2012.
[16] J. J. McAuley and J. Leskovec. Discovering social
circles in ego networks. TKDD, 8(1):4, 2014.
[17] C. McCarty, J. Jawitz, A. Hopkins, and A. Goldman.
Predicting author h-index using characteristics of the
co-author network. Scientometrics, 96(2):467 -- 483,
2013.
[18] A. Mislove, B. Viswanath, P. K. Gummadi, and
P. Druschel. You are who you know: inferring user
profiles in online social networks. In WSDM, pages
251 -- 260, 2010.
[19] M. E. J. Newman and M. Girvan. Finding and
evaluating community structure in networks. Phys.
Rev. E, 69(026113), 2004.
[20] J. Xie and B. K. Szymanski. Towards linear time
overlapping community detection in social networks.
In PAKDD, pages 25 -- 36, 2012.
[21] E. Yan and Y. Ding. Applying centrality measures to
impact analysis: A coauthorship network analysis.
JASIST, 60(10):2107 -- 2118, Oct. 2009.
[22] J. Yang and J. Leskovec. Overlapping community
detection at scale: A nonnegative matrix factorization
approach. In WSDM, pages 587 -- 596, New York, USA,
2013. ACM.
(b)
1
0.8
0.6
0.4
0.2
(c)
1
0.8
0.6
0.4
0.2
1
0
0
0.5
False positive rate
1
0
0
0.5
Algorithms
BIGCLAM
SLPA
OSLOM
COPRA
Field based
Our method
0.2
0.3
τ
L
0.4
0.5
|
1611.02305 | 1 | 1611 | 2016-11-07T21:28:40 | Learning Influence Functions from Incomplete Observations | [
"cs.SI",
"cs.LG",
"stat.ML"
] | We study the problem of learning influence functions under incomplete observations of node activations. Incomplete observations are a major concern as most (online and real-world) social networks are not fully observable. We establish both proper and improper PAC learnability of influence functions under randomly missing observations. Proper PAC learnability under the Discrete-Time Linear Threshold (DLT) and Discrete-Time Independent Cascade (DIC) models is established by reducing incomplete observations to complete observations in a modified graph. Our improper PAC learnability result applies for the DLT and DIC models as well as the Continuous-Time Independent Cascade (CIC) model. It is based on a parametrization in terms of reachability features, and also gives rise to an efficient and practical heuristic. Experiments on synthetic and real-world datasets demonstrate the ability of our method to compensate even for a fairly large fraction of missing observations. | cs.SI | cs | Learning Influence Functions from Incomplete Observations
Xinran He
Ke Xu
University of Southern California, Los Angeles, CA 90089
David Kempe
Yan Liu
6
1
0
2
v
o
N
7
]
I
S
.
s
c
[
1
v
5
0
3
2
0
.
1
1
6
1
:
v
i
X
r
a
{xinranhe, xuk, dkempe, yanliu.cs}@usc.edu
November 9, 2016
Abstract
We study the problem of learning influence functions under incomplete observations of node
activations. Incomplete observations are a major concern as most (online and real-world) social
networks are not fully observable. We establish both proper and improper PAC learnability
of influence functions under randomly missing observations. Proper PAC learnability under
the Discrete-Time Linear Threshold (DLT) and Discrete-Time Independent Cascade (DIC)
models is established by reducing incomplete observations to complete observations in a modified
graph. Our improper PAC learnability result applies for the DLT and DIC models as well as the
Continuous-Time Independent Cascade (CIC) model. It is based on a parametrization in terms
of reachability features, and also gives rise to an efficient and practical heuristic. Experiments
on synthetic and real-world datasets demonstrate the ability of our method to compensate even
for a fairly large fraction of missing observations.
1
Introduction
Many social phenomena, such as the spread of diseases, behaviors, technologies, or products, can
naturally be modeled as the diffusion of a contagion across a network. Owing to the potentially
high social or economic value of accelerating or inhibiting such diffusions, the goal of understanding
the flow of information and predicting information cascades has been an active area of research
[10, 7, 9, 14, 1, 20]. In this context, a key task is learning influence functions: the functions mapping
sets of initial adopters to the individuals who will be influenced (also called active) by the end of the
diffusion process [10].
Many methods have been developed to solve the influence function learning problem [9, 7, 5, 8, 3,
16, 18, 24, 25]. Most approaches are based on fitting the parameters of a diffusion model based on
observations, e.g., [8, 7, 18, 9, 16]. Recently, Du et al. [3] proposed a model-free approach to learn
influence functions as coverage functions; Narasimhan et al. [16] establish proper PAC learnability of
influence functions under several widely-used diffusion models.
All existing approaches rely on the assumption that the observations in the training dataset are
complete, complete, in the sense that all active nodes are observed as being active. However, this
assumption fails to hold in virtually all practical applications [15, 6, 2, 21]. For example, social media
data are usually collected through crawlers or acquired with public APIs provided by social media
platforms, such as Twitter or Facebook. Due to non-technical reasons and established restrictions
on the APIs, it is often impossible to obtain a complete set of observations even for a short period
1
of time. In turn, the existence of unobserved nodes, links, or activations may lead to a significant
misestimation of the diffusion model's parameters [19, 15].
In this paper, we take a step towards addressing the problem of learning influence functions from
incomplete observations (Here specifically we mean missing activation in the observed cascades).
Missing data are a complicated phenomenon, but to address it meaningfully and rigorously, one must
make at least some assumptions about the process resulting in the loss of data. As a first step, we
focus on random loss of observations: for each activated node independently, the node's activation
is observed only with probability r, the retention rate, and fails to be observed with probability
1 − r. Random observation loss naturally occurs when crawling data from social media, where rate
restrictions are likely to affect all observations equally.
We establish both proper and improper PAC learnability of influence functions under incomplete
observations for two popular diffusion models: the Discrete-Time Independent Cascade (DIC) and
Discrete-Time Linear Threshold (DLT) models. The result is proved by interpreting the incomplete
observations as complete observations in a transformed graph, In fact, randomly missing observations
do not significantly increase the required sample complexity.
The PAC learnability result implies good sample complexity bounds for the DIC and DLT models.
However, even without missing observations, proper PAC learnability of the CIC and other models
appears to be more challenging. Furthermore, the PAC learnability result does not lead to an
efficient algorithm, as it involves marginalizing a large number of hidden variables (one for each
node not observed to be active).
Towards designing more practical algorithms and obtaining learnability under a broader class of
diffusion models, we pursue improper learning approaches. Concretely, we use the parameterization of
Du et al. [3] in terms of reachability basis functions, and optimize a modified loss function suggested
by Natarajan et al. [17] to address incomplete observations. We prove that the algorithm ensures
improper PAC learning for the DIC, DLT and Continuous-Time Independent Cascade (CIC) models.
Experimental results on synthetic cascades generated from these diffusion models and real-world
cascades in the MemeTracker dataset demonstrate the effectiveness of our approach. Our algorithm
achieves nearly a 20% reduction in estimation error compared to the best baseline methods on the
MemeTracker dataset, by compensating for incomplete observations.
Several recent works also aim to address the issue of missing observations in social network
analysis, but with different emphases. For example, Chierichetti et al. [2] and Sadikov et al. [21]
mainly focus on recovering the size of a diffusion process, while our task is to learn the influence
functions from several incomplete cascades. Myers et al. [15] mainly aim to model unobserved
external influence in diffusion. Duong et al. [6] examine learning diffusion models with missing
links from complete observations, while we learn influence functions from incomplete cascades with
missing activations. Most related to our work are papers by Wu et al. [23] and simultaneous work by
Lokhov [13]. Both study the problem of network inference under incomplete observations. Lokhov
proposes a dynamic message passing approach to marginalize all the missing activations, in order
to infer diffusion model parameters using maximum likelihood estimation, while Wu et al. develop
an EM algorithm. Notice that the goal of learning the model parameters differs from our goal of
learning the influence functions directly. Both [13] and [23] provide empirical evaluation, but do not
provide theoretical guarantees.
2
2 Preliminaries
2.1 Models of Diffusion and Incomplete Observations
Diffusion Model. We model propagation of opinions, products, or behaviors as a diffusion process
over a social network. The social network is represented as a directed graph G = (V, E), where
n = V is the number of nodes, and m = E is the number of edges. Each edge e = (u, v) is
associated with a parameter wuv representing the strength of influence user u has on v. We assume
that the graph structure (the edge set E) is known, while the parameters wuv are to be learned.
Depending on the diffusion model, there are different ways to represent the strength of influence
between individuals. Nodes can be in one of two states, inactive or active. We say that a node gets
activated if it adopts the opinion/product/behavior under the diffusion process. In this work, we
focus on progressive diffusion models, where a node remains active once it gets activated.
The diffusion process begins with a set of seed nodes (initial adopters) S, who start active. The
process then proceeds in discrete or continuous time: according to a probabilistic process, additional
nodes may become active based on the influence from their neighbors. Let N (v) be the in-neighbors
of node v and At the set of nodes activated by time t. We consider the following three widely used
diffusion models:
• Discrete-time Linear Threshold (DLT) model [10]: Each node v has a threshold θv
drawn independently and uniformly from the interval [0, 1]. The diffusion under the DLT
model unfolds in discrete time steps: a node v becomes active at step t if the total incoming
weight from its neighbors exceeds its threshold: (cid:80)
• Discrete-time Independent Cascade (DIC) model [10]: The DIC model is also a
discrete-time model. Under the DIC model, the weight wuv ∈ [0, 1] captures an activation
probability. When a node u becomes active in step t, it attempts to activate all currently
inactive neighbors in step t + 1. For each neighbor v, it succeeds with probability wuv. If it
succeeds, v becomes active; otherwise, v remains inactive. Once u has made all these attempts,
it does not get to make further activation attempts at later times.
u∈N (v)∩At−1
wuv ≥ θv.
• Continuous-time Independent Cascade (CIC) model [8]: The CIC model unfolds in
continuous time. Each edge e = (u, v) is associated with a delay distribution with wuv as its
parameter. When a node u becomes newly active at time t, for every neighbor v that is still
inactive, a delay time duv is drawn from the delay distribution. duv is the duration it takes u to
activate v, which could be infinite (if u does not succeed in activating v). Nodes are considered
activated by the process if they are activated within a specified observation window [0, τ ].
Fix one of the diffusion models defined above and its parameters. For each seed set S, let ∆S be
the distribution of final active sets when the seed set is S. (In the case of the DIC and DLT model,
this is the set of active nodes when no new activations occur; for the CIC model, it is the set of
nodes active at time τ.) For any node v, let Fv(S) = ProbA∼∆S [v ∈ A] be the (marginal) probability
that v is activated according to the dynamics of the diffusion model with initial seeds S. Then,
define the influence function F : 2V → [0, 1]n mapping seed sets to the vector of marginal activation
probabilities: F (S) = [F1(S), . . . , Fn(S)]. Notice that the marginal probabilities do not capture the
full information about the diffusion process contained in ∆S (since they do not observe co-activation
patterns), but they are sufficient for many applications, such as influence maximization [10] and
influence estimation [4].
3
Cascades and Incomplete Observations. We focus on the problem of learning influence func-
tions from cascades. A cascade C = (S, A) is a realization of the random diffusion process; S is
the set of seeds and A ∼ ∆S, A ⊇ S is the set of activated nodes at the end of the random process.
Similar to Narasimhan et al. [16], we focus on activation-only observations, namely, we only observe
which nodes were activated, but not when these activations occurred.1
To capture the fact that some of the node activations may have been unobserved, we use the
following model of independently randomly missing data: for each (activated) node v ∈ A \ S, the
activation of v is actually observed independently with probability r. With probability 1 − r, the
node's activation is unobservable. For seed nodes v ∈ S, the activation is never lost. Formally, define
A as follows: each v ∈ S is deterministically in A, and each v ∈ A \ S is in A independently with
probability r. Then, the incomplete cascade is denoted by C = (S, A).
n · x − y2
2.2 Objective Functions and Learning Goals
To measure estimation error, we primarily use a quadratic loss function, as in [16, 3]. For two
n-dimensional vectors x, y, the quadratic loss is defined as (cid:96)sq(x, y) = 1
2. We also use
this notation when one or both arguments are sets: when an argument is a set S, we formally mean
to use the indicator function χS as a vector, where χS(v) = 1 if v ∈ S, and χS(v) = 0 otherwise. In
particular, for an activated set A, we write (cid:96)sq(A, F (S)) = 1
We now formally define the problem of learning influence functions from incomplete observations.
Let P be a distribution over seed sets (i.e., a distribution over 2V ), and fix a diffusion model M and
parameters, together giving rise to a distribution ∆S for each seed set. The algorithm is given a
set of M incomplete cascades C = {(S1, A1), . . . , (SM , AM )}, where each Si is drawn independently
from P, and Ai is obtained by the incomplete observation process described above from the (random)
activated set Ai ∼ ∆Si. The goal is to learn an influence function F that accurately captures the
diffusion process. Accuracy of the learned influence function is measured in terms of the squared
error with respect to the true model: errsq[F ] = ES∼P,A∼∆S [(cid:96)sq(A, F (S))]. That is, the expectation
is over the seed set and the randomness in the diffusion process, but not the data loss process.
nχA − F (S)2
2.
PAC Learnability of Influence Functions. We characterize the learnability of influence func-
tions under incomplete observations using the Probably Approximately Correct (PAC) learning
framework [22]. Let FM be the class of influence functions under the diffusion model M, and
FL the class of influence functions the learning algorithm is allowed to choose from. We say
that FM is PAC learnable if there exists an algorithm A with the following property:
for all
ε, δ ∈ (0, 1), all parametrizations of the diffusion model, and all distributions P over seed sets S:
when given activation-only and incomplete training cascades C = {(S1, A1), . . . , (SM , AM )} with
M ≥ poly(n, m, 1/ε, 1/δ), A outputs an influence function F ∈ FL satisfying:
Prob C[errsq[F ] − errsq[F ∗] ≥ ε] ≤ δ.
Here, F ∗ ∈ FM is the ground truth influence function. The probability is over the training
cascades, including the seed set generation, the stochastic diffusion process, and the missing data
process. We say that an influence function learning algorithm A is proper if FL ⊆ FM; that is, the
learned influence function is guaranteed to be an instance of the true diffusion model. Otherwise, we
say that A is an improper learning algorithm.
1Narasimhan et al. [16] refer to this model as partial observations; we change the terminology to avoid confusion
with "incomplete observations."
4
Figure 1: Illustration of the graph transformation. The light green node is the seed, the dark green
nodes are the activated and observed nodes while the yellow node is activated but lost due to
incomplete observations.
3 Proper PAC Learning under Incomplete Observations
In this section, we establish proper PAC learnability of influence functions under the DIC and DLT
models. For both diffusion models, FM can be parameterized by an edge parameter vector w, whose
entries we are the activation probabilities (DIC model) or edge weights (DLT model). Our goal is to
find an influence function F w ∈ FM that outputs accurate marginal activation probabilities. While
our goal is proper learning - meaning that the function must be from FM - we do not require
that the inferred parameters match the true edge parameters w. Our main theoretical results are
summarized in Theorem 1 and Theorem 2.
Theorem 1. Let λ ∈ (0, 0.5). The class of influence functions under the DIC model in which all
edge activation probabilities satisfy we ∈ [λ, 1 − λ] is PAC learnable under incomplete observations
with retention rate r. The sample complexity is O( n3m
Theorem 2. Let λ ∈ (0, 0.5), and consider the class of influence functions under the DLT model such
u∈N (v) wuv ∈
[λ, 1 − λ]. This class is PAC learnable under incomplete observations with retention rate r. The
sample complexity is O( n3m
that the edge weight for every edge satisfies we ∈ [λ, 1 − λ], and for every node v, 1 −(cid:80)
ε2r4 ).
ε2r4 ).
proof are provided in Appendix A.
In this section, we present the intuition and a proof sketch for the two theorems. Details of the
The key idea of the proof of both theorems is that a set of incomplete cascades C on G under the
two models can be considered as essentially complete cascades on a transformed graph G = ( V , E).
The influence functions of nodes in G can be learned using a modification of the result of Narasimhan et
al. [16]. Subsequently, the influence functions for G are directly obtained from the influence functions
for G, by exploiting that influence functions only focus on the marginal activation probabilities.
The transformed graph G is built by adding a layer of n nodes to the original graph G. For each
node v ∈ V of the original graph, we add a new node v(cid:48) ∈ V (cid:48) and a directed edge (v, v(cid:48)) with known
and fixed edge parameter wvv(cid:48) = r. (Conveniently, the same parameter value serves as activation
probability under the DIC model and as edge weight under the DLT model.) The new nodes V (cid:48)
have no other incident edges, and we retain all edges e = (u, v) ∈ E. Inferring their parameters is
the learning task. An example of the transformation on a simple graph consisting of four nodes is
shown in Figure 1.
5
𝐺𝑢𝑣𝑤𝑥𝑢𝑣𝑤𝑥𝑢'𝑣′𝑤′𝑥′𝐺'For each observed (incomplete) cascade (Si, Ai) on G (with Si ⊆ Ai), we produce an observed
i deterministically; (2) for each
i with probability r. This defines the training cascades
i as follows: (1) for each v ∈ Ai \ Si, we let v(cid:48) ∈ A(cid:48)
activation set A(cid:48)
v ∈ Si independently, we include v(cid:48) ∈ A(cid:48)
C = {(Si, A(cid:48)
i)}.
Now consider any edge parameters w, applied to both G and the first layer of G. Let F (S)
denote the influence function on G, and F (S) = [ F1(cid:48)(S), . . . , Fn(cid:48)(S)] the influence function of the
nodes in the added layer V (cid:48) of G. Then, by the transformation, we get that
(1)
for all nodes v ∈ V . And by the definition of the observation loss process, we also have that for all
non-seed nodes v /∈ Si,
Fv(cid:48)(S) = r · Fv(S)
Prob[v ∈ Ai] = r · Fv(S) = Fv(cid:48)(S).
While the cascades C are not complete on all of G, in a precise sense, they provide complete
information on the activation of nodes in V (cid:48). In Appendix A, we show that Theorem 2 of Narasimhan
et al. [16] can be extended to provide identical guarantees for learning F (S) from the modified
observed cascades C. For the DIC model, this is a straightforward modification of the proof from
[16]. For the DLT model, [16] had not established PAC learnability2, so we provide a separate proof.
Because the results of [16] and our generalizations ensure proper learning, they provide edge
weights w between the nodes of V . We use these exact same edge weights to define the learned
influence functions in G. Equation (1) then implies that the learned influence functions on V satisfy
r · Fv(cid:48)(S). The detailed analysis in Appendix A shows that the learning error only scales
Fv(S) = 1
by a multiplicative factor 1
r2 .
The PAC learnability result shows that there is no information-theoretical obstacle to influence
function learning under incomplete observations. However, it does not imply an efficient algorithm.
The reason is that a hidden variable would be associated with each node not observed to be active,
and computing the objective function for empirical risk minimization would require marginalizing
over all of the hidden variables. The proper PAC learnability result also does not readily generalize
to the CIC model and other diffusion models, even under complete observations. This is due to
the lack of a succinct characterization of influence functions as under the DIC and DLT models.
Therefore, in the next section, we explore improper learning approaches with the goal of designing
practical algorithms and establishing learnability under a broader class of diffusion models.
4 Efficient Improper Learning Algorithm
In this section, we develop improper learning algorithms for efficient influence function learning.
Instead of parameterizing the influence functions using the edge parameters, we adopt the model-free
influence function learning framework, InfluLearner, proposed by Du et al. [3] to represent the
influence function as a sum of weighted basis functions. From now on, we focus on the influence
function Fv(S) of a single fixed node v.
2[16] shows that the DLT model with fixed thresholds is PAC learnable under complete cascades. We study the
DLT model when the thresholds are uniformly distributed random variables.
6
v (S) =(cid:80)
H:at least one node in S has a path to v in H γH.
Influence Function Parameterization. For all three diffusion models (CIC, DIC and DLT),
the diffusion process can be characterized equivalently using live-edge graphs. Concretely, the
results of [10, 4] state that for each instance of the CIC, DIC, and DLT models, there exists a
distribution Γ over live-edge graphs H assigning probability γH to each live-edge graph H such that
F ∗
To reduce the representation complexity, notice that from the perspective of activating v, two
different live-edge graphs H, H(cid:48) are "equivalent" if v is reachable from exactly the same nodes in
H and H(cid:48). Therefore, for any node set T , let β∗
H:exactly the nodes in T have paths to v in H γH. We
then use characteristic vectors as feature vectors rT = χT , where we will interpret the entry for
node u as u having a path to v in a live-edge graph. More precisely, let φ(x) = min{x, 1}, and χS
S · rT ) = 1 if and only if v is reachable from S,
the characteristic vector of the seed set S. Then, φ(χ(cid:62)
and we can write
T :=(cid:80)
(cid:88)
F ∗
v (S) =
T · φ(χ(cid:62)
β∗
S · rT ).
T
This representation still has exponentially many features (one for each T ). In order to make
the learning problem tractable, we sample a smaller set T of K features from a suitably chosen
distribution, implicitly setting the weights βT of all other features to 0. Thus, we will parametrize
the learned influence function as
(cid:88)
T∈T
F β
v (S) =
βT · φ(χ(cid:62)
S · rT ).
The goal is then to learn weights βT for the sampled features. (They will form a distribution,
i.e., β1 = 1 and β ≥ 0.) The crux of the analysis is to show that a sufficiently small number K of
features (i.e., sampled sets) suffices for a good approximation, and that the weights can be learned
efficiently from a limited number of observed incomplete cascades. Specifically, we consider the log
likelihood function (cid:96)(t, y) = y log t + (1 − y) log(1 − t), and learn the parameter vector β via the
following maximum likelihood estimation problem:
Maximize (cid:80)M
subject to
i=1 (cid:96)(F β
β1 = 1, β ≥ 0.
v (Si), χAi(v))
Handling Incomplete Observations. The maximum likelihood estimation cannot be directly
applied to incomplete cascades, as we do not have access to Ai (only the incomplete version Ai). To
address this issue, notice that the MLE problem is actually a binary classification problem with log
loss and yi = χAi(v) as the label. From this perspective, incompleteness is simply class-conditional
noise on the labels. Let yi = χ Ai
(v) be our observation of whether v was activated or not under the
incomplete cascade i. Then,
Prob[yi = 1yi = 1] = r
and Prob[yi = 1yi = 0] = 0.
In words, the incomplete observation yi suffers from one-sided error compared to the complete
observation yi. Known techniques can be used to address this issue. By results of Natarajan et
al. [17], we can construct an unbiased estimator of (cid:96)(t, y) using only the incomplete observations y,
as in the following lemma.
7
Lemma 3 (Corollary of Lemma 1 [17]). Let y be the true activation of node v and y the incomplete
observation. Then, defining
for any t, we have Ey
= (cid:96)(t, y).
(cid:96)(t, y) :=
(cid:104)(cid:96)(t, y)
(cid:105)
1
r
y log t +
2r − 1
r
(1 − y) log(1 − t),
Based on this lemma, we solve the maximum likelihood estimation problem with the adjusted
(2)
likelihood function (cid:96)(t, y):
Maximize (cid:80)M
subject to
i=1
(cid:96)(F β
v (Si), χ Ai
β1 = 1, β ≥ 0.
(v))
We analyze conditions under which the solution to (2) provides improper PAC learnability under
incomplete observations; these conditions will apply for all three diffusion models.
These conditions are similar to those of Lemma 1 in the work of Du et al. [3], and concern the
approximability of the reachability distribution β∗
T . Specifically, let q be a distribution over node
sets T such that q(T ) ≤ Cβ∗
T for all node sets T . Here, C is a (possibly very large) number that we
will want to bound below. Let T1, . . . , TK be K i.i.d. samples drawn from the distribution q. The
(S) with parameter3
features are then rk = χTk. We use the truncated version of the function F β,λ
λ as in [3]:
v
(S) = (1 − 2λ)F β
F β,λ
v
v (S) + λ.
Let Mλ be the class of all such truncated influence functions, and F
∈ Mλ the influence
functions obtained from the optimization problem (2). The following theorem (proved in Appendix B)
establishes the accuracy of the learned functions.
β,λ
v
Theorem 4. Assume that the learning algorithm uses K = Ω( C2
it constructs, and observes4 M = Ω( log C
probability at least 1 − δ, the learned influence functions F
P satisfy
ε2 ) features in the influence function
ε4r2 ) incomplete cascades with retention rate r. Then, with
for each node v and seed distribution
(cid:104)
ES∼P
β,λ
(F
v
(S) − F ∗
β,λ
v
v (S))2(cid:105) ≤ ε.
The theorem implies that with enough incomplete cascades, an algorithm can approximate the
ground truth influence function to arbitrary accuracy. Therefore, all three diffusion models are
improperly PAC learnable under incomplete observations. The final sample complexity does not
contain the graph size, but is implicitly captured by C, which will depend on the graph and how well
the distribution β∗
T can be approximated. Notice that with r = 1, our bound on M has logarithmic
dependency on C instead of polynomial, as in [3]. The reason for this improvement is discussed
further in Appendix B.
3The proof of Theorem 4 in Appendix B will show how to choose λ.
4The Ω notation suppresses all logarithmic terms except log C, as C could be exponential or worse in the number
of nodes.
8
Efficient Implementation. As mentioned above, the features T cannot be sampled from the
exact reachability distribution β∗
T , because it is inaccessible (and complex). In order to obtain useful
guarantees from Theorem 4, we follow the approach of Du et al. [3], and approximate the distribution
β∗
T with the product of the marginal distributions, estimated from observed cascades.
The optimization problem (2) is convex and can therefore be solved in time polynomial in the
number of features K. However, the guarantees in Theorem 4 require a possibly large number of
features. In order to obtain an efficient algorithm for practical use and our experiments, we sacrifice
the guarantee and use a fixed number of features.
Notice that the optimization problem (2) can be solved independently for each node v; the
learned functions Fi(S) can then be combined into F (S) = [F1(S), . . . , Fn(S)]. As the optimization
problem factorizes over nodes, the method is obviously parallelizable, thus scaling to large networks.
in our theoretical analysis, we assumed that
the retention rate r is known to the learning algorithm. In practice, it can be estimated via cross-
validation. As we show in the next section, the algorithm is not very sensitive to the misspecification
of the retention rate.
A further point regarding the implementation:
5 Experiments
In this section, we experimentally evaluate the algorithm from Section 4. Since no other methods
explicitly account for incomplete observations, we compare it to several state-of-the-art methods
for influence function learning with full information. Hence, the main goal of the comparison is
to examine to what extent the impact of missing data can be mitigated by being aware of it. We
compare our algorithm to the following approaches: (1) CIC is an approach fitting the parameters
of a CIC model, using the NetRate algorithm [7] with exponential delay distribution. (2) DIC
fits the activation probabilities of a DIC model using the method in [18]. (3) InfluLearner is the
model-free approach proposed by Du et al. in [3] and discussed in Section 4. (4) Logistic uses
S · cu + b) for each u independently,
logistic regression to learn the influence functions Fu(S) = f (χ(cid:62)
1+e−x is the logistic function. (5)Linear uses
where cu is a learnable weight vector and f (x) = 1
linear regression to learn the total influence σ(S) = c(cid:62) · χS + b of the set S. Notice that the CIC
and DIC methods have access to the activation time of each node in addition to the final activation
status, giving them an inherent advantage.
5.1 Synthetic cascades
Data generation. We generate synthetic networks with core-peripheral structure following the
Kronecker graph model [12] with parameter matrix [0.9, 0.5; 0.5, 0.3].5 Each generated network has
512 nodes and 1024 edges.
We then generate synthetic cascades following the CIC, DIC and DLT models. For the CIC model,
we use an exponential delay distribution on each edge whose parameters are drawn independently
and uniformly from [0, 1]. The observation window length is τ = 1.0. For the DIC model, the
activation probability for each edge is chosen independently and uniformly from [0, 0.4]. For the
DLT model, we follow [10] and set the edge weight wuv as 1/dv where dv is the in-degree of node v.
For each model, we generate 8192 cascades as training data. The seed sets are sampled uniformly at
5We also experimented on Kronecker graphs with hierarchical community structure ([0.9, 0.1; 0.1, 0.9]) and random
structure ([0.5, 0.5; 0.5, 0.5]). The results are similar and omitted due to space constraints.
9
(a) CIC
(b) DIC
(c) DLT
Figure 2: MAE of estimated influence as a function of the retention rate on synthetic datasets for
(a) CIC model, (b) DIC model, (c) DLT model. The error bars shows one standard deviation.
random with sizes drawn from a power law distribution with parameter 2.5. The generated cascades
have average sizes of 10.8, 12.8 and 13.0 in the CIC, DIC and DLT models, respectively. We then
create incomplete cascades by varying the retention rate between 0.1 and 0.9. The test set contains
200 independently sampled seed sets generated in the same way as the training data. To sidestep
the computational cost of running Monte Carlo simulations, we estimate the ground truth influence
of the test seed sets using the method proposed in [3], with the true model parameters.
Algorithm settings. We apply all algorithms to cascades generated from all three models; that
is, we also consider the results under model misspecification. Whenever applicable, we set the
hyperparameters of the five comparison algorithms to the ground truth values. When applying the
NetRate algorithm to discrete-time cascades, we set the observation window to 10.0. When applying
the method in [18] to continuous-time cascades, we round activation times up to the nearest multiple
of 0.1, resulting in 10 discrete time steps. For the model-free approaches (InfluLearner and our
algorithm), we use K = 200 features.
Results. Figure 2 shows the Mean Absolute Error (MAE) between the estimated total influence
σ(S) and the true influence value, averaged over all testing seed sets. For each setting (diffusion
model and retention rate), the reported MAE is averaged over five independent runs.
The main insight is that accounting for missing observations indeed strongly mitigates their effect:
notice that for retention rates as small as 0.5, our algorithm can almost completely compensate for
the data loss, whereas both the model-free and parameter fitting approaches deteriorate significantly
even for retention rates close to 1. For the parameter fitting approaches, even such large retention
rates can lead to missing and spurious edges in the inferred networks, and thus significant estimation
errors. Additional observations include that fitting influence using (linear or logistic) regression
does not perform well at all, and that the CIC inference approach appears more robust to model
misspecification than the DIC approach.
Sensitivity of retention rate. We presented the algorithms as knowing r. Since r itself is inferred
from noisy data, it may be somewhat misestimated. Figure 4 shows the impact of misestimating r.
10
1.00.90.80.70.60.50.40.30.20.1Retention Rate234567891011MAECICDICInfluLearnerLinearLogisticOur Method1.00.90.80.70.60.50.40.30.20.1Retention Rate234567891011MAECICDICInfluLearnerLinearLogisticOur Method1.00.90.80.70.60.50.40.30.20.1Retention Rate234567891011MAECICDICInfluLearnerLinearLogisticOur MethodFigure 3: Relative error in MAE when the true retention rates are drawn from the truncated Gaussian
distribution. The x-axis shows standard deviation σ of the retention rates from the mean, and the
y-axis is the relative difference of the MAE compared to the case where all retention rates are the
same and known.
We generate synthetic cascades from all three diffusion models with a true retention rate of 0.8, and
then apply our algorithm with (incorrect) retention rate r ∈ {0.6, 0.65, . . . , 0.95, 1}. The results are
averaged over five independent runs. While the performance decreases as the misestimation gets
worse (after all, with r = 1, the algorithm is basically the same as InfluLearner), the degradation is
graceful.
Non-uniform retention rate In practice, different nodes may have different retention rates,
while we may be able only to estimate the mean retention rate r. For our experiments, we draw
each node v's retention rate rv independently from a distribution with mean r. Specifically, in our
experiments, we use uniform and Gaussian distributions; for the uniform distribution, we draw
rv ∼ Unif[r − σ, r + σ]; for the Gaussian distribution, we draw rv ∼ N (r, σ2), truncating draws at
0 and 1.6 In both cases, σ measures the level of noise in the estimated retention rate. We set the
mean retention rate r to 0.8 and vary σ in {0, 0.02, 0.05, 0.1, 0.2}. Figure 3 shows the results for the
Gaussian distribution; the results of uniform distribution are similar and omitted. The results show
that our model is very robust to random and independent perturbations of individual retention rates
for each node.
Influence Estimation on real cascades
5.2
We further evaluate the performance of our method on the real-world MemeTracker7 dataset [11].
The dataset consists of the propagation of short textual phrases, referred to as Memes, via the
publication of blog posts and main-stream media news articles between March 2011 and February
2012. Specifically, the dataset contains seven groups of cascades corresponding to the propagation
of Memes with certain keywords, namely "apple and jobs", "tsunami earthquake", "william kate
marriage"', "occupy wall-street", "airstrikes", "egypt" and "elections." Each cascade group consists of
6The truncation could lead to a bias on the mean of r. However, empirical simulations show that the bias is
negligible (only 0.01 when σ = 0.2).
7We use the preprocessed version of the dataset released by Du et al. [3] and available at http://www.cc.gatech.
edu/~ndu8/InfluLearner.html. Notice that the dataset is semi-real, as multi-node seed cascades are artificially
created by merging single-node seed cascades.
11
96%98%100%102%104%106%0.020.050.10.2CICDICDLTFigure 4: Relative error in MAE under reten-
tion rate misspecification. x-axis: retention
rate r used by the algorithm. y-axis: relative
difference of MAE compared to using the true
retention rate 0.8.
Figure 5: MAE of influence estimation on seven
sets of real-world cascades with 20% of activa-
tions missing.
1000 nodes, with a number of cascades varying from 1000 to 44000. We follow exactly the same
evaluation method as Du et al. [3] with a training/test set split of 60%/40%.
To test the performance of influence function learning under incomplete observations, we randomly
delete 20% of the occurrences, setting r = 0.8. The results for other retention rates are similar and
omitted. Figure 5 shows the MAE of our methods and the five baselines, averaged over 100 random
draws of test seed sets, for all groups of memes. While some baselines perform very poorly, even
compared to the best baseline (InfluLearner), our algorithm provides an 18% reduction in MAE
(averaged over the seven groups), showing the potential of data loss awareness to mitigate its effects.
6 Model Extensions
So far, we have assumed that the retention rate is the same for all the nodes; however, our approach
can be easily generalized to the case in which each individual node has a different (but known)
retention rate. The following theorem generalizes Theorems 1 and 2. (The proofs of all theorems
from this section are given in Appendix C.)
Theorem 5. Let λ ∈ (0, 0.5) and for each node v, let rv be v's retention rate. Write ¯r = 1
.
• The class of influence functions under the DIC model in which all edge activation probabilities
(cid:80)n
1
r2
v
i=1
n
satisfy we ∈ [λ, 1 − λ] is PAC learnable with sample complexity O( ¯r2n3m
satisfies we ∈ [λ, 1 − λ], and for every node v, 1 −(cid:80)
• The class of influence functions under the DLT model such that the edge weight for every edge
u∈N (v) wuv ∈ [λ, 1 − λ], is PAC learnable
).
ε2
with sample complexity O( ¯r2n3m
ε2
).
The empirical evaluation in the previous section also shows that the performance does not change
significantly if the true retention rate of each node is independently perturbed around the estimated
mean loss rate.
A second limitation of our approach is that we assume the retention rate r to be known to the
algorithm. Estimating r in a real-world setting presents a "chicken and egg" problem; however, we
12
--‐10--‐5051015202530354010.950.90.850.80.750.70.650.6CICDICDLT051015202530351234567MAEGroups
of
memesLinearLogisticDICCICInfluLearnerOur
Methodbelieve that a somewhat accurate estimate of r (perhaps based on past data for which ground truth
can be obtained at much higher cost) will still be a significant improvement over the status quo,
namely, pretending that no data are missing.
Moreover, even approximate information about r leads to positive results on proper PAC
learnability. We show that the PAC learnability result can be extended to the case where we only
know that the true retention rate lies in a given interval. Instead of knowing the exact value r, we only
know that r lies in an interval measured by the relative error η, namely r ∈ I = [¯r · (1− η), ¯r · (1 + η)].
Within that interval, the retention rate is adversarially chosen. We can then generalize Theorems 1
and 2 as follows.
Theorem 6. Let λ ∈ (0, 0.5), and assume that the ground truth retention rate r is adversarially
chosen in I = [¯r · (1 − η), ¯r · (1 + η)]. For all ε, δ ∈ (0, 1), all parametrizations of the diffusion
model, and all distributions P over seed sets S: when given activation-only and incomplete training
cascades C, there exists a proper learning algorithm A which outputs an influence function F ∈ FM
satisfying:
Prob C[errsq[F ] − errsq[F ∗] ≥ ε +
4η2
(1 − η)2 ] ≤ δ.
• For the DIC model, when all edge activation probabilities satisfy we ∈ [λ, 1 − λ], the required
number of observations is M = O(
n3m
ε4r4(1−η)4 ).
1 −(cid:80)
• For the DLT model, when all edges weights satisfy we ∈ [λ, 1 − λ], and for every node v,
u∈N (v) wuv ∈ [λ, 1 − λ], the required number of observations is M = O(
n3m
ε4r4(1−η)4 ).
Notice that the result of Theorem 6 is not technically a PAC learnability result, due to the
additive error that depends on the interval size. However, the theorem provides useful approximation
guarantees when the interval size is small. A dependence of the guarantee on the interval size is
inevitable. For when nothing is known about the retention rate (for η large enough), all information
about the marginal activation probabilities is lost in the incomplete data: for instance, if no nodes
are ever obesrved active, we cannot distinguish the case r = 0 from the case in which no nodes
become activated. The experiments from the previous section confirm that for moderate uncertainty
about the retention rate, the performance of our approach is not very sensitive to the misestimation
of r.
7 Conclusion and Future Work
We studied the problem of learning influence functions under incomplete observations, which are
common in real-world applications. We established proper PAC learnability of influence functions
under two popular diffusion models, the DIC and DLT model. The incompleteness only has moderate
impact on the sample complexity bound, but computational efficiency would require an oracle for
efficient empirical risk minimization. We next designed an efficient improper learning algorithm with
learning guarantees for the DIC, DLT, and CIC models.
Our framework can be easily generalized to handle non-uniform (but independent) loss of node
activations. We also have partial results theoretically establishing robustness to misestimations of
r (which we observed experimentally in Section 5). A much more significant departure for future
work would be non-random loss of activations, e.g., losing all activations of some randomly chosen
13
nodes. As another direction, it would be worthwhile to generalize the PAC learnability results to
other diffusion models, and to design an efficient algorithm with PAC learning guarantees.
Acknowledgments
We would like to thank anonymous reviewers for useful feedback. The research was sponsored
in part by NSF research grant IIS-1254206 and by the U.S. Defense Advanced Research Projects
Agency (DARPA) under the Social Media in Strategic Communication (SMISC) program, Agreement
Number W911NF-12-1-0034. The views and conclusions are those of the authors and should not be
interpreted as representing the official policies of the funding agency, or the U.S. Government.
14
References
[1] K. Amin, H. Heidari, and M. Kearns. Learning from contagion (without timestamps). In Proc.
31st Intl. Conf. on Machine Learning, pages 1845–1853, 2014.
[2] F. Chierichetti, D. Liben-Nowell, and J. M. Kleinberg. Reconstructing Patterns of Informa-
tion Diffusion from Incomplete Observations. In Proc. 23rd Advances in Neural Information
Processing Systems, pages 792–800, 2011.
[3] N. Du, Y. Liang, M.-F. Balcan, and L. Song. Influence Function Learning in Information
Diffusion Networks. In Proc. 31st Intl. Conf. on Machine Learning, 2014.
[4] N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable Influence Estimation in Continuous-
Time Diffusion Networks. In Proc. 25th Advances in Neural Information Processing Systems,
pages 3147–3155, 2013.
[5] N. Du, L. Song, S. Yuan, and A. J. Smola. Learning Networks of Heterogeneous Influence. In
Proc. 24th Advances in Neural Information Processing Systems, pages 2780–2788. 2012.
[6] Q. Duong, M. P. Wellman, and S. P. Singh. Modeling information diffusion in networks with
unobserved links. In SocialCom/PASSAT, pages 362–369, 2011.
[7] M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of
diffusion networks. In Proc. 28th Intl. Conf. on Machine Learning, pages 561–568, 2011.
[8] M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence.
ACM Transactions on Knowledge Discovery from Data, 5(4), 2012.
[9] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. Learning influence probabilities in social
networks. In Proc. 3rd ACM Intl. Conf. on Web Search and Data Mining, pages 241–250, 2010.
[10] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the Spread of Influence in a Social Network.
In Proc. 9th Intl. Conf. on Knowledge Discovery and Data Mining, pages 137–146, 2003.
[11] J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the dynamics of the news
cycle. In Proc. 15th Intl. Conf. on Knowledge Discovery and Data Mining, pages 497–506, 2009.
[12] J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker graphs:
An approach to modeling networks. The Journal of Machine Learning Research, 11:985–1042,
2010.
[13] A. Y. Lokhov. Reconstructing spreading couplings from partial observations of several cascades.
In Proc. 28th Advances in Neural Information Processing Systems, 2016.
[14] S. A. Myers and J. Leskovec. On the convexity of latent social network inference. In Proc. 22nd
Advances in Neural Information Processing Systems, pages 1741–1749, 2010.
[15] S. A. Myers, C. Zhu, and J. Leskovec. Information Diffusion and External Influence in Networks.
In Proc. 18th Intl. Conf. on Knowledge Discovery and Data Mining, pages 33–41.
[16] H. Narasimhan, D. C. Parkes, and Y. Singer. Learnability of Influence in Networks. In Proc.
27th Advances in Neural Information Processing Systems, pages 3168–3176, 2015.
15
[17] N. Natarajan, I. S. Dhillon, P. K. Ravikumar, and A. Tewari. Learning with noisy labels. In
Proc. 25th Advances in Neural Information Processing Systems, pages 1196–1204, 2013.
[18] N. Praneeth and S. Sujay. Learning the Graph of Epidemic Cascades. In Proc. 12th ACM
Sigmetrics Conf. on Measurement and Modeling of Computer Systems, pages 211–222, 2012.
[19] D. Quang, W. M. P, and S. S. P. Modeling Information Diffusion in Networks with Unobserved
Links. In SocialCom, pages 362–369, 2011.
[20] N. Rosenfeld, M. Nitzan, and A. Globerson. Discriminative learning of infection models. In
Proc. 9th ACM Intl. Conf. on Web Search and Data Mining, pages 563–572, 2016.
[21] E. Sadikov, M. Medina, J. Leskovec, and H. Garcia-Molina. Correcting for missing data in
information cascades. In Proc. 4th ACM Intl. Conf. on Web Search and Data Mining, pages
55–64, 2011.
[22] L. G. Valiant. A theory of the learnable. Communications of the ACM, 27(11):1134–1142, 1984.
[23] X. Wu, A. Kumar, D. Sheldon, and S. Zilberstein. Parameter learning for latent network
diffusion. In Proc. 29th Intl. Joint Conf. on Artificial Intelligence, pages 2923–2930, 2013.
[24] S.-H. Yang and H. Zha. Mixture of Mutually Exciting Processes for Viral Diffusion. In Proc.
30th Intl. Conf. on Machine Learning, 2013.
[25] K. Zhou, H. Zha, and L. Song. Learning Social Infectivity in Sparse Low-rank Network Using
Multi-dimensional Hawkes Processes. In Proc. 30th Intl. Conf. on Machine Learning, 2013.
16
A Proofs for Section 3
A.1 Proof of Theorem 1
Here, we flesh out the proof sketch from Section 3 for the DIC model. For the transformed graph
G, we consider only the influence functions of the n nodes in the added layer V (cid:48). Recall that we
write F (S) = [ F1(cid:48)(S), . . . , Fn(cid:48)(S)] for the influence function of those nodes. Let F ∗ be the ground
truth influence function for the same nodes, and F ∗ the ground truth influence function for G.
Let M(G) and M( G) be the class of influence functions of G and G. For functions F , we write
. Notice that the ground truth functions minimize the
(cid:99)errsq[ F ] = ES,A
expected squared error, i.e., F ∗ ∈ argmin F∈M( G)(cid:99)errsq[ F ] and F ∗ ∈ argminF∈M(G)errsq[F ]. We will
v(cid:48)∈V (cid:48)(χA(v(cid:48)) − Fv(cid:48)(S))2(cid:105)
(cid:80)
(cid:104) 1
show that errsq[F ] − errsq[F ∗] can be made arbitrary small.
n
We first prove a variation of Theorem 2 from [16] for learning F , by verifying that all the
supporting lemmas still apply. The modified Theorem 2 from [16] is the following:
Theorem 7. Assume that the learning algorithm observes M = Ω(−2n3m) training cascades
C = {(Si, A(cid:48)
i)} under the DIC model. Then, with probability at least 1 − δ, we have
(3)
Proof. While the cascades in C are incomplete on V , they are complete on V (cid:48). We use this
completeness of the cascades as follows. Consider the restricted class of the DIC model on the
transformed graph G in which only the m activation probabilities w between nodes in V are learnable,
while the edges (v, v(cid:48)) have a fixed weight of r. Define the log-likelihood for a cascade (S, A(cid:48)) as
(cid:99)errsq[ F ] −(cid:99)errsq[ F ∗] ≤ .
L(S, A(cid:48)w) =
(v(cid:48)) log( F w
v(cid:48) (S)) + (1 − χA(cid:48)
i
χA(cid:48)
i
(v(cid:48))) log(1 − F w
v(cid:48) (S)).
(cid:88)
v(cid:48)∈V (cid:48)
The algorithm outputs an influence function F based on the solution of the following optimization
problem:
w∗ ∈ argmaxw∈[λ,1−λ]m
L(Si, A(cid:48)
iw).
M(cid:88)
i=1
As the function F is learned from the DIC model, Lemma 3 in [16] carries thorough to establish
the Lipschitz continuity of DIC influence functions.
Lemma 8 (Lipschitz continuity of DIC influence). Fix S ⊆ V and v(cid:48) ∈ V (cid:48). For any w, w(cid:48) ∈ Rm
with w − w(cid:48)1 ≤ , we have F w
v(cid:48) (S) − F w(cid:48)
v(cid:48) (S) ≤ .
Moreover, such instances (on 2n nodes) still only have m parameters, and the L∞ covering
number bound in Lemma 8 from [16] applies without any changes.
Lemma 9 (Covering number of DIC influence functions). The L∞ covering number of the restricted
class of the DIC influence functions on the transformed graph for radius is O((m/)m).
Establishing the sample complexity bound on the log-likelihood objective (Lemma 4 in [16])
requires that all function values be bounded away from 0 and 1 (Lemma 9 in [16]). We assume that
r < 1, as Lemma 4 in [16] directly holds when there are no missing data at all. Let λ > 0 be the
bound on the edge activation probabilities in G from our Theorem 1; that is, λ ≤ wuv ≤ 1 − λ for all
17
u, v ∈ V . Due to the layered structure of G, we have that r · λn ≤ Fv(cid:48)(S) ≤ r · (1 − λn).8 Therefore,
Lemma 4 in [16] carries thorough with the same sample complexity of O(−2n3m):
Lemma 10 (Sample complexity guarantee on the log-likelihood objective). Fix , δ ∈ (0, 1) and
M = Ω(−2n3m). With probability at least 1 − δ (over the draws of the training cascades),
(cid:21)
(cid:20) 1
n
(cid:21)
(cid:20) 1
n
max
w∈[λ,1−λ]m
ES,A(cid:48)
L(S, A(cid:48)w)
− ES,A(cid:48)
L(S, A(cid:48)w∗)
≤ .
As all the lemmas used in the proof of Theorem 2 from [16] remain true, we have proved our
Theorem 7, with the guarantee that errsq[ F ] − errsq[ F ∗] ≤ .
Finally, we recall that according to Equation (1), Fv(S) = 1
r · Fv(cid:48)(S) and F ∗
v (S) = 1
r · F ∗
v(cid:48)(S),
giving us that
errsq[F ] − errsq[F ∗]
(∗)
=
Equation (1)
=
(∗)
=
v (S))2(cid:3)
v∈V
ES
(cid:2)(Fv(S) − F ∗
(cid:20)
(cid:88)
(cid:88)
(cid:99)errsq[ F ] −(cid:99)errsq[ F ∗]
Fv(cid:48)(S) − 1
r
v(cid:48)∈ V
1
n
1
n
(
1
r
ES
r2
(cid:21)
F ∗
v(cid:48)(S))2
Equation (3)≤
r2
(The steps labeled (*) are applications of Equation (4) from [16].) Now, by taking = ε · r2, with
O( n3m
ε2r4 ) incomplete cascades, we obtain that errsq[F ] − errsq[F ∗] ≤ ε.
A.2 Proof of Theorem 2
We will show that the analogue of Theorem 7 for the DLT model also holds. We do so by following
the same sequence of steps as in Appendix A.1 and verifying that all the steps in the proof of
Theorem 2 in [16] still hold. The main difference is that a new proof is needed for establishing
Lipschitz continuity of the DLT influence function with respect to the L1 norm (the analogue of
Lemma 3 in [16]). We begin by establishing this lemma.
Lemma 11 (Lipschitz continuity). Fix S ⊆ V and u ∈ V . For any w, w(cid:48) ∈ Rm with w− w(cid:48)1 ≤ ε,
we have that F w
Proof. As shown in [10], the influence functions under the DLT model can be also characterized via
the reachability under a distribution over live-edge graphs. Specifically, the distribution is as follows
[10, Theorem 2.5]: for each node v, pick at most one of its incoming edges at random, selecting
the edge from z ∈ N (v) with probability wzv and selecting no incoming edge with probability
z∈N (v) wzv. For each node v, let the random variable Xv be the incoming neighbor chosen for v,
z∈N (v) wzv.
1−(cid:80)
with Xv =⊥ if v has no incoming edge. For simplicity of notation, we define w⊥v = 1−(cid:80)
u (S) − F w(cid:48)
u (S) ≤ ε.
8As in the proof of Lemma 4 in [16], we assume that there exists a path in the graph G from a node in S to node
v(cid:48); the cases where this assumption fails can be handled easily.
18
Define X = (Xv)v∈V , and write X for the set of all such vectors X. For any node v, we write X−v
for the set of all vectors with edges (or ⊥) for all nodes except v. And for a vector X ∈ X−v, we
write X[v (cid:55)→ z] for the vector in which all entries agree with those in X, except for the entry for v
which is now z.
Let RX (v, S) be the indicator function of whether node v is reachable from the seed set S in the
graph (V, X), where we interpret X as the set of all edges (Xv, v) with Xv (cid:54)=⊥. Claim 2.6 of [10]
implies that
We fix an edge (y, y(cid:48)) and take the partial derivative of F w
u (S) with respect to wyy(cid:48):
(cid:12)(cid:12)(cid:12)(cid:12) ∂F w
u (S)
∂wyy(cid:48)
(cid:12)(cid:12)(cid:12)(cid:12) =
(cid:88)
(cid:89)
v∈V
X
(cid:88)
(cid:89)
F w
u (S) =
wXvvRX (u, S).
(cid:88)
(cid:89)
(cid:89)
v∈V \{y}
∂wyy(cid:48)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12) ∂
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:88)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
(cid:88)
X∈X−y
X∈X−y
v∈V \{y}
=
≤
wzy
z∈N (y)∪{⊥}
X∈X−y
v∈V \{y}
wXvv · RX[y(cid:55)→y(cid:48)](u, S) − (cid:88)
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
wXvv
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
wXvv · RX[y(cid:55)→z](u, S)
(cid:89)
wXvv · RX[y(cid:55)→⊥](u, S)
X∈X−y
v∈V \{y}
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)
Therefore, ∇wF w
= 1.
u (S)∞ ≤ 1, implying Lipschitz continuity.
wzv ∈ [λ, 1 − λ] by assumption, and we further assumed that w⊥v = 1 −(cid:80)
Next, we bound the values of the influence functions away from 0 and 1. Because each edge weight
z∈N (v) wzv ∈ [λ, 1 − λ],
it follows directly (as in the proof for the DIC model) that r · λn ≤ Fv(cid:48)(S) ≤ r · (1 − λn). This
establishes the analogue of Lemma 9 in [16], and we can therefore apply Lemma 4 in [16], obtaining
a sample complexity of O(−2n3m) under the DLT model. As all the used lemmas remain true, the
results of Theorem 7 also hold for the DLT model. Finally, exploiting the same relation between
F (S) and F (S) as in the proof of Theorem 1 leads to the conclusion of Theorem 2.
B Proof of Theorem 4
Let M = Ω( log C
that for any single node v, with probability at least 1 − δ/n,
4r2 ), and let F
β,λ
v
(S) be the influence functions obtained in Theorem 4. We will show
The theorem then follows by taking a union bound over all n nodes.
Recall that Mλ is function class of all truncated influence functions. We write
RM (Mλ) := E
Si∼P,(i)i∼Uniform({−1,1}M )
sup
F∈Mλ
1
M
i · Fv(Si)
(cid:35)
M(cid:88)
i=1
(cid:104)
ES
(F
β,λ
v
(S) − F ∗
v (S))2(cid:105) ≤ ε.
(cid:34)
19
εδ ) features such that ES∼P
for its Rademacher complexity, where the i's are i.i.d. Rademacher (symmetric Bernoulli) random
∈ Mλ with
β,λ
variables. By Lemma 12 in [3], there exists a truncated influence function F
v
K = O( C2
ε2 log Cn
least 1 − δ
2n.
Using the log likelihood function (cid:96)(t, y) = y log t + (1 − y) log(1 − t) as defined in Section 4, we
write the log loss of influence function Fv as errlog[Fv] = ES,A [−(cid:96)(Fv(S), A)]. By Lemma 2 in [17],
with probability at least 1 − δ
2n,
v (S))2(cid:105) ≤ 2ε2 + 2λ2 with probability at
(S) − F ∗
β,λ
(F
v
(cid:104)
(cid:114)
(cid:114)
β,λ
errlog[F
v
] ≤ min
f∈Mλ
errlog[f ] +
RM (Mλ) +
4
λ · r
log(2n/δ)
2M
.
Because F
β,λ
v ∈ Mλ, we can bound that minf∈Mλ errlog[f ] ≤ errlog[F
β,λ
v
side. Subtracting errlog [F ∗
v ] from both sides, we obtain
(S)] on the right-hand
follows:
β,λ
errlog[F
v
] − errlog[F ∗
v ] ≤ errlog[F
β,λ
v
] − errlog[F ∗
v ] +
RM (Mλ) +
4
λ · r
log(2n/δ)
2M
.
(4)
The square and log errors can be related to each other as in the proof of Theorem 2 in [16], as
(cid:104)
ES
β,λ
(F
v
(S) − F ∗
v (S))2(cid:105) ≤ 1
(cid:104)
] − errlog[F ∗
v ]).
β,λ
(errlog[F
v
2
(S) − F ∗
v (S))2(cid:105)
Hence, in order to obtain a bound on ES
β,λ
right-hand side of (4). The term errlog[F
v
β,λ
in [3], using Lemma 11 and Lemma 16 from [3]: Assume that F
v
Then, with probability at least 1 − δ, we have
β,λ
(F
v
]− errlog[F ∗
, it suffices to upper-bound the
v ] can be bounded as in the proof of Lemma 2
) features.
uses K = Ω( C2
2 log Cn
δ
).
Next, we bound the Rademacher complexity of the function class Mλ:
(1 + log
λ
β,λ
v
] − errlog[F ∗
v ] ≤ 2 + λ2
errlog[F
1
λ
(cid:113) 2 log(1+K)
Lemma 12. The Rademacher complexity RM (Mλ) for the function class Mλ with at most K
features is at most
Proof. Recall that we use basis functions φi(S) := min{1, χ(cid:62)
S rTi}. Let W = {φii = 1, . . . , K}∪{1},
where 1 is the constant function with value 1. By definition, we have Mλ ⊆ conv(W), where conv(W)
denotes the convex hull. Therefore, RM (Mλ) ≤ RM (conv(W)) = RM (W). Since φi(S) ≤ 1, by
Massart's finite lemma9, we have RM (W) ≤(cid:113) 2 log(1+K)
, completing the proof.
M
.
M
(5)
To finish the proof of Theorem 4, let be the desired accuracy. Define δ = δ
,
c(cid:48) log 1
where c(cid:48) is a sufficiently large constant. Then, the right-hand side of (5) is upper-bounded by
· (1 + log 1
9Massart's finite lemma states the following: Let F be a finite set of functions, such that supf∈F 1
for any variables values X1, . . . , Xn. Then, the Rademacher complexity of F is upper bounded by Rn(F) ≤(cid:113) 2C2 log F
(cid:80)n
i=1 f (Xi)2 ≤ C 2
.
2n and = λ =
) ≤
2.
n
n
20
4r2 ), we have 4
(cid:113) log(n/δ)
log n
2 ), we also get that
With M = Ω( log K
δ
2M ≤
4. Taking M as the maximum of the above three, which is satisfied when M =
(cid:104)
4r2 ), we can substitute all of the bounds into the right-hand side of (4) and obtain that
β,λ
n. Now, taking a union bound over all
(F
v
v (S))2(cid:105) ≤ with probability at least 1 − δ
4. Whenever M = Ω(
λ·rRM (Mλ) ≤
Ω( log C
ES
nodes v concludes the proof.
(S) − F ∗
Discussion. Notice that when the retention rate is 1, our Theorem 4 significantly improves the
sample complexity bound compared to Du et al. [3]. The sample complexity in [3] is O( C2
3 ), while
our theorem implies a sample complexity of O( log C
4 ) under complete observations. The improvement
is derived from bounding the Rademacher complexity of the function class Mλ instead of the L2,∞
dimension. The Rademacher bound leads to a logarithmic dependence of the sample complexity on
the number of features K, whereas the L2,∞ bound results in a polynomial dependence.
C Proofs for Section 6
C.1 Proof of Theorem 5
Let ri be the retention rate of node i and εi the desired error guarantee for learning the influence
)}
function Fvi.
incomplete cascades are sufficient to guarantee that with probability at least 1 − δ, for each i, we
obtain
It is immediate from the proofs of Theorems 1 and 2 that M = maxi{ O( n3m
ε2
i r4
i
(cid:2)(Fvi(S) − F ∗
vi(S))2(cid:3) ≤ εi.
ES
The estimation error for the overall influence is the average ε = 1
n
i εi. Given non-uniform
retention rates ri, we can choose non-uniform εi yielding the desired ε, so as to minimize the sample
complexity. The corresponding optimization problem is the following:
(cid:80)
Minimize
subject to
max
1
ε2
i r4
i
i
(cid:88)
εi = ε,
1
n
εi > 0 for all i.
i
(cid:80)
The minimum is achieved when all
The constant C can be obtained from the constraint 1
n
¯r = 1
n
. This completes the proof of the theorem.
(cid:80)
1
ε2
i r4
i
i
1
r2
i
are equal to some constant C, meaning that εi = 1√
i εi = ε, yielding that C = ¯r2
.
C·r2
ε2 , where
i
C.2 Proof of Theorem 6
The proof of Theorem 6 is similar to that of Theorems 1 and 2. We again treat the incomplete
cascades as complete cascades in a transformed graph G. Because we no longer know the true
retention rate r, we cannot set the probability on the egde (v, v(cid:48)) to wvv(cid:48) = r. Instead, we treat the
wvv(cid:48) as parameters to infer, under the constraint that wvv(cid:48) ∈ I = [¯r · (1 − η), ¯r · (1 + η)]. We spell
out the details of the proof for the DIC model; the proof for the DLT model is practically identical.
21
As in Theorem 1, we consider only the influence functions of the n nodes in the added layer V (cid:48).
ε2 ) cascades, for
Following the proof of Theorem 1, with probability as least 1 − δ, using M = O( n3m
all v(cid:48) ∈ V (cid:48),
(cid:104)
v(cid:48)(S))2(cid:105) ≤ ε.
ES
( Fv(cid:48)(S) − F ∗
(6)
In the proof of Theorem 1, the fact that wvv(cid:48) = r allowed us to obtain the influence function at v
r · Fv(cid:48)(S). Since the edge probabilities wvv(cid:48) are now inferred, we instead use the inferred
via Fv(S) = 1
probabilities for obtaining the activation functions for nodes v. On the other hand, the ground truth
influence functions for v and v(cid:48) are still related via the correct value r. Writing rv = wvv(cid:48), this gives
us the following:
Consider ES
can now be written as follows:
Fv(cid:48)(S)
F ∗
v (S) =
rv
Fv(S) =
(cid:2)(Fv(S) − F ∗
(cid:2)(Fv(S) − F ∗
v (S))2(cid:3) for any node v. The expected squared estimation error for node v
v (S))2(cid:3) Equation (7)
ES
(7)
=
.
F ∗
v(cid:48)(S)
r
ES
=
≤
ES
rv
v(cid:48)(S)
v(cid:48)(S)
r
− F ∗
(cid:32) Fv(cid:48)(S)
(cid:33)2
(cid:32) Fv(cid:48)(S) − F ∗
(cid:104)
vi(S))2(cid:105)
(cid:34) Fv(cid:48)(S)
( Fvi(S) − F ∗
r2 · ES
· r − rv
· ES
(cid:34) F 2
(cid:35)
· (r − rv)2
2
r
rv
1
r
r
.
r2
v(cid:48)(S)
r2
v
+
+ES
(cid:33)2
+ Fv(cid:48)(S)
r − rv
r · rv
· Fv(cid:48)(S) − F ∗
v(cid:48)(S)
(cid:35)
(8)
(9)
(10)
We will bound the term (8) using Inequality (6). In order to bound the terms (9) and (10), observe
the following:
• For all seed sets S and nodes v(cid:48) ∈ V (cid:48), we have Fv(cid:48)(S) ≤ rv by the structure of the transformed
graph.
• r−rv
r ≤ 2η
• By Jensen's inequality and Inequality (6), ES
1−η follows from the assumption that rv, r ∈ [¯r · (1 − η), ¯r · (1 + η)].
(cid:104) Fv(cid:48)(S) − F ∗
v(cid:48)(S)(cid:105) ≤ √
ε.
√
Using the preceding three inequalities, we can bound the term (9) by 4η
4η2
(1−η)2 .
When ε ≤ εr2
2 , using the inequality (6), the term (8) is upper-bounded by 1
r2 ES
ε
2. Similarly, when ε ≤ ε2r2(1−η)2
64η2
, the additive term (9) is upper-bounded by 2η
ε
r(1−η) and the term (10) by
(cid:2)(Fvi(S) − F ∗
vi(S))2(cid:3) ≤
√
r(1−η) ≤ ε
ε
2. Thus,
22
taking ε = min{ εr2
M = O(
2 , ε2r2(1−η)2
64η2
ε4r4(1−η)4 ) cascades, with probability at least 1 − δ, for each node v,
n3m
}, the first two terms combined are bounded by ε. Thus, using
(cid:2)(Fv(S) − F ∗
v (S))2(cid:3) ≤ ε +
ES
4η2
(1 − η)2 .
Now, taking an average on both sides of the above equation over all the nodes v ∈ V concludes the
proof of Theorem 6.
23
|
1703.04901 | 1 | 1703 | 2017-03-15T02:59:10 | On the Analysis of the DeGroot-Friedkin Model with Dynamic Relative Interaction Matrices | [
"cs.SI",
"cs.MA",
"eess.SY",
"physics.soc-ph"
] | This paper analyses the DeGroot-Friedkin model for evolution of the individuals' social powers in a social network when the network topology varies dynamically (described by dynamic relative interaction matrices). The DeGroot-Friedkin model describes how individual social power (self-appraisal, self-weight) evolves as a network of individuals discuss a sequence of issues. We seek to study dynamically changing relative interactions because interactions may change depending on the issue being discussed. In order to explore the problem in detail, two different cases of issue-dependent network topologies are studied. First, if the topology varies between issues in a periodic manner, it is shown that the individuals' self-appraisals admit a periodic solution. Second, if the topology changes arbitrarily, under the assumption that each relative interaction matrix is doubly stochastic and irreducible, the individuals' self-appraisals asymptotically converge to a unique non-trivial equilibrium. | cs.SI | cs |
On the Analysis of the DeGroot-Friedkin
Model with Dynamic Relative Interaction
Matrices (cid:63)
Mengbin Ye ∗, Ji Liu ∗∗, Brian D.O. Anderson ∗,∗∗∗,∗∗∗∗,
Changbin Yu ∗,∗∗∗, and Tamer Ba¸sar ∗∗
∗ Research School of Engineering, Australian National University,
Canberra, A.C.T. 2601, Australia
∗∗ University of Illinois at Urbana-Champaign, USA
∗∗∗ Hangzhou Dianzi University, Hangzhou, Zhejiang, China
E-mail: {mengbin.ye, brian.anderson, brad.yu}@anu.edu.au,
∗∗∗∗ Data61-CSIRO (formerly NICTA Ltd.)
{jiliu, basar1}@illinois.edu
Abstract: This paper analyses the DeGroot-Friedkin model for evolution of the individuals'
social powers in a social network when the network topology varies dynamically (described by
dynamic relative interaction matrices). The DeGroot-Friedkin model describes how individual
social power (self-appraisal, self-weight) evolves as a network of individuals discuss a sequence
of issues. We seek to study dynamically changing relative interactions because interactions may
change depending on the issue being discussed. In order to explore the problem in detail, two
different cases of issue-dependent network topologies are studied. First, if the topology varies
between issues in a periodic manner, it is shown that the individuals' self-appraisals admit a
periodic solution. Second, if the topology changes arbitrarily, under the assumption that each
relative interaction matrix is doubly stochastic and irreducible, the individuals' self-appraisals
asymptotically converge to a unique non-trivial equilibrium.
Keywords: social and behavioural sciences, multi-agent systems, social networks, networked
systems, opinion dynamics
1. INTRODUCTION
In the past decade and a half, the systems and control
community has conducted extensive research into multi-
agent systems. A multi-agent system comprises of multiple
interacting agents. Problems such as formation control,
distributed optimisation, consensus based coordination
and robotics have been heavily studied, see (Cao et al.,
2013; Knorn et al., 2015) for two overviews.
On the other hand, the control community has recently
turned to study multi-agent systems in social sciences.
Specifically, a social network consisting of groups of people
interacting with their acquaintances can be considered
from one point of view as a multi-agent system. The
emergence of social media platforms such as Facebook,
Instagram and Twitter has only increased the relevance
of research into social networks.
A problem of particular interest is "opinion dynamics",
which studies how opinions within a social network may
evolve as individuals discuss an issue, e.g. religion or
(cid:63) This work was supported by the Australian Research Council
(ARC) under the ARC grants DP-130103610 and DP-160104500, by
the National Natural Science Foundation of China (grant 61375072),
and by Data61-CSIRO (formerly NICTA). The work of Liu and
Ba¸sar was supported in part by AFOSR MURI Grant FA 9550-10-
1-0573, and in part by NSF under grant CCF 11-11342.
politics. The classical DeGroot model (DeGroot, 1974) is
closely related to the consensus process (Jadbabaie et al.,
2003; Shi and Johansson, 2013). Other models include the
Friedkin-Johnsen model (Friedkin and Johnsen, 1990), the
Altafini model (Altafini, 2013; Altafini and Lini, 2015),
and Hegselmann-Krause model (Hegselmann and Krause,
2002; Etesami and Ba¸sar, 2015). The DeGroot-Friedkin
model proposed and analysed in (Jia et al., 2015) is a two-
stage model for multi-issue discussions, where issues are
discussed sequentially. For each issue, the DeGroot model
is used to study the opinion dynamics; each individual
updates its own opinion based on a convex combination
of its opinion and those of its neighbours. The coefficients
of the convex combination are determined by 1) the indi-
vidual's self-weight (which represents self-appraisal, self-
confidence) and 2) the weights assigned by the individual
to its neighbours (which might be a measure of trust or
friendship). At the beginning of each new issue, a reflected
appraisal mechanism is used by each individual to update
its own self-weight. This mechanism takes into account
the individual's influence and impact on the discussion of
opinions on the prior issue. From one perspective, an indi-
vidual's self-weight is a representation of that individual's
social power in the social network.
The key contribution of this paper is the study of
the DeGroot-Friedkin model with time-varying interac-
tions among the individuals. Because interactions in the
DeGroot-Friedkin model are modelled by a matrix termed
the "relative interaction matrix ", we will be investigating
relative interaction matrices which dynamically change
between issues but remain constant during each issue. In
particular, we will investigate two types of time-varying in-
teractions as to be explained shortly. As an extension of the
DeGroot-Friedkin model, a modified version was proposed
and analysed in (Xu et al., 2015; Chen et al., 2015). Time-
varying interactions on this modified DeGroot-Friedkin
model was studied in (Xia et al., 2016). On the other hand,
there have been no results studying time-varying interac-
tions for the original DeGroot-Friedkin model proposed
in (Jia et al., 2015) (which assumed a constant relative
interaction matrix during each discussion and between all
issues).
The first type of time-varying interaction to consider
is issue-dependent interactions that change periodically.
For example, consider a government cabinet that meets
regularly to discuss several different issues, e.g. defence,
finance, and social security. Because different ministers
will have different portfolios and specialisations, it is likely
that the weights assigned by an individual to its neigh-
bours (used in the opinion dynamics component of the
DeGroot-Friedkin model) will change depending on the
issue. Periodically changing interactions may occur if a
group meets regularly to discuss the same set of issues, e.g.
the above example of the government cabinet. Initially, we
consider the situation where the social network switches
periodically between two different interaction topologies.
We show that the self-weight of each individual in the so-
cial network has a periodic solution where each individual
always has strictly positive self-weight that is less than
one. This result is then generalised to multiple periodically
switching interaction topologies.
As a second type of time variation, we consider the case
where the issues vary arbitrarily as opposed to periodically.
Accordingly, the relative interaction matrices also vary
arbitrarily. Furthermore, in order to simplify the analysis,
we assume that the arbitrarily varying relative interaction
matrices are doubly stochastic and irreducible for each
issue. Such arbitrarily changing interactions may occur in
current day online social networks. We show that, given
the assumption of doubly stochastic and irreducible rela-
tive interaction matrices, the self-weight of each individual
converges asymptotically to 1/n where n is the number of
individuals in the network. In other words, a democratic
sharing of social power is achieved. This result is consistent
with (Jia et al., 2015) which studied a single, constant
relative interaction matrix for the network over all issues.
The remainder of the paper is organised as follows. Sec-
tion 2 provides mathematical notation and introduces the
DeGroot-Friedkin model. Section 3 considers interactions
which change periodically with issues. Interactions which
vary randomly between issues is studied in Section 4.
Simulations are presented in Section 5 and we conclude
the paper with the concluding remarks of Section 6.
2. BACKGROUND AND PROBLEM STATEMENT
We begin by introducing some mathematical notations
used in the paper. Let 1n and 0n denote, respectively,
the n × 1 column vectors of all ones and all zeros. For a
vector x ∈ Rn, 0 (cid:22) x and 0 ≺ x indicate component-
wise inequalities, i.e., for all i ∈ {1, 2, . . . , n}, 0 ≤ xi
and 0 < xi, respectively. Let ∆n denote the n-simplex,
the set which satisfies {x ∈ Rn : 0 (cid:22) x, 1(cid:62)
n x = 1}.
(cid:101)∆n = ∆n\{e1, . . . , en} and int(∆n) = {x ∈ Rn : 0 ≺
The canonical basis of Rn is given by e1, . . . , en. Define
n x = 1}. For the rest of the paper, we shall use the
x, 1(cid:62)
terms "node", "agent", and "individual" interchangeably.
We shall also interchangeably use the words "self-weight"
and "individual social power".
An n × n matrix is called a row-stochastic matrix if its
entries are all nonnegative and its row sums all equal 1.
An n × n matrix is called a doubly stochastic matrix if its
entries are all nonnegative and its row and column sums
all equal 1.
2.1 Graph Theory
The interaction between agents in a social network is
modelled using a weighted directed graph, denoted as
G = (V,E). Each individual agent is a node in the finite,
nonempty set of nodes V = {v1, . . . , vn}. The set of
ordered edges is E ⊆ V × V. We denote an ordered edge
as eij = (vi, vj) ∈ E, and because the graph is directed, in
general the assumption eij = eji does not hold. An edge eij
is outgoing with respect to vi and incoming with respect
to vj. The presence of an edge eij connotes that individual
j's opinion is influenced by the opinion of individual i (the
precise nature of the influence will be made clear in the
sequel). The incoming and outgoing neighbour set of vi
are respectively defined as N +
i = {vj ∈ V : eji ∈ E}
and N −
i = {vj ∈ V : eij ∈ E}. The relative interaction
matrix C ∈ Rn×n associated with G has nonnegative
entries cij, termed "relative interpersonal weights" in Jia
et al. (2015). The entries of C have properties such that
0 < cij ≤ 1 ⇔ eji ∈ E and cij = 0 otherwise. It is
assumed that cii = 0 (i.e. with no self-loops), and we
cij = 1 (i.e. that C
impose the restriction that (cid:80)
is a row-stochastic matrix).
j∈N +
i
A directed path is a sequence of edges of the form
(vp1, vp2), (vp2, vp3 ), . . . where vpi ∈ V, eij ∈ E. Node i
is reachable from node j if there exists a directed path
from vj to vi. A graph is said to be strongly connected if
every node is reachable from every other node. The relative
interaction matrix C is irreducible if and only if the as-
sociated graph G is strongly connected. If C is irreducible
then it has a unique left eigenvector c(cid:62) associated with
the eigenvalue 1, with the property c(cid:62)1n = 1 (Perron-
Frobenius Theorem, see (Godsil et al., 2001)). Hence forth,
we shall call this left eigenvector c(cid:62) the dominant left
eigenvector of C.
2.2 Modelling the Dynamics of the Social Network
The discrete-time DeGroot-Friedkin model is comprised
of a consensus model and a mechanism for updating self-
appraisal (the precise meaning of self-appraisal will be
made clear in the sequel). We define S = {1, 2, 3, . . .} to
be the set of indices of sequential issues which are being
discussed by the social network. For a given issue s, the
social network discusses the issue using the discrete-time
n(cid:88)
DeGroot consensus model. At the end of the discussion
(i.e. when the DeGroot model has effectively reached
steady state), each individual judges its impact on the
discussion (self-appraisal). The individual then updates its
own self-weight and discussion begins on the next issue
s + 1.
For each issue s ∈ S,
DeGroot Consensus of Opinions
each agent updates its opinion yi(s,·) ∈ R at the t + 1th
time instant as
yi(s, t + 1) = wii(s)yi(s, t) +
wij(s)yj(s, t)
(1)
j∈N +
i ,j(cid:54)=i
where wii(s) is the self-weight individual i places on its
own opinion and wij are the weights given by agent i to
the opinions of its neighbour individual j. The opinion
dynamics for the entire social network may be expressed
as
y(s, t + 1) = W (s)y(s, t)
(2)
where y(s, t) = [y1(s, t) ··· yn(s, t)](cid:62) is the vector of
opinions of the n + 1 agents in the network at time instant
t. This model was first proposed in (DeGroot, 1974) with
S = 1 (i.e. only one issue was discussed). Below, we provide
the model for the updating of W (s) (and specifically wii(s)
via a reflected self-appraisal mechanism).
for Determining Self-
Friedkin's Self-Appraisal Model
Weight The Friedkin component of the model proposes
a method for updating the self-weight (self-appraisal, self-
confidence or self-esteem) of agent i, which is denoted by
xi(s) = wii(s) ∈ [0, 1] (the ith diagonal term of W (s)) (Jia
et al., 2015). Define the vector x(s) = [x1(s) ··· xn(s)](cid:62)
as the vector of self-weights for the social network, with
starting self-weight x(1) ∈ ∆n. The influence matrix W (s)
can be expressed as
W (s) = X(s) + (I n − X(s))C
(3)
where C is the relative interaction matrix associated with
the graph G and X(s)
.
= diag[x(s)]. From the fact that C
is row-stochastic with zero diagonal entries, (3) implies
that W (s) is a row-stochastic matrix. The self-weight
vector x(s) is updated at the end of issue s as
x(s + 1) = w(s)
(4)
where w(s) is the dominant left eigenvector of W (s) with
n w(s) = 1 and w(s) (cid:23) 0 (Jia
the properties such that 1(cid:62)
et al., 2015). This implies that x(s) ∈ ∆n for all s.
In (Jia et al., 2015), the DeGroot-Friedkin model was
studied under the assumption that C was constant for
all t and all s. In this paper, we investigate the model
when C(s) varies between issues. We assume that each
agent's opinion, yi(s, t),
is a scalar for simplicity. The
results can readily be applied to the scenario where each
agent's opinion state is a vector yi ∈ Rp, p ≥ 2, by using
Kronecker products.
It is shown in [Lemma 2.2, (Jia et al., 2015)] that the
system (4), with C independent of s, is equivalent to
x(s + 1) = F (x(s))
(5)
where the nonlinear vector-valued function F (x(s)) is
defined as
ei
F (x(s)) =
with α(x(s)) = 1/(cid:80)n
α(x(s))
if xi(s) = ei, for any i
otherwise
1 − x1(s)
c1
...
cn
1 − xn(s)
ci
i=1
(6)
1−xi(s) and where ci is the ith
entry of the dominant left eigenvector c(cid:62) of the relative
interaction matrix C.
Theorem 1. (Theorem 4.1, (Jia et al., 2015)). For n ≥ 3,
consider the DeGroot-Friedkin dynamical system (5) with
a relative interaction matrix C that is row-stochastic,
irreducible, and has zero diagonal entries. Assume that the
digraph G associated with C does not have star topology 1
and define c(cid:62) as the dominant left eigenvector of C. Then,
(i) For all initial conditions x(1) ∈ (cid:101)∆n, the self-weights
x(s) converge to x∗ as s → ∞. Here, x∗ ∈ (cid:101)∆n is the
unique fixed point satisfying x∗ = F (x∗).
(ii) There holds x∗
i < x∗
j if and only if ci < cj, for any
i, j, where ci is the ith entry of the dominant left
eigenvector c. There holds x∗
j if and only if
ci = cj.
(iii) The unique fixed point x∗ is determined only by c(cid:62),
i = x∗
and is independent of the initial conditions.
2.3 Problem Formulation
This paper studies the DeGroot-Friedkin model under the
assumption that C varies between issues. For a given s,
however, C is assumed to remain constant for all t. Thus,
the relative interactions among the individuals, i.e. C(s),
may change between issues, but remains constant for all
t for a given issue. We will consider alternative situations
corresponding to alternative assumptions. We leave the
details of these assumptions to their corresponding future
sections.
To facilitate our analysis, we make the following two
assumptions which will hold in all problems considered in
this paper.
Assumption 1. The graph G does not have star topology,
the relative interaction matrix C(s) is irreducible and
n ≥ 3.
Assumption 2. The initial conditions of the DeGroot-
Friedkin model dynamics (5) satisfy x(1) ∈ (cid:101)∆n.
Note that Assumption 1 requires n ≥ 3, because for
n = 2, any irreducible C(s) is doubly stochastic and
corresponds to a star topology. Assumption 2 ensures that
no individual begins with self-weight equal to 1 (autocratic
configuration).
3. PERIODIC SWITCHING
In this section, we investigate the situation where C(s)
changes periodically. In order to simplify the problem, we
make the following assumption.
1 A graph G is said to have star topology if there exists a node i
such that every edge of G is either to or from node i.
Assumption 3. The social network switches between two
relative interaction matrices, C1 and C2, where both ma-
trices are irreducible, row-stochastic, but not necessarily
doubly stochastic. More specifically, the social network
switches between C1 and C2 periodically, with period
T = 2, as given by
C(s) =
if s is odd
if s is even
(7)
(cid:26)C1
C2
Note that for a constant C, simulations show that conver-
gence of x(s) to x∗ typically occurs after only a few issues
(Jia et al., 2015). We are therefore interested in periodic
switching with a short period, because a long period will
allow x(s) to reach x∗ (hence the above assumption).
3.1 Transformation into a Time-Invariant System
Under Assumption 3, the update of the self-weights occurs
as x(s + 1) = F (x(s), s), where we now acknowledge the
fact that F (x(s), s) is an explicit function of time. More
specifically, and in accordance with (6), we have
for the time-invariant nonlinear composition functions
F 3 = F 2 ◦ F 1 and F 4 = F 1 ◦ F 2.
We can thus express the periodic system (8) as the
nonlinear time-invariant system
(cid:62) y∗
3 , F (cid:62)
y(2s + 2) = ¯F (y(2s))
(16)
where ¯F = [F (cid:62)
4 ](cid:62), and seek to study the equilibrium
of this system. More specifically, suppose that y∗ =
(cid:62)](cid:62) is an equilibrium of the system (16). In
[y∗
Appendix A, we show F 3 and F 4 are continuous. It is
then straightforward to see that if limk→∞ y(k) → y∗,
then x(s) is an asymptotic periodic sequence with periodic
sequence
2
1
(cid:26)F 3(y∗
1)
F 4(y∗
2)
x(s) =
if s is odd
if s is even
(17)
Define yi (respectively ¯Fi) as the ith element of the vector
y (respectively ¯F ). From the above, manipulation allows
us to obtain, for i = 1, . . . , n,
¯Fi(y1(2s)) = α2(F 1(y1(2s)))
where α1(y1(2s)) = 1/(cid:80)n
(cid:80)n
α2(F 1(y1(2s))) =
j=1
p=1
ci,2
1 − α1(y1(2s))
ci,1
1−yi(2s)
cj,1
1−yj (2s) and
1
cp,2
1−α1(y1(2s))
cp,1
1−yp (2s)
(18)
(19)
3.2 Existence of a Periodic Sequence
In this subsection, we establish properties of the function
¯F . More specifically, we detail properties of F 3(y1(2s)).
Because F 3(y1(2s)) is similar in form to F 4(y2(2s)), we
omit the proof verifying that the same properties hold for
F 4(y2(2s)).
Lemma 2. The following properties of F 3(y1(2s)) hold.
P1 The quantity α2(F 1(y1(2s))) > 0 if y1(2s) ∈ (cid:101)∆n, for
any s.
P2 If y1(2s) = ei for any i, then F 3(y1(2s)) = ei. In
other words, the n vertices of ∆n are fixed points of
F 3.
P3 The function F 3(y1(2s)) : ∆n → ∆n is continuous.
P4 There exists at least one fixed point in int(∆n).
(11)
Proof. See Appendix A.
1 and y∗
Lemma 2 states that F 3 and F 4 each have at least one
fixed point, which we denote by y∗
2 respectively.
We will leave the study of whether the fixed points are
unique, and analysis of convergence to the fixed points
to the journal version of this paper. We now state the
following theorem which establishes the periodic behaviour
of the system (8).
Theorem 3. Suppose that Assumption 3 holds.
T1 Suppose further that for some s1 ∈ S, there holds
1 ∈ int(∆n) is any fixed
x(2s1 − 1) = y∗
point of F 3. Then, for all s ≥ s1, there holds
1, where y∗
x(s) =
if s is odd
if s is even
(20)
where y∗
2 ∈ int(∆n) is a fixed point of F 4.
(cid:26)y∗
1
y∗
2
(14)
(15)
if s is odd
if s is even
(8)
if xi(s) = ei, for any i
otherwise
1 − x1(s)
ei
c1,p
αp(x(s))
F 2(x(s))
x(s + 1) =
F p(x(s)) =
The function F p, for p = 1, 2, is
(cid:26)F 1(x(s))
with αp(x(s)) = 1/(cid:80)n
(cid:20)y1(2s)
(cid:21)
(cid:20)y1(2s + 2)
...
cn,p
i=1
=
y(2s + 2) =
y2(2s + 2)
1 − xn(s)
ci,p
(9)
1−xi(s) . Here ci,p is the ith
(cid:62) associated
element of the dominant left eigenvector cp
with the relative interaction matrix Cp.
We now define a new state y ∈ R2n as
y(2s) =
(10)
and study the evolution of y(2s) for every s ∈ S. Observe
that
y2(2s)
(cid:21)
=
x(2s)
x(2s + 2)
(cid:21)
(cid:20)x(2s − 1)
(cid:20)x(2s + 1)
(cid:21)
(cid:21)
(cid:17)
(cid:17)
(cid:17)
(cid:17)
(cid:20) F 2(x(2s))
(cid:16)
F 2
(cid:16)
F 2
(cid:16)
(cid:20)F 3(y1(2s))
F 2(y2(2s))
F 1(y1(2s))
(cid:21)
F 1
F 4(y2(2s))
=
=
By observing that x(2s + 1) = F 2(x(2s)) and x(2s +
2) = F 1(x(2s + 1)) for any s, we obtain
y(2s + 2) =
F 1(x(2s + 1))
(12)
Similarly, by noticing that x(2s) = F 1(x(2s − 1)) and
x(2s + 1) = F 2(x(2s)) for any s, we obtain
F 1(x(2s − 1))
F 2(x(2s))
y(2s + 2) =
(cid:16)
(13)
F 1
T2 Suppose now that, instead of T1, there holds for some
s1 ∈ S, x(2s1) = y∗
2 ∈ int(∆n) is any fixed
point of F 3. Then, (20) holds for all s1 ≥ s, with
1 ∈ int(∆n) being a fixed point of F 3.
y∗
2, where y∗
Proof. See Appendix B
and that any y1(0) ∈ (cid:101)∆n will converge to the unique y∗
Note that the above result establishes that a periodic
sequence exists, but convergence to this sequence is not
established. We conjecture that F 3 does in fact have a
unique fixed point (i.e. a unique periodic sequence for x(s))
1.
We conjecture a similar result for F 4. In Section 5, we
provide simulations in support of these conjectures.
Remark 4. Theorem 3 leads to an interesting conclusion.
Consider that case where, at some point in the evolution
of the system trajectory, we have x(s) = y∗
1 or y∗
2 (e.g.
the self-weights are initialised as x(1) = y∗
1). Then, the
self-weights will exhibit a periodic sequence. Furthermore,
for each individual in the network, that individual's self-
weight/social power is never zero.
Remark 5. Notice that in the Theorem 3, we did not
require the fixed points of F 3 and F 4 to be unique.
Suppose that there are two distinct fixed points of F 3,
which we label y∗
1,b. The theorem then concludes
that if x(2s) = y∗
1,a for some s, then the system (8)
will exhibit a periodic sequence. If on the other hand
x(2s) = y∗
1,b for some s, the system (8) will also exhibit a
periodic sequence, but different from the sequence involving
y∗
1,a.
1,a and y∗
3.3 Generalisation to M Topologies
We now generalise to the case where the social network
switches between M different topologies. The following
assumption is now placed on the social network instead
of Assumption 3.
Assumption 4. For q ∈ Z≥0, the social network switches
between the M ≥ 3 relative interaction matrices in the
following manner
C(M (s − 1) + p) = Cp
(21)
for all s ∈ S and any p ∈ {1, 2, . . . , M}. The matrices
Cp are all irreducible, row-stochastic and in general Ci (cid:54)=
Cj,∀ i, j ∈ {1, 2, . . . , M}.
With the above Assumption 4, the update of the self-
weights is given by
x(M (s − 1) + p + 1) = F p(x(M (s − 1) + p))
(22)
for all s ∈ S and any p ∈ {1, 2, . . . , M}. The function
F p is given in (9), but now for p = 1, 2, . . . , M . Following
the steps in subsection 3.1, we now show the generalised
transformation of the time-varying system with M differ-
ent topologies to a time-invariant nonlinear system.
A new state variable y ∈ RM n is defined as
y1(M s)
y2(M s)
...
=
yM (M s)
x(M (s − 1) + 1)
x(M (s − 1) + 2)
x(M (s − 1) + M )
...
y(M s) =
(23)
and we study the evolution of y(M s) for every strictly
positive integer s. It follows that
y(M (s + 1)) =
y(M (s + 1)) =
(24)
Following the logic in subsection 3.1, but with the precise
steps omitted due to space limitations, we obtain that
...
...
x(M s + M )
x(M s + 2)
y2(M (s + 1))
yM (M (s + 1))
=
x(M s + 1)
y1(M (s + 1))
F M (F M−1(. . . (F 1(y1(M s)))))
G1(y1(M s))
F 1(F M (. . . (F 2(y2(M s)))))
G2(y2(M s))
F M−1(F M−2(. . . (F M (yM (M s)))))
...
=
...
(25)
GM (yM (M s))
One can observe that each GM is a time-invariant non-
linear function. Due to the complexity of each Gi, we do
not reproduce their expressions here, but their forms are
similar to the expressions in (18) - (19). The transformed
nonlinear system is expressed as
y(M (s + 1)) = ¯G(y(M s))
(26)
The generalisations of Lemma 2 and Theorem 3 are now
given below.
Lemma 6. The following properties of ¯G(y(M s)) hold, for
any p ∈ {1, 2, . . . , M}.
(cid:101)∆n, for any s.
P1 The quantity αj > 0,∀ j ∈ {1, 2, . . . , M} if yp(M s) ∈
P2 If yp(M s) = ei for any i, then Gp(yp(M s)) = ei. In
other words, the n vertices of ∆n are fixed points of
Gp.
P3 The function Gp(yp(M s)) : ∆n → ∆n is continuous.
P4 There exists at least one fixed point for Gp in int(∆n).
Theorem 7. Suppose that Assumption 4 holds. Suppose
further that for some s1, there holds x(M (s1−1)+p) = y∗
p,
p ∈ int(∆n) is a fixed point of Gp. Then, for all
where y∗
s ≥ s1 there holds
j , for any j ∈ {1, 2, . . . , M} (27)
xj(M (s − 1) + j) = y∗
where y∗
j = y∗
for j = p.
j ∈ int(∆n) is a fixed point of Gj, and y∗
p
The proofs for the above two results are omitted due to
the similarity of the proof methods between Lemma 2
(respectively, Theorem 3) and Lemma 6 (respectively,
Theorem 7).
4. ARBITRARY SWITCHING
This section considers the scenario where the social net-
work topology changes arbitrarily. In other words, the
function F (x(s), s) in (6) may depend explicitly on the
issue s. Specifically, it is the quantities ci(s) that may vary
depending on the issue discussed. In order to facilitate the
analysis, the following assumption is invoked.
Assumption 5. For all s ∈ {1, 2, . . .}, C(s) is doubly
stochastic and irreducible.
Theorem 8. Suppose that Assumption 5 holds. Then, the
vector of self-weights x(s) asymptotically converges to the
unique equilibrium x∗ in (cid:101)∆n as s → ∞, where x∗
for each i ∈ {1, 2, . . . , n}.
i = 1/n
Proof. Because C(s) is irreducible, the dominant nor-
malised left eigenvector c(s)(cid:62) is unique. Moreover, because
C(s) is doubly stochastic, we obtain that ci(s) = 1/n
for all i ∈ {1, 2, . . . , n}, which implies that ci(s) does not
depend on s, and neither does the function F (x(s), s) in
(6). Thus, the convergence analysis in (Jia et al., 2015),
on the system x(s + 1) = F (x(s)) can be directly applied
here, leading to the conclusion that lims→∞ x(s) = 1n/n.
5. SIMULATIONS
In this section, simulations are provided which verify the
claims of Lemma 2, Lemma 6, Theorem 3 and Theorem 7.
The simulated social network has 8 individuals, with three
possible sets of interactions described by three different
irreducible relative interaction matrices, which we denote
as C1, C2 and C3. These are omitted due to space
limitations.
Figure 1 shows the evolution of the individual social
power (self-weight xi(s)) over a sequence of issues for
the periodically switching relative interaction matrices C1
and C2. The initial condition x(s = 1) was generated
randomly. For the same two relative interaction matrices,
Fig. 2 shows the evolution for a second randomly generated
initial condition x(s = 1) different from the first figure.
Figure 3 shows the evolution of x(s) for a social network
that periodically switches between C1, C2 and C3.
Figures 1 and 2 illustrate that Theorem 3 holds. In
other words, x(s) has a periodic solution. Notice from
Figures 1 and 2 that even for different initial conditions,
x(s) asymptotically reaches the same periodic solution.
This supports our conjecture that ¯F has a unique fixed
point and that the fixed point is attractive for all x(s) ∈
int(∆n). Our goal is to verify this in the extended version
of this paper. Figure 3 illustrates the results developed
in subsection 3.3 on generalising to multiple periodically
switching relative interaction matrices.
Lastly, Figure 4 simulates the DeGroot-Friedkin model for
8 individuals, with C(s) arbitrarily changing between is-
sues. Assumption 5 holds for C(s) ∈ {C4, C5}. Theorem 8
is illustrated since lims→∞ x(s) → 1n/n.
6. CONCLUSION
In this paper, the DeGroot-Friedkin model was used to
analyse a social network under a number of assumptions
on the dynamically changing network topology, with the
network topology being described by relative interaction
matrices which vary between issues being discussed by the
social network. In particular, results were developed on the
evolution of an individual's social power (or self-weight).
If the relative interaction matrices changed periodically,
then an individual's self-weight admitted at least one peri-
odic solution where the individual's self-weight was always
strictly positive, and less than 1. For arbitrarily varying
relative interaction matrices which were irreducible and
doubly stochastic, individual social power converged to a
democratic configuration. In the periodic case, future work
will focus on studying the uniqueness of the periodic solu-
tion and obtaining a convergence property. For arbitrarily
varying topologies, future work will focus on relaxing the
assumptions on the relative interaction matrices.
REFERENCES
Altafini, C. (2013). Consensus problems on networks
with antagonistic interactions. IEEE Transactions on
Automatic Control, 58(4), 935–946.
Altafini, C. and Lini, G. (2015). Predictable dynamics of
opinion forming for networks with antagonistic interac-
tions. IEEE Transactions on Automatic Control, 60(2),
342–357.
Cao, Y., Yu, W., Ren, W., and Chen, G. (2013). An
Overview of Recent Progress in the Study of Dis-
IEEE Transac-
tributed Multi-Agent Coordination.
tions on Industrial Informatics, 9(1), 427–438.
doi:
10.1109/TII.2012.2219061.
Chen, X., Liu, J., Xu, Z., and Ba¸sar, T. (2015). Distributed
Evaluation and Convergence of Self-Appraisals in Social
Networks.
In 54th IEEE Conference on Decision and
Control (CDC), Osaka, Japan, 2895–2900.
DeGroot, M.H. (1974). Reaching a consensus. Journal of
the American Statistical Association, 69(345), 118–121.
Etesami, S.R. and Ba¸sar, T. (2015). Game-theoretic
analysis of the Hegselmann-Krause model for opinion
dynamics in finite dimensions.
IEEE Trans. Autom.
Control, 60(7), 1886–1897.
Friedkin, N.E. and Johnsen, E.C. (1990). Social influence
and opinions. The Journal of Mathematical Sociology,
15(3-4), 193–205.
Godsil, C.D., Royle, G., and Godsil, C. (2001). Algebraic
graph theory, volume 207. Springer New York.
Hegselmann, R. and Krause, U. (2002). Opinion dy-
namics and bounded confidence models, analysis, and
simulation. Journal of Artificial Societies and Social
Simulation, 5(3).
Jadbabaie, A., Lin, J., and Morse, A.S. (2003). Co-
ordination of Groups of Mobile Autonomous Agents
IEEE Transac-
Using Nearest Neighbor Rules.
tions on Automatic Control, 48(6), 988–1001.
doi:
10.1109/TAC.2003.812781.
Jia, P., MirTabatabaei, A., Friedkin, N.E., and Bullo, F.
(2015). Opinion Dynamics and the Evolution of Social
Power in Influence Networks. SIAM Review, 57(3), 367–
397.
Knorn, S., Chen, Z., and Middleton, R. (2015). Overview:
Collective control of multi-agent systems. IEEE Trans-
actions on Control of Network Systems, PP(99), 1–1.
doi:10.1109/TCNS.2015.2468991.
Shi, G. and Johansson, K.H. (2013). The Role of Persistent
Graphs in the Agreement Seeking of Social Networks.
IEEE Journal on Selected Areas in Communications,
31(9), 595–606. doi:10.1109/JSAC.2013.SUP.0513052.
Xia, W., Liu, J., Johansson, K.H., and Ba¸sar, T. (2016).
Convergence Rate of the Modified DeGroot-Friedkin
Model with Doubly Stochastic Relative Interaction Ma-
trices. In American Control Conference (ACC), Boston,
USA, 1054–1059. doi:10.1109/ACC.2016.7525054.
Xu, Z., Liu, J., and Ba¸sar, T. (2015). On a Modified
DeGroot-Friedkin Model of Opinion Dynamics.
In
American Control Conference (ACC), Chicago, USA,
1047–1052. doi:10.1109/ACC.2015.7170871.
Fig. 1. Evolution of an individual's self-weight for C1
and C2.
Fig. 2. Evolution of an individual's self-weight for C1
and C2, different initial conditions.
Fig. 3. Evolution of an individual's self-weight for C1,
C2 and C3.
Fig. 4. Evolution of an individual's self-weight when
C(s) varies arbitrarily between C4 and C5.
Appendix A. PROOF OF LEMMA 2
Property P1: Firstly, observe that
α2(F 1(y1(2s))) =
(cid:80)n
p=1
1
cp,2
1− ¯Fi(y1(2s))
and, for i = 1, . . . , n, we have
¯Fi(y1(2s)) = α1(y1(2s))
ci,1
1 − yi(2s)
(A.1)
(A.2)
i=1
From the fact that cp,1 > 0 and yp(2s) < 1 for any
p = 1, . . . , n, we obtain α1(y1(2s)) > 0 (see the definition
of α1 below (9)). It follows that ¯Fi(y1(2s)) > 0 for any
¯Fi = 1
i = 1, . . . , n. Furthermore, observe that (cid:80)n
implying that F 1(y1(2s)) ∈ (cid:101)∆n. It is then trivial to obtain
from (A.1) that α2(F 1(y1(2s))) > 0, for any s.
Property P2: From (9),
it follows that F 3(y1(2s)) =
F 2(F 1(ei)) = F 2(ei) = ei.
Property P3: Let p = 1, 2. The fact that F p : ∆n →
∆n is continuous on (cid:101)∆n is straightforward; [Lemma 2.2,
(Jia et al., 2015)] shows that F p is Lipschitz continuous
about ei with Lipschitz constant 2
2/ci,p. It is then
straightforward to verify that the composition F 3 = F 2 ◦
F 1 : ∆n → ∆n is continuous.
Property P4: Define the set
A = {y1 ∈ ∆n : 1 − r ≥ yi ≥ 0,∀ i ∈ {1, . . . , n}} (A.3)
where r is strictly positive. In [Theorem 4.1, (Jia et al.,
2015)], it is shown that for a sufficiently small r, there
holds F p(A) ⊂ A, for p = 1, 2. In fact, Fi(y1) < 1−r,∀ i ∈
√
{1, . . . , n}). It follows that F 1(A) ⊂ A ⇒ F 2(F 1(A)) ⊂
A, which implies that F 3(A) ⊂ A.
Brouwer's fixed-point theorem then implies that there ex-
ists at least one fixed point y∗
1 = F 3(y∗
1)
because F 3 is a continuous function on the compact, con-
vex set A. In the above proof for Property P1, we showed
that if y1(2s) ∈ (cid:101)∆n, then α1(y1(2s)) and α2(F 1(y1(2s)))
1 ∈ A such that y∗
are both strictly positive. For any i = 1, . . . , n, consider
now y∗
i = ¯Fi(y∗
¯Fi(y∗
1). We have
1) = α2(F 1(y∗
1))
(A.4)
ci,2
1 − α1(y∗
1) ci,1
1−y∗
i < 1 from the fact that y1 ∈ (cid:101)∆n. In other words, y∗
which implies that ¯Fi(y∗
and y∗
i
is strictly positive for all i = 1, . . . , n. We thus conclude
1 ∈ int(∆n) ⊂ A, i.e. no point on the boundary of
that y∗
(cid:3)
∆n is a fixed point apart from ei.
1) > 0 because ci,p > 0 for p = 1, 2
i
Appendix B. PROOF OF THEOREM 3
2 is a fixed point of F 4.
1)). Next, define z∗
2)) which implies that z∗
1 = F 2(F 1(y∗
1 = F 2(z∗
2). In other words, z∗
2 = F 2(y∗
Observe that y∗
1).
2). Next, observe that F 1(y∗
We thus have y∗
1) =
2 = F 1(F 2(z∗
F 1(F 2(z∗
2)) =
F 4(z∗
For any s, suppose that y1(2s) = x(2s − 1) = y∗
1.
From the fact that x(2s) = F 1(x(2s − 1)), it follows
that y2(2s) = x(2s) = z∗
2. One can then obtain x(2s +
1) = y1(2s + 2) = F 3(y1(2s)) = y∗
1. Likewise, we conclude
that x(2s + 1) = y2(2s + 2) = F 4(y2(2s)) = z∗
2. Because
the above arguments hold for any s, statement T1 in the
theorem readily follows. Statement T2 follows likewise. (cid:3)
246820121416182000.10.20.30.4Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 8246810121416182000.10.20.30.4Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 8246810121416182000.10.20.30.4Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 81234567891000.10.20.3Self-Weight, xi(s)Issue, s Agent 1Agent 2Agent 3Agent 4Agent 5Agent 6Agent 7Agent 8 |
1910.08010 | 1 | 1910 | 2019-10-17T16:30:08 | Uncritical polarized groups: The impact of spreading fake news as fact in social networks | [
"cs.SI",
"physics.soc-ph"
] | The spread of ideas in online social networks is a crucial phenomenon to understand nowadays the proliferation of fake news and their impact in democracies. This makes necessary to use models that mimic the circulation of rumors. The law of large numbers as well as the probability distribution of contact groups allow us to construct a model with a minimum number of hypotheses. Moreover, we can analyze with this model the presence of very polarized groups of individuals (humans or bots) who spread a rumor as soon as they know about it. Given only the initial number of individuals who know any news, in a population connected by an instant messaging application, we first deduce from our model a simple function of time to study the rumor propagation. We then prove that the polarized groups can be detected and quantified from empirical data. Finally, we also predict the time required by any rumor to reach a fixed percentage of the population. | cs.SI | cs |
Uncritical polarized groups: The impact of spreading
fake news as fact in social networks
Jes´us San Mart´ına, F´atima Drubib, Daniel Rodr´ıguez P´erezc
aDept. Matem´aticas del ´Area Industrial, ETSIDI, Universidad Polit´ecnica de Madrid,
bDept. Matem´aticas, Facultad de Ciencias, Universidad de Oviedo, Oviedo, Spain
cDept. F´ısica Matem´atica y de Fluidos, Facultad de Ciencias, Universidad Nacional de
Educaci´on a Distancia, Madrid, Spain
Madrid, Spain
Abstract
The spread of ideas in online social networks is a crucial phenomenon to un-
derstand nowadays the proliferation of fake news and their impact in democ-
racies. This makes necessary to use models that mimic the circulation of
rumors. The law of large numbers as well as the probability distribution of
contact groups allow us to construct a model with a minimum number of
hypotheses. Moreover, we can analyze with this model the presence of very
polarized groups of individuals (humans or bots) who spread a rumor as soon
as they know about it. Given only the initial number of individuals who know
any news, in a population connected by an instant messaging application, we
first deduce from our model a simple function of time to study the rumor
propagation. We then prove that the polarized groups can be detected and
quantified from empirical data. Finally, we also predict the time required by
any rumor to reach a fixed percentage of the population.
Keywords: online social network, fake news, rumor propagation, uncritical
Email address: [email protected] (Jes´us San Mart´ın)
Preprint submitted to Elsevier
October 18, 2019
senders group
1. Introduction
The extraordinary global increase in online social network usage, and the
ease of sending messages ubiquitously and almost instantaneously, have pro-
vided a fertile ground for the dissemination of fake news [1, 2]. In addition,
the use of these platforms can inevitably have deep social and political con-
sequences. For instance, a disinformation campaign became a topic of wide
public concern during the Brexit referendum in the UK, as well as during
the US presidential election, both in 2016 [3, 1, 4].
The seriousness of the situation due to the current and growing phe-
nomenon of fake news lies not only in the speed and ease of reaching broad
and very different strata of society but also in the negligible cost of this new
form of worldwide interactive communication. This is a novel and simulta-
neously complicated situation that makes it necessary to study rumor propa-
gation models in order to design appropriate countermeasures and avoid, for
example, their potential impact on destabilization of liberal democracies [2].
Nevertheless, online social networks cannot be considered solely as mere
media responsible for the propagation of fake news, since first they work in
an inverse manner spreading real news. For this reason, understanding how
ideas spread in social networks, as an element of both economic and political
marketing, becomes a fundamental task. Companies, as well as political
parties, that are interested in promoting their products or disseminating
their ideas to the population, can benefit from the use of new and cheaper
communication channels based on mobile applications such as WhatsApp
2
(with millions of users worldwide), which are much more profitable than
traditional marketing strategies, publicity campaigns, etc.
In order to avoid the destabilizing effects due to the spread of fake news, it
is necessary to provide a suitable propagation model of rumors. In this sense,
it is essential to first identify the fundamental variables that characterize this
phenomenon. Given that there are great similarities between the spread of
news and rumors and the spread of infectious diseases, a classic approach to
study how information is disseminated is to define epidemiological models of
populations [5, 6]. Additionally, other studies focused on identifying the most
efficient spreaders in a network [7]. In [8], two models were presented with
the assumption that either spreaders are not always active or an ignorant
is not interested in spreading the rumor. The effect of homogeneity and
polarization, i.e. echo chambers, in the spreading of misinformation online
was studied in [9]. Finally, why rumors spread so quickly in social networks
was analyzed in [10].
It should be noted that an element common to all
these different approaches is that it is necessary to assume certain more or
less believable hypotheses.
In this study, we present a news dissemination model base on a proba-
bilistic approach that allow us to use the law of large numbers to determine
the probability function of sending messages. To the best of our knowledge,
there is no similar result for rumor spread models and we can only refer to
the discussion in [11]. One of our main contributions is that additional un-
realistic hypotheses are not necessary. Therefore, we provide a more general
rumor propagation model, which is also robust, without any limitation due
to simplifications in the hypotheses.
3
In addition to reducing the number of necessary hypotheses, another ma-
jor issue when modelling is to obtain a faithful description of the reality that,
in the particular case of social networks, is manifested by its heterogeneity.
In our model, this heterogeneity is reflected in the fact that people are related
through groups, with different sizes and not with the same sensitivity to the
propagation of a message. In particular, the strongly polarized like-minded
population groups are one of the key elements to amplify the spread of ru-
mors. People belonging to this type of group will forwa all kind of news (false
or not) with the sole criterion that they are related to their own ideological
line.
It is interesting to note that news dissemination models hardly take into
account the different reactions that people show when faced with true and
false news. In this sense, there are two underlying problems for any model:
the first refers to the different reaction of people to the veracity/falsity of the
news and the second is related to how the certainty of the news is validated.
In order to give an answer to these problems with our model, we simply
focus on the propagation of the message. Thus, the authenticity or falsity
of the message will be determined solely by the probability of propagation.
Note that, except in very specific cases such us "the president has been
killed", the information is judged according to the sender and is considered
true based only on the idiosyncrasy of the person who receives it (similarly
to those people who belong to the same ideological line will do it). On
the contrary, that information will be considered false by those who have a
different ideology, opposed to the sender's. The continuous variations of the
ideological spectrum in the population imply the need to constantly evaluate
4
the truth/falsity of a message. This phenomenon can be perfectly described
by means of the different probabilities of propagation of the message: the
more inclined the population is towards the conservatives, the greater the
probability of spreading news that damages the image of the liberals and
vice versa.
In fact, the probability of news propagation is a fundamental parameter
when modeling the dissemination of ideas, since, if most of the individuals in a
network propagate a message with low probability but a group, which we call
the group of uncritical senders (USG), does so uncritically with probability
100%, the USG will be identified as a very polarized group.
The USG label is surely well defined in the sense that humans, not robots,
accelerate the spread of false news more than the truth [12]. The fact that
people react differently when they receive the news, mainly depending on
whether or not they have an ideological affinity, makes the probability of
news propagation a key parameter to present and analyze our results.
We must be aware that social networks are dynamic, that is, they are con-
stantly changing. Because of this, the proposed models can only be useful if
they can show how the spread of news changes when the relevant parameters
of those models vary continuously. That information must be provided, as
we will, with an analytic formulation. Therefore, we present a predictable
model that can be used to eliminate or mitigate the dangerous consequences
of spreading fake news as, for instance, biasing the vote in government elec-
tions, misallocating resources after natural disasters or terrorist actions, mis-
guiding in the investment measures after the stock market crash, etc. All
this with a great political, social and economic impact, due to the fact that
5
the number of people who are currently only informed of the news through
their social networks is increasing.
Finally, given that it is a well-known fact that news does not necessarily
have to be disseminated from a single source, but that there may be dif-
ferent sources from which the same news spreads in cascade to the entire
social network, we work with our propagation model of rumors but using
different initial conditions, that is, different seeds are considered in the pop-
ulation. These seeds represent different groups of individuals that initiate
the propagation of the same rumor in the network.
Our results show how the distributions of the propagation probability of
news in social networks change over time as a function of polarized groups of
uncritical senders. Particularly, we found that the probability of spreading
rumors varies from an exponential evolution to a logistic one. As a result,
simply observing how fake news is spread in a social network, we can detect
with our model the presence of a polarized group of uncritical individuals,
which becomes a very useful tool to design countermeasures to deactivate
such groups, if necessary.
The rest of this paper is structured as follows. In section 2, we present a
model of rumor propagation in a social network based on WhatsApp. This is
a numerical model defined from empirical data. In particular, the standard
distributions of the number of person-to-person contacts and of group sizes
were estimated experimentally. In addition, the key parameters that allows
us to analyze the phenomena of spreading rumors are identified and their
values are also estimated.
In section 3, analytic expressions that fit the
numerical simulations are deduced. Based on these expressions, a theoretical
6
model is proposed that captures the observed behavior and sets the basis
to interpret the dynamics that led to those results. In section 4, we discuss
the potential applications of our model and its predictive capabilities. We
conclude the paper in section 5.
2. Methodology
Taking into account that WhatsApp is one of the most popular messaging
application all over the world (e.g. it reaches a 70% of the total population
in Spain 1), we simulate our rumor propagation model in a social network
based on this application. In order to properly simulate message spreading
over this network, we must distinguish two types of contacts, person-to-
person and groups. We also need to know the standard distributions of the
number of person-to-person contacts and of group sizes. Both were estimated
experimentally as described below.
2.1. Statistical characterization of a WhatsApp network
A sample of 150 college students (age range 18-20 years) was used to ob-
tain the statistical distribution of person-to-person and groups in the What-
sApp network. Individuals were asked about the number of contacts in their
cell phone contact lists, the number of WhatsApp groups with three or more
members and the sizes of those groups (number of members including them-
selves). Moreover, they were asked about the number of frequent individual
WhatsApp contacts, defined as those to whom they would text with a con-
troversial message they learned from any source.
1https://www.messengerpeople.com/global-messenger-usage-statistics/#Spain
7
In any contact list, there are many contacts that do not belong to any
group (meaning by group a set of persons linked by a common interest).
Hence, we posed the following question: in case they learned about a partic-
ularly "hot news", to whom of their contacts would they expressly text for
commenting on it? Obviously, that "hot news" would not be sent to their
attorney or plumber and, depending on the topic, neither to a relative. Thus,
we define the groups of size two as those contacts in the contact list that,
although they may be members of any WhatsApp group, would receive a
message directly from the user about a news considered especially relevant.
Only these size-two groups constitute the set of person-to-person links of
each WhatsApp user.
From our sample data, we find out that the number m of person-to-person
contacts an individual has follows approximately a normal distribution
N (m, µ, σ) =
− (m−µ)2
2σ2
e
1
2πσ
(1)
where µ = 7.35 and σ = 4.38.
The group size distribution, for sizes of 3 ≤ N ≤ 30 members (that
included the majority of our samples), fits an exponential distribution
E(N ) = 1 − exp(−λ(N − a))
(2)
where coefficients are adjusted from the data as λ = 0.1113 ± 0.0019 and
a = 1.41 ± 0.12 (r2 = 0.9959). See Figure 1.
In summary, the groups between 3 and 30 individuals in size are charac-
terized by an exponential distribution function, while the groups of size 2, i.e.
person-to-person links, are characterized by a normal distribution function.
8
Figure 1: WhatsApp empirical group size distribution (left) and the goodness of fit of the
cumulative distribution function (right) to an exponential (r2 = 0.9959). N represents the
number of individuals in a group (3 ≤ N ≤ 30), E(N ) represents the empirical distribution
function, i.e. the fraction of groups of size ≤ N , and Eest(N ) is the estimation of E(N ).
2.2. The model
In this paper, we introduce a novel model where individuals are linked
either by person-to-person relations or by belonging to the same WhatsApp
group. These links fit the distributions obtained in section 2.1. It is worth
noticing that, initially, a given fraction of population, named the seed, knows
a rumor. This rumor may spread to other linked individuals at each itera-
tion during the numerical simulations. The rumor propagation proceeds
iteratively taking into account two main rules. First, the individual propaga-
tion probability at each iteration is given by a uniform distribution. Second,
there may also be a group of individuals, the so-called uncritical senders
group, which always propagates the rumor at each iteration, i.e. with an
individual propagation probability of 100%.
As the numerical simulations were repeated independently a large number
of times and then we averaged the result, the law of large numbers guaran-
tees that the final law of distribution followed by the rumor propagation is
9
0 0.2 0.4 0.6 0.8 1 5 10 15 20 25 30 35 40E(N)N 0 0.2 0.4 0.6 0.8 1 0 0.2 0.4 0.6 0.8 1Eest(N)E(N)determined as well as the time required for a rumor to reach a given fraction
of the population. An important feature of the model is that it shows when
a population is polarized regarding a given rumor.
For the sake of enabling a better understanding of the model that is
developed in detail below, we provide here some useful definitions:
Burned: A person who knows the rumor is said to be a burned individual.
Observe that if an individual is burned, he remains in that state until
the end of the rumor propagation process.
Sender: A person who knows the message (a burned individual) and texts
it to any of his contacts is called a sender.
Receiver: Any individual (burned or not) in the population that is reached
by the message is said to be a receiver.
Seed: All those individuals who know the rumor at the beginning of its
propagation constitute the seed, i.e. the set of burned individuals at
the initial time t = 0.
Person-to-person relation: A direct link between two individuals of the pop-
ulation is called a person-to-person relation. This relationship is singled
out from the group relationship because it represents a one-way link.
If an individual i is connected with another individual j, then j may
receive text messages sent by i, but this does not imply that individual
j could also send messages to i.
Group: The set of three or more individuals in the population that are
interconnected, meaning that what one of the individuals sends to the
10
group is received by all others in the group simultaneously.
Individual propagation probability (PIP ): The probability of the rumor
being sent by a burned individual, who knows the rumor, to one of
its contacts (person-to-person probability) or groups in the WhatsApp
network.
Individual initial probability (PII): The probability that individuals are
part of the seed. That is, the probability that an individual knows the
message at the beginning of the process of spreading the rumor.
Uncritical senders group (USG): The set of individuals who automatically
send the message to all of their contacts when they receive it is named
the uncritical senders group. Hence, PIP is always equal to 100% for
individuals in the USG.
USG membership probability (PU SG): The probability that individuals
belong to the USG. It represents the fraction of the population that
forms the USG. The size of the USG is fixed as an initial condition and
once fixed, and randomly chosen the individuals that are a part of it,
it does not change.
2.3. Model algorithms
The model consists of two main steps. First, an algorithm that generates
populations of connected individuals as described in section 2.1. Second,
another algorithm simulating the spreading rumors among these populations.
11
2.3.1. Populations
In order to simulate a network with the statistical properties described
in section 2.1, we proceeded to implement an algorithm that reproduces
that structure. That is, given a population of N p individuals, we establish
connections between pairs of individuals following the normal distribution
(1) and also generate groups of 3 to 30 interconnected individuals with group
sizes given by (2).
When come to consider group construction, we will separate groups formed
by just 2 individuals from groups formed by 3 or more individuals; the rea-
son is that in two-person groups, connections are not bidirectional (as we
explained above), whereas for groups with 3 or more individuals it is.
We will assume a normal distribution (1) for the number of 2-groups
an individual belongs to, having the mean and standard deviation fitted
from our sample. From that distribution, the number of individuals nm
that are expected to have a number m of person-to-person connections was
computed, for m = 0, 1, . . . , 30. That is, first the number of individuals in
the population having zero person-to-person contacts, n0 = N (0, µ, σ) was
computed and then, recursively, the number of individuals having m person-
to-person contacts nm = N (m, µ, σ) − N (m − 1, µ, σ) for m = 1, . . . , 30.
Then the nm individuals having m contacts were chosen randomly from the
population, linking them to other individuals also randomly chosen. Notice
that these relationships, by their very nature, are not bidirectional given that
they are not proper WhatsApp groups, but the initial individual will send
messages to the destination individual, but that does not have to work in the
reciprocal.
12
To compute the number of groups of size 3 or more an individual belongs
to, we will use the exponential distribution in (2) with the parameters fitted
from our sample. Specifically, the number of groups of size i is calculated as
E(i)− E(i− 1) for i = 3, 4, . . . , N . Once known the number of groups of each
size (from 3 to 30 individuals), the individuals of the population belonging
to each group are randomly chosen.
Thirty populations with 10000 individuals each were simulated following
the previous procedure, taking into account that only 70% of the individuals
(the penetration of WhatsApp in Spanish population) should be connected
either person-to-person or to groups of sizes 3 to 30. Each of these simulations
provided a network of connections between individuals of the population.
2.3.2. Message spreading
Once the population has been simulated (see above) the rumor spreads
among its individuals according to the following rules:
1. The fraction of the population that knows the rumor, that is the initial
seed, is chosen initially from the connected population given by PIP .
2. One individual belonging to the see is randomly chosen
3. The groups to which that individual belongs are identified
4. That individual will pass the rumor to each of these groups with a
probability PIP ; for this, a uniformly distributed random value in [0, 1)
is generated for each group, and the rumor is spread to the group if
that value is less than PIP
Steps 2 and 3 are repeated until all seed individuals are exhausted.
13
5. All the individuals that know the rumor become part of the seed, and
the propagation process is repeated 100 times; this number of iterations
is chosen because in most simulations the rumor reaches the entire
population before that time.
Once the initial seed and the USG have been chosen, according to the
individual initial probability (PII), the uncritical senders group membership
probability (PU SG), and the individual propagation probability (PIP ) that
characterize the initiation and propagation of the messages on the social
network, the algorithm proceeds according to the following rules:
i) The rumor is propagated among the individuals in the population for
100 iterations (the simulation unit of time).
ii) At each iteration, every burned individual in the population, that is,
every individual who knows the rumor, will communicate it to each of
its contacts with probability PIP .
iii) If an individual belongs to the USG and is burned, it will propagate
the message to all of its contacts (that is, PIP equals 1 for individuals
in the U SG).
iv) After every iteration, burned individuals (and WhatsApp groups) are
recorded and counted.
Given that message transmission is a random process, message spreading
algorithm is run 50 times on each population using, for that population al-
ways the same initial seed. The result after finishing each run is the series of
numbers of burned individuals at each iteration. The final result is summa-
rized as the average number of these 50 series. Along the same lines, given
14
that each population is computed as a random sample from a probability
distribution, in section 3 we will work with the results obtained by averaging
over the 30 populations, in order to characterize the temporal evolution of
the average number of burned individuals for each set of parameters PIP , PII
and PU SG.
3. Numerical results
To proceed with the simulations, the parameter space PII × PIP × PU SG
is sampled at 500 points given by the following tuples (u, v, w) where u, v ∈
{k · 10−2 : k = 1, 2, . . . , 10} and w ∈ {k · 10−2 : k = 0, 3, 5, 7, 10}. Each of
these 500 points characterizes individuals and groups in a simulated popula-
tion. For each of the 500 points, 30 such populations with 10000 individuals
each were randomly generated following the algorithm described in 2.3. No-
tice that although these populations are different, they are statistically the
same because they were generated using the same parameters at the same
point of the parameter space. For each of these 30 populations, a news was
spread over the network during 100 iterations, and this random process was
repeatedly simulated 50 times, choosing a different initial condition for each
of the 30 populations (the seed individuals who know the information at the
beginning of the propagation). The propagation time series was computed
as the average of the 50 simulations for a given population, resulting in 30
averaged spreading evolutions corresponding to the 30 statistically identical
populations. Finally, the average over the 30 populations was computed as
the propagation time series corresponding to one of the 500 points in the
parameter space.
15
The goal of this numeric modeling is to fit an analytic expression that
summarizes the spreading of the news corresponding to the model described
above.
3.1. Case PU SG = 0
To see the effect polarized groups have on news spreading, it was first
needed to know how news spread without those groups (PU SG = 0). In this
section these results are shown and an analytic expression fitted to them.
The analysis is based on data from simulations obtained as the aver-
age number of burned individuals at the n-th iteration taking into account
all populations (30) and all 50 simulations performed on each population.
That is, the behavior of the function corresponding to the average number
of burned individuals at each iteration is studied:
f (n) =
Total of burned individuals at n-th iteration
no. of populations × no. of simulations × Np
where Np is the number of individuals of the population connected by What-
sApp, and n = 1, . . . , 100.
The space of parameters is sliced in sections, that is, we study how rumor
spread in populations for different values of PII ∈ [0, 0.1] and, for each of
these values, the behavior for different values of PIP ∈ [0, 0.1] is also studied.
The simulation results f (n) (see Figure 2) picture the average evolution
of the fraction of burned individuals after successive iterations (indexed by
n) that approach a continuous function F (t) dependent of time t.
For values of PII around 10%, function F (t) is well approximated by an
exponential of the form
Fexp(t) = 1 − A exp(−t/a)
16
PII = 3%
PIP = 2%
Figure 2: Average number of burned individuals f (n) at each iteration n for different
values of PIP (left, PII = 3%) and PII (right, PIP = 2%). Fixed parameter: PU SG = 0.
The blue lines correspond to the fitting expression (3) in each case.
whereas for smaller values of PII a better fit is obtained using a logistic
function
Flog(t) =
1
1 + B exp(−2t/a)
Therefore, we construct a function that fits the data in the entire range by
changing from one form to the other through a parameter :
F (t) =
C exp[(1 + )(t − b)/a] − 1
1− + C exp[(1 + )(t − b)/a]
2
(3)
where a, b, and C are the fitted coefficients whose values depend on simula-
tion parameters PII and PIP (how, will be shown in what follows). Coefficient
a represents a characteristic time scale. Coefficient b has the meaning of a
time origin, thus can be taken as zero.
To fulfill the initial condition F (t = 0) = PII (the initial fraction is just
the seed), C had to be taken as a function of a, b, and PII given by:
C(a, b, ) =
1 + 2
1− PII
(1 − PII) exp[(1 + )b/a]
(4)
17
0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100PIP = 1, 3, 5, 7, 9%f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100PII = 1, 3, 5, 7, 9%f(n)nFrom the fitting of the simulation data for different PII and PIP , an
expression is given for in the form:
= 1 +
aaPII
1 + exp(bb/a)
(5)
where aa is less than zero, in order to produce an between 0 and 1. Likewise,
a is fitted to:
1/a = cc P ee
IP
(6)
which leads to a characteristic time a tending to infinity, when the probability
PIP tends to zero (that is, if the propagation probability is very small, the
time a rumour will take to spread over the entire network will become very
large). The values of aa, bb, cc and ee can be found in table 1 (for PU SG = 0).
The power law (6) did not provide a good collapse of all the points towards
the fitting curve (see Fig. 5a). Thus, in order to achieve that collapse (see
Fig. 5b), a factor (1+ggPII) is considered to correct for the small dependency
that a showed on PII, resulting in an expression of the form
1/a = cc P ee
IP (1 + gg PII)
(7)
Inserting into (3) the expressions for C, and a given by (4), (5) and (7)
an expression for F (t) is obtained.
It is remarkable that all the resulting expressions depend exclusively of
PIP , PII and PU SG so that the number of burned individuals at a given
iteration n, are given by (9) in terms of just these parameters. Hence, the
number of burned individuals can be computed at any time, given a point
(PU SG, PIP , PII) in the parameter space, or vice versa, that point in the
parameter space can be computed once the time required to burn a given
fraction of the connected population has been fixed.
18
Figure 3: Average number of burned individuals f (n) at each iteration n for different
values of PU SG. Fixed parameters: PII = 2% and PIP = 1%. The results of fitting the
simulation data to the analytic expression (3) are also shown (blue lines).
3.2. Case PU SG (cid:54)= 0: Effect of the uncritical senders group
Assuming the presence of very polarized groups among the population,
what we call the uncritical senders group, it is necessary to see how their
existence modifies the spread of news just described. The introduction of
the USG affects the evolution of the fraction of the population a rumor
reaches at a given time, as the simulations show. Some results of these
numerical simulations are shown in Figure 3, together with their respective
fitting to expressions formally identical to (3), which shows its validity also
for PU SG (cid:54)= 0.
The relationship (5) between and 1/a obtained above for PU SG = 0 is
still valid for PU SG (cid:54)= 0, according to the numerical results (see Figure 4 and
table 1). Also expression (7) for 1/a in terms of PIP and PII remains valid
19
0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100f(n)n 0 0.2 0.4 0.6 0.8 1 0 10 20 30 40 50 60 70 80 90 100PUSG = 1, 3, 5, 7, 10%f(n)nFigure 4: Fitted values of the coefficient ε with respect to 1/a for different values of
parameter PII . Fixed parameter: PU SG = 3%. The graph of the fitted expression relating
both coefficients with PIP is also shown (blue lines).
(see Figure 5 and table 1).
Nevertheless, the effect of considering a USG in the network makes that
the coefficients aa, bb, cc, ee and gg in equations (5) and (7) become functions
of PU SG. The functional expressions of aa, bb, cc, ee and gg were derived
from the numerical results (for PU SG ∈ [0, 0.1]) as follows:
aa = aa1 + aa2PU SG + aa3PU SG
2
bb = bb1 + bb2PU SG
4/(1 + bb3PU SG
3)
cc = cc1 + cc2PU SG + cc3PU SG
2
ee = ee1 + ee2PU SG + ee3PU SG
2
(8)
where the values of the new coefficients are given in Table 2. Substituting
expressions (8) in equations (5) and (7), and these in equations (4) and (3),
20
0.7 0.75 0.8 0.85 0.9 0.95 1 0 0.05 0.1 0.15 0.2 0.25 0.3PII=1, 3, 5, 7, 9%ε1/aFigure 5: Left: Fitted values of the coefficient 1/a for different values of PIP and PU SG
(and of PII ). The graph of the power law expression (6) is also shown (blue lines). Right:
Values of h(PII ) = 1/a
for different values of PIP and PU SG. Taking into account the
1+ggPII
effect of PII on 1/a, the correction given by (7) is shown (green lines). Notice how the
data now collapse to the modified power law.
the general equation for the evolution of F (t) is obtained, exclusively in terms
of the parameters PIP , PII and PU SG, as was our goal.
3.3. Dynamical spreading model
In this section we present a theoretical model that captures the behav-
iors described above. For that, we will interpret our discrete time model in
terms of a continuous time model that may be derived from a differential
equation. For that, it is enough to see that PIP is a probability per unit time
of a message being propagated by one individual to another or to its group,
being that unit time the time separating one iteration from the next one.
Expression (3), describing the fraction of burned individuals as a function of
(cid:20)1 −
(cid:21)
2
21
time turns out to be a solution of the following differential equation:
dF/dt =
2
a
+ F
(1 − F )
(9)
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 101/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10PUSG=0, 3, 5, 7, 10%1/aPPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10h(PIP)PPI 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0 2 4 6 8 10PUSG=0, 3, 5, 7, 10%h(PIP)PPIIf this equation is interpreted as a law of mass action, the coefficient A = 2
a
would stand for the spreading velocity towards the unburned population
(1 − F ) of news originating in the burned population F plus an "invisible"
population given by the additional term G = 1−
2 .
In order to find out the meaning of this "invisible" population (which is
constant along the spreading process), let us consider the case of PII → 0,
for which → 1. Then, employing (5), equation (9) tends to
dF/dt = 1/a
aaPII
1 + exp(bb/a)
+ F
(1 − F )
(cid:20)
(cid:21)
that is, the "invisible" population is proportional to the seed population that
knows the rumor at t = 0.
4. Discussion
For further clarification, we first summarize the procedure developed
above to obtain the function F (t), which depends only on parameters PIP ,
PII and PU SG. Next, we discuss our model and its capability to make pre-
dictions about the phenomenon of spreading rumors.
We outline below the steps necessary to adjust the experimental data and
find the function F (t).
First step: A partition of the parameter space is defined. For each of the
500 points in the partition, numerical simulations are performed and
the results obtained are analyzed as indicated below.
Second step: Coefficients a and are computed using (3). C is estimated
using (4), so that the initial conditions are fulfilled.
22
Third step: We study the dependence of these coefficients on the parame-
ters PIP and PII (for PU SG fixed), using (5) and (7).
Fourth step: Using the data set that was fitted in the first steps, we deduce
a general expression of the function F (t) and also analyze its depen-
dence on PU SG (see (8)).
In section 3.2, the distribution of burned individuals, F (t), was deduced
as a function dependent only on the parameters inherent to the network,
PIP , PII and PU SG. This function becomes a fundamental tool for predicting
how long fake news will take to spread and cause problems or for estimating
the time necessary for messages, as for instances a marketing campaign or
specific information, to be disseminated among the target audience.
4.1. Time necessary for a rumor to reach a fraction of the population
One of the main results of this study is that the function F (t) can be used
to estimate the number of burned individuals at any time. An immediate
consequence, no less important, is that the time necessary for a rumor to
reach a given fraction of the population can also be calculated from this
function. In summary, and more formally, the number of iterations tX (or
nX, for discrete time in our model) that are necessary for a rumor to reach
a fraction of the population X, assuming that the message begins to spread
(cid:33)
(cid:32) 1 + 2
1− X
(1 − X)C
at time t = 0, can be calculated using (3).
tX = F −1(X) = b +
a
1 +
log
(10)
Therefore, the equation X = F (tX) provides an implicit relation between the
parameters inherent in the network, PII, PIP and PU SG, and the variables
23
that define the necessary time tX and the fraction of the population X. As
a result, we can estimate the size of the seed (that is, the value of PII) such
that a given fraction X of the population is reached at time tX fixed, in a
network characterized by PIP and PU SG. In particular, the effect of the seed
(PII) and the size of the uncritical senders group (PU SG) can be studied to
obtain the result sought in a given population.
4.2. Time evolution from observed data
The function that models the propagation of a rumor in a network de-
pends, obviously, on the parameters associated with that particular rumor.
Our model can be used to estimate these parameters from empirical obser-
vations on how the rumor is spread. In fact, only four observations of the
number of individuals burned at four different times, since the beginning of
the propagation of a rumor, are sufficient to determine the coefficients that
fit the function F (t). Then, we can use this adjusted expression to calculate
the number of individuals burned at any time in the future.
As it is shown in figure 6, the fitted function (blue line) accurately follows
that obtained by numerically fitting the data (green dots). These approxima-
tions work for different values of PII. It should be noted that the adjustment
of the coefficients is done for a burned fraction of the population of less than
20%, so the function thus fitted can be used to predict when a catastrophe
will occur (i.e., a large-scale spreading of an idea). Last but not least, the
adjusted coefficients are obtained not only from small values of individuals
burned in the population but, and this is the most important, from values
that remain almost unchanged over time, see figure 6.
24
PU SG = 0%
PU SG = 3%
PU SG = 7%
Figure 6: Approximations of (t, F (t)) based on the evolution of the early times. From
left to right, the values of PU SG are 0%, 3% and 7%. Fixed parameter: PII = 5% and
PIP = 1%. The dotted line (green) corresponds to numerical simulation data (n, f (n)).
The four points used to approximate the coefficients of F (t) are highlighted in red.
4.3. Network structure inference
Knowing the number of burned individuals as a function of spreading
time allows us to infer the very structure of the network in which the news
is being disseminated. Once the propagation of a rumor for a given topic is
known, its current evolution f (n) is used to estimate the coefficients a, and
C in (3), and from them the parameters of the network, PII, PIP y PU SG,
can be calculated.
From equations (5) and (8), the value of the parameter PU SG is calculated.
Next, when entering in the function F (t) the initial value of PII, the estimated
value PU SG and the number of individuals burned X at time tX, we obtain
the value of parameter PIP .
Note that the calculation of PII and PU SG has to be performed for each
type of news, because each topic will have its own values for the parameters
PII and PU SG. Once these parameters are determined, the function F (t) can
be used to predict the propagation of similar topic news, and use that pre-
diction to design countermeasures, either to avoid further propagation, e.g.,
25
0 0.2 0.4 0.6 0.8 1 0 20 40 60 80 100F(n)n 0 0.2 0.4 0.6 0.8 1 0 20 40 60 80 100F(n)n 0 0.2 0.4 0.6 0.8 1 0 20 40 60 80 100F(n)nfrom a political point of view, or to improve the dissemination of news, e.g.,
with commercial or public information, such as the annual flu vaccination
campaign.
5. Conclusions
As far as we know, we present here a new approach to study the crucial
phenomena of rumor propagation through WhatsApp. It is noteworthy that
the results obtained in this paper, as well as our algorithms and main tech-
niques used, can be naturally extended to any other type of similar instant
messaging application.
One of our main contributions is to provide a manageable function of time
that describes the time evolution of rumor spreading taking into account only
person-to-person relationships and contact groups. To be more precise, fixed
the initial and propagation probabilities for each individual (PII and PIP ),
the function in (3) defines the fraction of the population who knows the rumor
at different times in terms of the parameters that characterize the structure
of the network and the dynamics of propagation. In fact, the values of these
parameters were estimated from the data obtained by numerical simulations
for different scenarios depending on the size of the uncritical senders group
(PU SG).
Conversely, we show that, given the temporal evolution of a rumor by a
function as in (3), it can be predicted how the message propagates throughout
the network and how much time it takes to burn a fraction of the population.
As a set of few parameters (PII, PIP and PU SG) typifies the structure of the
network, how a rumor spreads in any social network can be simulated simply
26
by replacing different values of these parameters in the analytical expressions
we provide in this paper. Therefore, this information can be used to assess
how long it will take a rumor to become dangerous and, consequently, to make
decisions accordingly during that time in order to avoid the damages caused
by the disinformation. Moreover, the number of individuals that should be
burnt to ensure that the rumor reaches a fixed fraction of the population in
a given time can be calculated.
Finally, we also study the impact of the so-called uncritical senders group,
i.e. a group of individuals who automatically forward a message as soon as
they receive it. For all we know, this is a novel idea that allows us to simulate
the behavior of groups of highly polarized humans that disseminate fake news
with the vile purpose of influencing and causing major changes in society.
From our model, we can detect and estimate the size of a group of uncritical
senders in a social network by analyzing in particular how the presence of
this group changes the temporal evolution in the propagation of a rumor.
In summary, we present a model that shows how some few but key pa-
rameters influence the spread of a rumor and determine the speed with which
a rumor may reach a large part of the population. Furthermore, we study
how this rumor propagation may be manipulated both through information
(or disinformation campaigns) and a group of uncritical senders that actively
disseminate some types of news to the entire population.
References
[1] Figueira A., Oliveira L. The current state of fake news: challenges and
opportunities. Procedia Computer Science 121 (2017) 817-825.
27
doi:10.1016/j.procs.2017.11.106
[2] Metaxas P. & Mustafaraj E. (2010) From Obscurity to Prominence in
Minutes: Political Speech and Real-Time Search. WebSci10: Extending
the Frontiers of Society On-Line.
[3] Allcott H., Gentzkow M. Social media and fake news in the 2016 Elec-
tion. Journal of Economic Perspectives 31(2) (2017) 211-236.
doi:10.1257/jep.31.2.211
[4] Silverman C., Singer-Vine J. Most Americans who see fake news believe
it, new survey says. BuzzFeed News (2016).
https://www.buzzfeednews.com/article/craigsilverman/fake-news-
survey
[5] Tambuscio M., Ruffo G., Flammini A., Menczer F. (2015). Fact-checking
effect on viral hoaxes: A model of misinformation spread in social net-
works. In Proceedings of the 24th International Conference on World
Wide Web (ACM, 2015), pp. 977982. doi:10.1145/2740908.2742572
[6] Jin, Fang and Dougherty, Edward and Saraf, Parang and Cao, Yang and
Ramakrishnan, Naren. Epidemiological Modeling of News and Rumors
on Twitter. Proceedings of the 7th Workshop on Social Network Mining
and Analysis. SNAKDD '13. pp. 8:1 -- 8:9. ACM, New York, 2013.
doi:10.1145/2501025.2501027
[7] Kitsak M, Gallos L.K., Havlin S., Liljeros F., Muchnik L., Stanley H.E.
and Makse H.A. (2010). Identification of influential spreaders in complex
28
networks. Nature Physics volume 6, pages 888-893
https://www.nature.com/articles/nphys1746
[8] Borge-Holthoefer, Meloni S., Gonalves B., Moreno Y (2012). Emergence
of Influential Spreaders in Modified Rumor Models. Journal of Statistical
Physics, 151, pages 383-393
https://link.springer.com/article/10.1007%2Fs10955-012-0595-6
[9] Del Vicario M., Bessi A., Zollo F., Petroni F., Scala A., Caldarelli G.,
Stanley H.E., and Quattrociocchi W. (2016). The spreading of misinfor-
mation online. PNAS, 113, pages 554-559
https://www.pnas.org/content/pnas/113/3/554.full.pdf
[10] Doerr B., Fouz M., Friedrich T. (2012). Why rumors spread so quickly
in social networks. Communications of the ACM, 55, pages 70-75
https://dl.acm.org/citation.cfm?id=2184338
[11] Daley D.J., Kendall D.G. (1965). Stochastic Rumours. IMA Journal of
Applied Mathematics, 1, pages 4255
https://doi.org/10.1093/imamat/1.1.42
[12] Vosoughi S., Roy D., Aral S. The spread of true and false news online.
Science 359 (2018) 1146-1151. doi:10.1126/science.aap9559
29
aa
Values
PU SG
0% −0.0208 ± 0.0003
3% −0.0663 ± 0.0006
5% −0.1148 ± 0.0010
−0.180 ± 0.002
7%
−0.328 ± 0.006
10%
cc
Values
PU SG
0% 0.03204 ± 0.00011
3% 0.03579 ± 0.00015
0.0391 ± 0.0002
5%
0.0431 ± 0.0002
0.0521 ± 0.0004
10%
7%
gg
Values
PU SG
0% 0.00354 ± 0.00019
0.0036 ± 0.0002
3%
0.0039 ± 0.0003
0.0045 ± 0.0003
0.0054 ± 0.0005
10%
5%
7%
Error
1.49%
0.91%
0.90%
1.12%
1.93%
bb
Values
7.32 ± 0.16
7.69 ± 0.09
8.28 ± 0.09
8.77 ± 0.11
9.47 ± 0.19
ee
Values
Error
0.33% 0.9381 ± 0.0015
0.41% 0.9228 ± 0.0019
0.51% 0.907 ± 0.002
0.56% 0.888 ± 0.003
0.77% 0.843 ± 0.004
Error
2.18%
1.23%
1.12%
1.31%
2.02%
Error
0.16%
0.21%
0.26%
0.30%
0.43%
Error
5.42%
6.70%
7.65%
7.54%
8.61%
Table 1: Coefficients and exponents obtained from fitting expressions (5) and (7) to data
from simulations with different values of PU SG.
30
Parameter
aa1
aa2
aa3
bb1
bb2
bb3
cc1
cc2
cc3
ee1
ee2
ee3
gg1
gg2
gg3
Value Error
-2.2 ±0.4
-63 ±18
-2410 ±170
7.319 ±0.010
1.09×106 ±0.09×106
49000 ±4000
2.405 ±0.010
4.7 ±0.5
-35 ±4
0.9375 ±0.0017
-0.25 ±0.08
-7.0 ±0.7
0.3541 ±0.0010
10800 ±600
4700 ±300
Table 2: Coefficients of equations (8).
31
|
1109.2417 | 1 | 1109 | 2011-09-12T09:48:41 | Internet and political communication - Macedonian case | [
"cs.SI"
] | Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their partys voters (people) and other interest groups and whether social networks can affect the political and economic changes in the state, and the political power of one party. | cs.SI | cs | IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
Internet and political communication – Macedonian case
154
MSc. Sali Emruli1, Prof. dr. sc. Miroslav Bača 2
Faculty of Organization and Informatics, University of Zagreb,
Varaždin, 42000, Croatia
Faculty of Organization and Informatics, Department for biometrics, University of Zagreb,
Varaždin, 42000, Croatia
Abstract
Analysis how to use Internet influence to the process of
political communication, marketing and the management
of public relations, what kind of online communication
methods are used by political parties, and to assess
satisfaction, means of communication and the services
they provide to their party's voters (people) and other
interest groups and whether social networks can affect the
political and economic changes
in
the state, and
the political power of one party.
Keywords: Network Analysis, Political parties, Complexity,
Scale Free Network, Social Network Analysis, Non-Profit
Organization, Capacity, Public relations, marketing, Interne,
Facebook, YouTube, Twitter, Blogs, MySpace, and Forum.
2. Introduction
The analysis will be done in a way that will create a list of
largest political parties in the Republic of Macedonia, their
communications infrastructure through ICT (website),
content and the manner in which they placed their
information and receive feedback from voters.
Internet, social networking, Web 2.0, Facebook, YouTube,
blog ... All these are relatively new word in the political
vocabulary, new concepts, new media and new
opportunities for the transmission of ideas and messages
are not enough channels used to communicate with the
public. Although the practice of using the Internet in local
political advertising goes back to the nineties, only in
recent years the advent of new tools and social networks
demonstrates true strength of this medium.
Besides direct access to the public, political ideas, it
provides full force confrontation, but also provides a
relatively convenient ground for review of public attitudes,
research and development of certain ideas. Using such a
change in social communication, transmission of political
messages through the transition from traditional forms of
communication and finding new paths to the recipients.
Professional and political public for years following the
development of the Internet as a medium, but he showed
the greatest strength in the last U.S. presidential election.
Political power depends on the satisfaction of the people
towards a particular party and party connections with other
parties or organizations. Well-developed social network
provides further prestige and power of the party and its
direct channel of communication with voters and other
influential interests groups.
3. Political Communication through Internet
Internet and politics in the modern world have become
inseparable and thus gradually eliminating barriers to free
flow of information between the political decision-makers
and those in whose name the benefits they bring (the
public). Countries
the
follow
transition must
in
contemporary trends of fitting of the Internet in the area of
political communication, which simultaneously causes the
change to the model that is still the dominant, of political
communication based on secrecy and lack of transparency.
In Macedonia, the network and politics are still not
together, except in the case of international organizations.
into political
incorporated
Internet
fully
is not
communication (or, more precisely,
it
is not done
properly). A key condition (requirement) for this is
application of technology and simultaneous transformation
of consciousness. This change requires the rejection of the
principle of confidentiality as a condition of political
activity of government and party, because it is absolutely
contrary to the nature of the Internet. It is necessary also to
strengthen the awareness of the importance of on-line
crystallization of public opinion, and more intensive and
better connection of on-line and off-line political stage.
155
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
4. Impact of Social network analysis in
politics
Political communication is a new and exciting area of
research and teaching that is located at the crossroads of
the study of communication, political parties and electoral
behavior. As well as profiling the changing nature of the
media system such an approach invariably leads us onto
what we term the ‘new political communication’ - that
based around the new Information and Communication
Technologies (ICTs). We examine the work that has been
done on the uses of the new media by parties and
politicians across a range of democratic contexts and offer
some insights into the strong challenges they introduce for
the established manufacturers of political communication.
One of the key uses of the Internet is to build databases of
voter data and access that through different applications
for different purposes. Because data entry can be easily
done automatically by scanners or by hand more
campaigns and political operatives are recognizing the
importance of capturing, storing, analyzing and using voter
information. What used to take days of analyzing can now
take minutes by using computers to analyze important
information. That data can also be used offline or online
for a number of different ways and the usage of these
systems have become key components of the political
system.
Throughout history political campaigns have evolved
around the advancing technologies that are available to
candidates. As technology develops, candidates are able to
permeate the lives of citizens on a daily basis. Television,
radio, newspapers, magazines, billboards, yard signs,
bumper stickers, and Internet websites all create a means
of spreading political platforms.
While the traditional forms of media are still an integral
portion of campaign strategy, the availability of the
Internet opens the door of campaign tools waiting for
candidate’s attention. The Internet provides numerous
opportunities for politicians to reach the polity. Among
those is a new phenomenon called social networking
websites. Social networking sites have gained popularity
in the last few years. These sites are growing popular
particularly on college campuses nationwide. Specifically
social networking websites such as MySpace and
Facebook have provided users with a new form of
communication. When new forms of communication are
made available, political candidates begin to use the new
technology to their advantage. What social networking
websites allow politicians to do is to create a sense of
personalized communication with their constituents. This
personalization of politics enables voters and politicians
alike to feel as though a connection is made. The Internet
can make direct communication possible among
government officials, candidates, parties, and citizens. As
history shows us, when new technologies are made
available, they begin to reshape the personalization factor
between the candidate and the voter. This increase in
interpersonal interactivity has shown to offer opportunities
and increase success for political campaigns.
5. Political Parties in Republic of Macedonia
5.1. Overview of the political system
Macedonia is a Republic having multi-party parliamentary
democracy and a political system with strict division into
legislative, executive and judicial branches. From 1945
Macedonia had been a sovereign Republic within Federal
Yugoslavia and on September 8, 1991, following the
referendum of its citizens, Macedonia was proclaimed a
sovereign and independent state. The Constitution of the
Republic of Macedonia was adopted on November 17,
1991, by the first multiparty parliament. The basic
intention was to constitute Macedonia as a sovereign and
independent, civil and democratic state and also to create
an
institutional framework for
the development of
parliamentary democracy, guaranteeing human rights, civil
liberties and national equality.
The Assembly is the central and most important institution
of state authority. According to the Constitution it is a
representative body of the citizens and the legislative
power of the Republic is vested in it. The Assembly is
composed of 120 seats.
The President of the Republic of Macedonia represents the
Republic, and is Commander-in-Chief of the Armed
Forces of Macedonia. He is elected in general and direct
elections, for a term of five years, and two terms at most.
Executive power of the Republic of Macedonia is
bicephalous and is divided between the Government and
the President of the Republic. The Government is elected
by the Assembly of the Republic of Macedonia by a
majority vote of the total number of Representatives, and
is accountable for its work to the Assembly. The
organization and work of the Government is defined by a
law on the Government.
In accordance with
its constitutional competencies,
executive power is vested in the Government of the
Republic of Macedonia. It is the highest institution of the
state administration and has, among others, the following
responsibilities: it proposes laws, the budget of the
Republic and other regulations passed by the Assembly, it
determines the policies of execution of laws and other
regulations of the Assembly and is responsible for their
execution, decides on the recognition of states and
governments, establishes diplomatic and consular relations
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
156
with other states, proposes the Public Prosecutor, proposes
the appointment of ambassadors and representatives of the
Republic of Macedonia abroad and appoints chiefs of
consular offices, and also performs other duties stipulated
by the Constitution and law.
In Macedonia there are more political parties participating
in the electoral process at national and local level.
5.2. Current Structure
Parties of traditional left and right:
Coalition VMRO – DPMNE (63 mandates, right oriented
Macedonian party)
Democratic Party of the Albanians (12 mandates, right
oriented Albanian party)
Coalition “SONCE” – SDSM (27 mandates left oriented
Macedonian party)
Democratic Union for Integration (18 mandates left
oriented Albanian party)
Fig. 1 Current political structure in Republic of Macedonia and Political
Parties mandate percentage win in latest parliamentary elections.
6. Political party web sites and use of social
media
Party websites represent an application of a technology
which has led those dealing in votes to invest considerable
amounts of time and money. This part presents a survey of
the websites of Macedonian political parties. It examines
the individual parties on the web and the party system on
the web as virtual counterparts of the ordinary parties and
party system.
Because of the importance of applying information and
communication technologies (ICT) in the work of central
and local government and in terms of facilitating the life
and work of citizens, as well as the major role in the
development of information society in EU integration
process, an analysis has been conducted on websites and
social media usage by political parties in Macedonia.
The research includes analysis of websites, analysis of the
use of social media and online activities compared in terms
of seats obtained by political parties.
In account were taken only websites of the major political
parties that can certainly be determined to be guided by
their info centers.
In order to level the differences between the parties and a
common base for comparison, two indexes were created:
Internal platform which are the party's official website and
External platforms which are websites that defined as
social media platforms.
While reviewing the websites I have searched for features
that can be considered as social media features and that
were incorporated in parties' websites.
Contrary to traditional content analysis where texts are the
subject of a thorough analysis, here a content analysis was
made, but on a more general level of website sections and
less on their content.
Platforms that are not owned by the parties and considered
as social media platforms. On these platforms the party has
an official profile/user that is uploading the content and
has the permissions to monitor moderate the other users'
activity.
The results had showed that the relatively popular parties,
The VMRO-DMPNE, Social Democrats, DPA, DUI and
ND had been using more social media features and
platforms than the other parliament parties.
Despite these findings there are no clear signs of an
established use of
social media as a political
communication strategy. There is not enough correlation
between number of parliament members and website’s
users. Some of major parties are the worst in translating
voters into website’s users.
Fig. 2 Represents Traffic rate and mandates by relatively popular parties
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
6.1. Purpose of research
Due to the increased use of Internet in Macedonia and the
increased influence of the same as medium, research has
been conducted to determine how political parties use the
influence of Internet.
The study aims to evaluate several levels of Internet usage
and social networks in everyday political events:
To determine
the
level of quality and
implementation of the standards of the political
parties websites
To determine the level of use of social media for
their promotion
To determine the level of online communication
of political parties with public
To compare the number of online supporters with
conquered mandate of the last elections.
157
6.1.3. Methodology
To implement this part of the research content analysis
methodology was used. Drawing up the list of web sites
that will be use, their analysis is processed by strictly
defined form, with concrete questions and directions.
The form consists of three main issues, which contain
additional questions about obtaining
the necessary
information and conclusions.
The main issues are:
In which language versions websites are
accessible
What type of content is offered by websites
What kind of social media are used by political
party
One area of running a political campaign is Internet, and
also the use of social media. The analysis will include
internal platform which are the party's official website
their social content and does this web pages have links to
the external platforms which are websites that defined as
social media platforms. Also, the technical characteristics
of the sites.
6.1.1. Research questions and hypotheses
The analysis of political parties’ websites is based on
clearly defined issues that are divided into several
categories, in order to evaluate every aspect of the content
and making
the website of
the political party.
Questionnaire for this section is designed to address the
following main questions:
In what languages website is available
What type of content is offered on website (text,
multimedia, transparency ...)
Applying the standard for usability of website
Usage of Social Media
6.1.2. Limits
In conducting the research and when creating the list of
political parties whose Web sites will be analyzed, there
were taken in consideration only those whose identity
could be confirmed. It means that it is evident that website
is managed by the political party.
6.2. Language version
The websites analysis will include Web sites of relatively
popular political parties in Macedonia. From 19 political
parties, only 13 (70%) have their own web sites for
promotion and marketing of their political activity. From
analyzed Web sites , only 4 offer bilingual accessibility
(30%), and others offer information only in the language
of own ethnicity (unilingual content).
Table 1: Language Versions
Fig. 3 Language versions
As I mentioned above from analyzed websites, only 4
offer bilingual accessibility (30%), and nine other political
parties (70%) offer only unilingual content.
Table 2: Multilanguage Usage
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
158
future activities and events. Most political parties use their
websites to archive articles from the media, rather than
used to inform their supporters.
Fig. 4 Multilanguage Usage
6.3. Offered content
The second area for which websites analysis was
performed is content offered by political party websites to
their readers. The type of content is divided into text and
multimedia.
Table 3-1: Content offered by political parties websites
Fig.5 Textual content of all political party web sites
Fig. 6 Multimedia content of all political party web sites
to external
Frequently political parties put banners
WebPages, and not applying the concept of linking in the
text. Although most of the texts offered by political parties
at their web sites are excerpts from articles in the media,
although they cite the source from where the content is
downloaded, they not publish the link to the original
article, not even the online edition of the medium.
Besides textual content almost all political parties are
offering and multimedia content. Most of political parties
have placed videos of nearly any report or television
interview. Besides the video clips, several political parties
offer galleries of their activities. Only audio clips are
missing from multimedia content on political party
websites. Only three political parties have offered this type
of content, and they have offered several songs (hymns of
the party) for download, but they were not taken into
account.
Fig.7 Textual content of each political party websites
Table 3-2: Content offered by political parties’ websites
The results of this part of the research shows that most of
the websites of political parties are filled with textual
content, but that the textual content is not linked to the
outside source (Out Links) 31% of websites, while
regarding the multimedia content nearly 46% of the
websites of political parties have no photo gallery, 77% of
websites of political parties have no audio clips and 38%
of websites have no video clips. Also a lack in all the
websites of political parties is informing the guests for
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
159
parties do not take care of attendance (visitors) of their
websites.
Fig.8 Multimedia content of each political party website.
Besides the types of content (text and multimedia) in this
part of the analysis were explored also the ways of
communication which are offered by political parties
through their websites.
Surprising fact that political parties do not use their sites
for the opportunity to communicate and besides the
possibility of sending e-mails almost there is no other
possible way to contact them, except a very small number
of political parties which offers email and other contact
information as phone number, address and the like.
Very few political parties have set forum on their website,
also very small number of political parties offers an
opportunity for asking questions and publishing answers
online.
Fig.9 Opportunities for contact / interaction / transparency offered by
each political party in Macedonia
Fig.10 Opportunities for contact / interaction / transparency offered by all
political party in Macedonia by category
Table 4: Ways of communication offered by political parties
Table shows that in terms of interaction, political parties
are not handled and did not use the opportunities of new
media field. Besides basic information such as postal
address, phone and email address, no other method is used.
Sites of some political parties have disabled
the
opportunity to contact them via e-mail or form, but they
offer only
traditional ways of communication
the
(telephone and letter).
For transparency of the website is necessary to enable
seeing the number of visitors on the site, which was also
left out of more websites of the political parties. A very
small part of the political parties had included counters on
their websites, whether public or just used by the
administrators of the website. This means that political
Table 5: Visitors Counter on political web pages
From the table we can conclude that almost 92% of
political parties have no counters on their websites, as a
consequence of lack of counters we cannot say with
certainty about the attendance (visitors) of website of
certain political parties.
Almost all political parties have used CMS (Content
Management System) for making their websites, so they
meet the basic rules for usability of the website. However
astonishing fact
that despite meeting
the
technical
specifications for usability, they have errors that are not
inherent for the platforms that are used, for example the
search box which does not work properly and the like. In
terms of recommendations for visibility of search engines,
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
160
many political parties does not satisfy the conditions,
which means that their site search will not be among the
first results and will not be easily accessible to readers.
6.4. Technical Specifications of political
parties’ websites
This part of research covers the technical characteristics of
the websites of political parties, respectively hosting and
platform on which websites are set up and registration of
the domain are shown in the table below.
Table 6: Technical Specifications of political parties web sites
If we do comparison of software solutions which is more
used we can conclude that 69% of political parties
websites use the PHP programming language, 23% use
ASP programming language and only 8% use ASPX
programming
language. Platforms
that are used by
political parties websites are 23% Windows Server 2003,
23% of them use Windows 2000 platform and 54% were
Unknown platforms.
Table 7: Software solutions and platforms used by political parties
websites
Fig.11 Software solution used by political parties’ websites in Macedonia
Fig.12 Platforms used by political parties’ websites in Macedonia
Table 8: Servers used by political parties’ websites in Macedonia
Fig.13 Servers used by political parties’ websites in Macedonia
Most of political parties websites are hosted in Macedonia
46% of the total number of political Web sites, 38% of
them are hosted in the US, 8% are hosted in France and
8% are hosted in the Netherland.
Fig.14 Hosted in Countries
Most of the websites of political parties are registered in
the Republic of Macedonia 63%, while 31% are registered
in the United States and 7% are registered in France.
Table 9: Registered in countries
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
161
Fig.15 Registered in countries
According the table in which the technical characteristics
of the websites of political parties are presented, we can
see that political parties have used free solutions. While
the information for domains show that websites of political
parties often are registered and hosted in Macedonia, but
there are a few exceptions, some political parties have
their sites hosted in the U.S., but again Macedonia is
dominant in terms of domain registration. Here it is
important to mention that those domains that are not
registered in Macedonia have no extension. mk.
6.5. Profiles on social media websites
Recently, many popular are accounts of political parties
and politicians on social media, so precisely because they
were included in this study. According to this fact i have
collected information which politicians (party presidents)
have their official account on social media (social
networking sites) and the political parties use these social
media to communicate with electors.
Fig.16 Usage of social media by each political party
Fig.17 Usage of social media by each president of political parties
Fig.18 Usage of social media by all political parties
Table 10: Usage of social media by each political party and its leader
Fig.19 Usage of social media by all presidents of political parties
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
162
Fig.20 Usage of social media by all political parties VS all party
presidents
According to the results, they show that despite the
popularity of social media (SNS), political parties and
politicians (presidents of the parties) have not used fully
the advantages and opportunities of these tools to connect
with their supporters. Most popular services are Facebook
and YouTube, while platforms for sharing images were
used rarely. Some political parties had implemented photo
galleries on their sites.
7. Conclusion
The Internet first became a significant political tool in
offering one-way communication for political parties with
the development of political parties’ websites. However,
politics online is no longer as valued for its one-way
communication but is now praised, and used for the
opportunities
it provides
to
conduct
two way
communications
their
parties,
political
between
campaigns, and potential voters.
In today’s political arena, websites and Internet resources,
such as weblogs, social networks, podcasts and compatible
video formats are being shared as a means of consuming
and disseminating information via the web. As a result,
websites are becoming a major if not the number one
resource for political campaigns to contact supporters,
volunteers, and donations. At the same time, for the
consumer, or, in this case, the voter, the Internet has
become a primary resource for campaign media explored
via web blogging, campaign websites, news sites, social
networks, video sharing and podcasts. While traditional
websites are still offering significant value to the political
world, technology is pushing the envelope steps further
with the use of web blogging, the development of social
networks, the availability of podcasts (news and opinion
related), and video sharing through sites such as YouTube,
which provide the general public with video clips (of up to
5+ minutes in length). Thus the issue is no longer whether
politics is online but, instead, in what form and with what
consequences.
Politics on the Internet has expanded beyond static two-
dimensional web pages that used to serve as online
billboards, flyers for a candidates position, and the
traditional barriers of physical organizing. This has
ushered in a new era of online consumer media and
networking content that is saturated by political and
campaign content. Furthermore,
the phenomena of
campaigns and the Internet is becoming less about what is
featured on the campaign website, and instead consists
more of user generated and user spread content that
circulates virally on the Internet, connecting supporters
from across the globe.
So far, Web 2.0 has had a weak e-ruptive effect on
Macedonian party politics. On the horizontal dimension,
the parties’ share of activities on Web 2.0 has mainly
followed what could be expected from their share of votes
in 2008 parliamentary election. But deviations from the
pattern indicate there are variable priorities, meaning that
given a minimum of resource, parties and activists can
decide to be “big in Web 2.0 politics” or decide not to.
Regarding the vertical dimension of e-ruption, it appears
that the national party organizations has gained more
control and initiative in 2009 presidential an municipality
election, the more anarchical situation of 2008 being
temporary, due
to
sudden
introduction of new
technologies. Furthermore, while the number of users,
viewers, members, followers and bloggers may have
doubled since 2008, the party political Web 2.0 segment is
still very small. This is both as a segment on Web 2.0 and
as segment of voters in general.
Therefore the Web 1.5 hypothesis appears to give the best
description. Furthermore, a likely next step is an even
more integrated and proactive strategy, as indicated by
providing guidance and cues on the party web sites, as
well as setting up party specific networks or “zones” on
places like Facebook. Success stories of internet politics,
and especially Obama, have had a significant impact on
Macedonian media. Comments like the one quoted below
is quite common:
“Macedonian politicians have a lot to learn from Obama
and his staff when
it comes
to running electoral
campaigns. In particular, they should notice his priority of
digital media, a part of the campaign which can be run
without especially high costs.”
Party strategists have also been inspired by the American
experience. However, to get Macedonian voters drawn into
Web politics in sufficient numbers in the first place, a
more systemic approach is called for. During the American
presidential campaign common “entrances” or “portals” to
party politics on the main Web 2.0 sites were set up on
established sites as on Facebook, YouTube and Twitter.
IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, May 2011
ISSN (Online): 1694-0814
www.IJCSI.org
163
Some differences between the American and Macedonian
party systems should also be noted. A national party in the
USA and Macedonia is quite simply different entities.
Population- and territorial size, as well as diversity, place
different demands on local networking and autonomy, as
well as effective coordination and communication between
the localities. American parties also have a much looser
structure, with relatively few members and dormant local
branches. Macedonian parties on the other hand are still
are relatively strong organizations and less reliant on ad
hoc networking. Thirdly, American elections are
candidate-centered, in contrast to the party centered
approach found in Macedonia. These differences may be
reduced over time, as Macedonia – along with other
European countries – is approaching a model with
decoupled local branches, fewer members and more focus
on individual leaders. But they are still significant enough
to warrant the question whether Web 2.0 is more
functional for American parties and therefore more
“rational” to use for winning elections, exactly because
these parties are more like network parties in the first
place.
As such, it may therefore seem like a paradox that it is the
SDSM and VMRO-DPMNE which have most fully
embraced Web 2.0. They are one of the oldest parties and
probably still have the most effective and vital party
organization. However, this also means that the party has
the resources and structure to effectively implement their
Web 2.0 presence, provided the party leadership thinks it
necessary. It
is another useful media channel for
communicating with members and voters.
The Internet is a unique forum for politics as it provides
back and forth communication and allows for an exchange
of information between users and sources. The Internet
also offers its users greater access to information and the
ability to express themselves in various online political
arenas. In addition, individuals use the Internet as a tool to
find and join groups that share their similar ideological,
cultural, political and lifestyle preferences.
8. Reference
[1] Marin, Alexandra, and Barry Wellman. "Social
Network Analysis: An Introduction." Computing in the
Humanities and Social Sciences. Web. 04 Apr. 2010.
<http://www.chass.utoronto.ca/~wellman/publications/new
bies/newbies.pdf>.
[2] Oblak, Tanja. "Internet Kao Medij i Normalizacija
Kibernetskog Prostora." Hrčak Portal Znanstvenih
časopisa Republike Hrvatske. Web. 06 Apr. 2010.
<hrcak.srce.hr/file/36810>.
[3] "Mixing Friends with Politics: A Functional Analysis
of ’08 Presidential Candidates Social Networking Profiles
Authored by Compton, Jordan." All Academic Inc.
(Abstract Management, Conference Management and
Research Search Engine). Web. 13 June 2010.
<http://www.allacademic.com//meta/p_mla_apa_research_
citation/2/5/9/3/4/pages259348/p259348-1.php>.
[4] All Academic Inc. (Abstract Management, Conference
Management and Research Search Engine). Web. 13 June
2010.
<http://www.allacademic.com//meta/p_mla_apa_research_
citation/2/5/9/3/4/pages259348/p259348-1.php>.
[5] "Alexa Internet - Website Information." Alexa the Web
Information Company. Web. 20 June 2010.
<http://www.alexa.com/siteinfo>.
[6] "What Is Web 2.0 - O'Reilly Media." O'Reilly Media -
Technology Books, Tech Conferences, IT Courses, News.
Web. 27 May 2010.
<http://oreilly.com/web2/archive/what-is-web-20.html>.
[7] Web 2.0 Sites. Web. 28 May 2010.
<http://web2.ajaxprojects.com/>.
[8] "Key Differences between Web1.0 and Web2.0."
CiteSeerX. Web. 25 May 2010.
<http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1
.145.3391>.
[9] "Political Participation and Web 2.0." Political Theory.
Web. 24 May 2010. <http://arts.monash.edu.au/psi/news-
and-events/apsa/refereed-papers/political-
theory/allisonpoliticalparticipationandweb.pdf>.
[10] "Alexa - Top Sites in Macedonia." Alexa the Web
Information Company. Web. 01 June 2010.
<http://www.alexa.com/topsites/countries/MK>.
[11] "What Is Social Networking? - Should You Join."
What Is Social Networking? - What Is Social Networking?
Web. 30 May 2010.
<http://www.whatissocialnetworking.com/Should_You_Jo
in.html>.
[12] Boyd, Danah M., and Nicole B. Ellison. "Social
Network Sites: Definition, History”. Web. 30 May 2010.
<http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html>.
S. Emruli, received his bachelor degree from Faculty of
Communication Sciences and Technologies in Tetovo SEE
University (2006), MSc degree from Faculty of
Organization and Informatics, Varaždin (2010). Currently
works as professional IPA Advisor at Ministry of Local
Self Government in Macedonia.
M. Bača, is currently an Associated professor, University
of Zagreb, Faculty of Organization and Informatics. He is
a member of various professional societies and program
committee members, and he is reviewer of several
international journals and conferences. He is also the head
of the Biometrics centre in Varaždin, Croatia. He is author
or co-author more than 70 scientific and professional
papers and two books.
|
1606.05179 | 1 | 1606 | 2016-06-16T13:24:52 | Incentivized Campaigning in Social Networks | [
"cs.SI"
] | Campaigners, advertisers and activists are increasingly turning to social recommendation mechanisms, provided by social media, for promoting their products, services, brands and even ideas. However, many times, such social network based campaigns perform poorly in practice because the intensity of the recommendations drastically reduces beyond a few hops from the source. A natural strategy for maintaining the intensity is to provide incentives. In this paper, we address the problem of minimizing the cost incurred by the campaigner for incentivizing a fraction of individuals in the social network, while ensuring that the campaign message reaches a given expected fraction of individuals. We also address the dual problem of maximizing the campaign penetration for a resource constrained campaigner. To help us understand and solve the above mentioned problems, we use percolation theory to formally state them as optimization problems. These problems are not amenable to traditional approaches because of a fixed point equation that needs to be solved numerically. However, we use results from reliability theory to establish some key properties of the fixed point, which in turn enables us to solve these problems using algorithms that are linearithmic in maximum node degree. Furthermore, we evaluate the efficacy of the analytical solution by performing simulations on real world networks. | cs.SI | cs | Incentivized Campaigning in Social Networks
Bhushan Kotnis, Albert Sunny, Joy Kuri
1
6
1
0
2
n
u
J
6
1
]
I
S
.
s
c
[
1
v
9
7
1
5
0
.
6
0
6
1
:
v
i
X
r
a
Abstract -- Campaigners, advertisers and activists are increas-
ingly turning to social recommendation mechanisms, provided
by social media, for promoting their products, services, brands
and even ideas. However, many times, such social network based
campaigns perform poorly in practice because the intensity of
the recommendations drastically reduces beyond a few hops from
the source. A natural strategy for maintaining the intensity is
to provide incentives. In this paper, we address the problem of
minimizing the cost incurred by the campaigner for incentivizing
a fraction of individuals in the social network, while ensuring
that the campaign message reaches a given expected fraction of
individuals. We also address the dual problem of maximizing the
campaign penetration for a resource constrained campaigner. To
help us understand and solve the above mentioned problems,
we use percolation theory to formally state them as optimization
problems. These problems are not amenable to traditional ap-
proaches because of a fixed point equation that needs to be solved
numerically. However, we use results from reliability theory to
establish some key properties of the fixed point, which in turn
enables us to solve these problems using algorithms that are
linearithmic in maximum node degree. Furthermore, we evaluate
the efficacy of the analytical solution by performing simulations
on real world networks.
Index Terms -- Social Networks, Incentivized Campaigns, In-
formation Control, Bootstrapped Percolation, Reliability Theory
I. INTRODUCTION
On-line social networking services have enabled advertisers,
campaigners and activists to reach millions of individuals. In
particular, the ability to recommend or share web articles [1],
videos [2], and other media can be harnessed by campaigners
for disseminating information to a worldwide audience. While
such social network based campaigns sound promising, due
to the fact that ideas propagate only a few hops from their
origins [3], often, they are found to perform poorly in practice.
Providing incentives for recommendations is a natural solution
for increasing the hop count. For example, Dropbox, which
offers cloud storage services,
increased its customer base
rapidly by offering incentives for social recommendations [4].
Although such referrals may increase the short term costs to
the company by generating a large number of registrations for
the free service, in the long term, the free registrations pay off,
since a significant portion of free users eventually migrate to
the premium service. Also, to keep the cost down, they capped
the referral payouts -- additional 500 MB only for the first
28 referrals, i.e. the referral payout is capped at 14 GB.
An alternative mechanism to limiting the cost is to cap the
number of incentivized individuals, i.e., instead of capping in-
Department of Electronic Systems Engineering, Indian Institute of Science,
Bangalore, India. Email: {bkotnis,salbert,kuri}@dese.iisc.ernet.in
centive payments, offer large referral rewards1 to a preselected
set of individuals2. This approach allows the campaigner to
target individuals who are best suited to use and recommend
the service to their co-workers or friends.
A. Related Work
through direct
In [5 -- 7], the authors consider nodes to be either active
or inactive. Making an inactive node active -- not through
network effects, but
intervention for kick-
starting the campaign -- is termed as "seeding." Assuming
full knowledge of the network structure, i.e., the adjacency
matrix, the question asked in [5 -- 7] is; Given a constraint on
the number of seeds, what is the optimal set of seed nodes
that would maximize the reach of the campaign? However,
in several real-world settings, we may just have access to the
statistical properties of the network. Also, the authors in [5 --
7] do not consider the cost incurred due to incentivization.
Incentivization is the process of providing incentives to nodes
who are already active, to persuade their friends to sign up.
Incentivization happens throughout
the campaign, whereas
seeding, as discussed in [5], happens only at the beginning.
A related problem involving the calculation of an optimal
pricing strategy for products sold to individuals in a social
network was explored in [8, 9]. The authors in [8, 9] consider
the problem of pricing a product and calculating the amount
of cash-back (discount) that is provided to individuals as an
incentive to evangelize the product. In this paper, we do not
focus on optimal pricing, but rather focus on the size and
cost of the campaign where individuals do not incur a cost to
register for the service. The problems studied in this paper
are more appropriate in settings where the service is free,
or is based on a freemium model. Furthermore, we only
assume partial knowledge of the network and also incorporate
constraints that ensure a given campaign penetration, whereas
the algorithms proposed in [8, 9] assume full knowledge of
the network structure and do not consider any constraint on
the campaign size.
The problem of computing the optimal referral payment
mechanisms that maximize profit was studied in [10], by
modelling the referral process as a network game. The authors
in [10] conclude that a combination of linear payment mecha-
nism (linear in the number of referrals) and threshold payment
mechanism (payment only when number of referral exceeds
a threshold) approximates the optimal pricing scheme. In this
1For example the living social website gives 100% cash-back on a
purchased product if the customer persuades three others to buy the (same)
product. Another famous example of uncapped referrals is Uber, and also the
taxi service Lyft.
2Instead of advertising the referral scheme, a randomized scheme can be
advertised. For example, the advertisement could be "those who register for
the service will get a chance to win discounts for referring their friends."
paper, we focus on the set of nodes to be incentivized while
assuming that a pricing scheme, which can be computed based
on the results in [10], is provided by the campaigner. Similar
problems involving the computation of referral rewards in real
time, for maximizing the campaign spread, were studied using
the theory of optimal control in [11 -- 15].
B. Our Contributions
We consider a scheme where preselected incentivized in-
dividuals are presented with a reward when they register for
the service, encouraging them to spread the news about the
service to their friends. The decision of whether to offer
an incentive to an individual is precomputed based on the
solution of an optimization problem. We use a variant of
the linear threshold model [5] for modelling the campaign
spreading process. For a given fraction of such incentivized
individuals, we first compute the campaign size (expected
fraction of registered individuals) using bootstrap percolation.
We then use this quantity to formulate the following optimiza-
tion problems: 1). minimize the cost for achieving a given
expected fraction of registered individuals, and 2). maximize
the expected fraction of registered individuals for a given
cost budget. These optimization problems are not amenable to
traditional approaches because of a fixed point equation that
needs to be solved numerically. However, we use results from
reliability theory to establish some key properties of the fixed
point, which in turn enables us to solve these problems using
algorithms that are linearithmic in the maximum node degree.
Through extensive simulations, we also study the efficacy our
incentivization scheme in real world networks.
TABLE I
A SUMMARY OF KEY NOTATION
Description
fraction of degree k nodes
maximum node degree of graph G
probability of a degree k node having threshold m
activation probability of a type 1 node
activation probability of a type 2 node
Notation
p(k)
kmax
pth(mk)
α1
α2
d mean node degree of graph G
q
Xk2
Yk−k2
u
uq
s(q)
sk(q)
probability of encountering a type 2 node
by traversing a randomly chosen link
random variables that denote the number of type 2
active neighbours of a degree k node, given that there
are k2 type 2 neighbours
random variables that denote the number of type 1
active neighbours of a degree k node, given that there
are k − k2 type 1 neighbours
probability of reaching a registered node by following
an arbitrary edge of the graph
fixed point of Equation (3)
expected fraction of registered nodes
at the end of the campaign
expected fraction of degree k registered
nodes at the end of the campaign
cost of incentivizing a degree k node
probability of incentivizing a degree k node
minimum expected fraction of registered nodes
ck
φ(k)
γ
c maximum expected incentivization cost
2
Fig. 1.
Flow chart denoting the various stages of a node; m denotes the
threshold of node i, α1 and α2 are the activation probabilities of incentivized
and non-incentivized nodes, respectively.
results from percolation theory, we compute the campaign
size (expected proportion of registered individuals). Using this
quantity, we formulate and solve two relevant optimization
problems in Sections IV and V. In Section VI, we compare
the analytical results with simulation performed on real-world
networks. Finally, in Section VII, we conclude the paper.
II. MODEL
Consider a set of N = {1, 2,··· , n} individuals who
are connected to one another through a social network. For
analytical tractability, as in [16, 17], we consider this network
to be arbitrary, connected3, locally tree-like and uncorrelated4.
We represent this network as an undirected graph G(N ,L),
where N and L represent the set of nodes and links of graph
G, respectively. An undirected edge (a, b) ∈ L if individuals a
and b are neighbours in the underlying social network. In most
scenarios, full knowledge of the network structure may not be
available to the campaigner. In such cases, the campaigner
can obtain statistical properties of the network through data
mining. One such property is the degree distribution. Let
{p(k), k ≥ 1} be the degree distribution of graph G.
We consider a campaign on the network represented by
graph G (see Fig. 1 for the flow chart). The nodes in graph
G can be either in "active", "registered" or "unregistered"
state. Once active, a node remains active. Active nodes are
very spirited and express their strong support for the campaign
The key notation used in this paper is summarized in Table I.
The remainder of this paper is organized as follows. In Sec-
tion II, we present the campaign model. In Section III, using
3The configuration model random graph is connected with high probability
if and only if the minimum degree is greater than or equal to 3.
4Uncorrelated networks are networks where the degree of a node is
statistically independent of the degree of any other node in the network [18].
Nodei:unregisteredIsnodezealous?WaittoberecommendedbyactiveneighboursHasatleastmactiveneighbours?Nodei:registeredIsnodeincentivized?Choosetobecomeactive(withprobabilityα2)?Nodei:activeChoosetobecomeactive(withprobabilityα1)?Nodei:registeredYesNoYesNoYesNoYesYesNoNoby encouraging their neighbours to register, whereas nodes in
the registered and unregistered states refrain from recommen-
dations. For a node to become active, it must first show support
for the campaign by registering itself. However, all registered
nodes need not be active.
The campaign starts with a set of zealous individuals --
those who intrinsically desire the service. These nodes do not
need any recommendation to register, and are registered for
the campaign from the very start. If a zealous node becomes
active, it will recommend the service to its neighbours. On
the other hand, nodes that are not zealous, register only if the
number of active neighbours exceeds a predefined threshold
value (see Fig. 1). Let pth(mk) denote the probability of a
degree k node having threshold m. This is a generalization of
the celebrated linear threshold model [5] -- a model of choice
for studying the dissemination and adoption of new products,
technologies and ideas [19 -- 22]. We note that, by definition,
k≥1 p(k)· pth(0k) denotes the fraction of zealous nodes in
the network5 -- fraction of nodes that register without any
recommendations.
(cid:80)
A node that receives a reward when it registers for the
service is more likely to tell its neighbours about the reward
and encourage them to register. Therefore, we divide the nodes
into two categories: the 'non-incentivized' (type 1) and the
'incentivized' (type 2). The campaigner decides the fraction of
incentivized nodes before the start of the campaign6. However,
these nodes become aware of the fact that they are incentivized
only if they register for the service7. Since incentivized nodes
are provided with incentives upon registration, they are more
likely to be enthused, and will play an active part in the
campaign than non-incentivized nodes. Let α1 ∈ (0, 1] and
α2 ∈ (0, 1] be the probabilities of a non-incentivized (type 1)
and incentivized (type 2) node becoming active, respectively.
Due to the presence of incentives, we assume that α2 > α1.
III. COMPUTING THE CASCADE SIZE
Before presenting the problems, we need to first compute
cascade size, i.e., the expected fraction of nodes that have
registered at the end of the campaign. Let p(k(cid:48)k) be the
probability of encountering a degree k(cid:48) node by traversing
a link from a degree k node. From [16], we know that
this conditional distribution, for an uncorrelated network, has
the following form p(k(cid:48)k) = k(cid:48)·p(k(cid:48)
, where d denotes the
mean degree of the graph G. Let q(k) be the probability of
encountering a type 2 node by traversing a randomly chosen
link from a degree k node. Then, we have
] · p(k
1
d
Pr[type 2 neigh.k
(cid:48)k) =
(cid:88)
(cid:88)
(cid:88)
) · p(k
q(k) =
(cid:48)k)
)p(k
(cid:48)≥1
(cid:48)≥1
(cid:48)≥1
φ(k
φ(k
=
k
)
k
k
k
d
)
(cid:48)
(cid:48)
(cid:48)
(cid:48)
(cid:48)
5Campaigner can estimate the fraction of zealous nodes by conducting
surveys on a reasonable sized demographic.
6Alternatively, whenever an individual registers, the campaigner can dynam-
ically decide whether to incentivize this individual. This problem is similar
to stochastic control problems, and is beyond the scope of this paper.
7Incentives are assigned assuming knowledge of the exact degree of
the registered node, because the exact node degree can be obtained after
registering. For example, one can ask individuals to register through an on-
line social network, and compute the exact degree from their contact list.
3
(cid:48)
k2
Since q(k) is independent of k,
let q(k) = q ∀ k ∈
{1, 2,··· , kmax}. Here, kmax is the maximum node degree.
Since the network is locally tree-like, with some effort, it
can be shown that the number of type 2 neighbours of a degree
k node is a binomial random variable with the probability
distribution function p(k2k) = (cid:0) k
(cid:1) · qk2 · (1 − q)k−k2. Let
(cid:48)
(cid:48)
(cid:48)
+1)
i.e.,
) = (k
+1)·p(k
) be the excess degree distribution,
the degree
pex(k
distribution of a node encountered by following a randomly
chosen link without counting that link. For an uncorrelated
.
network, from [17], we know that pex(k
Now, let u denote the probability of reaching a registered
node by following an arbitrary edge of the graph. First, let
us consider an arbitrary node j of degree k and threshold m.
Next, we compute the probability that node j registers due
to recommendations from its active neighbours, given that we
have arrived at node j by following an arbitrary link in the
graph. For ease of presentation, we do not explicitly write the
condition "following an arbitrary link."
P [j registers j is of degree k, j has threshold m]
d
(cid:80)k
l=mP [j has l active neighboursj is of degree k]
k2=0P [k2 type 2 neighboursj is of degree k]
(cid:16)(cid:80)k
· P [l active neigh.j is of degree k and k2 type 2 neigh.]
k2=0 p(k2k) · P [Xk2 + Yk−k2 = l]
(cid:17)
l=m
l=m
k2=0 p(k2k) · P [Xk2 + Yk−k2 ≥ m]
(1)
where Equality (a) follows because the events {j registers}
and {j has m or more active neighbours given that j has
threshold m} are equivalent, and the events {j has l active
neighbours} and {j has threshold m} are independent of each
other.
(a)
= (cid:80)k
=(cid:80)k
=(cid:80)k
=(cid:80)k
(cid:17)
In Equality (1), Xk2 and Yk−k2 are random variables that
denote the number of type 2 and type 1 active neighbours of
a degree k node, given that there are k2 type 2 and k − k2
type 1 neighbours. With some effort, it can be shown that
random variables Xk2 and Yk−k2 are independent and have
a binomial distribution with parameters (k2, α2u) and (k −
k2, α1u), respectively. Here, α1 and α2 are the probability of
a type 1 and type 2 node becoming active, respectively. The
independence occurs because the probability of incentivizing
a node is independent of the degree of its neighbouring nodes.
The binomial distribution arises here because the network is
locally tree-like.
From Equation (1), it is evident that the probability of a
node registering is independent of its type8. Therefore, the
probability that by following an arbitrary link we can reach a
node that registers due to recommendations is given by
(cid:88)
P [node registers due to recommendation] =
pex(k)·
P [node reg. due to recommendationsexcess degree k]
k≥1
8A node registers either if it is zealous (this event is independent of its
type), or through recommendations which depend on its neighbours and type
of neighbours but not on its type.
(cid:88)
(cid:88)
k≥0
k≥0
f (q, u) =
=
pex(k) · pth(0k + 1) +
pex(k) · pth(0k + 1) +
(cid:88)
(cid:88)
(cid:18)(cid:88)
(cid:88)k
l+l
(cid:88)
(cid:88)
(cid:88)k
(cid:88)k
(cid:18)k − k2
k≥1
k≥1
pex(k)
m≥1
pth(mk + 1)
pth(mk + 1)
m≥1
pex(k)
(cid:18)k2
(cid:19)
l
l
p(k2k) · P [Xk2 + Yk−k2 ≥ m]
(α2u)l(1 − α2u)k2−l
(cid:48)
(cid:48)≥m
4
(cid:19)
p(k2k) · P [Xk2 + Yk−k2 ≥ m]
(cid:18) k
· qk2 · (1 − q)k−k2·
(1 − α1u)k−k2−l
(cid:48)(cid:19)
k2=0
(cid:19)
k2=0
k2
(cid:48)
(α1u)l
(cid:88)
k2=0
k≥1
m≥1
m≥1
pex(k)
pth(mk)
P [node registers, node has threshold m
gk(q, u) = pth(0k) +
where Xk2 ∼ Bin(k2, α2u) and Yk−k2 ∼ Bin(k − k2, α1u)
(cid:88)
(cid:88)
(cid:88)
k(cid:88)
m≥1
· qk2 · (1 − q)k−k2 · P [Xk2 + Yk−k2 ≥ m] (2)
node has excess degree k, node has threshold m]
pth(mk + 1) · P [node registers
(cid:88)
(cid:88)
(cid:88)
node has excess degree k]
pth(mk + 1)·
(cid:18) k
pex(k)
pex(k)
(cid:19)
m≥1
k≥1
k≥1
=
(a)
=
=
k2
k2=0
On the RHS of Equation (2), we use the excess degree
distribution because we discount the link that we followed
to arrive at the node. In Equality (a), we use pth(mk + 1)
because if we include the link on which we arrived, a node of
excess degree k will have k + 1 links. Arguing along the lines
of [17], we can conclude that u has to satisfy the following
self consistency equation
(ii) If every node in the network is zealous, then u = 1 is
the only solution of Equation (3).
(iii) If the fraction of zealous nodes lies in the interval (0, 1),
then Equation (3) has a unique fixed point in (0, 1).
Proof: In Appendix B-B.
For ease of presentation, in the remainder of the paper, we
assume that the fraction of zealous nodes lies in the open
interval (0, 1). For any q ∈ [0, 1], let uq denote the fixed point
of Equation (3). Since the fixed point is unique, we can obtain
uq by iteratively solving Equation (3). Our next proposition
qualitatively describes the variation of the fixed point uq as
function of q.
Proposition 3.3: If α2 > α1, then uq is a strictly increasing
continuous function of q, i.e., ∂uq
∂q > 0.
Proof: In Appendix C.
Now, given a q ∈ [0, 1], let sk(q) be the expected fraction of
degree k nodes that have registered at the end of the campaign.
The expression for sk(q) can be obtained as follows
sk(q) = P [node registersdegree k]
= P [node is zealousdegree k]
+ P [node reg. due to recommendationsdegree k]
m≥1
P [node reg, node has threshold m
node has degree k] + pth(0k)
(cid:88)
= pth(0k) +
pth(mk)·
m≥1
P [node regnode has degree k, node has threshold m]
= gk(q, u)u=uq
(4)
where gk(q, u) is as given at the top of this page and uq is
the fixed point of Equation(3). Given a q ∈ [0, 1], let s(q)
be the expected fraction of nodes that have registered at the
end of the campaign. s(q) is also termed as the size of the
epidemic. Then, using arguments similar to the ones used to
derive Equation (5), it can be shown that
k≥1
s(q) =
p(k) · gk(q, u)
p(k) · sk(q) (5)
Once again using results from reliability theory, in Proposi-
tion 3.4, we establish the increasing and non-decreasing nature
of functions g(q, u) and gk(q, u) (with respect to u and q).
k≥1
=
(cid:12)(cid:12)(cid:12)u=uq
(cid:88)
(cid:88)
Proposition 3.4: If α2 > α1, then
1) ∂g(q,u)
∂u > 0
∂u ≥ 0.
2) ∂gk(q,u)
∂q > 0 and ∂g(q,u)
∂q ≥ 0 and ∂gk(q,u)
u = P [node is zealous]
(cid:88)
=
k≥0
+ P [node reg. due to recommendations]
pex(k)pth(0k + 1)
=
(cid:88)
+ P [node reg. due to recommendations]
= f (q, u)
(3)
where f (q, u) is as given at the top of this page.
For any q, Equation (3) is a fixed point equation in u.
However, due to the complex nature of the function f (q, u),
the existence of a u that satisfies Equation (3) is not obvious.
Using results from reliability theory, in Proposition 3.2, we
prove the existence and uniqueness of the fixed point of
Equation (3). Before that, the following proposition establishes
the nature of function f (q, u) (w.r.t u).
Proposition 3.1: If the fraction of zealous nodes lies in the
open interval (0, 1), then ∀ q ∈ [0, 1], f (q, u) is a continuously
differentiable, convex, monotonically increasing function of u.
Proof: In Appendix B-A.
Proposition 3.1 gives us some intuition about the existence
and uniqueness of the fixed point. However, we establish the
same rigorously in the following proposition.
Proposition 3.2: For every q ∈ [0, 1],
(i) If no node in the network is zealous, then u = 0 is the
only solution of Equation (3).
Proof: Similar to that of Propositions 3.1 and C.1.
IV. COST MINIMIZATION UNDER CASCADE SIZE
CONSTRAINT
Providing incentives is a costly affair. The campaigner may
either be interested in minimizing the cost while guaranteeing
that a given proportion of population registers, or in maximiz-
ing the registrations for a given cost budget. In this section,
we look at the former problem.
A. Cost of incentivization
Incentives provided by the campaigner is usually a function
of its degree because the number of potential recommendations
depend on the degree. Let ck be the cost of incentivizing a
degree k node. Incentivized nodes obtain incentives only if
they registers. Therefore, the expected cost per incentivized
degree k node is given by ck · sk(q), where sk(q) (see
Equation 4) is the probability that an incentivized degree k
node registers. Let φ(k) denote the probability of incentivizing
a degree k node. Then, the average cost per node for incentive-
k≥1 p(k)φ(k) ×
k≥1 p(k)·ck·φ(k)·sk(q), where
policy (φ = {φ(k), k ≥ 1}) is given by (cid:80)
(cost of node of deg. k) =(cid:80)
(cid:80)
k≥1 k · p(k) · φ(k).
q = 1
d
B. Problem formulation
Minimizing the cost while providing guarantees on the
number of expected registrations is appropriate for campaigns
where the campaigners are mandated to achieve a given target.
This problem can be mathematically formulated as follows
min
0≤φ≤1
k≥1
ck · p(k) · φ(k) · sk(q)
(6)
(cid:88)
Subject to:
s(q) ≥ γ and q =
k · p(k) · φ(k)
k≥1
where γ ∈ [0, γmax] is the minimum expected fraction of
registered individuals that must be achieved and d is the mean
degree of the network. Here, γmax is the expected fraction of
registered individuals obtained by incentivizing everyone. The
expression for sk(q) (Equation (4)) and s(q) (Equation (5))
involve uq, which is the solution to the fixed point Equa-
tion (3). Thus, it is not possible to apply traditional analytical
techniques such as the Karush-Kuhn-Tucker (KKT) conditions
to solve the above problem. Furthermore, the problem may
be non convex, and applying numerical techniques such as
genetic algorithms, or Markov Chain Monte Carlo methods
may not yield a globally optimal solution.
(cid:88)
1
d
C. Solution approach
In this section, we present transformations that allow us to
efficiently compute the global optima of the cost minimization
problem presented in the previous section. To help us with this,
we state and prove the following proposition. The intuition
behind this proposition is that, as α2 > α1, increasing q
increases the proportion of type 2 nodes, which results in a
higher s(q).
Proposition 4.1: If α2 > α1, then function s : [0, 1] →
[γmin, γmax] is a monotonically increasing bijection, where
Proof: We have
(cid:1)
∂(cid:0)g(q, u)u=uq
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)u=uq
∂g(q, u)
∂q
∂q
∂s(q)
∂q
=
(a)
=
(cid:12)(cid:12)(cid:12)(cid:12)(cid:12)u=uq
· ∂uq
∂q
+
∂g(q, u)
∂u
·
γmax = s(0) and γmax = s(1) are the expected fraction of
registered individuals obtained by incentivizing nobody and
everybody, respectively.
5
= (> 0)
Proposition 3.4
+ (> 0)
Proposition 3.4
⇒ ∂s(q)
∂q
> 0
(> 0)
Proposition 3.3
(7)
where Equality (a) follows from an application of the chain
rule. From Inequality (7), we can see that s(q) is a monoton-
ically increasing function defined on the closed interval [0, 1].
Hence, s : [0, 1] → [γmin, γmax] is a bijection.
Proposition 4.1 establishes that s(q) is a monotonically
increasing function of q and is a bijection. Therefore, we can
replace the constraint s(q) ≥ γ with the constraint q ≥ qγ,
where qγ is such that s(qγ) = γ. Since s(q) is a monotonically
increasing function of q, we can compute qγ by performing
a line search over the closed interval [0, 1]. The following
algorithm does this.
qmp := (q1 + q2)/2
Solve equation u = f (qmp, u) to obtain uqmp.
if s(qmp) < γ then
Algorithm 1 Algorithm to compute qγ
1: Set q1 := 0 and q2 := 1
2: while s(q1) − s(q2) > do
3:
4:
5:
6:
7:
8:
9:
10: end while
11: return qγ := (q1 + q2)/2
q1 := qmp
q2 := qmp
end if
else
Proposition 4.2: If α2 > α1, then for all k ≥ 1, ∂sk(q)
Proposition 4.1 does not tell us how the expected fraction
of registered degree k nodes (sk(q)) responds to changes in q.
While, the function sk(q) may not be a bijection for all values
of k, we show that it is a non-decreasing function of q, for
all values of k.
∂q ≥ 0
Proof: By first writing the total derivative in terms of the
partial derivatives (see Proposition 4.1), and then by using the
non-negativity of these partial derivatives (from Propositions
3.3 and 3.4).
Now, if γ ≤ γmin = s(0), then the cascade constraint
is met without incentivizing anyone. In such cases, the op-
timum incentive policy and the optimum cost is given by
{φ(k) = 0,∀k ≥ 1} and 0, respectively. On the other hand,
if γ = γmax = s(1), then the cascade constraint is met only
if everyone is incentivized, i.e., {φ(k) = 1,∀k ≥ 1}, and
k≥1 ck · p(k) · sk(1). For the
cases when γ ∈ (γmin, γmax), due to Propositions 4.1, the
the optimum cost is given by(cid:80)
(cid:88)
cost minimization problem can be re-written as follows
P1 : min
0≤φ≤1
Subject to:
ck · p(k) · φ(k) · sk(q)
k≥1
(8)
q ≥ qγ and q =
k · p(k) · φ(k)
k≥1
·(cid:88)
1
d
where qγ is chosen such that s(qγ) = γ. Since γ ∈
(γmin, γmax), we have qγ ∈ (0, 1) (see Proposition 4.1).
The next proposition establishes the existence of an optimal
policy, of problem P1, that satisfies all its the constraints, with
equality.
optimal solution φopt = {φopt
p(k) · φopt(k) = d · qγ
k , k ≥ 1} such that (cid:80)
then problem P1 has an
k≥1 k ·
Proposition 4.3: If α2 > α1,
Proof: In Appendix D-A.
From Proposition 4.3, we can see that problem P1 has an
optimal solution that satisfies all its constraints with equality.
Therefore, to obtain a solution of problem P1, we restrict our
search to the set of policies that satisfy the constraints of
problem P1 with equality. Subsequently, a change of variable
gives us the following linear program
d · qγ ·(cid:88)
νk · µk(qγ)
νk = 1 and 0 ≤ νk ≤ k · p(k)
d · qγ
k≥1
(9)
∀k ≥ 1
P2 : min
Subject to: (cid:88)
{νk,k≥1}
k≥1
k
where µk(qγ) = sk(qγ )·ck
. The following proposition es-
tablishes a crucial relation between the optimal solutions of
problems P1 and P2.
k , k ≥ 1} be an optimal solution
of problem P2. If α2 > α1, then we can obtain an optimal
solution of problem P1 as follows
Proposition 4.4: Let {νopt
(cid:40)
φopt(k) =
0
k ·d·qγ
νopt
k·p(k)
if p(k) = 0
otherwise
Proof: In Appendix D-B.
Therefore, to obtain an optimal solution of problem P1, we
just need to solve P2 and apply Proposition 4.4. Problem P2
is a linear program and can be solved by any well-known LP-
solver in polynomial time (O((kmax)3.5) time, where kmax
is the maximum node degree in the network)[23]. However,
we exploit the rich structure of this problem and solve it in
linearithmic time O(kmax · log(kmax))
Let S = {1, 2,··· , kmax}. Here, kmax is the maximum
degree of the network. Consider a permutation σ : S → S
such that if k1 < k2, then µσ(k1)(qγ) ≤ µσ(k2)(qγ), i.e.,
µσ(1)(qγ) ≤ µσ(2)(qγ) ≤ ··· ≤ µσ(kmax)(qγ). The permu-
tation σ can be obtained in O(kmax · log(kmax)) time by
sorting the set {µk(qγ), k ≥ 1} in ascending order. Using
this order, we can obtain an optimal solution νa of problem
P2 in Θ(kmax) time by following the steps in Algorithm 2.
k denotes the kth component of vector
νa. We illustrate the principle behind Algorithm 2 using a
σ(j) can be interpreted as a
jar filling analogy. Variable νa
jar with capacity σ(j)·p(σ(j))
. The for loop in the algorithm
is equivalent to filling these jars with water from another
jar of unit capacity, in an ascending order, as given by the
In Algorithm 2, νa
d·qγ
6
(cid:110)
Algorithm 2 Algorithm to compute optimal solution of P2
1: res := 1 and νa := [0, 0,··· , 0] -- a 1 × kmax vector
2: for j ∈ [1, 2,··· , kmax] do
3:
4:
5:
end if
6:
7: end for
8: return νa
if res > 0 then
νa
σ(j) = min
res := res − νa
res, σ(j)·p(σ(j))
(cid:111)
d·qγ
σ(j)
permutation σ. From steps 1, and 4 − 5 of Algorithm 2, it is
easy to see that νa is a feasible solution of problem P2. The
optimality of νa with respect to problem P2 is established by
the following proposition.
Proposition 4.5: The vector νa returned by Algorithm 2 is
an optimal solution of problem P2.
Proof: In Appendix E.
V. CASCADE SIZE MAXIMIZATION UNDER BUDGET
CONSTRAINT
In this section, we consider the challenge faced by a
resource-constrained campaigner. The campaigner desires to
maximize the campaign size, but is constrained by limited
resources. Let c denote the limit on the expected incentiviza-
tion cost. Then, we can formulate the cost-constrained cascade
maximization problem as follows
P3 : max
0≤φ≤1
Subject to: (cid:88)
(cid:88)
k≥1
and q =
1
d
s(q)
ck · p(k)φ(k)sk(q) ≤ c
k · p(k) · φ(k)
k≥1
A. Solution approach
Let sopt be the optimum value of problem P3. From Propo-
sition 4.1, we know that there exists a unique qopt ∈ (0, 1)
such that s(qopt) = sopt. From Proposition 4.1, we know that
∂s(q)
∂q > 0, i.e., s(q) is a monotonically increasing bijection.
Therefore, it can be argued that qopt can be obtained by solving
the following optimization problem
Subject to:(cid:88)
P4 : max
0≤φ≤1
q
ck · p(k)φ(k)sk(q) ≤ c
k≥1
(cid:88)
1
d
and q =
k≥1
Let us define µk(q) = sk(q)·ck
k
k · p(k) · φ(k)
and νk(q) = k·p(k)·φ(k)
.
d·q
Then, problem P4 can be re-written as follows
ν,q∈(0,1)
P5 : max
Subject to: d · q ·(cid:88)
νk(q) = 1 and 0 ≤ νk(q) ≤ k · p(k)
d · q
q
νk(q) · µk(q) ≤ c
k≥1
∀ k ≥ 1
(cid:88)
k≥1
Now, given a q ∈ (0, 1), consider the following criteria
(1) d · q ·(cid:80)
(2) (cid:80)
k≥1 νk(q) · µk(q) ≤ c
∀k ≥ 1
k≥1 νk(q) = 1
(3) 0 ≤ νk(q) ≤ k·p(k)
d·q
If we can find a vector ν that satisfies the above criteria,
then the 2-tuple (ν, q) is a feasible solution of problem P5. Let
νa(q) be the vector output by Algorithm 2 when qγ is set to q.
From Proposition 4.5, we know that this vector minimizes the
LHS of criterion (1) subject to criteria (2) and (3). Therefore, if
k (q)·µk(q) > c, then for the given value
of q, no vector ν can satisfy criterion (1). Now, let νa(q +∆q)
be the vector output by Algorithm 2 when qγ is set to q + ∆q.
k (q) · µk(q) > c, then
we have d·q·(cid:80)
Then, for any ∆q > 0, if d · q ·(cid:80)
k≥1 νa
k≥1 νa
(cid:88)
we have
c < d · q
k (q) · µk(q)
νa
k≥1
(b)≤ d · (q + ∆q) ·(cid:88)
k≥1
(a)≤ d · q ·(cid:88)
k≥1
k (q + ∆q) · µk(q)
νa
k (q + ∆q) · µk(q + ∆q)
νa
(10)
where Inequality (a) follows because the vector νa(q) is an
optimal solution and νa(q + ∆q) is just a feasible point at q,
∂q ≥ 0
and Inequality (b) follows because ∂µk(q)
(see Proposition 4.2). From Inequality 10 we can conclude that
if there does not exist a vector ν that satisfies criteria (1)-(3)
for some q ∈ (0, 1), then no vector satisfies these criteria for
(cid:48) ∈ (q, 1). Therefore, the optimal value qopt is given by
any q
the largest value of q in [0, 1] such that vector νa(q) satisfies
criteria (1), and can be computed using the following algorithm
k · ∂sk(q)
∂q = ck
qmp := (q1 + q2)/2
Set qγ = qmp in Algorithm 2 and obtain νa(qmp)
if d · qmp ·(cid:80)
Algorithm 3 Algorithm to compute optimum of P3
1: Set q1 := 0 and q2 := 1
2: while s(q1) − s(q2) > do
3:
4:
5:
6:
7:
8:
9:
10: end while
11: Return qopt := (q1 + q2)/2
k (qmp) · µk(qmp) > c then
q2 := qmp
q1 := qmp
k≥1 νa
end if
else
Algorithm 3 does a line search to find the largest values of
q ∈ [0, 1] such that the tuple (νa(q), q) meets criteria (1)-(3).
VI. SIMULATION AND NUMERICAL EVALUATIONS
We formulated and solved the optimization problems assum-
ing an uncorrelated, locally tree-like and connected network.
However, real world social networks may contain triads, loops,
multiple connected components, and need not be uncorrelated.
Despite such differences, we show that, in most cases, our
analytical results closely match the simulations on real world
social networks. We evaluate our analytical results on two
very different networks: Gnutella [24] -- a p2p file sharing
network, and Hamsterster [25] -- a social network for people
with pet hamsters. Table II presents a few statistical measures
of these networks. The degree distributions of these networks
7
Fig. 2. Degree distribution of network A (Gnutella network); the thick black
line denotes the best fit of the power law to the degree distribution.
Fig. 3. Degree distribution of network B (Hamsterster network); the thick
black line denotes the best fit of the power law to the degree distribution.
3. All simulations are
are displayed in Figures
averaged over 10000 runs. To enhance legibility, error bars
are suppressed in all the plots.
2 and
SIMPLE PARAMETERS OF THE TWO REAL-WORLD NETWORKS USED FOR
TABLE II
SIMULATIONS.
Network A
Network B
p2p-Gnutella08 [24]
Hamsterster [25]
Network category
Peer-to-peer
Source
Nodes
Edges
Maximum degree
Average degree
Number of triangles
Clustering coefficient
Connected components
6301
20777
273
6.59
2383
0.01
2
Social
2426
16631
97
13.71
53265
0.51
148
We first evaluate the correctness of the analytical calculation
of the campaign size, i.e., s(q). The simulation plots were
generated by considering a linear threshold model where nodes
register if at least 50% of their neighbours are active. We
assume that 30% of the nodes in the network were zealous.
For a different values of q, we studied three schemes: φall
-- incentivizing all nodes equally with probability q, φhigh
-- incentivizing nodes starting from the highest degree till
degree k(cid:48) such that q = 1
k≥k(cid:48) p(k)φhigh(k), and φlow --
incentivizing nodes starting from the lowest degree till degree
k(cid:48) such that q = 1
1≤k≤k(cid:48) p(k)φhigh(k). The analytical
results were obtained by extracting the degree distribution
from the networks.
(cid:80)
(cid:80)
The number of triangles in the p2p Gnutella network is
very small, which is also reflected in the clustering coefficient.
Therefore, the Gnutella network is very similar to a locally
d
d
1 10 100 1000 1 10 100Number of NodesDegree 1 10 100 1 10 100Number of NodesDegree8
Fig. 4. Analytical and simulated values of s(q) on network A (Gnutella
network).
Fig. 7. Analytical and simulated values of average cost vs. γ for network B
(Hamsterster network).
Fig. 5. Analytical and simulated values of s(q) on network B (Hamsterster
network).
Fig. 8. Analytical and simulated values of cascade size vs. c for network A
(Gnutella network).
compute the solution φ and the average cost. We then simulate
the linear threshold process (nodes register if at least 50%
of their neighbours are active) on the respective real world
networks using the analytical solution φ, and compare the
average cost obtained from analysis and simulations (see Fig. 6
and Fig. 7). Similarly, for the campaign size maximization
problem we analytically compute φ and size s for a given cost
budget c. The analytical solution is then used in the simulation
of cascade maximization problem (see Fig. 8 and Fig. 9).
As observed in Fig. 6 and 7, the analytical average cost
is in excellent agreement with the simulated one for different
values of α1, α2 and γ, on both the networks. Similarly Fig.
8 and 9 show an excellent match between simulation and
analytical computation of campaign size in almost all the
plots. For large values of α1 and α2, the simulated campaign
size in the Hamsterster network is larger than the analytically
computed campaign size. This may in part be due to the large
number of triangles in the network. This suggests that in social
networks containing large number of triangles and loops, the
analytically computed size represents a lower bound.
Fig. 6. Analytical and simulated values of average cost vs. γ for network
A (Gnutella network).
tree-like network. As consequence of this, for the Gnutella
network, the simulation and analytical results are in excellent
agreement with each other (see Fig. 4). On the other hand,
one can observe a deviation of the simulation results from
the analytical on Hamsterster for large values of q (see
Fig. 5). This behaviour may in part be due to the presence
of significant number of triangles and loops in the network.
Next, we consider a linear incentive structure, where an
incentivized node obtains a unit reward per neighbour, i.e.,
ck = k, ∀ k ≥ 1. For the cost minimization problem,
for a given γ, using the degree distributions, we analytically
0.32 0.34 0.36 0.38 0.4 0.42 0.44 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1s(q)qAnalyticalSimulation (all nodes incentivized)Simulation (low degree nodes incentivized)Simulation (high degree nodes incentivized) 0.31 0.32 0.33 0.34 0.35 0.36 0.37 0.38 0.39 0.4 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1s(q)qAnalyticalSimulation (all nodes incentivized)Simulation (low degree nodes incentivized)Simulation (high degree nodes incentivized) 0 0.75 1.5 2.25 0.324 0.326 0.328 0.33 0.332 0.334 0.336 0.338 0.34α1=0.2, α2=0.3AnalyticalSimulation 0 0.75 1.5 2.25 3 0.32 0.34 0.36 0.38 0.4 0.42 0.44 0.46Average costα1=0.2, α2=0.8 0 0.75 1.5 2.25 3 0.41 0.415 0.42 0.425 0.43 0.435 0.44 0.445γα1=0.7, α2=0.8 0 1.5 3 4.5 0.314 0.315 0.316 0.317 0.318 0.319 0.32 0.321 0.322 0.323 0.324α1=0.2, α2=0.3AnalyticalSimulation 0 1.5 3 4.5 6 0.31 0.32 0.33 0.34 0.35 0.36 0.37 0.38 0.39 0.4Average costα1=0.2, α2=0.8 0 1.5 3 4.5 6 0.375 0.38 0.385 0.39 0.395 0.4γα1=0.7, α2=0.8 0.32 0.325 0.33 0.335 0.34 0 0.5 1 1.5 2 2.5α1=0.2, α2=0.3AnalyticalSimulation 0.3 0.35 0.4 0.45 0 0.5 1 1.5 2 2.5Cascade sizec-α1=0.2, α2=0.8 0.4 0.41 0.42 0.43 0.44 0.45 0 0.5 1 1.5 2 2.5α1=0.7, α2=0.89
(ii) Let Z(n, p1) and Z(n, p2) be two binomial random
variable with parameters (n, p1) and (n, p2), then for
any n ∈ N, Z(n, p1) ≤st Z(n, p2) if p1 ≤ p2.
Proof: Part (i): By comparing the complementary cumu-
lative distribution function of the two random variable, and by
applying the definition of usual stochastic order.
Part (ii): A binomial random variable with parameter (n, p)
is the sum of n i.i.d. Bernoulli random variable with parameter
p. Now, the result follows from an application of Part (i), and
due to the fact that stochastic order is closed under convolution
(Theorem A.2).
We also use some results from the theory of stochastic
convexity in our proofs. For the sake of completeness, we
reproduce some definitions and theorems from [26]. Let
{X(θ), θ ∈ Θ} be a parametrized collection of random
variables. We say
(a) {X(θ), θ ∈ Θ} is stochastically increasing (SI)
if
E[ψ(X(θ))] is non-decreasing in θ for all non-decreasing
functions ψ.
(b) {X(θ), θ ∈ Θ} is stochastically increasing and convex
(SICX) if {X(θ), θ ∈ Θ} ∈ SI and E[ψ(X(θ))] is non-
decreasing and convex in θ for all non-decreasing convex
functions ψ.
(c) {X(θ), θ ∈ Θ} is stochastically increasing and linear
(SIL) if {X(θ), θ ∈ Θ} ∈ SICX and E[ψ(X(θ))] is
non-decreasing and concave in θ for all non-decreasing
concave functions ψ.
Note that, by definition, we have {X(θ), θ ∈ Θ} ∈ SIL ⇒
{X(θ), θ ∈ Θ} ∈ SICX.
Lemma A.2: Let X(n, p) be a binomial random variable
with parameters (n, p). Then, {X(n, p), p ∈ (0, 1)} ∈ SICX.
Proof: By combining example Example 8.B.3 and Theo-
rem 8.B.9 of [26], it can shown that {X(n, p), p ∈ (0, 1)} ∈
SIL. Then, due to the fact that SIL ⇒ SICX, the lemma
follows.
Theorem A.3: Suppose {X(θ), θ ∈ Θ} and {Y (θ), θ ∈ Θ}
are two collection of random variables such that X(θ) and
Y (θ) are independent for each θ. If {X(θ), θ ∈ Θ} ∈ SICX
and {Y (θ), θ ∈ Θ} ∈ SICX, then {X(θ) + Y (θ), θ ∈ Θ} ∈
SICX.
Proof: Refer the proof of Theorem 8.A.15 in [26].
Theorem A.4: Suppose that for each θ ∈ Θ, the support of
X(θ) is in N. Then, {X(θ), θ ∈ Θ} ∈ SICX if and only if
{X(θ), θ ∈ Θ} ∈ SI and P [X(θ) > m] is non-decreasing
and convex in θ for all m ∈ N.
Proof: Refer the proof of Theorem 8.A.10 in [26].
APPENDIX B
EXISTENCE AND UNIQUENESS OF THE FIXED POINT
In this section, we show that for any q ∈ [0, 1], the fixed
point Equation 3 has a unique solution. The proof in this
section is split into two parts. In the first part, we show that
function f (q, u) is monotonically increasing and convex in u.
In the section part, we use the result of the first part to establish
the existence and uniqueness of the fixed point.
Fig. 9. Analytical and simulated values of cascade size vs. c for network B
(Hamsterster network).
VII. CONCLUSION
In this paper, we have studied the problem of campaigning
in social networks by offering incentives for referrals. We used
ideas from percolation theory to compute the campaign size,
which was then used to formulate two optimization problems.
These problems were not amenable to traditional solutions
since they involved a fixed point equation whose solution
was analytically intractable. We used results from reliability
theory to establish some key properties of the fixed point that
enabled us to solve these problems with simple algorithms
having linearithmic time complexity. Although we assumed
an uncorrelated and locally tree-like network in the analysis,
through extensive simulations on real world social networks,
we showed that our analytical results are applicable in real
world networks.
APPENDIX A
SOME RESULTS FROM RELIABILITY THEORY
In this paper, we prove several propositions using the theory
of stochastic order.. Let X and Y be two random variables.
Then, X is said to be smaller than Y in the usual stochastic
order (denoted by X ≤st Y ) [26] if and only if
P [X > x] ≤ P [Y > x] ∀x ∈ (−∞,∞)
Next, we present two theorem from [26] without proof, and
a lemma. We will use these theorems and lemma in several of
our proofs.
Theorem A.1: X ≤st Y if and only if E[ψ(X)] ≤ E[ψ(Y )]
holds for all non-decreasing functions ψ for which the expec-
tation exists.
Proof: Refer Chapter 1 of [26].
Theorem A.2: The usual stochastic order is closed under
+
convolutions, i.e., If X ≤st Y and X
X ≤st Y
(cid:48) ≤st Y
, then X
(cid:48)
(cid:48)
+ Y .
(cid:48)
Proof: Refer Chapter 1 of [26].
Lemma A.1:
(i) Let I(p1) and I(p2) be two Bernoulli
then
random variable with parameters p1 and p2,
I(p1) ≤st I(p2) if and only if p1 ≤ p2.
0.31 0.315 0.32 0.325 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5α1=0.2, α2=0.3AnalyticalSimulation 0.3 0.35 0.4 0.45 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5Cascade sizec-α1=0.2, α2=0.8 0.36 0.38 0.4 0.42 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5α1=0.7, α2=0.810
f (q, u) − u. It is easy to see that u0 is a fixed point of
Equation 3 if and only if f 0(u0) = 0. By differentiating f 0(u)
∂u2 ≥ 0, i.e.,
with respect to u twice, we get ∂2f 0(u)
f 0 is a convex function of u. We also have
∂u2 = ∂2f (q,u)
f 0(0) = f (q, 0) =
f 0(1) = f (q, 1) − 1
(b)
< 0
pex(k) · pth(0k + 1)
(a)
> 0
k≥0
(cid:88)
where Inequality (a) follows because the network is connected
and the fraction of zealous nodes lies in the open interval
(0, 1), and Inequality (b) follows because the f (q, 1) is a
convex combination of non-negative terms less or equal to
1 (some terms are strictly less that 1). Since f 0(0) > 0 and
f 0(1) < 0, due to the continuity of function f 0, there exist a
point u0 ∈ (0, 1) such that f 0(u0) = 0 i.e., f (q, u0) = u0.
We prove the uniqueness of the fixed point by contradiction.
Now, if u0, u1 ∈ (0, 1) are two fixed points of Equation (3),
then we should have f 0(u0) = f 0(u1) = 0. Without loss of
generality, let us assume that 0 < u0 < u1 < 1. Now, choose
positive real numbers u2 ∈ (u1, 1) and λ ∈ (0, 1) such that
f 0(u2) < 0 and u1 = λu0 + (1 − λ)u2. Then, we have
f 0(λu0 + (1 − λ)u2) = f 0(u1) = 0 and
λf 0(u0) + (1 − λ)f 0(u2) = (1 − λ)f 0(u2) < 0
=⇒ f 0(λu0 + (1 − λ)u2)
Inequality (c) contradicts the convex nature of function f 0.
> λf 0(u0) + (1 − λ)f 0(u2)
(c)
Thus, in turn, establishes the uniqueness of the fixed point.
APPENDIX C
INCREASING NATURE OF THE FIXED POINT
A. Proof of Proposition 3.1
Then,
The differentiability of f (q, u) follows from its definition. In
this section, we show that f (q, u) is monotonically increasing
and convex in u ∈ (0, 1). To show this, we use the theory of
stochastic convexity.
Let {X(k2, α2u), u ∈ (0, 1)} and {Y (k − k2, α1u), u ∈
(0, 1)} be two collection of independent binomial random
variables with parameters (k2, α2u) and (k − k2, α1u), re-
spectively.
from Lemma A.2, we have {X(k2, α2u), u ∈
(0, 1)} ∈ SICX and {Y (k − k2, α1u), u ∈ (0, 1)} ∈ SICX.
Since the random variables are independent, an application of
Theorem A.3 gives us {X(k2, α2u) + Y (k − k2, α1u), u ∈
(0, 1)} ∈ SICX. Now, by applying Theorem A.4 we can
conclude that
(1) {X(k2, α2u) + Y (k − k2, α1u), u ∈ (0, 1)} ∈ SI.
(2) P [X(k2, α2u)+Y (k−k2, α1u) > m] is a non-decreasing
convex function of u ∈ (0, 1) for all m ∈ N.
Let h(u, k, k2, m) = P [X(k2, α2u)+Y (k−k2, α1u) > m].
We note that function h(u, k, k2, m) is non-decreasing and
convex in u. Since the network is connected and the frac-
tion of zealous nodes lies in the open interval (0, 1), there
exists positive integers k0, m0 such that m0 ∈ (0, k0] and
pex(k0)pth(m0k0 + 1) > 0. Therefore, we have
∂f (q, u)
(cid:88)
k(cid:88)
(cid:88)
pth(mk + 1) ·
p(k2k)·
=
pex(k)
∂u
∂h(u, k, k2, m)
k≥1
∂u
+ pex(k0)pth(m0k0 + 1)
m≥1
· (1 − I{k=k0,m=m0,k2=k})
k2=0
∂P [X(k0, uα2) ≥ m0]
(a)
> 0
∂u
where Inequality (a)
follows because h(u, k, k2, m) and
P [X(k0, uα2) ≥ m0], m0 ∈ (0, k0] are non-decreasing and
monotonically increasing functions of u, respectively. Simi-
larly, we have
(cid:88)
k≥1
(cid:88)
m≥0
∂2f (q, u)
∂u2
=
pex(k)
pth(mk + 1)
∂2h(u, k, k2, m)
∂u2
k2=0
(b)≥ 0
where Inequality (a) follows because h(u, k, k2, m) is convex
in u.
B. Proof of Proposition 3.2
We recollect that u denotes the probability of finding a
registered node by following an arbitrary link of the network.
Nodes with zero threshold do not need any recommendations,
and are registered from the start of the campaign. Thus, if
every node has threshold value zero, then the entire network
is registered and we have u = 1. On the other hand, nodes
with non-zero threshold have to be recommended by active
nodes to register. Therefore, if all nodes in the network have
non-zero threshold, then there are no node from which the
campaign can start. Hence, in such scenarios, we have u = 0.
Now, let us consider the case when the fraction of zealous
nodes lies in the interval (0, 1). Let us define f 0(u) =
k(cid:88)
First we introduce some notation and present some prelimi-
nary observations. We will use these observations in the proof
of Proposition 3.3. Let
(cid:19)
qk2 (1 − q)k−k2P [Xk2 + Yk−k2 ≥ m]
(cid:18) k
k(cid:88)
p(k2k)·
hm,k(q) =
k2
k2=0
where random variables Xk2 and Yk−k2 are independent and
have a binomial distribution with parameters (k2, α2u) and
(k − k2, α1u), respectively. The first step in the proof of
Proposition 3.3 is to show that for any m ∈ Z+, P [Xk2 +
Yk−k2 ≥ m] is a non-decreasing function of k2 ∈ [0, k]. Let
ϕm,k(k2) = P [Xk2 + Yk−k2 ≥ m] ∀k2 ∈ [0, k]
We note that if u ∈ (0, 1] then ϕm,k(k2) = 0 only if m > k,
i.e., if the number of active neighbours is greater than the node
degree.
Lemma C.1: For any m, k ∈ Z+, ϕm,k(k2) is non-
decreasing function of k2 ∈ [0, k].
2 ∈ [0, k]. Without loss
(cid:48)
2 > k2 and define the following random
Proof: Consider two integers k2, k
(cid:48)
of generality, let k
variables
Wk2 = Xk2 + Yk−k2
and Wk
(cid:48)
2
= Xk
(cid:48)
2
+ Yk−k
(cid:48)
2
Then, we have
Wk2 =st Xk2 + Yk−k2
(cid:88)k2
=st
Ii(α2u) +
i=1
(cid:88)k−k2
i=1
Ii(α1u)
where Ii(p) are independent Bernoulli random variable with
parameter p and =st implies equality in distribution [26].
Therefore, for any k
2 ∈ [0, k], we have
(cid:48)
(cid:48)
2 > k2 and k2, k
(cid:48)
2)+(k
(cid:48)
2−k2)
Wk2 =st
Ii(α2u) +
i=1
(cid:88)k2
(cid:88)k2
(cid:88)k2
(cid:88)k
i=1
(cid:48)
2
i=1
=st
(a)≤ st
i=1
(cid:88)(k−k
(cid:88)k−k
(cid:88)k−k
(cid:88)k−k
i=1
(cid:48)
2
i=1
(cid:48)
2
(cid:48)
2
Ii(α2u) +
Ii(α1u) +
Ii(α1u)
Ii(α2u) +
Ii(α1u) +
Ii(α2u)
(cid:88)k
(cid:88)k
Ii(α1u)
(cid:48)
2−k2
i=1
(cid:48)
2−k2
i=1
(cid:48)
2
i=1
i=1
Ii(α2u) +
Ii(α1u) =st Wk
=st
where Inequality (a) follows because α1 < α2 ⇒ α1u ≤ α2u,
and due to Lemma A.1. Hence, we have established that for
. Thus,
k2, k
∀m ∈ Z+ and k
ϕm,k(k2) = P [Xk2 + Yk−k2 ≥ m] = P [Wk2 ≥ m]
2 > k2, we have Wk2 ≤st Wk
2 ∈ [0, k] and k
(cid:48)
2 > k2, we have
(cid:48)
2
(cid:48)
(cid:48)
(b)≤ P [Wk
(cid:48)
2
≥ m] = P [Xk
(cid:48)
2
+ Yk−k
(cid:48)
2
≥ m] = ϕm,k(k
(cid:48)
2)
where Inequality (b) follows because Wk2 ≤st Wk
. Thus,
we have shown that ϕm,k(k2) is a non-decreasing function of
k2 ∈ [0, k].
Now, let us define
(cid:48)
2
ψm,k(k2) =
k · ϕm,k(k2)
(k − k2)
∀k2 ∈ [0, k − 1]
Due to Lemma C.1, we can conclude that for any m, k ∈
Z+, ψm,k(k2) is also a non-decreasing function of k2 ∈ [0, k−
1]. Next, establish that the function f (q, u) is monotonically
increasing in q.
Proposition C.1: If α2 > α1, then ∂f (q,u)
∂q > 0.
Proof:
hm,k(q) =
(cid:88)k−1
=
k2=0
= (1 − q)
(cid:19)
k2=0
(cid:18) k
k(cid:88)
(cid:19)
(cid:18) k
(cid:88)k−1
k2
(cid:18)k − 1
(cid:19)
k2=0
k2
qk2(1 − q)k−k2 P [Xk2 + Yk−k2 ≥ m]
k2
qk2 (1 − q)k−k2P [Xk2 + Yk−k2 ≥ m]
+ qm · P [Xk ≥ m]
qk2 (1 − q)k−k2 · ψm,k(k2)
+ qm · P [Xk ≥ m]
= (1 − q) · E[ψm,k(Z(k − 1, q))] + qm · P [Xk ≥ m]
where Z(k − 1, q) is a binomial random variable with param-
eters (k − 1, q).
Now, consider two real numbers q1, q2 ∈ [0, 1] such that
q1 < q2. Then, we have
11
hm,k(q1) = (1 − q1)E[ψm,k(Z(k − 1, q1))]
+ (q1)mP [Xk ≥ m]
(a)≤ (1 − q1)E[ψm,k(Z(k − 1, q1))] + (q2)mP [Xk ≥ m]
(b)≤ (1 − q1)E[ψm,k(Z(k − 1, q2))] + (q2)mP [Xk ≥ m]
= (1 − q2)E[ψm,k(Z(k − 1, q2))] + (q2)mP [Xk ≥ m]
+ (q2 − q1)E[ψm,k(Z(k − 1, q2))]
= hm,k(q2) + (q2 − q1)E[ψm,k(Z(k − 1, q2))]
(11)
where
(a) follows because q1 < q2.
(b) since q1 < q2, we have Z(k − 1, q1) ≤st Z(k − 1, q2)
(Lemma A.1). Therefore, due to the non-decreasing nature
of function ψm,k, we have E[ψm,k(Z(k − 1, q1))] ≤
E[ψm,k(Z(k − 1, q2))] (Theorem A.1).
Also, from the definition, we also have
hm,k(q1) = E[ϕm,k(Z(k, q1))]
(c)≤ E[ϕm,k(Z(k, q2))] = hm,k(q2)
(12)
follows because of Lemma A.1,
where Inequality (c)
Lemma C.1 and Theorem A.1.
From Equations (11) and (12), we can see that for any
q1, q2 ∈ [0, 1] such that q1 < q2, we have hm,k(q1) =
hm,k(q2) if and only if E[ψm,k(Z(k − 1, q2))] = 0. From the
definition of function ψm,k, we can see that E[ψm,k(Z(k −
1, q2))] = 0 if and only if m > k. Thus, if m ∈ [0, k], then
we can conclude that hm,k(q1) < hm,k(q2).
k≥1
m≥1
(cid:88)
(cid:88)
f (q1, u) = z0 +
Thus, we have
pex(k)pth(mk + 1)hm,k(q1)
Since the network is connected and the fraction of
there ex-
zealous nodes lies in the open interval (0, 1),
ists positive integers k0, m0 such that m0 ∈ (0, k0] and
pex(k0)pth(m0k0 + 1) > 0. Therefore, for q1, q2 ∈ [0, 1]
z0 =(cid:80)
such that q1 < q2, we have hm0,k0 (q1) < hm0,k0(q2). Let
k≥1 pex(k)pth(0k + 1) -- fraction of zealous nodes.
(cid:88)
(cid:88)
(cid:88)
(cid:88)
(cid:88)
≤(cid:88)
(cid:41))
pex(k)pth(mk + 1)hm,k(q1)(1 − I(cid:40)
+ pex(k0)pth(m0k0 + 1) · hm0,k0(q1) + z0
pex(k)pth(mk + 1)hm,k(q1)(1 − I(cid:40)
(cid:41))
+ pex(k0)pth(m0k0 + 1) · hm0,k0(q2) + z0
(cid:41))
pex(k)pth(mk + 1)hm,k(q2)(1 − I(cid:40)
+ pex(k0)pth(m0k0 + 1) · hm0,k0(q2) + z0
m=m0
k=k0
m=m0
k=k0
m=m0
k=k0
m≥1
m≥1
m≥1
k≥1
k≥1
k≥1
=
<
= f (q2, u)
i.e., for q1, q2 ∈ [0, 1] such that q1 < q2, we have f (q1, u) <
f (q2, u).
A. Proof of Proposition 3.3
The continuity of the fixed point follows from the fact that
function f (·, u) is a continuous map for all u ∈ [0, 1]. To prove
the increasing nature of the fixed point, we use the implicit
function theorem.
Let f 0(q, u) = f (q, u) − u. According to the implicit
function theorem, when f 0(q, u) = 0, we have
= −
du
dq
∂f 0(q,u)
∂q
∂f 0(q,u)
∂u
=
∂f (q,u)
∂q
1 − ∂f (q,u)
∂u
(cid:16)
(cid:17)
From Proposition 3.2, we know that for every q ∈ [0, 1],
there is a unique fixed point uq ∈ (0, 1) that satisfies
f (q, uq) = uq i.e., f 0(q, uq) = 0. Therefore, we have
duq
dq
=
(cid:18)
∂f (q,uq)
∂q
1 − ∂f (q,u)
∂u
(cid:19)
(cid:12)(cid:12)(cid:12)u=uq
From Proposition C.1, we know that ∂f (q,u)
(0, 1). Since uq ∈ (0, 1), we have ∂f (q,uq)
Proposition 3.3, we just need to show that ∂f (q,u)
> 0,∀u ∈
∂q > 0. Now, to prove
< 1.
(cid:12)(cid:12)(cid:12)u=uq
∂u
∂q
(a)
We show this by contradiction. We note that f (q, 1)
< 1,
where Inequality (a) follows because the f (q, 1) is a convex
combination of non-negative terms less than or equal to 1
(some terms are strictly less that 1). Since the function f (q, u)
is continuous and non-decreasing in u (see Proposition 3.1),
(cid:48)
(cid:48)
(cid:48)
q.
there exists a point u
q) < u
We note that the function f (q, u) is convex in u ∈ (0, 1) (see
≥ 1.
Proposition 3.1). Now, let us assume that ∂f (q,u)
Then, from the definition of convex functions, we have
q ∈ (uq, 1) such that f (q, u
∂u
(cid:12)(cid:12)(cid:12)u=uq
(cid:12)(cid:12)(cid:12)u=uq
(cid:48)
f (q, u
q) ≥ f (q, uq) + (u
≥ f (q, uq) + (u
(cid:48)
(cid:48)
q − uq) · ∂f (q, u)
q − uq)
q − uq) = u
∂u
(cid:48)
q
(cid:48)
(b)
= uq + (u
(cid:48)
q
(c)≥ u
⇒ f (q, u
(cid:48)
q)
where Inequality (b) follows because we have f (q, uq) = uq.
(cid:48)
q.
Since this contradiction was due to the assumption that
∂f (q,u)
< 1. This,
≥ 1, we should have ∂f (q,u)
Inequality (c) contradicts the fact
(cid:48)
that f (q, u
q) < u
(cid:12)(cid:12)(cid:12)u=uq
(cid:12)(cid:12)(cid:12)u=uq
∂u
∂u
in turn, establishes that duq
dq > 0.
APPENDIX D
EQUIVALENCE TO THE LINEAR PROGRAM
In this section, we prove the equivalence between problems
P1 and P2 presented in Section IV
A. Proof of Proposition 4.3
optimal solution of problem P1. If we have (cid:80)
Let the value of the objective of problem P1 for incentive-
k, k ≥ 1} be an
k≥1 k · p(k) ·
policy φ be denoted as c(φ). Let φo = {φo
φo(k) = d · qγ, then we can choose φopt = φo.
12
So, let us assume that 1
d
(cid:80)
k≥1 k · p(k) · φo(k) = qo > qγ.
Our goal to obtain a policy φopt from φo without increasing
(cid:88)
the cost. Let φopt = qγ
qo φo. Then, we have
(cid:88)
k · p(k) · φo(k) = qγ (13)
kp(k) · φopt(k) =
qγ
qod
k≥1
1
d
k≥1
and 0 ≤ φopt ≤ φo ≤ 1
(14)
From Equality (13) and Inequality (14) we can see that φopt
is a feasible solution of problem P1. Further, we also have
c(φo) =
(cid:88)
(a)≥ (cid:88)
(b)≥ (cid:88)
= c(φopt)
k≥1
k≥1
k≥1
ck · p(k) · φo(k) · sk(qo)
ck · p(k) · φopt(k) · sk(qo)
ck · p(k) · φopt(k) · sk(qγ)
(c)≥ c(φo) ⇒ c(φo) = c(φopt)
where Inequality (a) follows because φopt ≤ φo, Inequality (b)
follows because q0 > qγ and sk(q) is non-decreasing in q
(Proposition 4.2), and Inequality (c) follows because φo is an
optimal solution of problem P1.
Since the cost for policies φo and φopt are equal, and φo
is an optimal policy, we can conclude that policy φopt is also
an optimal solution of problem P1.
B. Proof of Proposition 4.4
k , k ≥ 1} be an optimal solution of problem
Let νopt = {νopt
P2. Let us define
φf (k) =
0
k ·d·qγ
νopt
k·p(k)
Then, we have
(cid:88)
1
d
k≥1
k · p(k) · φf (k) = qγ
0 < 1
k ·d·qγ
νopt
k·p(k)
φf (k) =
if p(k) = 0
otherwise
(cid:88)
νopt
k
(a)
= qγ
k≥1
if p(k) = 0
(b)≤ 1
otherwise
(15)
(16)
(cid:40)
where Equality (a) and Inequality (b)
follows because
{νopt
k , k ≥ 1} is a feasible solution of problem P2. From
Equality (15) and Inequality (16), we can conclude that φf is
a feasible solution of problem P1.
k , k ≥ 1} be an optimal solution
k≥1 k · p(k) · φopt(k) = d · qγ.
The existence of such an optimal policy is guaranteed by
Proposition 4.3. Let us define
of problem P1 such that (cid:80)
Now, let φopt = {φopt
k · p(k) · φopt
k
d · qγ
Then, we have(cid:80)
νf (k) =
k≥1 νf (k) =(cid:80)
νk =
k·p(k)·φopt
k
d·qγ
≤ k·p(k)
d·qγ
k·p(k)·φopt
= 1 and 0 ≤
. Hence, νf is a feasible solution of
k≥1
d·qγ
k
problem P2. Further, we also have
ckp(k)φopt(k)sk(qγ) ≤(cid:88)
(cid:88)
k≥1
· µk(qγ) ≤ d · qγ
νopt
k
(cid:88)
k≥1
ckp(k)φopt(k)sk(qγ)
k≥1
= d · qγ
(cid:88)
(cid:88)
⇒(cid:88)
k≥1
=
k≥1
(cid:88)
k≥1
⇒ φf is an optimal solution of problem P1.
ckp(k)φopt(k)sk(qγ) =
ckp(k)φf (k)sk(qγ)
ckp(k)φf (k)sk(qγ)
k · µk(qγ)
νf
k≥1
APPENDIX E
OPTIMALITY OF ALGORITHM 2
In this section, we prove that the vector νa returned by
Algorithm 2 is an optimal point of problem P2. However,
as a first step, we prove the following lemma. Let S =
{1, 2,··· , kmax} and kmax is the maximum degree in the
network.
Lemma E.1: Let ν, a 1×kmax vector, be a feasible solution
of problem P2. Then, we have
(cid:88)j0
νa
j=1
σ(j) ≥(cid:88)j0
(cid:26)
j=1
νa
σ(1) = min
Proof: We prove this lemma by induction. For j0 = 1,
we have
σ(1) · p(σ(1))
(cid:27) (a)≥ νσ(1)
let us assume that (cid:80)j1
d · qγ
1,
(17)
(cid:80)j1
(cid:80)j1+1
σ(j) ≥(cid:80)j1+1
where Inequality (a) follows because ν is a feasible solution
σ(j) ≥
of problem P2. Now,
for some j1 ∈ S. We need to show that
j=1 νσ(j).
σ(j1+1) ≥ νσ(j1+1), then the result is trivial.
σ(j1+1) < νσ(j1+1).
j=1 νσ(j)
j=1 νa
If we have νa
Let us therefore consider the case where νa
This implies that
j=1 νa
σ(j1+1) < νσ(j1+1) ≤ σ(j1 + 1) · p(σ(j1 + 1))
νa
⇒ νa
d · qγ
(b)
νa
σ(j)
σ(j1+1)
j=1
where Equality (b) follows because of steps 4 and 5 of
Algorithm 2. Therefore, if νa
σ(j1+1) < νσ(j1+1), then we have
j∈S νσ(j) ≥(cid:88)j1+1
j=1
νσ(j)
(cid:88)j1+1
j=1
νa
σ(j) = 1 =
= 1 −(cid:88)j1
(cid:88)
A. Proof of Proposition 4.5
(cid:80)
Let ν be a feasible solution of problem P2. Since νa
and ν are feasible solutions of problem P2, we have
j≥1 ν(σ(j)) = 1. Let X a and X two
independent random variable taking values from the set S
such that P [X a = j] = νa
and P [X = j] = νσ(j).
σ(j)
Then, from Lemma E.1, we have
j≥1 νa(σ(j)) = (cid:80)
j0(cid:88)
νσ(j) = P [X ≤ j0]
(18)
σ(j) ≥ j0(cid:88)
P [X a ≤ j0] =
νa
j=1
j=1
νσ(j) ∀j0 ∈ S
where Inequality (b) follows by setting ν to νopt in Inequal-
ity (19).
13
From Equation 18 and the definition of usual stochastic
k≥1
orders we can see that X a ≤st X. Therefore, we have
(cid:88)
(cid:88)
=
(cid:88)
(a)≤ E[µσ(X)(qγ)] =
(cid:88)
k · µk(qγ) =
νa
j∈S P [X a = j] · µσ(j)(qγ) = E[µσ(X a)(qγ)]
(cid:88)
j∈S P [X = j] · µσ(j)(qγ)
νk · µk(qγ)
σ(j) · µσ(j)(qγ)
j∈S νσ(j) · µσ(j)(qγ) =
(cid:88)
j∈S νa
k≥1
=
(19)
following inequalities
Let νopt be an optimal solution of P2. Then, we have the
where Inequality (a) follows from an application of The-
orem A.1 (X a ≤st X and µσ(j)(qγ) is a non-decreasing
function of j).
(cid:88)
=⇒(cid:88)
· µk(qγ) ≤(cid:88)
k · µk(qγ)
(cid:88)
νa
k≥1
· µk(qγ) =
(b)≤ (cid:88)
k · µk(qγ)
νa
· µk(qγ)
νopt
k
νopt
k
k≥1
k≥1
νopt
k
k≥1
k≥1
=⇒ νa is an optimal solution of P2
REFERENCES
[1] J. Leskovec, L. Backstrom, and J. Kleinberg, "Meme-tracking and the
dynamics of the news cycle," in Proc. 15th ACM SIGKDD Int. Conf.
Knowledge Discovery and Data Mining, 2009, pp. 497 -- 506.
[2] J. Leskovec, A. Singh, and J. Kleinberg, "Patterns of influence in a
recommendation network," in Advances in Knowledge Discovery and
Data Mining. Springer, 2006, pp. 380 -- 389.
[3] T. N. Dinh, D. T. Nguyen, and M. T. Thai, "Cheap, easy, and massively
effective viral marketing in social networks: truth or fiction?" in Proc.
23rd ACM Conf. Hypertext and Social Media, 2012, pp. 165 -- 174.
[4] D. Houston, "Dropbox - startup lessons learned," Presentation Slides
http://www.slideshare.net/gueste94e4c/dropbox-startup-
avaliable
lessons-learned-3836587, 2010.
at
[5] D. Kempe, J. Kleinberg, and E. Tardos, "Maximizing the spread of
influence through a social network," in Proc. 9th ACM SIGKDD Int.
Conf. Knowledge Discovery and Data Mining, 2003, pp. 137 -- 146.
[6] W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in
social networks," in Proc. 15th ACM SIGKDD Int. Conf. Knowledge
Discovery and Data Mining, 2009, pp. 199 -- 208.
[7] W. Chen, Y. Yuan, and L. Zhang, "Scalable influence maximization in
social networks under the linear threshold model," in Proc. 10th IEEE
Int. Conf. Data Mining (ICDM), 2010, pp. 88 -- 97.
[8] J. Hartline, V. Mirrokni, and M. Sundararajan, "Optimal marketing
strategies over social networks," in Proc. 17th Int. Conf. World Wide
Web, 2008, pp. 189 -- 198.
[9] D. Arthur, R. Motwani, A. Sharma, and Y. Xu, "Pricing strategies for
viral marketing on social networks," in Internet and Network Economics.
Springer, 2009, pp. 101 -- 112.
[10] I. Lobel, E. D. Sadler,
and L. R. Varshney,
social media," Available
"Customer
at
SSRN:
referral
http://ssrn.com/abstract=2520615, 2014.
incentives
and
[11] A. Karnik and P. Dayama, "Optimal control of information epidemics,"
in Proc. 4th IEEE Int. Conf. Communication Systems and Networks
(COMSNETS), 2012, pp. 1 -- 7.
[12] P. Dayama, A. Karnik, and Y. Narahari, "Optimal incentive timing
strategies for product marketing on social networks," in Proc 11th Int.
Conf. Autonomous Agents and Multiagent Systems-Volume 2, 2012, pp.
703 -- 710.
[13] K. Kandhway and J. Kuri, "How to run a campaign: Optimal control of
sis and sir information epidemics," Applied Mathematics and Computa-
tion, vol. 231, no. 0, pp. 79 -- 92, 2014.
[14] -- -- , "Optimal control of information epidemics modeled as maki
thompson rumors," Communications in Nonlinear Science and Numeri-
cal Simulation, vol. 19, no. 12, pp. 4135 -- 4147, 2014.
14
[15] -- -- , "Campaigning in heterogeneous social networks: Optimal control
of si information epidemics," IEEE/ACM Trans. Netw., vol. PP, no. 99,
pp. 1 -- 1, 2014.
[16] A. Barrat, M. Barthelemy, and A. Vespignani, Dynamical processes on
complex networks. Cambridge University Press, 2008.
[17] G. J. Baxter, S. N. Dorogovtsev, A. V. Goltsev, and J. F. Mendes,
"Bootstrap percolation on complex networks," Phys. Rev. E, vol. 82,
no. 1, p. 011103, 2010.
[18] S. N. Dorogovtsev, Lectures on complex networks. Oxford University
Press Oxford, 2010, vol. 24.
[19] M. Granovetter, "Threshold models of collective behavior," American
journal of sociology, pp. 1420 -- 1443, 1978.
[20] M. W. Macy, "Chains of cooperation: Threshold effects in collective
action," American Sociological Review, pp. 730 -- 747, 1991.
[21] V. Mahajan, E. Muller, and F. M. Bass, "New product diffusion models
in marketing: A review and directions for research," in Diffusion of
technologies and social behavior. Springer, 1991, pp. 125 -- 177.
[22] E. Berger, "Dynamic monopolies of constant size," Journal of Combi-
natorial Theory, Series B, vol. 83, no. 2, pp. 191 -- 200, 2001.
[23] N. Karmarkar, "A New Polynomial-time Algorithm for Linear Program-
ming," in Proc. 16th Annu. ACM Symp. Theory of Computing, 1984, pp.
302 -- 311.
[24] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network
dataset collection," http://snap.stanford.edu/data, Jun. 2014.
[25] J. Kunegis, "KONECT Datasets: Koblenz network collection," http://
konect.uni-koblenz.de/, 2015.
[26] M. Shaked and J. G. Shanthikumar, Stochastic Orders. Springer, 2007.
|
1906.07358 | 1 | 1906 | 2019-06-18T03:05:52 | Knowledge Network System (KNS) by Evolutionary Collective Intelligence (ECI): Model, Algorithm and Applications | [
"cs.SI"
] | Aiming at overcoming some inherent drawbacks and bottlenecks encountered by the conventional Knowledge, Recommendation, Search, and Social Systems, in this article we introduce the Knowledge Network System (KNS), a novel type of knowledge graph which is constructed by a new proposed algorithm, the Evolutionary Collective Intelligence (ECI) algorithm. The ECI, an agent-machine interactive algorithm, constructs the KNS by iteratively recommending interesting/matched samples/files to the agents, and meanwhile taking advantages of the collective intelligence of the agents. The ECI based KNS, to the best of our knowledge, is the first attempt in literature that integrates the functions of knowledge network construction, high-quality recommendation, new types of search and social in a same framework. Some real and potential applications of KNS and ECI are discussed, and a real system named VISVA is provided to demonstrate their efficacy. Some open problems for future works are also summarized in the end. | cs.SI | cs | Knowledge Network System (KNS) by
Evolutionary Collective Intelligence (ECI):
Model, Algorithm and Applications
Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu(cid:63)(cid:63)
Visva, Inc. 20410 Town Center Lane, Suite 295 Cupertino, CA 95014, U.S.A.
{taoxiang, zilianghuang, pengbai, congruiji, [email protected] }
Abstract. Aiming at overcoming some inherent drawbacks and bot-
tlenecks encountered by the conventional Knowledge, Recommendation,
Search, and Social Systems, in this article we introduce the Knowl-
edge Network System (KNS), a novel type of knowledge graph which
is constructed by a new proposed algorithm, the Evolutionary Collec-
tive Intelligence (ECI) algorithm. The ECI, an agent-machine interac-
tive algorithm, constructs the KNS by iteratively recommending inter-
esting/matched samples/files to the agents, and meanwhile taking ad-
vantages of the collective intelligence of the agents. The ECI based KNS,
to the best of our knowledge, is the first attempt in literature that in-
tegrates the functions of knowledge network construction, high-quality
recommendation, new types of search and social in a same framework.
Some real and potential applications of KNS and ECI are discussed, and
a real system named VISVA is provided to demonstrate their efficacy.
Some open problems for future works are also summarized in the end.
Keywords: Knowledge Network System, Evolutionary Collective Intel-
ligence, Knowledge System, Recommendation System, Search Engine,
Social Network System, Internet of Things, VISVA
1
Introduction
Nowadays, people query/search/receive information from the Internet by using
a variety of tools, Knowledge System such as Wikipedia, Search Engine such
as Google, Recommend Systems such as TopBUZZ, and Social Network System
(SNS) such as Twitter, to name a few. The underlying technologies behind them
have proven quite effective during the last decade. Generally, the Knowledge
System employs entry to facilitate the query, Search Engines make use of key
words matching, Recommend System works by mining the correlations between
the articles and/or users, and SNS relies on the follow relationship between users.
Though these tools have achieved great success by now, all of them exhibit some
inherent drawbacks.
(cid:63)(cid:63) Corresponding author
9
1
0
2
n
u
J
8
1
]
I
S
.
s
c
[
1
v
8
5
3
7
0
.
6
0
9
1
:
v
i
X
r
a
2
Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu
The entry system makes query convenient to implement, but it somehow suf-
fers from at least the two facts. First, the entry system is tedious to maintain,
especially in nowadays many new ideas and concepts emerge almost everyday;
second, it is hard to precisely locate in the entry system some multidisciplinary
knowledge, let alone those concepts beyond words and unnameable. For the
key words based search engines, only the articles containing the key words can
be found, but cannot hit those closely related materials but without explicitly
containing the key words; it is even harder, if not impossible, to recover those
nonverbal medias such as image, video and audio files. Huge number of rec-
ommendation algorithms have been proposed in recent years. The content or
user based recommendation recommends the content based on some similarity
between some related contents or users, but hard to generalize to find other po-
tential interesting items; the knowledge graph based recommendation can work
in a more systematic way, but how to formulate the knowledge graph (especially
suitable for recommendation) remains to be a tough task. The follow relation-
ship in SNS means that the follower receives all of the information posted by the
one followed, however, in general not all but only a part of the posts might be
interesting to the follower, consequently making the follower receive much noise.
In view of the above considerations, in this paper we introduce the Knowl-
edge Network System (KNS), which is gradually formulated by the Evolutionary
Collective Intelligence (ECI), a novel agent(human)-machine interactive learn-
ing algorithm proposed particularly for the KNS. The main contribution of this
article is summarized as twofold:
-- To overcome the drawbacks of the knowledge and recommendation systems
etc., we propose the ECI algorithm to construct the KNS, a new type of
knowledge construction, storage and distribution system.
-- A real application based on the KNS and ECI is presented to illustrate their
efficacy.
The remainder of this article is organized as follows. The KNS and ECI
algorithms are introduced in Sections 2 and 3, respectively, followed by some
theoretical analysis and discussions in Section 4. After giving some real and po-
tential applications in Section 5, Section 6 concludes this article by summarizing
some future works.
2 Knowledge Network Systems
Some notations used in the KNS and ECI algorithm are firstly given as follows.
-- Knowledge file, denoted by f , is the basic input or sample of the knowledge
system. Typical types of knowledge file include such as message, article,
image, video, and audio file.
-- Knowledge item, denoted by v, exactly a knowledge node in the KNS, rep-
resents one basic knowledge point in the KNS. Each item consists of one or
more knowledge files, or in other word, the knowledge item is a collection of
KNS by ECI
3
these files, which share some common characteristics. Since as will see below
each node in the KNS is also accompanied with some agents, sometimes we
may also call each item a group in the sense of group of agents. That is,
item, node, and group can be exchanged equivalently by context.
-- Agent, denoted by a, might being a person or an artificial agent, is defined
as an intelligent reactor that might be interested to some particular files. If
an agent a is interested in a file f pushed to it, we say that f matches a,
and f is a signal to a, or a noise otherwise. Thus, for each agent a, we can
define a signal-noise ratio (SNR) on the pushed files as follows,
#matched files
snra =
#unmatched files
(1)
The Knowledge Networks Systems (KNS), denoted by K, is defined as a
dynamic directed knowledge graph K = {V, E}, where V is the set of graph nodes
and E = (vx, vy) defines the directed edges from node vx to vy, as illustrated by
Fig. 1. Here dynamic implies that the graph including both V and E may evolve
over time. Actually, as will see below, K could be evolved initially from a null
graph without containing any node. Without doubt, KNS is also possible to be
a static graph with fixed nodes and structure if the evolution is finished.
Fig. 1. A simple illustration of KNS
Each node v in the KNS represents a knowledge item, and v has two at-
tributes. The first one is the knowledge files it consists of, and the second one is
the agents belonging to it. So, v can be represented as
k}, av = {av
v = {f v, av}, f v = {f v
n}
2, ..., av
2 , ...f v
(2)
1 , f v
1, av
It is noted that in general it is f v instead of av that defines the knowledge item,
just because each agent may cover huge number of knowledge items. It is also
because as shown in the next section the collected files f v in each v are voted
together by the agents, the knowledge item takes a quite different form from the
traditional entry.
Based on f v and given two nodes vx and vy, the weight value of the edges
exy and eyx can be calculated respectively as
exy =
f vx ∩ f vy
f vy
, eyx =
f vx ∩ f vy
f vx
.
(3)
………………},{vvafvxyeyxe4
Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu
Each directed weighted edge between two nodes measures not only the simi-
larity, but also a hierarchical relationship between them. For example, given two
directed edges exy = 0.9 and eyx = 0.5 , the similarity between the two nodes
can be directed calculated by 1
2 (exy + eyx) = 0.7, and vx positions a higher
hierarchical level in K since simply exy > eyx. In addition, once the KNS is
established, we may also employ some hierarchical spectral clustering tools [1,2]
on the KNS to mine its hierarchical knowledge structure.
In practice, we may set a threshold value Te for the weighted edges, that is,
exy is set to be zero if exy < Te. Thus, the KNS is in general a sparse graph,
meaning that only a very small fraction of the node pairs is activated. This sparse
property is particulary important for a large K, considering both the storage and
computational complexities.
3 Evolutionary Collective Intelligence
In this section we introduce the Evolutionary Collective Intelligence (ECI), an
agent-machine interactive algorithm proposed particularly to generate the KNS.
Fig. 2. A simple illustration of the interaction between agents and KNS
Generally, the ECI algorithm works by interactions between the agents and
the machine: the machine recommends the files to the agents, and the agent
chooses to activate or not on the recommendation. The relationship between the
agents and the KNS is illustrated by Fig. 2, where the top and bottom layers are
the agents and KNS, respectively. If an agent links to some nodes of the KNS, it
means that the agent matches this items or belongs to this group. And the ECI
algorithm is implemented by extensively using such relationships between the
agents and KNS. Actually, the goal of the ECI algorithm comprises two parts:
first to generate the KNS with each item consisting of multiple files sharing
comment knowledge, and second to achieve a high-qualify recommendation, i.e.,
high snra for agents.
…………KNSAgent……………………},{vvafvxyeyxeKNS by ECI
5
The basic flowchart of ECI algorithm is shown in Fig. 3, where the algorithm
starts by a new generated file f , posted by the system or an agent. Then f is
recommended/pushed to some initially selected agents A (initial spread in the
flowchart), usually in a random or other sophisticated way. More importantly,
except for the initial spread, f will also be pushed to some or all of the agents
belonging to those activated items I (spread by KNS in the flowchart). Mean-
while, f is checked to be qualified or not to be added into I (add into the item
in the flowchart), and whether qualified or not, as the founding f ile, to generate
a new item (new item in the flowchart).
Fig. 3. The basic flowchart of ECI algorithm
Spread by KNS is the core module of the algorithm which are crucial to
achieve the two goals mentioned above, i.e., to formulate the KNS and to get a
high SNR. We give some more details about the module below.
In ECI algorithm, a file f is pushed to the agents by two ways: initial spread
and spread by KNS. Because the initial spread is usually implemented by ran-
domly selecting some initial agents for a new file, its SNR is basically around the
random recommendation SNR. Therefore, the SNR is improved based mainly on
the spread by KNS, for which two mechanisms are proposed to achieve a high
quality recommendation: voting mechanism and multi-round spread mechanism.
The voting mechanism refers to that to make a file qualified or further spread in
an item, most agents in a group should match the file, or in other words, most
agents vote for the file (voting ratio should be bigger than a preset threshold).
The multi-round spread mechanism means that a file spreads in a group by being
pushed to only some but not all agents in the group in each round, and the file
will not spread further in the next round unless it successfully passes the agents
voting in the current round. The former one guarantees that only those matched
files to the agents could be qualified or even spread in their group, and the latter
one further ensures a high SNR by a gradually progressive sampling mechanism.
6
Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu
Some other modules are briefly summarized here. New item means that if
the number of matched agents of a file f is bigger than a threshold, a new item
v is created by taking f as the founding file of v, and also some matched agents
are added into the item, i.e., va in eqn.(2). Add into the item is to add a file into
an item, i.e., vf in eqn.(2). Normally, the file that passes the whole multi-round
spread in an item/group and meanwhile satisfies some other measures1 will be
added into the item.
4 Theoretical Analysis and Discussions
An overview of the KNS and ECI was described above. Next we give some
theoretical analysis and discussions on them.
4.1 on agent
In the ECI algorithm, a key step is to check if an agent a matches a file f or
not. In the case of the agent being a human user, when the file is pushed to a
user, the match is embodied by some positive actions, such as click, comment,
or save of the user on the file. But if the agent is an artificial but non-human
agent, we need to introduce extra information, on both agent and file, to make
the algorithm proceed. Below an extra variable knowledge unit u is introduced
for the artificial agent case. Though the concept of knowledge unit is unnecessary
for a human user system to implement, it, as an implicit hidden variable, still
helps to theoretically analyze both KNS and ECI.
A knowledge unit, denoted by u, is considered as the most basic knowledge
element in the knowledge system, which cannot be further decomposed. In this
sense, a knowledge file f can be taken as a collection of one or more units;
meanwhile, from the viewpoint of agent, the knowledge unit can be regarded as
the interest of the agent, and thus an agent a can also be taken as a collection
of interests or units, That is, given a knowledge unit set
U = {u1, u2, ...., um},
(4)
a knowledge file f and an agent a can be respectively expressed as a m-dimensional
0 − 1 vectors
f = [τ f
a = [τ a
1 , τ f
1 , τ a
2 , ...., τ f
m]T
m]T
2 , ..., τ a
(5)
where τ = {0, 1}, and τi = 1 implies f or a consists of the ith knowledge or
interest unit, i.e., ui.
Then, based on eqn. (5), the match between a and f is directly checked by
the following r(a, f ),
r(a, f ) =
(cid:26) 0 if f T a = 0,
1 otherwise
(6)
1 For example, the degree of matching between f and the files already in an item v
should be checked before f can be added into v.
KNS by ECI
7
Eqn. (6) implies that if f and a share at least one unit, then a matches f . We
can also assign the number of units shared to r(a, f ) to measure the degree of
match. In addition, r(a, f ) can be regarded as a SNR, meaning that the file f
is a signal to the agent a if r(a, f ) = 1, or noise otherwise. It is noted that such
a definition is consistent with the SNR defined in eqn. (1). In practice, a or f
defined in eqn. (5) are usually sparse vectors, especially when m is large.
4.2 on objective of ECI
As mentioned above, the goals of ECI are twofold: the KNS and a high SNR,
meaning that the KNS can be gradually evolved along with a high-qualify recom-
mendation system. So the two types of systems, knowledge and recommendation
systems, mutually promote each other.
For the KNS, each of its node represents one knowledge item, via a collection
of knowledge files. So, these files should be cohesive to make the item compact
and focused. The cohesion of each item can be measured by the mean square
reconstruction error (MSRE) [3] of the files: the smaller the error the more
cohesive the item. Given a knowledge item v and its f v = {f v
k} defined
by eqn. (2), the MSRE of v is given by
2 , ...f v
1 , f v
k(cid:88)
i=1
(cid:80)k
msre(v) =
1
k
i − f v)T (f v
(f v
i − f v)
(7)
where f v = 1
is the mean of f v. Based on the MSRE of each item, and
by denoting the item set V = {v1, v2, ..., vl} of the KNS K, the MSRE or the
k
objective function for K is formulated as follows,
i=1 f v
i
M SRE(K) =
1
l
l(cid:88)
i=1
msre(vi).
(8)
Minimization of M SRE(K) defines a typical clustering problem, i.e., MSRE
clustering which is inherently a NP-hard problem. So in this sense, the ECI
provides an algorithm to approximately solve this NP-hard problem.
It is noted that, in literature, K-means algorithm [4] is a commonly used
technique for solving such clustering problem. However, the K-means like algo-
rithm is inapplicable here, because in practice it is usually hard to explicitly
get the knowledge unit set U , which is introduced here as a hidden variable for
theoretical analysis.
by eqn.(6). Thus, by denoting f a = {f a
the SNR for a is given as
For the second goal, a high SNR, the SNR of a file f to an agent a is given
t } as the file list pushed to a,
2 , ..., f a
1 , f a
t(cid:88)
i=1
snr(a) =
1
t
r(a, f a
i )
(9)
8
Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu
And for the agent set A = {a1, a2, ...., an}, the system SNR can be averagely
gotten by
n(cid:88)
i=1
SN R(A) =
1
n
snr(ai)
(10)
Generally, it is difficult to simultaneously minimize M SRE(K) and maximize
SN R(A). ECI, to our best knowledge, is the first attempt in literature to target
at the two goals simultaneously.
4.3 on comparison with related techniques
The ECI realizes recommendation and constructs knowledge system, but in a
much different way from conventional techniques. ECI based KNS can avoid
some troubles faced by nowadays related systems, including not only recommen-
dation and knowledge, but also search and social systems. Below we give a brief
comparison between KNS and the conventional systems. it is noted that for the
above four types of systems, the agents in the ECI and KNS are all human user.
From the viewpoint of knowledge, by the ECI, the KNS does not need to
maintain a sophisticated but tedious entry system; also it can naturally adapt
to knowledge changes, including new emerged concepts; furthermore, compared
to the tree structure used by encyclopedia, the KNS is much more flexible on
mining the knowledge structure.
From the viewpoint of recommendation, by the KNS, the system can recom-
mend closely related files to users based on the knowledge structure, but not just
rely on the similarity (by means of content or users) based techniques. In addi-
tion, by the multi-round voting mechanism, the KNS recommendation achieves
a high SNR, i.e., a high-qualify recommendation.
From the viewpoint of search, the KNS system can provide not only articles,
but also any other types of medias, including typically image, video and audio
files. This is by now extremely difficult for conventional search engines. Also,
somehow similar to recommendation, the search results can include those closely
related contents without needing to explicitly contain the searching keywords.
From the viewpoint of social, as illustrated by Fig. 2, in KNS the users
are not connected directly, but indirectly via the knowledge or interest items.
This structure truly realizes the interest social and avoids the hard connection
between users, commonly used by SNS systems. In such as interest social system,
one user receives only commonly interesting files posted by other users, but
excludes the noises.
5 Applications
In this section we describe some real and potential applications of the ECI based
KNS.
KNS by ECI
9
5.1 VISVA
The VISVA system2 is a knowledge/interest construction, share and recommen-
dation platform, where the posted files will be pushed to interested users, and
users receive their interesting recommendations. With the help of the KNS and
ECI, the VISVA system integrates all of the four functions: knowledge, recom-
mendation, search and social, in a different way from the traditional experiences.
Fig. 4 shows four typical knowledge items3, consisting of 3, 3, 12, and 3 files,
respectively. We can feel that the files in each group share some common features,
but from different perspectives. For instance, the first 3 files somehow share the
units "blue, water, ocean", while the third 12 files share the same author, the
official account of VISVA China4. Meanwhile, we can feel sometimes, such as
the first and the fourth one, that the common units in an item are hard to
precisely described in word, so we may regard these knowledge items as mind
knowledges5, which is far beyond the conventional entry system.
Fig. 4. Four typical nodes of the KNS in VISVA, comprise 3, 3, 12, and 3 files, respec-
tively.
As for the SNR, in practice we use
SN R =
#clicked files
#pushed files
instead of eqn. (1) to measure it, by simply assuming that once a user clicked
a file, he/she is interested in it, and vice versa. By the VISVA system, the
recommendation SNR is promoted from around 0.1, the random recommendation
2 http://www.visva.com and http://www.visvachina.com.
3 The results are captured from the VISVA China Ta Zai APP.
4 Without using any tag or particular channel, it is surprising to see the system can
group the 12 files together without any noise.
5 Actually, the vision of VISVA is to construct a global brain [5].
10
Tao Xiang, Ziliang Huang, Peng Bai, Congrui Ji, and Zhiyong Liu
SNR, to around 0.35, that is, VISVA significantly improves the recommendation
qualify by 3.5 times6.
5.2 other potential applications
The KNS and ECI can also be straightforwardly applied to some other types
of recommendation system, such as the electric commercial platform to achieve
more reasonable product recommendations, or it can be served as a fundamen-
tal multi-platform (commercial, reading, education, restaurant etc.) information
spreading system, to integrate these looking-very-different information and re-
alize a cross-cutting recommendation at the operation system (OS) level.
From the perspective of information flow, the KNS and ECI realize a high
efficient information distribution from the sender to target receivers. So the KNS
in this sense functions as a router, which is a core requirement for the internet
of things (IoT). From the perspective of machine learning, the ECI realizes an
automated feature extraction or data clustering (by the nodes in KNS), two
important tasks in machine learning. Though there are further more challenges
to be solved (see the last section for details), the KNS and ECI do provide a
new perspective and tool to re-consider and re-formulate these problems.
6 Conclusions and Future Works
In this article we introduced the KNS and ECI algorithm. Basically, the ECI al-
gorithm collectively takes advantages of intelligence of agents in an evolutionary
manner, thus named ECI. The ECI based KNS is a new knowledge generation,
storage and distribution system, which avoids many drawbacks and bottlenecks
encountered by nowadays knowledge, recommendation, search and social sys-
tems. A real application, VISVA, was built based on the KNS and ECI, and has
exhibited some promising and quite surprising results. On the other hand, this
paper basically gives only some preliminary theoretical analysis about the model
and algorithm, on which there are many open problems worth further exploring.
First, as an original but mainly heuristical algorithm, though has achieved
great progresses especially in real application, the ECI still needs further theo-
retical analysis, on such as convergence, error bound, and complexity. In addition
to some theoretical insights, it will also definitely help to further improve the
algorithm itself.
Second, it is also beneficial to make an extensive comparison, from the per-
spective of model and algorithm instead of just function, with related works.
(Google) knowledge graph and collaborative filtering [6] used by recommenda-
tion system, the Pagerank [7] like voting techniques used by search engine, are
typical examples.
6 By comparison, in an artificial test of VISVA, by setting A = 1000,U = 54,
number of files F = 953, and average
i ai =
1.543, where f, a is defined by eqn.(5), the system SNR was greatly improved from
the random 0.0883 to 0.5492.
(cid:80)1000
(cid:80)953
i=1 aT
i=1 f T
i fi = 3.178,
1
953
1
1000
KNS by ECI
11
Last but not least, how to design machine agent for ECI is another important
further work. By machine agents, which might be preset or learned during the
evolution, the information generation and distribution mechanisms of KNS and
ECI may generalize them to vast applications in the fields of, such as, machine
learning, evolutionary computation and IoT.
References
1. Von Luxburg, U.: A tutorial on spectral clustering. Statistics and computing 17(4),
395 -- 416 (2007)
2. S´anchez-Garc´ıa, R.J., Fennelly, M., Norris, S., Wright, N., Niblo, G., Brodzki, J.,
Bialek, J.W.: Hierarchical spectral clustering of power grids. IEEE Transactions on
Power Systems 29(5), 2229 -- 2237 (2014)
3. Xu, L.: Least mean square error reconstruction principle for self-organizing neural-
nets. Neural networks 6(5), 627 -- 648 (1993)
4. Hartigan, J.A., Wong, M.A.: Algorithm as 136: A k-means clustering algorithm.
Journal of the Royal Statistical Society. Series C (Applied Statistics) 28(1), 100 --
108 (1979)
5. Bloom, H.: Global brain. NY: Wiley (2000)
6. Herlocker, J.L., Konstan, J.A., Borchers, A., Riedl, J.: An algorithmic framework
for performing collaborative filtering. In: 22nd Annual International ACM SIGIR
Conference on Research and Development in Information Retrieval, SIGIR 1999.
pp. 230 -- 237. Association for Computing Machinery, Inc (1999)
7. Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking:
Bringing order to the web. Tech. rep., Stanford InfoLab (1999)
|
1711.10002 | 1 | 1711 | 2017-11-27T21:10:48 | TweetIT- Analyzing Topics for Twitter Users to garner Maximum Attention | [
"cs.SI"
] | Twitter, a microblogging service, is todays most popular platform for communication in the form of short text messages, called Tweets. Users use Twitter to publish their content either for expressing concerns on information news or views on daily conversations. When this expression emerges, they are experienced by the worldwide distribution network of users and not only by the interlocutor(s). Depending upon the impact of the tweet in the form of the likes, retweets and percentage of followers increases for the user considering a window of time frame, we compute attention factor for each tweet for the selected user profiles. This factor is used to select the top 1000 Tweets, from each user profile, to form a document. Topic modelling is then applied to this document to determine the intent of the user behind the Tweets. After topics are modelled, the similarity is determined between the BBC news data-set containing the modelled topic, and the user document under evaluation. Finally, we determine the top words for a user which would enable us to find the topics which garnered attention and has been posted recently. The experiment is performed using more than 1.1M Tweets from around 500 Twitter profiles spanning Politics, Entertainment, Sports etc. and hundreds of BBC news articles. The results show that our analysis is efficient enough to enable us to find the topics which would act as a suggestion for users to get higher popularity rating for the user in the future. | cs.SI | cs | TweetIT- Analyzing Topics for Twitter Users to garner
Maximum Attention
Dhanasekar Sundararaman
SSN College of Engineering
Chennai, Tamilnadu
Priya Arora
Texas A&M University
Texas
India
[email protected]
United States
[email protected]
Vishwanath Seshagiri
College of Engineering, Guindy
Chennai, Tamilnadu
India
[email protected]
ABSTRACT
Twitter, a microblogging service, is today's most popular platform
for communication in the form of short text messages, called
Tweets. Users use Twitter to publish their content either for
expressing concerns on information news or views on daily
conversations. When this expression emerges, they are experienced
by the worldwide distribution network of users and not only by the
interlocutor(s). Depending upon the impact of the tweet in the form
of the likes, retweets and percentage of followers increases for the
user considering a window of time frame, we compute attention
factor for each tweet for the selected user profiles. This factor is
used to select the top 1000 Tweets, from each user profile, to form
a document. Topic modelling is then applied to this document to
determine the intent of the user behind the Tweets. After topics are
modeled, the similarity is determined between the BBC news data-
set containing the modeled topic, and the user document under
evaluation. Finally, we determine the top words for a user which
would enable us to find the topics which garnered attention and has
been posted recently. The experiment is performed using more than
1.1M Tweets from around 500 Twitter profiles spanning Politics,
Entertainment, Sports etc. and hundreds of BBC news articles. The
results show that our analysis is efficient enough to enable us to
find the topics which would act as a suggestion for users to get
higher popularity rating for the user in the future.
systems➝Database management
CCS Concepts
• Information
system
engines • Computing methodologies➝Massively parallel and
high-performance simulations. This is just an example; please
use the correct category and subject descriptors for your
submission. The ACM Computing Classification Scheme:
Keywords
Topic modelling; Twitter; Text Mining
1. INTRODUCTION
Social networks like Twitter, Facebook etc. are becoming an
essential part of everyday life. Being a microblogging platform,
Twitter has gained so much of attention in the past few years since
it allows users to post short text messages, called Tweets on their
timeline. These Tweets range from news articles to gossips but
within a limit of 140 characters. It enables interested parties to
follow individual user's views on an event or a topic in real-time[1].
Users tend to follow people with whom they share common
interests or who they want to know more about like their favourite
celebrities etc. Hence, people tend to post Tweets that can bring
maximum attention to their engaged followers as well as which can
fetch more followers to the profile. An analysis on this is imperative
as it tends to reveal the topics a particular user has posted, which
fetched a lot of attention enabling them to do the same in the future.
Now after developing an efficient service for determining the
potential suggested topics, a user can enhance his follower list. This
list is expanded gradually depending upon the topic chosen for the
tweet which, in turn, leads to getting most popularity ratings. The
newly added followers would have shared the same interests like
the topic of the tweet, or the topic trending in the market. For
example, if the user is a healthcare consultant and tweets are highly
focussed on health-insurance, health-benefits, meditation and
medical-equipments etc., the followers of that user would have
interest in this domain. However, if the user is a popular celebrity
or a politician, the topic of the tweet may span various topics
ranging from entertainment to politics. Hence, with the liking in
several domains, the user gets increment in his follower list within
a time frame. Though this seems obvious, what if there is a way to
find the topics, among several interested once, which a user can
focus the most so that his follower list could be increased; and this
could lead to getting most popularity ratings for that user profile
based upon the tweet. To get this rating, we propose a topic-
modeling based twitter service that would help in determining the
top words that a user could use for enhancing the follower's list and
hence popularity ratings.
To summarise,
We take the last 3000 tweets from Twitter API of several
users (over 500) of various domains like entertainment,
politics, sports. Further, we analyse, pre-process and
mine the data.
For each user, we select top 1000 tweets based on the
attention factor of the tweets. This attention factor is
determined by the number of likes on the tweet and
retweet count, on a topic, within a time-frame window.
Then we apply the topic modelling on each user
document containing top 1000 tweets. BBC news data-
set is then analysed to find the topic and compared with
the document of each user. The similarity between the
user's tweet top-document and the BBC data-set suggests
us the topic that a user should tweet upon to get the
maximum popularity ratings.
The paper is organised as follows. Section 2 deals with the literature
survey about the Twitter as a major microblogging platform in
social media. It also highlights scenarios where user modelling can
be done on the Twitter API. Section 3 talks about the collection of
Twitter and BBC news dataset and the filters employed to extract
Tweets from the user efficiently. Section 4 describes the profile
modeling in which the most representative terms are found and the
similarity measures employed and the accuracy with which
proposed study can be used for the suggestion of the topics to the
user. Section 5 explains the process behind our research work while
section 6 highlights the results of the process. We conclude finally
with Section 7 reflecting on the shortcomings with the future vision
of this work.
2. RELATED WORKS
The social microblogging services/platform such as Twitter helps
in engaging people by letting them publish about their thoughts
ranging from entertainment to politics. Millions of people, now a
day is part of this microblogging platform. Everyone uses Twitter
for conveying their views and to follow like-minded people who
post such views. Due to such a large user-base, this platform has
gained lots of attention from the research point of view. Hence, to
study the work already done in this direction, we provide the
literature survey that is most closely related to our work. The work
done by [2,3] describes the notion of Twitter being a microblogging
website and how it impacts the society. It also hypothesises the
differences between a users' network connection structure by
suggesting three types of unique user activities - information
sharing, information seeking and social activity. Likewise, work
done by [4,5,6] provides us with a background as to how the tweets
can be handled for such a large user-base platform services.
Moreover, it gives us the strategies as to how tweets can be
analysed. Similarly, the work done by Liu et al. [7] gives us several
tools for mining the data obtained from various data-sets.
Apart from the study of Twitter, a micro-blogging service and how
the tweets can be analysed, much of the work has been done in
studying the pattern of tweets, like the work was done by
Krishnamurthy et al. [8] perform a descriptive analysis of the
Twitter network. It suggests that frequent updates might be
correlated with high overlap between friends and followers.
Similarly, Cha et al. [9] study the impact of mentions, retweets and
on the dynamics of on topics and time. Apart from the impact of
the users' tweet on the community, there has been work done as to
how the expressed tweet content influence the society as studied by
Cataldi et al. [10]. The same kind of work has been done by Rui et
al. as described in work [11]. In another work, Guo et al. [12] the
patterns of user tweets in several online communities, such as a
blog system, a question-answering social network and a social
bookmark-sharing network. They find that the rank order
distribution of user postings follows stretched exponential
distribution. There is one study which indirectly relates to our
hypothesis, as mentioned above, by Huberman et al. [13] which
says
in
crowdsourcing exhibits a strong positive dependence on attention,
measured by the number of downloads. They find that the lack of
interest leads to a decrease in the number of uploaded videos and a
hence a drop in productivity.
from YouTube exhibited
that analysis of data
There is one more parameter to determine the popularity of a
Twitter account, and that is the follower counts. Many studies have
been done as what makes a Twitter follower count and the factors
that impact its increment as done by [14,15, 16, 17]. Depending
upon the discussion on the topics based upon the recency and
variety of topics happen on Twitter, user profiles generated from
Twitter posts promise to be beneficial for other applications on the
social web as well. However, automatically inferring the semantic
meaning of Twitter posts is a non-trivial problem as mentioned in
work [18].
3. DATA COLLECTION AND
PREPROCESSING
In this section, first of all, we describe the data-set obtained from
Twitter API and then the process using which tweets are collected
related
- sports, politics, education,
to several domains
entertainment, and philosophy. Then, we explain about the BBC
dataset and finally about preprocessing these data.
3.1 Twitter Data Collection
The process used for filtering out the data-set is as follows:- First
of all, a large number of Twitter profiles are selected, each contains
a large number of tweets. A popularity filter is employed to find the
Twitter profiles having a minimum threshold of followers (several
thousand). Second, a Language filter is applied to extract the words
used for tweeting by the users. Language filter provides consistency
across geographically distributed domains for the same user profile
where the same user profile is perceived differently due to the usage
of different language depending on the region. Further, a domain
filter is applied to extract user profiles by comparing it with the
words or topics extracted from the BBC news dataset. To perform
this experiment, we have extracted approximately 3000 user
profiles of renowned people among various domains. At an average
of 120 characters per tweet, our dataset comprises 1.1M tweets with
130M characters approximately.
3.2 News Data Collection
The news articles data is collected from the news provider, BBC
available publicly online. It spans from various topics like politics,
sports, entertainment, regional news, religion and current trends.
These news articles were carefully chosen to include the interests
of that of various Twitter profiles to avoid any bias. Hundreds of
such news articles are preprocessed to remove any abbreviations
and acronyms. The preprocessed text is then aggregated into a
single text document as a collection of news articles. This forms the
query document, that is the document that is queried on different
Twitter profiles for similarity.
3.3 Preprocessing
The first step in pre-processing is to transform the data to get an
efficient format so that the top influential words of the tweets for
each user profile can be extracted. Here, preprocessing essentially
deals with filtering out non-required words from a user's profile.
The non-required words are selected by sorting the bag of words
selected for each user profile. This sorting is done by the number
of likes and increment in follower count to that user profile. To
filter out the acronyms in a tweet, we pre-process the data by using
acronym dictionary by converting acronyms to their full forms. For
example, "omg" is translated to "Oh My God". During pre-
processing, words containing symbols such as '@,' #' and numerics
are removed. The 1.1M such preprocessed tweets are carefully
documented based on their domains.
To process the data using our proposed methodology, it is required
for the Tweets not be just arranged as stand-alone strings but rather
as user profile text documents. Hence 1000 such selected tweets
from each user profile are merged to form one single profile
document, which collectively makes up an exhaustive dataset.
4. PROFILE MODELING AND
SIMILARITY
In this section, first, we discuss the profile modeling by determining
the most representative words of that particular user profile
(Section 4.1), and then we determine the similarity the user's
document (Twitter profile) and the BBC data-set using suitable
distance metric (Section 4.2).
4.1 User Profile Modeling
User profile modelling refers to the top influential words of a user
profile, by top influential we mean the most important words that
gain the maximum number of likes with the increment in the
number of followers to that user. As already defined, this
importance is a measure by the number of likes and increment in
the number of followers to the user profile based on the tweet. For
determining the same, we compute TF-IDF between the documents
generated using user's profile with the one obtained using BBC
data-set for the same influential word. TF-IDF is the feature
selection approach to determine the highly representative words of
a document by ignoring the words that don't convey any meaning
to the content like stop words.
Table 1. TF-IDF of few sample terms in @realDonaldTrump
realDonaldTrump
TF-IDF
taxes
election
washington
reforms
immigrant
>0
>0
>0
>0
>0
Table 2. TF-IDF of few sample terms in @katyperry
katyperry
TF-IDF
taxes
election
washington
reforms
immigrant
0
0
>0
0
0
Table 1 shows the TF-IDF of sample terms in @realDonaldTrump
profile. These words were completely picked at random. The TF-
IDF scores of these words are greater than 0, which implies that
these words have been used a considerable number of times and are
important or characteristic of that Twitter profile. We then see the
TF-IDF scores of the same words in another contrasting Twitter
profile. Table 2 shows that only some of the words enlisted (in fact
only one out of five) have a score, the rest are zeros. This indicates
that the first Twitter profile, being a one that of politician involves
a lot of terms related to government and country. The second
profile, on the other hand, belongs to the entertainment industry,
and obviously, the words that relate to the notion of government
and politics has a score of zero. When the similarity between these
two profiles is analysed, they were found to be far less than that of
two profiles involving political domain.
4.2 Profile Similarity
Now that the top influential words in a user profile are identified
using TF-IDF scores, the similarity between the user profile
(Twitter profile) document with the BBC data-set document can be
compared. Various distance metrics exist to compute this similarity
such as Cosine, Euclidean, and Manhattan, etc. However, Cosine
distance is the appropriate choice [19] for this work since it takes
care of the bias caused due to the difference in the document
lengths. This similarity is computed using TF-IDF which computes
inner product of two vectors generated for the two documents (sum
of the pairwise multiplied elements) which are further divided by
the product of their vector lengths. The resultant score lies in the
range of 0 and 1. Hence, the similarity score is obtained by
subtracting this value from 1.
Cosine distance = (d1d2)/d1d2
Where d1 and d2 are the vectors of the same length.
Cosine similarity = 1 − (d1d2)/d1d2
While calculating the similarity between the user profile document
and BBC dataset generated querydocument, the top terms
contained in the query document alone are taken. The TF-IDF
scores corresponding to the top words present in the user tweet is
used for cosine distance computation. That is, the influential words
present in the user profile are searched in the document generated
using BBC dataset for the same word. Next, the TF-IDF scores of
these two documents are compared for finding the similarity.
5. TweetIT – The Process
The process behind TweetIT can be broken down into three steps.
5.1 Gathering Popular Tweets
For modelling a person's popularity, one has to consider the reach
which the person has amongst the Twitterati. Twitter provides us
with a quantitative measure in the form of Likes and Retweets for
every tweet, which can be used to gauge the person's ken about a
certain topic or event. We combine these measures to calculate the
attention factor, which is an average of some retweets and likes.
Attention_Factor = 0.5 * No of Likes + 0.5 * No of Retweets
This Attention_Factor is calculated for all the Tweets, and the top
1000 Tweets for each profile is obtained and stored in a separate
document. Once these tweets are gathered, the time that has elapsed
since the last posting this tweet is obtained and sorted from latest
to oldest Tweet. This is done so that the tweet which is most recent
and has highest attention_factor appear at the top. Using these
newly acquired Tweets, Topic Modelling (Section 4.1) is
performed to identify the topics on which a user is Tweeting.
5.2 Analyzing Similarity
After gathering recent popular Tweets for each of the 500 Twitter
profiles, we then analyse the similarity of these Tweets with the
BBC news articles. A percentage score of similarity is obtained for
each profile with every news articles. The similarity is achieved by
the presence of words/ topics present in the Tweets that are also
present in the news articles
For each profile, we compare its similarity using the formulas
described in section 4.2 with all the latest news articles and find the
most similar user and the second most similar user and so on.
5.3 Analyzing Topics
After finding similarity between the news articles and the various
Twitter profiles, we then analyse the words or in more technical
form topics, that caused the similarity in the first place. We use
Influential Term Metric, proposed in [20] that finds the topics that
have high influence individually in the Twitter profile, news data
and together as a whole.
The topics may be biased based on the nature of the dataset. If the
news articles contained in the majority of sports, the most similar
profiles could be that of a sportsperson, and the top words could be
that related to sports. A glimpse of the results obtained through
BBC news articles and Twitter profiles is shown in Tables 3 and 4
in the next section.
6. RESULTS
Table 3. Similarity Ranking of Twitter profiles to BBC News
QUERY
DOCUMENT
TWITTER
PROFILE
RANK
BBC NEWS
DATASET
faisalislam
jamesrbuk
benfenton
robfordmancs
paullewismoney
DouglasCarswell
montie
PatrickStrud
JolyonMaugham
1
2
3
4
5
6
7
8
9
IanDunt
10
For finding the result, we combined 300 BBC news articles from
various domains and used it as our query document. It was a
collection of all the latest trending news from across the globe.
Similarly, top 1000 Tweets of each user were sorted by the posted
date, and stored in the separate document, which was used to
compare against the query document. Based on similarity explain
in 4.2, we have ranked the profiles Table 3 shows the top 10
profiles, whose tweets are similar to topics trending in BBC dataset.
When we get all news articles from other genres, it can show how
the ranking varies based on the content of news. This goes on to
show that, even if personal tweets could be ranked, there needs to
be a correlation with the trending topics, to propagate your opinions
better.
Apart from finding similarity between a news article and Twitter
profiles, we go a notch higher and find the topics that are influential
[20]. Five of the top such topics, between each Twitter profile, and
BBC News is shown in Table 4. Top 5 such topics of @faisalislam
are 'labour, government, chancellor, market, tories' which have
been recently posted and garner maximum attention from the
Twitteratti.
Thus our system enables one to find many such topics for each
Twitter profile by latest news sources, and propagate their views
across depths of social media.
Table 4. Top words in most similar Twitter profiles
NAME
TOPWORDS
faisalislam
jamesrbuk
labour
government
chancellor
market
tories
people
britain
premiership
benfenton
robfordmancs
public
secretary
mobile
election
british
england
digital
voters
research
growth
ireland
economic
pensions
customers
paullewismoney
compensation
ryanair
company
7. CONCLUSION
Thus, we were able to determine topics of Twitter profiles that were
posted recently, has attained widespread recognition and found in
that of news headlines. This enables the user to retrospect on topics
that garnered more attention than average, which in turn helps to
grow the followers. The system can work to find such topics for
any Twitter profile and a query document. The query document can
be a news article, advertisement or any text for which related
Twitter profiles is to be found. There are certain drawbacks in this
process such as the failure to detect semantic words – words with
the same meaning but in different forms. In the future, we would
use dictionary such as Wordnet to eliminate redundancies caused
by such misinterpretations.
8. REFERENCES
[1] Schonfeld, E.: Mining the thought stream. TechCrunch
Weblog Article (2009),
http://techcrunch.com/2009/02/15/mining-the-thought-
stream/
[2] Java Akshay, Xiaodan Song, Tim Finin, Belle Tseng. Why
We Twitter: Understanding Microblogging Usage and
Communities. Springer, 56-65, 2007..
[3] Mor Naaman, Jeffrey Boase, Chih Hui Lai. Is it really about
me?: Message content in social awareness streams. 189-192,
2010.
[4] Aditi Gupta, Ponnurangam Kumaraguru. Credibility ranking
of tweets during high impact events. 978-1-4503-1236-3,
2012.
[5] Danah Boyd, Scott Golder, Gilad Lotan. Tweet, Tweet,
Retweet: Conversational Aspects of Retweeting on Twitter.
1530-1605, 2010
[6] Honeycutt, C., & Herring, S. Beyond microblogging:
Conversation and collaboration via Twitter. In Proc. HICSS
'09. IEEE Press (2009).
[7] Liu, B.: Web data mining; Exploring hyperlinks, contents,
and usage data. Springer, Heidelberg (2006) - how to mine
data.
[8] Krishnamurthy, B., Gill, P., and Arlitt, M. A few chirps
about twitter. In Proc. WOSP '08. ACM Press (2008)
Follow the green: growth and dynamics in twitter follower
markets. In Proc IMC 2013.
[15] Haewoon Kwak, Changhyun Lee, Hosung Park, Sue Moon;
What is Twitter, a social network or a news media?. In Proc
WWW 2010.
[16] Meeyoung Cha , Hamed Haddadi , Fabrício Benevenuto ,
Krishna P. Gummadi; Measuring user influence in Twitter:
The million follower fallacy. In Proc ICWSM 2010.
[9] Meeyoung Cha, Hamed Haddadi, Fabr´ıcio Benevenuto,
[17] Chunliang Lu, Wai Lam, Yingxiao Zhang; Twitter User
Krishna P. Gummadi. In Proc. ICWSM (2010).
[10] Mario Cataldi, Luigi Di Caro, Claudio Schifanella; Emerging
topic detection on Twitter based on temporal and social
terms evaluation. In Proc MDMKDD'10 2010.
[11] Huaxia Rui, Andrew Whinston; Information or attention? An
empirical study of user contribution on Twitter. In Proc.
Information Systems and e-Business Management 2012.
[12] Guo, Lei, et al. "Analyzing patterns of user content
generation in online social networks." Proceedings of the
15th ACM SIGKDD international conference on Knowledge
discovery and data mining. ACM, 2009.
[13] Bernardo A. Huberman, Daniel M. Romero, Fang Wu;
Crowdsourcing, attention and productivity. In Proc KDD,
2009.
[14] Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher
Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao;
Modeling and Tweets Recommendation Based on Wikipedia
Concept Graph. In Proc AAAI 2009.
[18] Fabian Abel, Qi Gao, Geert-Jan Houben, Ke Tao; Semantic
Enrichment of Twitter Posts for User Profile Construction on
the Social Web. In Proc ESWC 2011.
[19] Huang, Anna. "Similarity measures for text document
clustering." Proceedings of the sixth new zealand computer
science research student conference (NZCSRSC2008),
Christchurch, New Zealand. 2008.
[20] Sundararaman, Dhanasekar, and Sudharshan Srinivasan.
"Twigraph: Discovering and Visualizing Influential Words
Between Twitter Profiles." International Conference on
Social Informatics. Springer, Cham, 2017.
Columns on Last Page Should Be Made As Close As
Possible to Equal Length
Authors' background
Your Name
Title*
Research Field
Personal website
*This form helps us to understand your paper better, the form itself will not be published.
*Title can be chosen from: master student, Phd candidate, assistant professor, lecture, senior lecture, associate
professor, full professor
|
1504.06394 | 1 | 1504 | 2015-04-24T05:01:12 | Social Trust Prediction via Max-norm Constrained 1-bit Matrix Completion | [
"cs.SI",
"cs.LG",
"stat.ML"
] | Social trust prediction addresses the significant problem of exploring interactions among users in social networks. Naturally, this problem can be formulated in the matrix completion framework, with each entry indicating the trustness or distrustness. However, there are two challenges for the social trust problem: 1) the observed data are with sign (1-bit) measurements; 2) they are typically sampled non-uniformly. Most of the previous matrix completion methods do not well handle the two issues. Motivated by the recent progress of max-norm, we propose to solve the problem with a 1-bit max-norm constrained formulation. Since max-norm is not easy to optimize, we utilize a reformulation of max-norm which facilitates an efficient projected gradient decent algorithm. We demonstrate the superiority of our formulation on two benchmark datasets. | cs.SI | cs |
Social Trust Prediction via Max-norm Constrained 1-bit Matrix Completion
Jing Wang1, Jie Shen2, Huan Xu3
1 Hefei University of Technology, China
[email protected]
2 Rutgers University, USA
[email protected]
3 National University of Singapore, Singapore
[email protected]
Abstract
Social
trust prediction addresses the significant
problem of exploring interactions among users in
social networks. Naturally, this problem can be for-
mulated in the matrix completion framework, with
each entry indicating the trustness or distrustness.
However, there are two challenges for the social
trust problem: 1) the observed data are with sign
(1-bit) measurements; 2) they are typically sampled
non-uniformly. Most of the previous matrix com-
pletion methods do not well handle the two issues.
Motivated by the recent progress of max-norm, we
propose to solve the problem with a 1-bit max-
norm constrained formulation. Since max-norm is
not easy to optimize, we utilize a reformulation of
max-norm which facilitates an efficient projected
gradient decent algorithm. We demonstrate the
superiority of our formulation on two benchmark
datasets.
1 Introduction
With the increasing popularity of social networks, there ex-
ist many interesting and difficult problems, such as friends
recommendation, information propagation, etc. In this paper,
we study the problem of social trust prediction, which aims
to estimate the positive or negative relationship among the
users based on the existing trustness information associated
with them. This problem plays an important role in social
networks as the system can block the invitation from some-
one that the user does not trust, or recommend new friends
who enjoys a high reputation.
the
trust
within
the
matrix
social
problem
Naturally,
formulated
can
completion
be
[Liben-Nowell and Kleinberg, 2007]
framework
[Billsus and Pazzani, 1998].
the (i, j)-th entry
of the observed data matrix Z ∈ Rn×n is a 1-bit code
implying that the i-th user trusts the j-th user if Zij = 1.
Here, n denotes the number of users. However, what we
observe is only a small fraction of the entries, whose values
are zero. And our goal is to estimate the missing entries
according to the 1-bit measurements in Z.
That
is,
Note that the problem is ill-posed if no assumption is im-
posed on the structure of the data. To solve the problem,
a number of methods are proposed. Generally, existing so-
cial trust prediction methods fall into three categories. The
first category is based on similarity measures or the struc-
tural context similarity [Newman, 2001] [Chowdhury, 2010]
[Katz, 1953] [Jeh and Widom, 2002], motivated by the in-
tuition that an individual tends to trust their neighbors, or
the ones with similar trusted people. The second is based
on low rank matrix completion [Billsus and Pazzani, 1998]
[Cai et al., 2010] [Huang et al., 2013], which assumes that
the underlying data matrix is low-rank or can be approximate
by a low-rank matrix. The third one models the problem as
a binary classification one and utilizes techniques such as lo-
gistic regression [Leskovec et al., 2010].
Challenges. However,
there are two issues emerging
in social trust prediction which are not well characterized
by the algorithms in previous works. First, the value of
the observed entry is either 1 or −1, which is analogous
to the binary classification problem. But in our problem,
we are handling much more complex matrix data. For-
tunately, [Srebro et al., 2004] presented a maximum margin
matrix factorization framework that unifies the binary prob-
lem for vector case and matrix case. The key idea in their
work is a low-norm matrix factorization, which will also be
utilized in this paper. Second, the locations of the entries are
sampled non-uniformly, which gaps the theory and practice
for a lot of matrix completion algorithms. To tackle this chal-
lenge, we suggest using the max-norm as a convex surrogate
for the rank function, which is shown to be superior to the
well-known nuclear norm when addressing the non-uniform
data [Salakhutdinov and Srebro, 2010].
Our contributions are two-folds: 1) To the best of our
knowledge, we are the first to address the social trust predic-
tion problem by utilizing a max-norm constrained formula-
tion. 2) Although a max-norm constrained problem can be
solved by SDP solvers and an accurate enough solution can
be achieved, we here utilize a projected gradient algorithm
that is scalable to large scale datasets. We empirically show
the improvement of our formulation for the non-uniform 1-bit
benchmarks compared to state-of-the-art solvers.
2 Related Work
interaction is investigated intensively in the last
Social
decades. The social interaction indicates the friendship, sup-
port, enemy or disapproval as shown in Figure 1. Online users
user-item matrix, such as transitivity. Meanwhile, the social
trust in reality is extremely sparse. For instance, Facebook
has hundreds of millions of users, but most of them have less
than 1,000 friends. Besides, the people with similar person-
ality tend to behave similarly. To sum up, the data matrix of
social trust has both sparse and low-rank structure. Thus, the
social trust prediction problem is especially suitable for the
matrix completion model. That is the focus of our paper.
The problem of matrix completion is to recover a low-rank
matrix from a subset of entries [Cand`es and Recht, 2009],
which is given by:
rank(X)
min
X
s.t. PΩ(X) = PΩ(Z)
(2.1)
where Z ∈ Rp×n is the data matrix, X is the recovered
matrix, and Ω is the index set of observed entries. Th op-
timization problem (2.1) is not only NP-hard, but requires
double exponential time complexity with the number of sam-
ples [Recht et al., 2010]. To solve the above problem, one
alternative is to use nuclear norm as a relaxation to the rank
function:
X∗
min
X
s.t. PΩ(X) = PΩ(M )
(2.2)
[Keshavan et al., 2010]
where X∗ denotes the sum of singular values of matrix
[Cai et al., 2010] developed a first-order procedure
X.
to solve the convex problem (2.2), namely singular
[Jain et al., 2010] minimized
value thresholding (SVT).
the rank minimization by the singular value projection
(SVP) algorithm.
solved the
trimming each row and column with
problem by first
too few entries,
then compute the truncated SVD of the
trimmed matrix.
it showed
accurate recovery on the order of nd log n samples (n is
the number of samples, d is the rank of recovered ma-
trix). With the rapid development of matrix completion
problem, some more efficient methods have been proposed
[Cand`es and Tao, 2010][Gross, 2011][Wang and Xu, 2012][Huang et al., 2013].
Under certain conditions,
However, all
the methods mentioned above use the
nuclear norm as the surrogate to the rank, whose ex-
act
recovery can be guaranteed only when the data
are sampled uniformly, which is not practical
in real
world applications. On the other hand, recent empiri-
cal on max-norm [Srebro et al., 2004] shows promising re-
sults for non-uniform data if one utilize the max-norm
as a surrogate [Salakhutdinov and Srebro, 2010]. Notably,
for some specific problems, such as collaborative filter-
ing, [Srebro and Shraibman, 2005] proved that the general-
ization error bound for max-norm is better than the nuclear
norm. More recently, [Shen et al., 2014] reported encourag-
ing results on the subspace recovery task (which is closely
relevant to matrix completion). Since the social trust data is
non-uniformly sampled, we believe that a max-norm regu-
larized formulation can better handle the challenge than the
nuclear norm. Our formulation is also inspired by a re-
cent theoretical study on matrix completion with 1-bit mea-
surement [Cai and Zhou, 2013], which established a minimax
Figure 1: Illustration of the data matrix of social trust. Each
column of the data matrix is a rating sample. Each entry is
a tag that a user assigns to another user. The symbol "+" de-
notes the "trust" relationship, "-" denotes "distrust" and "?"
means unknown relationship (that we aim to predict). Most
of the relationships are unknown, so the data is sparse. Typi-
cally, each individual has own preference and friendship net-
work, making the data non-uniform. Also noted that the data
matrix may not be symmetric.
rely on the trustworthiness information to filter information,
establish collaboration or build social bonds. Social networks
rely on the trust information to make recommendation, at-
tract users from other circles, or influencing public opinions.
Thus, the exploration of social trust has a wide range of ap-
plications, and has emerged as an important topic in social
network research. A number of methods are proposed.
Specifically,
commonly used to measure
One kind of methods are based on the similar-
Jaccard's coefficient
ity measurement.
the probability two
is
items that have a relationship.
Inspired by the met-
ric, Jeh and Widom [Jeh and Widom, 2002] proposed a
domain-independent
similarity measurement, SimRank.
[Newman, 2001] directly defined a score to verify the corre-
lation between common neighbors. Some methods are based
on relational data modeling, structural proximity measures
and stochastic relational model [Getoor and Diehl, 2005]
[Liben-Nowell and Kleinberg, 2007] [Yu et al., 2009]. The
above mentioned methods are mainly derived from the
solutions of link prediction. The link prediction is ori-
ented to network-level prediction, whereas social
trust
prediction focuses on person-level.
Another class of
methods are derived from the collaborative filtering meth-
ods, such as clustering techniques [Sarwar et al., 2001],
[Hofmann and Puzicha, 1999],
model-based
and the matrix factorization models [Srebro et al., 2003]
[Mnih and Salakhutdinov, 2007]. However, the data matrix
of trust has some structure properties different from the
methods
lower bound on the general sampling model and derived the
optimal convergence rate in terms of Frobenius norm loss.
Furthermore, there are several practical algorithms to solve
max-norm regularized or max-norm constrained problems,
see [Lee et al., 2010] and [Shen et al., 2014] for example.
2.1 Overview
After review of related work in Section 2, we introduce the
notations and formulate the problem in Section 3. Then
we give algorithm to solve the max-norm constrained 1-bit
matrix completion (MMC) problem in Section 4. Mean-
while, we also provide an equivalent SDP formulation for the
MMC, which can be accurately solved at the expense of effi-
ciency. Then we report the empirical study on two benchmark
datasets in Section 5. Section 6 concludes this paper and dis-
cusses possible future work.
3 Notations and Problem Setup
In this section, we introduce the notations that will be used in
this paper. Capital letters such as M are used for matrices and
lowercase bold letters such as v denotes vectors. The i-th row
and j-th column of a matrix M is denoted by m(i) and mj
respectively, and the (i, j)-th entry is denoted by Mij. For a
vector v, we use vi to denote its i-th element. We denote the
ℓ2 norm of a vector v by kvk2. For a matrix M ∈ Rp×n, we
denote the Frobenius norm by kM kF and kM k2,∞ denotes
the maximum ℓ2 row norm of M , i.e.,
otherwise. However, it is usually intractable to optimize the
above program as the rank function is non-convex and non-
continuous [Recht et al., 2010]. One common approach is to
use the nuclear norm as a convex surrogate to the rank func-
tion. However, it is well known that the nuclear norm can-
not well handle the non-uniform data. Motivated by the re-
cent progress in max-norm [Salakhutdinov and Srebro, 2010;
Cai and Zhou, 2013; Shen et al., 2014], we use the max-
norm as an alternative convex relaxation, which gives the fol-
lowing formulation:
min
X
1
2
kPΩ(Z − X)k2
F ,
s.t. kXkmax ≤ λ2,
(3.2)
where λ is some tunable parameter.
4 Algorithm
The max-norm is convex and moreover, it can be solved by
any SDP solver. Formally, we have the following lemma:
Lemma 4.1 ([Srebro et al., 2004]). For any matrix X ∈
Rp×n and λ ∈ R, kXkmax ≤ λ if and only if there ex-
ist A ∈ Rp×p and B ∈ Rn×n, such that (cid:2) A X
definite positive and each diagonal element in A and B is
upper bounded by λ.
X ⊤ B(cid:3) is semi-
With Lemma 4.1 on hand, one can formulate Problem 3.2
as an SDP:
kM k2,∞ :=
p
max
i=1
km(i)k2 .
min
X,A,B
1
2
kPΩ(Z − X)k2
F ,
We further define the max-norm of M [Linial et al., 2007],
s.t. Aii ≤ λ2, Bjj ≤ λ2, ∀ i ∈ [p], j ∈ [n],
(4.1)
kM kmax =
min
U,V,M=U V ⊤
max{kU k2
2,∞ , kV k2
2,∞},
(3.1)
where we enumerate all possible factorizations to obtain the
minimum.
Intuition on max-norm. At a first sight, the max-norm is
hard to understand. We simply explain why it is a tighter
approximation to the rank function than the nuclear norm.
Again, we write the nuclear norm of M as a factorization
form [Recht et al., 2010]:
kM k∗ :=
min
U,V,M=U V ⊤
1
2(cid:16)kU k2
F + kV k2
F(cid:17) .
Note that the Frobenius norm is the sum of the square of the
ℓ2 row norm. Thus, a nuclear norm regularizer actually con-
strains the average of the ℓ2 row norm, while the max-norm
constrains the maximum of the ℓ2 row norm!
Given the observed data Z ∈ Rp×n, we are interested in
approximating Z with a low-rank matrix X, which can be
formulated by,
minimize
1
2
kPΩ(Z − X)kF ,
s.t. rank(X) ≤ d,
where Ω is an index set of observed entries and d is some
expected rank. PΩ(M ) is a projection operator on a ma-
trix M such that PΩ(mij ) = mij if (i, j) ∈ Ω and zero
(cid:20) A X
X ⊤ B(cid:21) (cid:23) 0.
And this program can be solved by any SDP solver to obtain
accurate enough solution.
However, SDP solvers are not scalable to large matrices.
Thus, in this paper, we apply a projected gradient method to
solve Problem (3.2), which is due to [Lee et al., 2010]. A key
technique is the reformulation of the max-norm (3.1). As-
sume that the rank of the optimal solution X ∗ produced by
the SDP (4.1) is at most d. Then we can safely factorize
X = U V ⊤, with U ∈ Rp×d and V ∈ Rn×d. Combining
the factorization and the definition, we obtain the following
equivalent program :
1
min
U,V
2(cid:13)(cid:13)PΩ(Z − U V ⊤)(cid:13)(cid:13)
s.t. kU k2,∞ ≤ λ, kV k2,∞ ≤ λ.
2
F ,
(4.2)
Note that the gradient of the objective function w.r.t. U and
V can be easily computed. That is,
Here, for simplicity we define
∇U f (Z, U, V ) = PΩ(cid:0)(U V ⊤ − Z)V(cid:1) ,
∇V f (Z, U, V ) = PΩ(cid:0)(V U ⊤ − Z ⊤)U(cid:1) .
2(cid:13)(cid:13)PΩ(Z − U V ⊤)(cid:13)(cid:13)
f (Z, U, V ) =
2
F .
1
(4.3)
Algorithm 1 Max-norm Constrained 1-Bit Matrix Comple-
tion (MMC)
Input: Z ∈ Rp×n (observed samples), parameters λ, initial
solution (U0, V0), maximum iteration τ.
Output: Optimal solution (U ∗, V ∗).
1: for t = 1 to τ do
2:
Compute the gradient by Eq. (4.3):
U ′
t = ∇U f (Z, U, Vt−1) U=Ut−1 ,
V ′
t = ∇V f (Z, Ut−1, V ) V =Vt−1 .
3:
4:
Compute the step size αt according to Armijo rule.
Compute the new iterate:
Ut = Π(Ut−1 − αtU ′
t),
Vt = Π(Vt−1 − αtV ′
t ).
5: end for
The inequality constraints can be addressed by a projection
step. That is, when we have a new iterate (Ut, Vt) at the t-
th iteration, we can check if they violate the constraints. If
not, we can proceed to the next iteration. Otherwise, we can
re-
scale the rows of U and/or V by
kV k2,∞
spectively. In this way, we have the projection operator:
and/or
λ
λ
kUk2,∞
Π(M ) =( λ
kMk2,∞
M,
M,
if kM k2,∞ > λ,
otherwise.
(4.4)
If we further pick the step size αt via the Armijo
rule [Armijo and others, 1966],
it can be shown that
the sequence of (Ut, Vt) will converge to a stationary
point [Bertsekas, 1999]. The algorithm is summarized in Al-
gorithm 1.
The benefits of applying the factorization on the max-norm
are two-folds: 1) the memory cost can be significantly re-
duced from O(pn) of SDP to O(d(p + n)). 2) it facil-
itates the projected gradient algorithm, which is computa-
tionally efficient when working on large matrices (see Sec-
tion 5). However, note that Problem (4.2) is non-convex. For-
tunately, [Burer and Monteiro, 2005] proved that as long as
we pick a sufficiently large value for d, then any local mini-
mum of Eq. (4.2) is a global optimum. In Section 5, we will
report the influence of d on the performance. Actually, in
Algorithm 1, the stopping criteria is set to be a maximum it-
eration. One may also check if it reaches a local minima as
the stopping criteria, as discussed in [Cai and Zhou, 2013].
5 Experiments
In this section, we empirically evaluate our method for the
matrix completion performance. We will first introduce the
used datasets. In the experimental settings, we present the
comparative methods and evaluation metrics. Then we report
encouraging results on two benchmark datasets. We also ex-
amine the influence of matrix rank d.
5.1 Datasets
We conduct the experiments on two benchmark datasets:
Epinions and Slashdot. In these two datasets, the users are
connected by explicit positive (trust) or negative (distrust)
links (i.e., the 1-bit measurements in Z). The first dataset con-
tains 119,217 nodes (users) and 841,000 edges (links), 85.0%
of which are positive. The Slashdot dataset contains 82,144
users and 549,202 links, and 77.4% of the edges are labeled
as positive. Table 1 gives a summary description about the
subset used in our experiment.
It is clear that the distribution of links are not uniform
since each user has his/her individual preference and own
friendship network. Following [Huang et al., 2013], we se-
lect 2,000 users with the highest degrees from each dataset to
form the observation matrix Z.
Table 1: Description of 2 datasets
Dataset
#of Users
#of Trust
#of Distrust
Epinions
2,000
171,731
18,916
Slashdot
2,000
68,932
20,032
5.2 Experimental Settings
Baselines.
We choose four state-of-the-art methods
including SVP [Jain et al., 2010], SVT
as baselines,
[Cai et al., 2010], OPTSpace [Keshavan et al., 2010] and
RRMC [Huang et al., 2013]. Since SVT and RRMC need
a specified rank, we tune the rank for these methods and
choose the best performance as the final result.
Evaluation Metric. Let T be the index set of all observed
entries. We use two evaluation metrics to measure the per-
formance, mean average error (MAE) and root mean square
error (RMSE), computed as follows:
M AE = X(i,j)∈T \Ω
RM SE =s X(i,j)∈T \Ω
(Xij − Mij)/(T − Ω),
(Xij − Mij)2/(T − Ω),
4.1 Heuristic on λ
The λ is the only tunable parameter in our algorithm. For
our problem, note that the data is of 1-bit measurements, i.e.,
Zij = 1 for (i, j) ∈ Ω. Also note that Zij = u(i)v(j)⊤.
Thus,(cid:12)(cid:12)u(i)v(j)⊤(cid:12)(cid:12) = 1. So we have λ ≥ 1. However, if we
choose a large λ, the estimation Xij may deviate away from
1. We find that λ = 1.2 lead to satisfactory improvement.
where T denotes the cardinality of T .
Training and Testing. We randomly split the dataset for
training and testing. In particular, the number of observation
measurements Ω for training ranges from 10% to 60%, with
step size 10%. For each split, we run all the algorithms for
20 trials, with the training data in each trail being randomly
sampled. Then, we report the mean and standard deviation of
MAE and RMSE over all 20 trials.
Observed entries (%)
10
20
30
40
50
60
Observed entries (%)
10
20
30
40
50
60
Table 2: MAE Results on Epinions Dataset
SVT
0.359±0.004
0.394±0.022
0.360±0.057
0.410±0.099
0.471±0.129
0.476±0.146
OPTSpace
0.289±0.019
0.236±0.005
0.219±0.009
0.205±0.008
0.197±0.007
0.197±0.003
Methods
SVP
0.450±0.008
0.294±0.002
0.248±0.001
0.224±0.001
0.210±0.001
0.199±0.001
RRMC
0.576±0.001
0.518±0.002
0.460±0.002
0.418±0.002
0.386±0.001
0.362±0.002
MMC
0.254±0.003
0.212±0.003
0.201±0.002
0.193±0.001
0.190±0.002
0.206±0.003
Table 3: RMSE Results on Epinions Dataset
SVT
0.513±0.010
0.559±0.031
0.532±0.082
0.620±0.171
0.719±0.225
0.728±0.288
OPTSpace
0.530±0.021
0.456±0.005
0.422±0.011
0.406±0.015
0.398±0.016
0.403±0.009
Methods
SVP
0.610±0.010
0.459±0.002
0.415±0.002
0.394±0.002
0.381±0.001
0.371±0.002
RRMC
0.650±0.001
0.606±0.002
0.563±0.002
0.533±0.002
0.509±0.001
0.491±0.002
MMC
0.466±0.004
0.406±0.004
0.383±0.002
0.371±0.002
0.364±0.001
0.365±0.002
5.3 Experimental Results
We report detailed results from Table 2 to Table 5. From
the results in Tables 2 and 3, we observe that MMC out-
performs the other methods in terms of both evaluation met-
rics on the Epinions dataset most of the time. In particular,
when there are few observations 10 % (which indicates a hard
task), MMC obtains the RMSE of 0.466, much better than
OPTSpace (0.530), SVP (0.610) and RRMC (0.650). Except
on the case with 60% observed entries, OPTSpace obtains the
smallest MSE with 0.197, but our algorithm is comparative
with 0.206. In a nut of shell, the gap between MMC and the
baselines becomes larger as the fraction of observed entries
decreases.
Similarly, our method achieves the least MAE and RMSE
on the Slashdot dataset (see Table 4 and 5). For instance with
30 % observed entries, MMC obtains the MAE with less than
0.4, much better than the comparative methods, such as SVT
(0.513), OPTSpace (0.427), SVP (0.501) and RRMC (0.686).
In terms of RMSE, in the case of 20% observed entries, the
RMSE values of other methods are all above 0.7 while our
method reaches 0.679. In sum, our method is superior than
the comparative methods on two real-life datasets in terms of
MSE and RMSE most of the time.
Since we have studied the effectiveness of our method, here
we examine the computational efficiency in Table 6, which is
important for practical applications. To test the time com-
plexity of the methods, we report the averaged time cost on
the Epinions dataset with 10% observed entries and Slash-
dot with 20% observed entries. To illustrate the trade-off be-
tween accuracy and efficiency, we also report the MAE and
RMSE. As we see, SVP is the most efficient method, whose
running time is 0.84 seconds on Epinions while ours is 1.92
seconds. On Slashdot, it also achieves the best performance
in terms of efficiency. However, our method enjoys a signifi-
cant improvement of MAE and RMSE compared to all base-
E
A
M
E
S
M
R
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0
1
0.9
0.8
0.7
0.6
0.5
0.4
0
d=1
d=5
d=50
d=100
d=300
d=500
30
90
60
Epoch
120 150
d=1
d=5
d=50
d=100
d=300
d=500
30
60
90
Epoch
120 150
Figure 2: MAE and RMSE in terms of different rank d on the
Epinions dataset.
Observed entries (%)
10
20
30
40
50
60
Observed entries (%)
10
20
30
40
50
60
Table 4: MAE Results on Slashdot Dataset
SVT
0.679±0.008
0.562±0.004
0.513±0.030
0.506±0.041
0.495±0.060
0.520±0.065
OPTSpace
0.554±0.017
0.458±0.008
0.427±0.009
0.395±0.009
0.376±0.004
0.362±0.011
Methods
SVP
0.755±0.005
0.582±0.007
0.501±0.003
0.460±0.002
0.432±0.002
0.413±0.002
RRMC
0.715±0.001
0.704±0.001
0.686±0.003
0.647±0.006
0.609±0.002
0.585±0.002
MMC
0.546±0.008
0.437±0.008
0.395±0.006
0.380±0.009
0.366±0.003
0.350±0.002
Table 5: RMSE Results on Slashdot Dataset
SVT
0.788±0.008
0.718±0.020
0.680±0.043
0.670±0.056
0.642±0.055
0.699±0.084
OPTSpace
0.826±0.021
0.704±0.013
0.652±0.006
0.620±0.009
0.596±0.009
0.577±0.011
Methods
SVP
0.873±0.004
0.746±0.007
0.680±0.003
0.647±0.003
0.624±0.003
0.609±0.002
RRMC
0.829±0.001
0.821±0.001
0.807±0.002
0.778±0.005
0.749±0.002
0.730±0.002
MMC
0.774±0.008
0.679±0.009
0.633±0.008
0.615±0.011
0.581±0.006
0.566±0.002
Table 6: The trade-off between accuracy and efficiency.
Dataset
Epinions
Slashdot
SVT
OPTSpace
SVP
MAE RMSE Time MAE RMSE Time MAE RMSE Time MAE RMSE Time MAE RMSE Time
1.92
0.466 0.618
0.618 0.728
2.41
43.11 0.262 0.481
44.12 0.437 0.679
0.576 0.651
0.715 0.830
26.76 0.288 0.531
50.73 0.458 0.705
15.26 0.450 0.610
9.23
0.582 0.746
0.84
0.83
RRMC
MMC
consistently outperformed them, which meets with recently
developed theories on max-norm. We also studied the trade-
off between the accuracy and efficiency and observed that
MMC achieved superior accuracy while keeping comparable
computational efficiency.
The max-norm has been studied for several years and in
many applications, such as collaborative filtering, clustering,
subspace recovery. It is empirically and theoretically shown
to be superior than the popular nuclear norm. This work in-
vestigates the power of max-norm for social trust problem
and demonstrates encouraging results.
It is interesting and
promising to apply max-norm as a convex surrogate to other
practical problems such as face recognition, subspace cluster-
ing etc.
lines. Also, our algorithm is orders of magnitude faster than
other three baselines. This implies that MMC favors a good
trade-off between the accuracy and efficiency.
5.4 Examine The Influence of d
The non-convex reformulation (4.2) requires an explicit rank
estimation d on the true matrix. In this section, we investigate
the influence of d on the Epinions dataset as an example. The
rank d is chosen from [1, 5, 50 ,100, 300, 500] and the results
are plot in Figure 2. We observe that the rank has little in-
fluence on the performance. This is possibly because that the
actual data has a low-rank structure (close to rank one). And
from [Burer and Monteiro, 2005], we know that if d is larger
than the actual rank, any local minimum of Eq. (4.2) is also a
global optima.
6 Conclusion and Future Work
In this paper, we formulated the social trust prediction in the
matrix completion framework. In particular, due to the spe-
cial structure of the social trust problem, i.e., the measure-
ments are 1-bit and the observed entries are non-uniformly
sampled, we presented a max-norm constrained 1-bit matrix
completion (MMC) algorithm. Since SDP solvers are not
scalable to large scale matrices, we utilized a non-convex re-
formulation of the max-norm, which facilitates an efficient
projected gradient decent algorithm. We empirically exam-
ined our algorithm on two benchmark datasets. Compared to
other state-of-the-art matrix completion formulations, MMC
[Leskovec et al., 2010] Jure Leskovec, Daniel Huttenlocher, and
Jon Kleinberg. Predicting positive and negative links in online
social networks. In WWW, pages 641 -- 650, 2010.
[Liben-Nowell and Kleinberg, 2007] David Liben-Nowell and Jon
Kleinberg. The link-prediction problem for social networks.
Journal of the American society for information science and tech-
nology, 58(7):1019 -- 1031, 2007.
[Linial et al., 2007] Nati Linial, Shahar Mendelson, Gideon
Schechtman, and Adi Shraibman. Complexity measures of sign
matrices. Combinatorica, 27(4):439 -- 463, 2007.
[Mnih and Salakhutdinov, 2007] Andriy Mnih
and
Ruslan
In NIPS,
Salakhutdinov.
pages 1257 -- 1264, 2007.
Probabilistic matrix factorization.
[Newman, 2001] Mark EJ Newman. Clustering and preferen-
Physical Review E,
in growing networks.
tial attachment
64(2):025102, 2001.
[Recht et al., 2010] Benjamin Recht, Maryam Fazel, and Pablo A
Parrilo. Guaranteed minimum-rank solutions of linear ma-
trix equations via nuclear norm minimization.
SIAM review,
52(3):471 -- 501, 2010.
[Salakhutdinov and Srebro, 2010] Ruslan
and
Nathan Srebro. Collaborative filtering in a non-uniform world:
Learning with the weighted trace norm. tc (X), 10:2, 2010.
Salakhutdinov
[Sarwar et al., 2001] Badrul Sarwar, George Karypis, Joseph Kon-
stan, and John Riedl. Item-based collaborative filtering recom-
mendation algorithms. In WWW, pages 285 -- 295, 2001.
[Shen et al., 2014] Jie Shen, Huan Xu, and Ping Li. Online op-
In NIPS, pages 1718 --
timization for max-norm regularization.
1726, 2014.
[Srebro and Shraibman, 2005] Nathan Srebro and Adi Shraibman.
In Learning Theory, pages
Rank, trace-norm and max-norm.
545 -- 560. 2005.
[Srebro et al., 2003] Nathan Srebro, Tommi
et al.
Weighted low-rank approximations. In ICML, volume 3, pages
720 -- 727, 2003.
Jaakkola,
[Srebro et al., 2004] Nathan Srebro, Jason DM Rennie, and Tommi
Jaakkola. Maximum-margin matrix factorization. In NIPS, vol-
ume 17, pages 1329 -- 1336, 2004.
[Wang and Xu, 2012] Yu-Xiang Wang and Huan Xu. Stability of
matrix factorization for collaborative filtering. ICML, 2012.
[Yu et al., 2009] Kai Yu, John Lafferty, Shenghuo Zhu, and Yihong
Gong. Large-scale collaborative prediction using a nonparamet-
ric random effects model. In ICML, pages 1185 -- 1192, 2009.
References
[Armijo and others, 1966] Larry Armijo et al. Minimization of
functions having lipschitz continuous first partial derivatives. Pa-
cific Journal of mathematics, 16(1):1 -- 3, 1966.
[Bertsekas, 1999] Dimitri P Bertsekas. Nonlinear programming.
1999.
[Billsus and Pazzani, 1998] Daniel Billsus and Michael J Pazzani.
Learning collaborative information filters. In ICML, volume 98,
pages 46 -- 54, 1998.
[Burer and Monteiro, 2005] Samuel Burer and Renato DC Mon-
teiro. Local minima and convergence in low-rank semidefinite
programming. Mathematical Programming, 103(3):427 -- 444,
2005.
[Cai and Zhou, 2013] Tony Cai and Wen-Xin Zhou. A max-norm
constrained minimization approach to 1-bit matrix completion.
The Journal of Machine Learning Research, 14(1):3619 -- 3647,
2013.
[Cai et al., 2010] Jian-Feng Cai, Emmanuel J Cand`es, and Zuowei
Shen. A singular value thresholding algorithm for matrix com-
pletion. SIAM Journal on Optimization, 20(4):1956 -- 1982, 2010.
J Cand`es and Benjamin
Recht. Exact matrix completion via convex optimization. Foun-
dations of Computational mathematics, 9(6):717 -- 772, 2009.
[Cand`es and Recht, 2009] Emmanuel
[Cand`es and Tao, 2010] Emmanuel J Cand`es and Terence Tao. The
power of convex relaxation: Near-optimal matrix completion.
IEEE Transactions on Information Theory, 56(5):2053 -- 2080,
2010.
[Chowdhury, 2010] Gobinda Chowdhury. Introduction to modern
information retrieval. 2010.
[Getoor and Diehl, 2005] Lise Getoor and Christopher P Diehl.
Link mining: a survey. ACM SIGKDD Explorations Newsletter,
7(2):3 -- 12, 2005.
[Gross, 2011] David Gross. Recovering low-rank matrices from
few coefficients in any basis. IEEE Transactions on Information
Theory, 57(3):1548 -- 1566, 2011.
[Hofmann and Puzicha, 1999] Thomas Hofmann and Jan Puzicha.
In IJCAI, vol-
Latent class models for collaborative filtering.
ume 99, pages 688 -- 693, 1999.
[Huang et al., 2013] Jin Huang, Feiping Nie, Heng Huang, Yi-
Cheng Tu, and Yu Lei. Social trust prediction using heteroge-
neous networks. ACM Transactions on Knowledge Discovery
from Data, 7(4):17, 2013.
[Jain et al., 2010] Prateek Jain, Raghu Meka, and Inderjit S
Dhillon. Guaranteed rank minimization via singular value pro-
jection. In NIPS, pages 937 -- 945, 2010.
[Jeh and Widom, 2002] Glen Jeh and Jennifer Widom. Simrank:
a measure of structural-context similarity. In ACM KDD, pages
538 -- 543, 2002.
[Katz, 1953] Leo Katz. A new status index derived from sociomet-
ric analysis. Psychometrika, 18(1):39 -- 43, 1953.
[Keshavan et al., 2010] Raghunandan H Keshavan, Andrea Monta-
nari, and Sewoong Oh. Matrix completion from a few entries.
Information Theory, IEEE Transactions on, 56(6):2980 -- 2998,
2010.
[Lee et al., 2010] Jason D Lee, Ben Recht, Nathan Srebro, Joel
Tropp, and Ruslan R Salakhutdinov. Practical large-scale op-
timization for max-norm regularization.
In NIPS, pages 1297 --
1305, 2010.
|
1912.12060 | 1 | 1912 | 2019-12-27T11:34:41 | Characterizing and Detecting Money Laundering Activities on the Bitcoin Network | [
"cs.SI",
"cs.CR",
"cs.LG"
] | Bitcoin is by far the most popular crypto-currency solution enabling peer-to-peer payments. Despite some studies highlighting the network does not provide full anonymity, it is still being heavily used for a wide variety of dubious financial activities such as money laundering, ponzi schemes, and ransom-ware payments. In this paper, we explore the landscape of potential money laundering activities occurring across the Bitcoin network. Using data collected over three years, we create transaction graphs and provide an in-depth analysis on various graph characteristics to differentiate money laundering transactions from regular transactions. We found that the main difference between laundering and regular transactions lies in their output values and neighbourhood information. Then, we propose and evaluate a set of classifiers based on four types of graph features: immediate neighbours, curated features, deepwalk embeddings, and node2vec embeddings to classify money laundering and regular transactions. Results show that the node2vec-based classifier outperforms other classifiers in binary classification reaching an average accuracy of 92.29% and an F1-measure of 0.93 and high robustness over a 2.5-year time span. Finally, we demonstrate how effective our classifiers are in discovering unknown laundering services. The classifier performance dropped compared to binary classification, however, the prediction can be improved with simple ensemble techniques for some services. | cs.SI | cs |
Characterizing and Detecting Money
Laundering Activities on the Bitcoin Network
Yining Hu1,2[0000−0002−6233−743X], Suranga Seneviratne3[0000−0002−5485−5595],
Fukuda4[0000−0001−8372−2807], and Aruna Seneviratne2[0000−0001−6894−7987]
Kanchana Thilakarathna3[0000−0003−4332−0082], Kensuke
1 Data61-CSIRO, Sydney, Australia
[email protected]
2 University of New South Wales, Sydney, Australia
[email protected]
3 University of Sydney, Sydney, Australia
{firstname.lastname}@sydney.edu.au
4 National Institute of Informatics, Tokyo, Japan
[email protected]
Abstract. Bitcoin is by far the most popular crypto-currency solution
enabling peer-to-peer payments. Despite some studies highlighting the
network does not provide full anonymity, it is still being heavily used for
a wide variety of dubious financial activities such as money laundering,
ponzi schemes, and ransom-ware payments. In this paper, we explore
the landscape of potential money laundering activities occurring across
the Bitcoin network. Using data collected over three years, we create
transaction graphs and provide an in-depth analysis on various graph
characteristics to differentiate money laundering transactions from regu-
lar transactions. We found that the main difference between laundering
and regular transactions lies in their output values and neighbourhood
information. Then, we propose and evaluate a set of classifiers based
on four types of graph features: immediate neighbours, curated features,
deepwalk embeddings, and node2vec embeddings to classify money laun-
dering and regular transactions. Results show that the node2vec-based
classifier outperforms other classifiers in binary classification reaching an
average accuracy of 92.29% and an F1-measure of 0.93 and high robust-
ness over a 2.5-year time span. Finally, we demonstrate how effective
our classifiers are in discovering unknown laundering services. The clas-
sifier performance dropped compared to binary classification, however,
the prediction can be improved with simple ensemble techniques for some
services.
Keywords: Bitcoin, Transaction Graph, Money Laundering
1
Introduction
The first successful peer-to-peer (P2P) financial system, Bitcoin [30], has evolved
over the years into a complex financial ecosystem with a large number of users,
different transaction types, and various support services. As of now, Bitcoin has
the highest market share of 50% among crypto-currencies [6] and performs over
300k transactions per day [7].
Driven by the pseudonymity provided by the network, many cyber-criminals
and hackers have started using Bitcoin for illegal activities. For example, Silk
Road [12], an online market place for illegal goods and services, accepted bit-
coins as their payment method to hide the identities of the sellers and buyers.
More recently, ransom-ware attacks WannaCry and Petaya [14] also accepted
Bitcoin payments from victimized computer owners to unlock their machines.
Other activities that involve the misuse of Bitcoin include money laundering via
mixing to hide the origin of illegally obtained money [29,16], and ponzi scheme,
a pyramid scheme that pays old users with investments from new users [17].
In this paper, we investigate money laundering activities, one of the main mis-
uses of Bitcoin [29]. While there are public websites such as Blockchain Info [7],
BitcoinWhosWho [5], WalletExplorer.com [13] that collect de-anonymized Bit-
coin services and tag those involved in money laundering, new money laundering
services emerge frequently due to the unregulated and P2P nature of Bitcoin.
Although several efforts have been made to understand and detect laundering
activities [17,16,39], existing studies have not looked at the graph properties of
laundering and regular transactions in detail, they also have not fully explored
the potential of automatically created node embeddings using techniques such
as deepwalk [32] and node2vec [24]. In this paper, we first explore money laun-
dering transactions on the Bitcoin network from a graph theoretic perspective
and compare their characteristics to regular transactions. We find that although
some manually extracted statistical and network features follow different distri-
butions for laundering and regular transactions, they are not sufficiently effective
in detecting laundering transactions. We show that random-walk based graph
representation learning algorithms -- deepwalk [32] and node2vec [24] significantly
outperform manually created features for this task. This paper makes the fol-
lowing contributions:
-- With Bitcoin data collected over three years, we characterize graph prop-
erties of money laundering transactions and highlight their differences in
comparison to regular transactions.
-- We show that laundering transactions are distinguishable from regular trans-
actions in several statistical and network features including in-degree/out-
degree ratio, sum/mean/standard deviation of output values, and number of
weakly connected components -- the size of the subgraph a transaction belongs
to. Nonetheless, these metrics are not effective for the binary classification
of money laundering and regular transactions.
-- We show a node2vec-based classifier achieves the highest performance in
classifying laundering and regular transactions. We also show the robustness
of the classifier by applying it to randomly selected weeks across a large
timescale of two and a half years and show that results remain consistent.
-- Finally, we demonstrate the performance of our classifiers in detecting un-
known money laundering transactions. The classifier performance decreases
2
compared to the binary classification, but can be improved with simple en-
semble techniques.
The remainder of the paper is organized as follows. Section 2 discusses re-
lated work that motivated our research. Section 3 presents details of our data
collection, ground truth labelling and how we created the Bitcoin transaction
graphs. Section 4 characterizes the properties of money laundering transactions
in comparison to regular transactions. Section 5 presents the classifier design
and classification results, followed by Section 6 which presents the new money
laundering service discovery results. Section 7 concludes the paper.
2 Related Work
Bitcoin Network Characterization Ron and Shamir [37] found a significant
variance in the distribution of various Bitcoin addresses, accumulated balance
and number of transactions per user providing empirical evidence that a lim-
ited number of Bitcoin entities control the majority of addresses, transactions
and bitcoins. Lischke et al. [27] conducted a study on the Bitcoin transaction
graph during its first four years. Authors observed the distribution of several
graph metrics such as in-degree, out-degree and clustering coefficient of the en-
tire transaction graph. They also analyzed the economic and network aspects
of multiple major Bitcoin businesses and markets including SatoshiDice and
Mt.Gox. Similar studies include [31,38]. In this paper, we analyse the graph
characteristics of potential laundering and regular transactions separately with
the objective of coming up with a transaction classifier.
Address De-anonymization Multiple studies explored the possibility of de-
anonymizing Bitcoin addresses [36,28,20]. Reid et al. [36] found external informa-
tion, such as user registration details and voluntary disclosure of public-keys, can
be used to link Bitcoin addresses to real-life users. Meiklejohn et al. [28] proposed
two address clustering heuristics to aggregate Bitcoin transactions: i) addresses
associated with the input UTXOs of a transaction belonging to the same user
and ii) the change address that is created when the sum of input UTXOs exceeds
the amount to pay also belongs to the sender. Using these heuristics, a number of
services and their Bitcoin addresses have been identified in the literature [16,17]
and online forums [4,13,5,7]. We establish our ground truth labelling based on
these identified services and their addresses.
Service Analysis and Anomaly Detection Driven by its pseudonymity,
there also exists a number of dubious and potentially illegal services in the
Bitcoin network. Moser et al. [29] found services such as Bitcoin Fog, that hide
transaction origins by withholding multiple small inputs and bundling them into
a smaller number of larger outputs. Ferrin et al. [21] later discovered a common
pattern of transaction mixing which is to form a "mixing cloud" that contains
multiple interconnected "joint transactions", which result from layering multiple
transactions into a single larger transaction.
3
More recently, machine learning methods are being applied to detect poten-
tially illegal Bitcoin activities. Early studies often relied on the metadata and
the temporal features of addresses or transactions. Pham et al. [33] performed
k-means clustering on both the transaction graph and user graph and applied
outlier detection to find suspicious transactions and users, however they were
only able to detect one out of 30 known cases of theft. Bartoletti et al. [17]
applied several supervised learning techniques to detect Bitcoin addresses asso-
ciated with ponzi schemes using temporal features such as total address lifetime
and active days. Weber et al. [39] recently presented a study on detecting Bit-
coin laundering transactions using network features and node embeddings. The
authors created 49 independent graphs over a total period of 2 weeks, using the
first 34 graphs for training and the rest for testing and achieved an F1-measure of
over 0.7 with Graph Convolutional Networks (GCN) and EvolveGCN. They also
published a dataset containing the extracted network features, an anatomized
edge list and labels [8]. However, no information was provided on the ground
truth labelling process as well as the exact features the authors used, making it
hard to apply the solution in other datasets. While our work is complementary
to this study, we analyse data in a much larger time span of over three years,
evaluate quantitatively different types of metadata and graph features, and ad-
dress more realistic and challenging scenarios of operating on larger graphs and
discovering new money laundering instances.
3 Data
We next describe how the transaction graphs are built, our data collection pro-
cess, and the methodology of establishing the ground truth.
3.1 Bitcoin Transaction Graph
A Bitcoin transaction, identified by a unique id, comprises a list of input and
output unspent transaction outputs, or UTXOs. UTXOs are indivisible chunks of
bitcoins attached to specific owners. A Bitcoin transaction consumes UTXOs by
unlocking them with the sender's signature, and creates new UTXOs designated
to recipients. This is how bitcoins are transferred among users, i.e., by creating
chains of transactions as shown in Figure 1. Each node represents a transaction
and a directed edge between two nodes exists if an output UTXO of a transaction
becomes an input UTXO of a succeeding transaction. For example, an edge is
created from transaction Tx3 to transaction Tx4 as UTXO8 serves as an output
for Tx3 and an input for Tx4. We utilize these transaction chains to create
transaction graphs. We did not explore user (address) graphs in this paper, as
new addresses can be easily created and manipulated.
3.2 Data Collection and Labelling
Data Collection We ran a Bitcoin Core client under the version bitcoin-
0.15.0 [3] to collect block data, and parsed the block data with a simple parser [2]
4
Fig. 1: A simple Bitcoin transaction chain.
to obtain transaction information. For each transaction, we extracted its times-
tamp, previous transactions (cf. Part 3.1), number and value of input and output
UTXOs. Our dataset was collected between 07/2014 and 05/2017.
Ground Truth Labelling We identify several laundering and regular services
and their addresses. We consider all transactions associated with these addresses
as our labelled ground truth.
Money laundering Laundering services disguise the origin of bitcoins by mix-
ing different users' transactions, and many of them are potentially malicious [29]
Our selection of money laundering services is based on existing literature [29,16],
news articles and address tags from trusted online resources, e.g., WalletEx-
plorer.com [13], a website that tracks Bitcoin wallets and aggregates relevant
addresses. In total we found 4 major laundering services with more than 22,000
transactions each. Our selection include AlphaBay [10], BTC-e [1], Bitmixer [9]
and HelixMixer [16]. Figure 2 shows the accumulated number of daily trans-
actions during the active periods of the four laundering services, as well as a
combined sum across all these services. For example, BTC-e was active between
08/14-05/17, and generated nearly six million transactions in total.
Fig. 2: Service active period and accumulated number of transactions.
5
Inputs:UTXO1Tx1Outputs:UTXO2UTXO3Inputs:UTXO4UTXO5Tx2Outputs:UTXO6Inputs:UTXO2UTXO6Tx3Outputs:UTXO7UTXO8Inputs:UTXO8Tx4Outputs:UTXO9UTXO102014-092015-012015-052015-092016-012016-052016-092017-012017-05101103105107Accumulated number of transactionsAlphaBayBitmixerBTC-eHelixMixerCombinedRegular The exchange sector has the highest number of operating entities, as
most new users begin trading on Bitcoin via exchanges [23]. This is followed by
wallet services with 5.8 − 11.5 million active users [35]. Payment services such
as CoinPayment and Bitpay are also often linked to banking institutions and
existing payment networks. As the lines between different sectors have become
increasingly blurred [35], when labelling regular services, we randomly selected
9 active, large-scale exchange, payment and wallet services from the top wallet
list on WalletExplorer.com [13], with reference to existing studies [34].
We label all transactions related to regular services as regular and those
associated with laundering services as laundering, similar to the ground truth
labelling in [17]. To ensure the correctness of labelling, we have eliminated all
transactions with conflicting labels [20]. Table 1 summarizes our data collection
with the total number of laundering and regular transactions, active periods of
laundering services, as well as the percentage of labelled laundering and regular
transactions among all existing transactions.
Table 1: Data collection.
Service
AlphaBay
Bitmixer
BTC-e
HelixMixer
Laundering
Regular
Number of Tx.s Active period Percentage
1,168,382
22,122
5,665,400
605,991
7,461,895
37,907,769
08/15-04/17
09/14-06/17
08/14-06/17
12/15-08/16
-
-
0.97%
0.01%
2.93%
0.56%
4.29%
22.98%
4 Graph Characterization
We next provide a characterization of Bitcoin transaction graphs, with a focus
on the difference between laundering and regular transactions.
4.1 Graph Evolution
We first show the growth of Bitcoin network using directed daily transaction
graphs created between 07/2014-05/2017. We calculated the number of nodes,
number of edges, and graph density for each graph. Figure 3 shows the evolu-
tion of these 3 metrics over the approximate 3-year time span. Both number
of nodes and number of edges continued to increase, and started to saturate
in early 2017. The decrease in graph density suggests transactions have fewer
inputs and outputs on average in more recent years. This could be due to the
growing number of wallet or payment services that run specific algorithms to
construct transactions. The periodic fluctuations can be ascribed to the diffi-
culty adjustment embedded in the Bitcoin Proof-of-Work (PoW) protocol [15].
6
As the total hashrate changes, to maintain the constant 10 minute block time,
Bitcoin adjusts PoW difficulty every 2016 blocks, which approximately was 2
weeks in 2016 [11].
(a) Node
(b) Edge
(c) Graph density
Fig. 3: Evolution of daily transaction graphs.
4.2 Feature Characterization
We then look at transaction values, calculated as the sum of all output UXTOs.
Figure 4 shows the daily average value of laundering and regular transactions.
On average, laundering transactions carry 38.8 bitcoins per day, while regular
transactions only have 29.1 bitcoins per day. Laundering transactions also carry
higher values than regular ones 77.3% of the time.
Fig. 4: Average daily transaction value by service type.
For each directed daily transaction graph, we calculate basic features such
as number of input UTXOs (or in-degree), number of output UTXOs (or out-
degree), sum/mean/standard deviation (std) of outputs, and network features
such as centrality measures, PageRank, and clustering co-efficient [19]. We ex-
tracted a total of 14 features for each transaction. We performed a feature impor-
tance analysis using an Adaptive Boost (Adaboost) [22] classifier with a Decision
Tree based estimator of maximum depth 5. We selected 5 most discriminating
features based on the importance score, among which the in-degree/out-degree
ratio provides information on edges; the sum/mean/std of outputs relate to
UTXO values; and the weakly connected components relate to a transaction's
neighbourhood.
7
2015201620170.10.20.30.40.50.60.7Number of nodes (million)2015201620170.10.20.30.40.50.60.70.8Number of edges (million)2015201620170.050.100.150.200.250.30Graph density (10e-4)2014-092015-012015-052015-092016-012016-052016-092017-012017-05101101103Transaction balanceLaunderingRegularFigure 5 shows the distribution of these 5 features of laundering and regu-
lar transactions separately. Compared to regular transactions, a larger portion
of laundering transactions have high in-degree/out-degree ratio. The resulting
distribution confirms laundering services operate by bundling small transactions
from various users and forming new ones, which is also discussed in Section 2. The
CDF curves for sum, mean and std of output UTXOs of laundering transactions
are slightly steeper than those of regular transactions. This indicates laundering
transactions create similar number and value of output UTXOs, which also con-
firms the findings in [29]. Laundering transactions also have a slightly smaller
number of weakly connected components than regular transactions. This is re-
sulted from the scales of different services. As services tend to send and receive
transactions using addresses associated to them, directly connected transactions
are more likely to belong to a same service. We leverage this observation later
to design the baseline classifier in Section 5.
(a) In/Out Ratio (b) Sum of outputs(c) Mean of outputs (d) Std of outputs
(e) Components
Fig. 5: Feature distribution for money laundering and regular transactions.
To further understand the service-wise differences, we provide a more detailed
comparison in Figure 6. Although there are some differences among laundering
transactions related to different services, these transactions are individually dis-
tinguishable from regular ones in the selected features. Among the 4 laundering
services studied, BTC-e shows the most similar feature distributions as regular
transactions. Bitmixer, on the other hand, behaves similarly to HelixMixer.
(a) Ratio
(b) Sum of outputs(c) Mean of outputs (d) Std of outputs
(e) Components
Fig. 6: Service-wise feature distribution.
8
1031011011030.00.20.40.60.81.0CDFMoney LaunderingRegular1061031001030.00.20.40.60.81.0CDFMoney LaunderingRegular1061031001030.00.20.40.60.81.0CDFMoney LaunderingRegular101910121051020.00.20.40.60.81.0CDFMoney LaunderingRegular1011021031041051060.00.20.40.60.81.0CDFMoney LaunderingRegular1031011011030.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular1061031001030.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular1061031001030.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular101910121051020.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular1011021031041051060.00.20.40.60.81.0CDFAlphaBayBitmixerBTC-eHelixMixerRegular5 Detecting Money Laundering Activities
We next build multiple classifiers to detect laundering transactions using the
partially labelled dataset described in Section 3. We train our classifiers with
four different features -- nodes' immediate neighbours, curated features, deepwalk
embeddings and node2vec embeddings. We used accuracy -- the total percentage
of regular and laundering transactions that are correctly identified, and F1-
measure -- the harmonic mean of precision and recall -- as evaluation metrics.
5.1 Transaction Classifiers
The design details of our four classifiers are discussed below.
Immediate Neighbour-Based Classifier Since transactions from a same
service tend to be more connected (cf. Section 4.2), as a first step, we classify
unlabelled transactions based on their nearest neighbours. This classifier works
under the following criteria: 1) a node with more immediate regular neighbours
than laundering neighbours is classified regular, 2) a node with more or equal
number of immediate laundering than regular neighbours is classified laundering,
and 3) a node with no regular or laundering neighbours is classified regular -- this
criterion is required due to the unlabelled nodes in the graph.
Curated Features We trained an Adaboost classifier with a Decision Tree
base-estimator using the 14 statistical and network features discussed in Sec-
tion 4. Hyper-parameter tuning results when varying the maximum depth and
number of estimators are presented in Appendix A.
Deepwalk Graph representation learning via random walks has become a com-
mon technique to analyse graph structures in recent years [26]. These algorithms
can automatically create feature vectors for graph nodes in an unsupervised man-
ner, and achieve better scalability and performance than manually extracted
features in various scenarios. A widely used algorithm -- deepwalk [32] -- leverages
random walks of specified number of walks per node and walk length to uniformly
sample a node's neighbourhood.
Node2vec A more recent technique, node2vec [24], uses 2 more parameters --
the return parameter p and the in-out parameter q -- to more precisely guide the
walks. When p is high (> max(q, 1)), the same nodes will not be revisited in the
next 2 steps [24], and when p is low (< max(q, 1)), the walks will remain close
to the starting node. When q and p both equal to 1, node2vec creates random
walks in a uniform manner, similar to deepwalk.
Deepwalk and node2vec are strictly transductive [25], and can only predict
unlabelled nodes on the same graph, hence we created transaction graphs that
cover the entire duration of training and testing, and only considered nodes on
the giant component [18]. We also used undirected graphs to better explore the
9
graph structure. For both binary classification and new instance prediction in
Section 6, we started random-walks from all labelled nodes in the training set
and all labelled and unlabelled nodes in the testing set to ensure no pre-assumed
knowledge on the testing nodes. We used 100 (number of walks per node), 100
(walk length), 25 (embedding dimension) for both deepwalk and node2vec, and
2 (p), and 0.5 (q) for node2vec. We fed the embedding vectors into an Adaboost
classifier with a Decision Tree base classifier (maximum depth = 5, number of
estimators = 40) for binary classification. Details on the selection of random-
walk parameters and walk starting nodes are provided in Appendix A.
5.2 Classifier Performance Comparison
We set the experiment duration to 1 week with the first 5 days for training and
last 2 days for testing. To compare the performance of the above 4 classifiers, we
selected 5 consecutive weeks in late 2014, and present the results averaged over
these weeks below. In addition, we also applied two simple ensemble techniques
to the prediction results using curated features and node2vec embeddings. In
"OR" ensemble, we label a transaction as laundering if either classifier labels it as
laundering. While in "AND" ensemble, we only label a transaction as laundering
if both classifiers do so.
Table 2 shows the node2vec-based classifier with proper parameter settings
outperforms the other three classifiers achieving an average accuracy of 92.05%
and an average F1-measure of 0.94. Information from a transaction's immedi-
ate neighbours is not sufficient in detecting laundering transactions. Although
some differences can be observed in the feature distribution (cf. Section 4),
manually extracted statistical and network features cannot effectively differ-
entiate laundering and regular transactions. Calculating network features on
these large transaction graphs can also be very time-consuming. Both deepwalk
and node2vec performed well in binary classification, while node2vec produced
slightly better results than deepwalk. "OR" ensemble improved the node2vec
classifier performance as it helps to capture more laundering nodes. "AND"
ensemble on the other hand drastically diminished the performance of both clas-
sifiers, as more laundering transactions are wrongly detected as regular.
Table 2: Classifier Performance.
Classifier
Neighbourhood
Manually extracted features
Deepwalk
Node2vec
"OR" ensemble
"AND" ensemble
Accuracy (%) F1-measure
28.46
65.34
91.72
92.05
92.74
21.47
0.09
0.45
0.94
0.94
0.95
0.02
10
5.3 Over-time Classification Results With Node2vec
We then applied the node2vec-based classifier with proper parameters on one
random week per month between 08/2014-01/2017. Figure 7 illustrates the clas-
sifier performance over the entire experimentation period. To ensure training
reliability, we have removed scenarios with less than 150 laundering samples in
training. The classifier performance was robust and achieved an average accuracy
of 92.29% and F1-measure of 0.93 across the selected weeks.
Fig. 7: Node2vec classifier performance over time.
6 Predicting New Money Laundering Instances
We next apply a curated feature-based classifier and a node2vec-based classifier
with corresponding parameters to detect previously unseen laundering trans-
actions. We selected AlphaBay, Bitmixer and HelixMixer for comparison. For
every 2 or 3 months during a service's active period, we randomly selected one
week to leave the target service out and train the model using the remaining
services. Then, we evaluated the model's ability to discover the left-out service.
Figure 8 compares the classifier performance and prediction ensemble for the 3
selected services, averaged over their respective experiment periods.
Compared to the classification results in Section 5, the classifier perfor-
mance decreases when predicting instances from new services. Nonetheless, the
node2vec classifier was able to achieve 95.2% accuracy in detecting HelixMixer
with a F1-measure of 0.3. As observed in Figure 6, there are differences in sev-
eral features among these services. When applying node2vec, the random walks
cannot effectively explore the neighbourhoods of transactions belonging to a dif-
ferent service. The class imbalance also becomes more significant when splitting
training and testing sets by service, resulting in more malicious nodes being clas-
sified as regular. "OR" ensemble improves the F1-measure, as it tends to capture
more malicious transactions. "AND" ensemble on the other hand improves the
accuracy as more regular transactions are correctly identified.
In the case of Bitmixer, there are on average 66 laundering transactions and
24,428 regular transactions in the test set of each week. This significant class
imbalance causes an extremely low F1-measure, which is not improved even with
the proposed ensemble techniques. As for AlphaBay and HelixMixer, which have
11
15-08-201426-02-201513-08-201525-03-201628-10-20160.00.20.40.60.81.0ScoresAccuracyF1-measurediscriminating features compared to regular transactions, the F1-measure using
the curated feature-based classifier increases as more laundering transactions
can be easily distinguished from regular ones. Both services also have sufficient
samples, with an average money laundering to regular ratio being 10,485/18,727
and 2,287/24,842 respectively. When applying node2vec, their transactions are
more often covered by random walks and are hence more correctly identified.
Since the prediction results are also affected by the number of testing samples,
it can be inferred that laundering services need to grow to a certain extent for our
classifiers to be effective. Services with a small number of transactions are hard
to predict, and hence they can operate unnoticed and last longer than services
who create a higher transaction volume.
(a) Accuracy
(b) F1-measure
Fig. 8: Comparison of classifier performance for different services.
7 Concluding Remarks
We characterized Bitcoin transaction graphs and studied patterns of money laun-
dering and regular transactions on data collected over three years. Our study
found that money laundering transactions tend to have a higher in-degree/out-
degree ratio, more uniform sum, mean and std of outputs, and a slightly smaller
number of weakly connected components compared to regular transactions. We
also show that BTC-e behaves similarly to regular services, while Bitmixer and
HelixMixer have the most similar behaviors among the 4 selected laundering ser-
vices. The preliminary classification and prediction results using an Adaboost
classifier proved we can differentiate money laundering from regular transactions,
and predict new instances using node2vec embeddings. Results also showed the
classifier performance can be improved with ensemble techniques. Future work
will mainly focus on the two aspects below.
Ground Truth Labelling We operated on a fraction (≈ 27%) of Bitcoin trans-
actions belonging to a limited number of identified services. A larger fraction
of transactions remain unlabelled. Finding sufficient volumes of reliably labelled
12
AlphaBayBitmixerHelixMixer020406080100AccuracyCurated FeaturesNode2vecOR EnsembleAND EnsembleAlphaBayBitmixerHelixMixer0.00.51.0F1-measureCurated FeaturesNode2vecOR EnsembleAND Ensembledata for potentially illegal activities such as money laundering is always chal-
lenging. As we used data labelled by volunteers, there exist conflicting labels for
certain transactions. In this paper, we limit ourselves to the most reliable tags
based on information from existing literature and trusted websites. In the future,
semi-supervised approaches such as label propagation [41] and label spreading [40]
can be leveraged to further improve the performance.
Transductive Graph Embeddings As mentioned in Section 5, node2vec is strictly
transductive and can only be used to predict unknown nodes on the same graph.
One requirement for analysing temporal graphs is the possibility of making
predictions to previously unseen nodes. Recent developments based on graph
convolutions such as GraphSage [25] which allow embeddings learned from one
graph to be used in prediction on a completely different graph can be explored.
Nonetheless, their success on very large and dynamic graphs remains to be seen.
13
A Parameter Tuning
A.1 Curated Features
We varied the maximum depth of the base estimator from 5 to 50 and number
of estimators from 10 to 80 as illustrated in Figure 9. The classifier performance
remains low and does not vary significantly with maximum depth and number
of estimators. This confirms manually-extracted statistical and network features
are not effective in distinguishing laundering and regular transactions.
(a) Accuracy heatmap
(b) F1-measure heatmap
Fig. 9: Adaboost classifier parameter tuning.
A.2 Node2vec/Deepwalk
Hyper-parameter Tuning Results in Table 3 show that a higher number of walks
per node and longer walk path produce better performance. Also, for node2vec it
is better to set q to a relatively low value and p higher than max(q, 1) to ensure
outwards exploration from transaction nodes, as it is important to understand
how UTXOs are propagated via transactions for different services.
Effect of Random-Walk Starting Nodes Further, to understand the effect of
random-walk starting nodes, we compared the classifier performance when vary-
ing the volume of labelled and unlabelled test nodes to start random-walks from
and present the results in Figure 10. The random-walks are started from all
labelled training nodes, x% (x ∈ {100, 80}) of all labelled testing nodes, y%
(y ∈ {100, 80, 50, 20, 0}) of all unlabelled testing nodes. Results show that to
achieve high classifier performance, random-walks should be started from as
many labelled testing nodes as possible. The volume of unlabelled random-walk
starting nodes does not significantly affect the classifier performance.
14
510152050Maximum depth10204080Number of estimators64.0463.0765.6266.1768.4069.7865.3265.3367.3268.1068.1665.0368.1669.0468.0666.9266.6868.2867.5068.47646668accuracy510152050Maximum depth10204080Number of estimators0.520.530.540.550.570.580.540.550.570.570.570.540.570.600.580.570.560.570.570.580.520.540.560.580.60f-measureTable 3: Node2vec/Deepwalk hyper-parameter tuning.
# of walks per node Walk length p
1
50
2
50
4
50
0.5
50
0.5
50
1
100
2
100
100
4
* The graph has 634,739 nodes and 1,147,979 edges.
50
50
50
50
50
100
100
100
q
1
0.5
0.5
2
4
1
0.5
0.5
Accuracy (%) F1-measure
90.20
90.48
89.72
88.35
86.85
89.84
91.01
89.62
0.93
0.93
0.92
0.91
0.90
0.92
0.93
0.92
(a) Accuracy heatmap
(b) F1-measure heatmap
Fig. 10: Effect of random-walk starting nodes on classifier performance.
References
1. Alleged
btc-e
operator
alexander
vinnik
ex-
https://www.coindesk.com/
seeks
tradition
alleged-btc-e-operator-alexander-vinnik-seeks-extradition-to-russia,
accessed: 2019-10-14
russia.
to
2. bitcoin-blk-file-reader.
https://github.com/mrqc/bitcoin-blk-file-reader,
accessed: 2019-04-26
3. Bitcoin core version 0.15.0 released. https://bitcoin.org/en/release/v0.15.0,
accessed: 2019-04-26
4. Bitcoin forum. https://bitcointalk.org, accessed: 2019-05-04
5. Bitcoin who is who. https://bitcoinwhoswho.com, accessed: 2019-04-27
6. Bitcoin's
crypto
total
of
back
bitcoins-share-of-total-crypto-market-slips-back-toward-50,
2019-05-04
50%.
market
slips
https://www.coindesk.com/
accessed:
share
toward
7. Blockchain. https://www.blockchain.com, accessed: 2019-04-27
8. Elliptic data set. https://www.kaggle.com/ellipticco/elliptic-data-set, ac-
cessed: 2019-10-06
9. European authorities swoop on bitcoin mixing service. https://bravenewcoin.
com/insights/european-authorities-swoop-on-bitcoin-mixing-service, ac-
cessed: 2019-10-20
15
100%80%50%20%0Unlabelled100%80%50%Labelled92.1991.4991.8490.9892.1467.4167.5467.8967.7467.4667.1368.1567.7368.1667.477075808590accuracy100%80%50%20%0Unlabelled100%80%50%Labelled0.9250.9400.9420.9360.9430.7670.7670.7680.7680.7650.7640.7710.7690.7720.7650.800.850.90f-measure10. The golden age of dark web drug markets is over. https://www.theverge.com/
2019/2/17/18226718/alphabay-takedown-drug-marketplace-federal-arrest,
accessed: 2019-10-14
11. Proof of work. https://en.bitcoin.it/wiki/Proof_of_work, accessed: 2019-05-
10
12. Silk
road
(marketplace).
https://en.wikipedia.org/wiki/Silk_Road_
(marketplace), accessed: 2019-04-26
13. Wallet explorer. https://www.walletexplorer.com, accessed: 2019-04-27
14. Wannacry,
big
how ransomware
petya,
notpetya:
time
https://www.theguardian.com/technology/2017/dec/30/
in
wannacry-petya-notpetya-ransomware, accessed: 2019-05-06
2017.
hit
the
15. Antonopoulos, A.M.: Mastering Bitcoin: unlocking digital cryptocurrencies. "
O'Reilly Media, Inc." (2014)
16. de Balthasar, T., Hernandez-Castro, J.: An analysis of bitcoin laundry services. In:
Nordic Conference on Secure IT Systems. pp. 297 -- 312. Springer (2017)
17. Bartoletti, M., Pes, B., Serusi, S.: Data mining for detecting bitcoin ponzi schemes.
arXiv preprint arXiv:1803.00646 (2018)
18. Bollob´as, B.: The evolution of random graphsthe giant component. In: Random
graphs. vol. 184, pp. 130 -- 59. Cambridge university press Cambridge (2001)
19. Bondy, J.A., Murty, U.S.R., et al.: Graph theory with applications, vol. 290. Cite-
seer (1976)
20. Ermilov, D., Panov, M., Yanovich, Y.: Automatic bitcoin address clustering. In:
Machine Learning and Applications (ICMLA), 2017 16th IEEE International Con-
ference on. pp. 461 -- 466. IEEE (2017)
21. Ferrin, D.: A preliminary field guide for bitcoin transaction patterns. In: Texas
Bitcoin Conference (2015)
22. Freund, Y., Schapire, R.E., et al.: Experiments with a new boosting algorithm. In:
International Conference on Machine Learning (ICML). pp. 148 -- 156 (1996)
23. Glaser, F., Zimmermann, K., Haferkorn, M., Weber, M., Siering, M.: Bitcoin-asset
or currency? revealing users' hidden intentions. ECIS (2014)
24. Grover, A., Leskovec, J.: node2vec: Scalable feature learning for networks. In: Pro-
ceedings of the 22nd ACM SIGKDD international conference on Knowledge dis-
covery and data mining. pp. 855 -- 864. ACM (2016)
25. Hamilton, W., Ying, Z., Leskovec, J.: Inductive representation learning on large
graphs. In: Advances in Neural Information Processing Systems. pp. 1024 -- 1034
(2017)
26. Hamilton, W.L., Ying, R., Leskovec, J.: Representation learning on graphs: Meth-
ods and applications. arXiv preprint arXiv:1709.05584 (2017)
27. Lischke, M., Fabian, B.: Analyzing the bitcoin network: The first four years. Future
Internet 8(1), 7 (2016)
28. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker,
G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no
names. In: Proceedings of the 2013 conference on Internet measurement conference.
pp. 127 -- 140. ACM (2013)
29. Moser, M., Bohme, R., Breuker, D.: An inquiry into money laundering tools in the
bitcoin ecosystem. In: eCrime Researchers Summit (eCRS), 2013. pp. 1 -- 14. IEEE
(2013)
30. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)
31. Parino, F., Beir´o, M.G., Gauvin, L.: Analysis of the bitcoin blockchain: socio-
economic factors behind the adoption. EPJ Data Science 7(1), 38 (2018)
16
32. Perozzi, B., Al-Rfou, R., Skiena, S.: Deepwalk: Online learning of social represen-
tations. In: Proceedings of the 20th ACM SIGKDD international conference on
Knowledge discovery and data mining. pp. 701 -- 710. ACM (2014)
33. Pham, T., Lee, S.: Anomaly detection in the bitcoin system-a network perspective.
arXiv preprint arXiv:1611.03942 (2016)
34. Ranshous, S., Joslyn, C.A., Kreyling, S., Nowak, K., Samatova, N.F., West, C.L.,
Winters, S.: Exchange pattern mining in the bitcoin transaction directed hyper-
graph. In: International Conference on Financial Cryptography and Data Security.
pp. 248 -- 263. Springer (2017)
35. Rauchs, M., Hileman, G., et al.: Global cryptocurrency benchmarking study. Tech.
rep., Cambridge Centre for Alternative Finance, Cambridge Judge Business School
(2017)
36. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Privacy,
Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference
on Social Computing (SocialCom), 2011 IEEE Third International Conference on.
pp. 1318 -- 1326. IEEE (2011)
37. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In:
International Conference on Financial Cryptography and Data Security. pp. 6 -- 24.
Springer (2013)
38. Somin, S., Gordon, G., Altshuler, Y.: Social signals in the ethereum trading net-
work. arXiv preprint arXiv:1805.12097 (2018)
39. Weber, M., Domeniconi, G., Chen, J., Weidele, D.K.I., Bellei, C., Robinson, T.,
Leiserson, C.E.: Anti-money laundering in bitcoin: Experimenting with graph con-
volutional networks for financial forensics. arXiv preprint arXiv:1908.02591 (2019)
40. Zhou, D., Bousquet, O., Lal, T.N., Weston, J., Scholkopf, B.: Learning with local
and global consistency. In: Advances in neural information processing systems. pp.
321 -- 328 (2004)
41. Zhu, X., Ghahramani, Z.: Learning from labeled and unlabeled data with label
propagation. Tech. rep., CMU-CALD-02-107, Carnegie Mellon University (2002)
17
|
1509.01095 | 1 | 1509 | 2015-09-03T14:18:16 | Tag Me Maybe: Perceptions of Public Targeted Sharing on Facebook | [
"cs.SI",
"cs.CY"
] | Social network sites allow users to publicly tag people in their posts. These tagged posts allow users to share to both the general public and a targeted audience, dynamically assembled via notifications that alert the people mentioned. We investigate people's perceptions of this mixed sharing mode through a qualitative study with 120 participants. We found that individuals like this sharing modality as they believe it strengthens their relationships. Individuals also report using tags to have more control of Facebook's ranking algorithm, and to expose one another to novel information and people. This work helps us understand people's complex relationships with the algorithms that mediate their interactions with each another. We conclude by discussing the design implications of these findings. | cs.SI | cs | Perceptions of Public Targeted Sharing on Facebook
Tag Me Maybe:
Saiph Savage Andrés Monroy-Hernández Kasturi Bhattacharjee Tobias Höllerer
University of California Santa Barbara
Universidad Nacional Autónoma de México
Microsoft Research
{saiph, kbhattacharjee, holl }@cs.ucsb.edu [email protected] [email protected]
5
1
0
2
p
e
S
3
]
I
S
.
s
c
[
1
v
5
9
0
1
0
.
9
0
5
1
:
v
i
X
r
a
ABSTRACT
Social network sites allow users to publicly tag people in their
posts. These tagged posts allow users to share to both the general
public and a targeted audience, dynamically assembled via notifi-
cations that alert the people mentioned. We investigate people’s
perceptions of this mixed sharing mode through a qualitative study
with 120 participants. We found that individuals like this sharing
modality as they believe it strengthens their relationships.
Indi-
viduals also report using tags to have more control of Facebook’s
ranking algorithm, and to expose one another to novel information
and people. This work helps us understand people’s complex re-
lationships with the algorithms that mediate their interactions with
each another. We conclude by discussing the design implications
of these findings.
Author Keywords Social media; access controls; social net-
works; narrowcast; broadcasting; algorithmic filtering
ACM Classification Keywords H.5.3 Group and Organization In-
terfaces
1.
INTRODUCTION
On social networking sites (SNS), people have contacts from dif-
ferent facets of their lives, e.g., college or work. This can lead to
unintentionally sharing sensitive content with subsets of friends [7].
People engage in a spectrum of sharing modes to overcome this
problem, from targeted sharing, where messages are shared with
specific individuals, e.g., in an email [1], to public broadcasts where
people share messages that are appropriate for all [7].
There has been growing interest in understanding people’s per-
ceptions of these sharing modalities. Bernstein et al. [1] studied
targeted sharing in private messages and found that people saw this
modality as a way to share personally relevant content. Kairam et
al. [10] used Google+ to study selective sharing, i.e., the sharing of
content with specific predefined groups such as “family” or “work.”
Their results indicate that people use selective sharing to evange-
lize, ask questions, or start conversations. Hogan [7], in studies
of public broadcasting in social media, found that in this sharing
.
Figure 1: Example of public targeted sharing on Facebook.
mode, people often speak to the “lowest common denominator” to
allow everyone to understand the message.
Few studies have fully addressed the public targeted sharing modal-
ity of SNS. Figure 1 presents an example of a Facebook post with
this sharing mode. Public targeted sharing combines elements of
targeted sharing and broadcasting. When a person tags others, the
tagged individuals receive a direct notice of the post. However,
the post’s public nature also reaches a wider audience similar to
a broadcast (e.g., the entire social graph of the content producer).
This hybrid sharing mode also represents a public display of social
connections, as the public posts carry the names of certain friends
and links to their personal Facebook profiles [2]. Previous research
has studied particular aspects of this interaction, such as the iden-
tity concerns it triggers [11] or the types of conversations that such
posts elicit [9, 8]. Little is known, however, regarding people’s dif-
ferent views and uses of this sharing modality.
The aim of this investigation is to organize and understand the
variety of perceptions of this hybrid sharing mode on Facebook.
Although Facebook has a particular design for public targeted shar-
ing, the concepts involved are not unique. Sites such as Twitter or
Soundcloud also provide hyperlinks to the profiles of the people
tagged in content. Google+ links tags to people’s profiles and al-
lows people to broadcast to the social circles of those tagged. Gold
users of reddit receive notifications when others tag them.
Our interview-based study of 120 individuals discovers that indi-
viduals feel public targeted sharing strengthens friendships. They
also believe it can be used to overcome the algorithmic filtering
powers in play, bringing each other greater exposure to more sur-
prising content and people.
2. METHODS
To examine the perceptions of public targeted sharing, we em-
ploy a methodology similar to that used in a study about people’s
perceptions of Facebook disclosures [11]. Similar to Lampinen et
al. [11], instead of pursuing a longitudinal study, our goal is to shed
light on the variety of interpretations that individuals have regard-
ing this sharing modality. We conducted interviews to understand
the perceptions.
2.1 Data Collection
We recruited participants both offline and online to avoid having
only highly active Facebook users. To recruit online, we posted
invitations to our study in different Facebook groups and to pages
randomly selected from public listings. To recruit offline, we ap-
proached people in public spaces such as bus stops and parks and
invited them to take part in our study. We labeled participants re-
cruited directly from Facebook as F# and those recruited from pub-
lic spaces as P#. Our recruitment material avoided the term “tag-
ging” to not exclude people who rarely tag.
Of the 120 individuals participated in our study, 32 were re-
cruited from Facebook, and 88 from public spaces. Participants
used Facebook to varying degrees. The individuals recruited from
Facebook were 18-52 years old; 44% were female, 56% were male.
The participants from public spaces were 18-68 years old; 52%
were female, and 48% were male. The interviews had a median
duration of 11 minutes, with the longest lasting 40 minutes, and the
shortest 8 minutes. The interviews covered participants’ interpreta-
tions of this sharing modality from the perspectives of the different
social roles involved, such as content producers (individuals who
tag friends in content they share on Facebook), taggees (individu-
als tagged in the content), and viewers (individuals who view the
tagged content). We counterbalanced the order in which we asked
participants about each role. Participants voiced which roles they
had taken and only responded for those that they had personally
assumed. All participants had been viewers at least once, 87% had
been taggees at least once, and 83% had been content producers at
least once.
Our study began by asking each participant to write down ex-
amples of public targeted sharing. On average, each participant
provided two examples (for instance, two Facebook posts where
friends were tagged). For each role, we used the examples to start a
discussion. For instance, we asked: “What are your thoughts when
someone tags you in this type of post?” We encouraged the par-
ticipants to lead the discussion. Our goal was mainly to get them
to elaborate and exemplify. Participants mostly reported on their
perceptions of public targeted sharing in posts (Facebook status up-
dates or wall posts). Some also referred to tagging in comments,
photos, or videos. However, participants did not highlight any dif-
ference among content types. The interviews also covered partici-
pants’ background in SNS use (sites and devices used, type of con-
tent they or their friends share, number of Facebook friends, etc.)
We did not witness any difference in interview responses across age
groups or SNS usage.
2.2 Categorization Perspectives
We used qualitative coding to analyze interview responses. This
allowed us to establish a categorization of perceptions of public
targeted sharing. Our overarching goal was to identify patterns in
these perceptions. We transcribed all audio recordings and sepa-
rated each interview into sections based on the social role that the
interviewee was reporting on. Two researchers then jointly read
each interview transcript for each social role to identify key con-
cepts and ideas. These initial concepts were then discussed with
a third researcher. We decided that a category would cover a gen-
eral type of perception and that, when possible, it would include
perspectives specific to each social role. Concepts were then ag-
gregated and similar ones renamed.
We also quantified the number of participants who viewed the
tagging of Facebook users in posts as a mechanism that involved
two mixed audiences. We considered this would help to further
contextualize our results. Two researchers, unfamiliar with the
work, read each interview and classified whether the person saw
tagging as involving two audiences. The researchers found that all
interviewees referred to tagging as a mixed sharing mode. Addi-
tionally, 71% of the interviewees specifically used the term “share”
to describe tagging on Facebook.
3. RESULTS
The following five main categories cover participants’ percep-
tions of public targeted sharing. One person can be associated with
more than one category, as a person can have more than one per-
ception associated with the sharing modality. We did not identify
differences between participants’ Facebook usage and their percep-
tions on sharing.
Stronger Relationships. A majority of our interviewees (79%)
perceived public targeted sharing as a way to build stronger re-
lationships. From our interviews, it appears that tagging builds
stronger friendships because the targeted audience feels that some-
one is making time for them:
“I think the best thing about being tagged is that
there is somebody who is considering and thinking about
you. I always comment on the things people tag me be-
cause they took the time to think about me.” 28, male
F2.
This result matches theory on disclosure, which states that the
more an interaction makes people feel singled out, the more value
they attribute to it [2]. Being publicly tagged has become a so-
cial signal that helps individuals feel unique and noteworthy. Con-
tent producers appear to be aware of this dynamic. Interviewees
stated that, via public targeted sharing, they secured higher-quality
responses from their network:
“[Tagging] ensures that you are working with only
loyal people that you know will help and promote your
cause, not sabotage it.” 30, male, F1.
Individuals appear to use targeted sharing to jump start discussions
with sympathetic crowds. Interviewees also believed that, via tag-
ging, Facebook’s ranking algorithm was more likely to share their
content with others. Therefore some people use public targeted
sharing to revive relationships:
“...I basically hope that friends I haven’t seen in
a while will see this [a tagged post], and they will
comment, and we can reconnect [...] Basically I have
had other people in mind when I have tagged – sort
of thinking about the fact that they are also watch-
ing.” 21, male, F55.
Surprising Content.
Interviewees (61%) perceived this shar-
ing mode as a way to expose audiences to information outside of
what they normally viewed on Facebook. Interviewees believe that
friends have similar tastes. Facebook’s recommendation algorithm
thus tends to show more of one type of content to the members
of a particular social circle. Tagging broke this by enabling con-
tent producers to reach multiple social graphs and share surprising
information, outside the social graph’s norms:
“I like to tag people that I know are interested in
something and whose audience will also care. But my
interest is in creating a crossover. So I involve au-
diences that follow people in dance, but I share with
them something totally different, such as poetry...” 25,
female, F10.
This is similar to the finding of Huang et al. [9] of how people
tagged on Twitter to direct content to certain social graphs. How-
ever, perhaps due to Facebook’s recommendation algorithms, we
observed here an emphasis on using tagging to diversify a social
graph’s information.
Participants also had folk theories about how tags influenced
Facebook’s ranking algorithm:
“If I tag someone and then he comments, the post
becomes “active” and it’ll appear at the top of the
News Feed. So I’ll sometimes tag someone directly in
the post, or in the comments. In either case, if it makes
him comment, the post will be pushed to the top.” 25,
female, F10.
Participants also believed that this sharing mode facilitates the in-
troduction of audiences to new and surprising people:
“Being a group of friends, I want them to meet
other people who they might find interesting. The whole
idea of social media is that we can share. So they might
see a face, but they don’t know who they are; with the
tag, they can find more information about them” 26,
male, P3.
Public Image. Interviewees (60% ) believed that public targeted
sharing can help refine one’s public image:
“I tag friends to represent something I want to
project. So let’s say that I want to project that I am a
super hipster, well then I will tag friends in support of a
cause, I will casually mention that my friends and I are
out writing in our Moleskine journals...” 29, female
F5.
Interviewees also reported that they tagged to link their content
to the reputation or image of their friends and increase the value of
the content. Participants cherry-picked who they tagged. They an-
alyzed how influential or relevant the image of a person whom they
planned on tagging was in reference to the content they wanted to
share. Similarly, participants also believed that Facebook’s ranking
algorithm would give more visibility to posts linked to high-profile
users. Individuals thus tagged users with influential public images
in an attempt to garner more visibility for the posts they wanted to
broadcast:
“Facebook will always rank higher content tied to
verified, well known accounts. You’re losing a lot of
visibility if you don’t link your content. You have to
select well who you tag.” 41, male, P83.
In contrast to selective sharing [10], public targeted sharing is also a
public display of social connections [2]. This might cause individ-
uals to relate it to public image construction, as everyone (people
and algorithms included) can view how one interacts with others.
Participants saw public targeted sharing as an opportunity to tai-
lor not only their own public image but also that of their friends.
They tagged as a way to collectively help friends find content that
favored them.
Interviewees also expressed that, in general, they
felt honored to be tagged and be a part of their friends’ posts. How-
ever, some also voiced identity concerns because others selected
the content linked to them and the content might not match what
they wanted to portray:
might mislead the idea of who you are. Through tags
your identity can be created for you. Your identity be-
comes what other people broadcast about you, their
idea of you.” 26, male, O3.
Content producers were aware that others are self-conscious about
the type of content that is posted about them. We found that most
empathized with their friends and usually alerted them offline that
they were going to tag them:
“A lot of people don’t want to be tagged at a party.
People are self-conscious of what they want or what
they don’t want about them online. [...] I always ask
people if they want to be tagged. I am in the car and
I say: Hey guys I am making a Facebook status and I
am going to tag all you guys!” 19, male O7.
This echoes the findings of Lampinen et al. [11] regarding peo-
ple negotiating self-disclosures before conflicts emerge. However,
we found that, despite the negotiations taking place, individuals
occasionally had to untag themselves. This occurred when indi-
viduals were excessively tagged in their friends’ content. Individ-
uals wanted to show their involvement in their friends’ lives (as it
helped strengthen friendships). Yet, showing too much of that in-
volvement, e.g., being tagged in too many posts, obscured who they
were:
“In every wedding photo they posted, they included
my name regardless of whether I was in the photo or
not [...] Because I don’t have any other posts on my
profile, that one wedding event began dominating my
page and it began characterizing me because it was the
only thing that people saw on my profile. When peo-
ple went into my page, they thought I was really into
weddings [...] My identity was made up by someone’s
wedding.
I thought
about untagging myself from the photos but decided to
leave them. I felt it was sad to disassociate myself from
my friend’s wedding.” 29, male, O8.
I felt that was too emphasized.
The nature of this mixed sharing modality generates struggles, as
individuals want to show support for friends, while also portraying
their desired public image.
Unwanted Content. Interviewees (38%) perceived this sharing
modality as annoying, because it brought them undesired data. In-
dividuals thought that the content should have been shared privately
with the targeted audience. Some taggees also found this sharing
modality annoying because they received excessive Facebook no-
tifications. Some untagged themselves as a result. Taggees and
viewers alike felt annoyed with tagged posts generated by compa-
nies, especially if they were advertisements. Individuals appeared
tolerant of targeted ads created by friends. They considered that at
least their friends thought about them to tag them and that the posts
were a chance to be updated about their friends’ lives:
“It’s usually interesting to see what my friends are
selling. One girl was tagging so we could see her ce-
ramics creations [...] it’s really interesting to see what
they’re up to...” 25, female, P52.
Content producers are aware that this sharing modality can be an-
noying. They are thus careful about how often they publicly target
others and in what content they target others. Interestingly, some
see this annoyance as a chance to play with friends:
“[Tagging] is a very public thing. It allows any-
one to broadcast something about you, something that
“One friend of mine was an Obama supporter
I was tagging them in some anti-Obama stuff
[...]
to mess with them [...] I succeeded in being annoy-
ing...hehe...” 24, male, F15.
Despite this, taggees and viewers felt that unwanted content could
also bring them serendipitous discoveries, as it could expose them
to interesting strangers:
“...I have personally met several people through
this “spam”, like people with whom I’ve had an inter-
est to collaborate, and people with whom I’ve shared
interests on this and other topics. It isn’t common that
you get to meet people in spam. They are rare excep-
tions. Marvelous exceptions that bring you marvelous
opportunities.” 20, male, F3.
Recollection. Interviewees (33%) perceived public targeted shar-
ing as a type of virtual diary that helped to document who played
a part in their lives. Participants reported that they enjoyed return-
ing later to these posts to reminisce. Interviewees thought it helped
them to reminisce not only individually but also collectively. Indi-
viduals surfaced posts from the past to encourage their audiences
to relive memories:
“...For me, they [tagged posts] are more like a
path for sharing memories. They are really about mak-
ing your friends relive these experiences again...” 28,
female, P60.
Content producers also have the perception that by including a per-
son’s name in a post, they can implicitly remind the taggees of
events that they will conduct together. In this case, content produc-
ers admitted to mentioning certain persons so that their posts would
be favored by Facebook’s ranking algorithm and people would be
reminded of their event:
“...tagging helps to build the fan base of your event,
and people will be constantly reminded of the event.
Their friends are also more likely to see it [i.e., the
content] if you tag. That’s one of the things which
Facebook loves and favors: tagging!” 21, male, F202.
4. DISCUSSION
We used Facebook as a medium to investigate perceptions on an
increasingly popular sharing modality: public targeted sharing. In
general, individuals feel that this modality helps to reinforce rela-
tionships, as content producers publicly show that they are taking
the time to consider a particular targeted audience. Tagged posts
generated automatically by companies are likely to not be perceived
as positively, because individuals do not see any real person mak-
ing time for them. This is similar to what was observed in the
Scratch online community, where people valued credit granted au-
tomatically less than credit given by humans [12]. SNS and UI
designers could contemplate how to help companies better engage
with their online clients, perhaps by encouraging more humanized
sharing. This result is important especially given the recent lawsuit
over people’s name appearing in tagged advertising.
Individuals appeared to use public targeted sharing to build col-
laborative spaces, such as a space to reminisce collectively about
the past, or a type of backstage to collectively help friends craft a
desired public image. Individuals seem to have adopted public tar-
geted sharing as a building block to create the flexible online social
spaces they desire. We believe that it is important to design digital
structures that allow people to collectively experiment with build-
ing on the technology. It is not about just user-testing all elements
of an interface but, rather, testing whether people can make use of
those elements to construct jointly the dynamic spaces they want.
Our study revealed that individuals view public targeted sharing
as a way to expose each other to surprising content or to other peo-
ple beyond those recommended by Facebook’s algorithms. Recom-
mendation algorithms in general have sought to filter out opinions,
people, and items that are different from us, potentially limiting
the diffusion of information. Individuals appear to use this shar-
ing modality as a means to free audiences from these “algorithmic
biases” and distribute information that they consider fresh and in-
teresting.
Individuals also perceive public targeted sharing as a way to
reach audiences outside their immediate social circles. Facebook
does not officially present tagging as a way to reach foreign social
graphs but rather as a way simply to let people know when they are
involved in the posts that are shared. Our findings thus raise the
question of whether social media would benefit from more official
digital structures tailored for targeting and assessing novel audi-
ences [13, 4, 3, 14]. Audiences could be bombarded with more un-
wanted content in this setting, however, it might also enable more
serendipitous discoveries. Future work could further explore this
trade-off.
Across categories, we uncovered how individuals feel they can
use this sharing modality to try to manipulate or “game” Face-
book’s ranking algorithm and obtain the viewership they want. This
result is consistent with the recent work of Gillespie [5], which
points out, “Teens have been known to tag their status updates with
unrelated brand names, in the hopes that Facebook will privilege
those updates in their friends’ feeds.” Editors were traditionally the
gatekeepers of information. Today, it is filtering algorithms that
determine what is relevant [15] and even how we interact with con-
tent, products and prices [6]. Our results raise the question of what
the role of human-centered SNS should be regarding the algorith-
mic powers in play. Again, there is a trade-off: allowing manip-
ulations could expose audiences to more unwanted content, yet it
might also help disseminate more diverse, unpredictable, notewor-
thy content.
Finally, similar to [11], we call for caution in generalizing our re-
sults. Although we took care to recruit a diverse set of participants,
the pool of interviewees recruited outdoors belonged to particular
cultural settings. We tried to counter this issue by triangulating
their responses with those participants recruited online. However,
future work could focus on a quantitative analysis with a more var-
ied population.
Acknowledgements Special thanks to all our participants, as
well as Leif Singer, Angus Forbes, Airi Lampinen for the immense
feedback and iterations on this work. This work was partially sup-
ported by the U.S. Army Research Laboratory under Cooperative
Agreement No. W911NF-09-2-0053 and by NSF grant IIS-0747520.
5. REFERENCES
[1] Bernstein, M. S., Marcus, A., Karger, D. R., and Miller, R. C.
Enhancing directed content sharing on the web. In Proc. of
the SIGCHI Conf. on Human Factors in Computing Systems,
CHI ’10, ACM (2010), 971–980.
[2] Donath, J., and Boyd, D. Public displays of connection. BT
Technology Journal 22, 4 (Oct. 2004), 71–82.
[3] Forbes, A. G., Hollerer, T., and Legrady, G. behaviorism: A
framework for dynamic data visualization. Visualization and
Computer Graphics, IEEE Transactions on 16, 6 (2010),
1164–1171.
[4] Forbes, A. G., Savage, S., and Höllerer, T. Visualizing and
verifying directed social queries. In IEEE Workshop on
Interactive Visual Text Analytics. Seattle, WA, Citeseer
(2012).
[5] Gillespie, T. The relevance of algorithms. Media
Technologies (2013).
[6] Hannak, A., Soeller, G., Lazer, D., Mislove, A., and Wilson,
C. Measuring price discrimination and steering on
e-commerce web sites. In Proceedings of the 2014
Conference on Internet Measurement Conference, ACM
(2014), 305–318.
[7] Hogan, B. The presentation of self in the age of social media.
Bulletin of Science, Technology & Society (2010).
[8] Honeycutt, C., and Herring, S. C. Beyond microblogging:
Conversation and collaboration via twitter. 2013 46th Hawaii
International Conference on System Sciences 0 (2009), 1–10.
[9] Huang, J., Thornton, K. M., and Efthimiadis, E. N.
Conversational tagging in twitter. In Proceedings of the 21st
ACM conference on Hypertext and hypermedia, ACM
(2010), 173–178.
[10] Kairam, S., Brzozowski, M., Huffaker, D., and Chi, E.
Talking in circles: selective sharing in google+. In Proc. of
the SIGCHI Conf. on Human Factors in Computing Systems,
CHI ’12, ACM (2012), 1065–1074.
[11] Lampinen, A., Lehtinen, V., Lehmuskallio, A., and
Tamminen, S. We’re in it together: interpersonal
management of disclosure in social network services. In
Proceedings of the SIGCHI Conference on Human Factors in
Computing Systems, CHI ’11 (2011).
[12] Monroy-Hernández, A., Hill, B. M., Gonzalez-Rivero, J.,
and boyd, d. Computers can’t give credit: How automatic
attribution falls short in an online remixing community. In
Proc. of the SIGCHI Conf. on Human Factors in Computing
SystemsI (2011).
[13] Savage, S., Forbes, A., Toxtli, C., McKenzie, G., Desai, S.,
and Hollerer, T. Visualizing targeted audiences. In
Proceedings of the International Conference on the Design
of Cooperative Systems, COOP’15 (2015).
[14] Singer, L., Filho, F. M. F., Cleary, B., Treude, C., Storey,
M.-A. D., and Schneider, K. Mutual assessment in the social
programmer ecosystem: an empirical investigation of
developer profile aggregators. In Proc. of the 2013 Conf. on
Computer-Supported Cooperative Work (2013), 103–116.
[15] Tufekci, Z. Algorithms in our midst: Information, power and
choice when software is everywhere. In Proceedings
Conference on Computer Supported Cooperative Work &
Social Computing, CSCW ’15 (2015).
|
1804.06434 | 1 | 1804 | 2018-04-17T18:54:56 | The emergent integrated network structure of scientific research | [
"cs.SI",
"stat.AP"
] | The practice of scientific research is often thought of as individuals and small teams striving for disciplinary advances. Yet as a whole, this endeavor more closely resembles a complex system of natural computation, in which information is obtained, generated, and disseminated more effectively than would be possible by individuals acting in isolation. Currently, the structure of this integrated and innovative landscape of scientific ideas is not well understood. Here we use tools from network science to map the landscape of interconnected research topics covered in the multidisciplinary journal PNAS since 2000. We construct networks in which nodes represent topics of study and edges give the degree to which topics occur in the same papers. The network displays small-world architecture, with dense connectivity within scientific clusters and sparse connectivity between clusters. Notably, clusters tend not to align with assigned article classifications, but instead contain topics from various disciplines. Using a temporal graph, we find that small-worldness has increased over time, suggesting growing efficiency and integration of ideas. Finally, we define a novel measure of interdisciplinarity, which is positively associated with PNAS's impact factor. Broadly, this work suggests that complex and dynamic patterns of knowledge emerge from scientific research, and that structures reflecting intellectual integration may be beneficial for obtaining scientific insight. | cs.SI | cs | The emergent integrated network structure of scientific research
Jordan D. Dworkina, Russell T. Shinoharaa, Danielle S. Bassettb,c,d,e,∗
aDepartment of Biostatistics, Epidemiology, and Informatics, Perelman School of Medicine, University of Pennsylvania,
bDepartment of Bioengineering, University of Pennsylvania, Philadelphia, PA, USA
cDepartment of Physics & Astronomy, University of Pennsylvania, Philadelphia, PA, USA
dDepartment of Electrical & Systems Engineering, University of Pennsylvania, Philadelphia, PA, USA
eDepartment of Neurology, University of Pennsylvania, Philadelphia, PA, USA
Philadelphia, PA, USA
8
1
0
2
r
p
A
7
1
]
I
S
.
s
c
[
1
v
4
3
4
6
0
.
4
0
8
1
:
v
i
X
r
a
Abstract
The practice of scientific research is often thought of as individuals and small teams striving for disciplinary
advances. Yet as a whole, this endeavor more closely resembles a complex system of natural computation,
in which information is obtained, generated, and disseminated more effectively than would be possible
by individuals acting in isolation. Currently, the structure of this integrated and innovative landscape
of scientific ideas is not well understood. Here we use tools from network science to map the landscape
of interconnected research topics covered in the multidisciplinary journal PNAS since 2000. We construct
networks in which nodes represent topics of study and edges give the degree to which topics occur in the same
papers. The network displays small-world architecture, with dense connectivity within scientific clusters and
sparse connectivity between clusters. Notably, clusters tend not to align with assigned article classifications,
but instead contain topics from various disciplines. Using a temporal graph, we find that small-worldness
has increased over time, suggesting growing efficiency and integration of ideas. Finally, we define a novel
measure of interdisciplinarity, which is positively associated with PNAS 's impact factor. Broadly, this
work suggests that complex and dynamic patterns of knowledge emerge from scientific research, and that
structures reflecting intellectual integration may be beneficial for obtaining scientific insight.
Keywords:
scientific research, knowledge network, graph theory, human computation
1. Introduction
The practice of scientific research represents the
collective effort of humans to acquire information,
generate insight, and disseminate knowledge. Al-
though scientific inquiry has been carried out for
centuries, the recent expansion of meta-data collec-
tion has allowed a robust body of literature to de-
velop around the scientific study of science itself.
This work has led to advances in predicting the
success of scientific papers and authors 1,2, found
that articles often do not fit into existing disci-
plinary boundaries 3,4, and provided empirical fuel
for the debate over interdisciplinary research 5,6,7,8.
Yet much remains unknown about the nature of the
∗Corresponding author:
Email address: [email protected] (Danielle S.
Bassett)
large-scale scientific system that emerges from in-
dividuals' intellectual and social incentives.
It is
especially unclear what features of this system may
make it more or less effective at producing insights.
In recent years, network analysis has provided a
particularly useful framework for beginning to re-
veal the structure and evolution of the emergent
scientific landscape. The tools of this growing dis-
cipline have facilitated greater understanding the
roles of specific authors or papers in co-authorship
and citation networks. Network measures can pre-
dict authors' future collaboration patterns 9,10, and
can help identify turning points in the literature 11.
While the fine-scale topology of such networks dif-
fers by scientific discipline 12,13, many display sim-
ilar global properties. One such commonly shared
property is small-world architecture 13,14, which re-
flects high local clustering within specialty, po-
tentially supporting development and refinement
April 19, 2018
within sub-fields, combined with efficient paths that
connect distant areas, providing outlets for innova-
tion and information sharing.
Although co-authorship and citation networks
have provided much insight into the properties of
the scientific community, their dependence on au-
thors' social network structures makes them an
indirect window into the structure of scientific
knowledge. Topic networks, which reflect the re-
lations between scientific ideas, offer an opportu-
nity to fill this gap.
Surprisingly, the few ex-
isting studies of topic networks have largely for-
gone explicit large-scale analyses in favor of man-
ual inspection of network appearance or node-level
trends 15,16,17,18,19,20. Yet, the operationalization of
science as a set of interconnected ideas provides a
unique opportunity to study how research topics
are related within and across scientific disciplines,
how these topics and their relationships grow and
change over time, and how these changes may in-
fluence the degree to which scientists engage with
the literature.
Here we address these questions in a network of
topics covered in PNAS since the year 2000. Net-
work nodes reflect specific words or phrases, and
network edges reflect the degree of co-occurrence
within article abstracts and keyword sections. Us-
ing the resultant weighted, undirected network of
scientific topics, we address four hypotheses. First,
building on findings for co-authorship and cita-
tion networks 13,14, we hypothesize that the topic
network will demonstrate non-random, small-world
structure.
Second, based on prior studies that
performed latent topic modeling 3,4, we hypothe-
size that the community structure of the network
will deviate significantly from disciplinary classi-
fications. Third, as collaboration has crossed na-
tional boundaries and broadly increased in recent
years 21,22, we hypothesize that over time the net-
work will show greater bridging across topic com-
munities. Fourth, although the benefits of interdis-
ciplinarity for individual papers are debated 5,6,7,8,
we seek to investigate whether the topic network's
interdisciplinarity may be associated with the over-
all degree of engagement the component literature
receives, as measured by PNAS 's impact factor.
Materials and Methods
Data collection
We retrieved keywords and abstracts from 65,290
articles published in PNAS from the journal's web-
2
site using an in-house R script, and we used key-
word sections to create a list of potential topics to
be searched for in the abstracts. This technique
was chosen over latent topic modeling, as it re-
flected scientists' explicit opinions as to the words
and phrases that constitute relevant scientific top-
ics, and allowed for the incorporation of multi-word
phrases.
Network construction
We calculated the prevalence of each potential
topic by finding the ratio of abstracts or keyword
sections containing the topic phrase to the total
number of articles written in the time-span of study.
Thus, prevalence varied for the full network and
the year-specific networks. We used the 1000 most
common topics in the given time-span as nodes to
construct the network, as this value represented the
approximate number at which the least prevalent
words occurred often enough to produce meaning-
ful signal. Edges were given by the φ coefficient
for binary association 25, representing the degree to
which two topics tended to be mentioned in the
same abstract. We removed negative correlations,
as several statistics for the analysis of signed net-
works remain difficult to interpret.
We created a dynamic network using a sliding
window of ±6 months from a central month. Cen-
tral months ranged from July, 2000 to May, 2017
such that data from January, 2000 to November,
2017 were included in the analyses. At each win-
dow, the 1000 most common topics were used as
nodes. We made the choice of 1000 nodes for both
the static and dynamic networks because it rep-
resented the highest number at which all topics
selected in each window would occur more than
five times. Thus, higher values would risk unin-
terpretable noise among low-prevalence topics, and
lower values would sacrifice valuable information.
Community detection
For both the static and the dynamic networks,
we performed community detection using an iter-
ative generalized Louvain-like locally greedy algo-
rithm to maximize a common modularity quality
function 26. This technique works by stochastic op-
timization of the quality index value Q, in which
nodes are reassigned one by one until no reassign-
ment can improve Q, and then by iterating this
optimization until convergence to a globally opti-
mal set of community assignments to account for
Figure 1: Architecture of the topic network. Nodes (N = 1000) reflect research topics and edges (E = 173, 309) reflect
the degree of co-occurrence in abstracts and keyword sections. (A) The adjacency matrix sorted by topics' most commonly
associated article classification. (B) Visualization of the topic network using a distributed recursive graph layout 23. (C)
Visualization of the topic landscape using t-SNE 24, a method that places datapoints on a two-dimensional map based on their
similarity. Nodes colored by classification; "other" includes biophysics, developmental biology, ecology, environmental sciences,
plant biology, and sustainability science.
local maxima in the Q space. The free parameter,
γ, was selected by maximizing the Jaccard similar-
ity 27 between the community-detection-based par-
tition and the classification-based partition. After
averaging over repeated maximizations, this value
was determined to be γ = 1.2.
Novel network measures
We defined two novel network measures: de-
viance and interdisciplinarity. The deviance for a
given partition is the degree to which edge weights
differ from their expectation under an exponential
distribution. It is defined as follows:
(cid:16)
(cid:88)
i(cid:54)=j
(cid:17)2
Dp =
wij − βpb
,
where wij is the observed edge weight in a cell, and
βpb is the expected edge weight for a given block
in the partitioned adjacency matrix, as estimated
by an exponential model (see SI Methods). The
interdisciplinarity is the degree to which a net-
work is well-fit by a small-world structure that does
not adhere to a known classification partition. It is
defined as follows:
ξ = φ ∗ Dc,
where φ is the small-world propensity (see SI
Methods, 28), and Dc is the deviance under the
classification partition.
3
Results
We used data from 65,290 articles published in
PNAS between January, 2000 and November, 2017
to create a network of research topics. We drew po-
tential topics from the keywords section of each arti-
cle to allow for multi-word phrases. We determined
the prevalence of each potential topic by finding the
percentage of articles in which the word or phrase
was contained in either the abstract or the key-
words section. Based on this prevalence score, we
identified the 1000 most common topics and repre-
sented each as a node in the network (See Methods
for details). Edges represented the co-occurrence of
topics within abstracts, quantified by the φ coeffi-
cient of association for binary variables 25 (Fig. 1).
Negative correlations – comprising roughly 65% of
edges – were removed to allow for the use of state-
of-the-art analysis techniques; these edges had no-
tably lower magnitude and less variability (range:
[-0.10,0], interquartile range: 0.004) than the edges
that remained (range: [0,0.84], interquartile range:
0.011).
Structure of the topic network
To understand the structure of the topic net-
work, we calculated measures of interconnected-
ness (global efficiency) and local clustering (average
clustering coefficient); see SI Methods for math-
ematical definitions. For comparison, we obtained
null distributions from 100 random networks with
equivalent degree and strength distributions 29. We
observed that the topic network had significantly
lower global efficiency (p < 0.01) and higher aver-
age clustering (p < 0.01) than that observed in the
null model, indicating locally dense, non-random
connectivity. See Table S1 for robustness of re-
sults to variations in network size.
To probe the local contributions of a topic to this
overall structure, we examined each node's general
level of connectivity (degree, strength) and its role
in bridging disparate regions of the network (be-
tweenness centrality). We observed that between-
ness centrality and degree were positively correlated
(ρ = 0.30, p < 0.01) after accounting for strength,
and that betweenness centrality and strength were
negatively correlated (ρ = −0.27, p < 0.01) after
accounting for degree (Fig. 2). These associations
indicate that topics with high betweenness central-
ity tended to be those with many relatively weak
connections. Intuitively, this pattern is consistent
with the presence of topics that are only occasion-
ally covered but in a wide variety of research areas;
topics exemplary of this pattern include protein ex-
pression, physiology, and molecular mechanism.
The observed high local clustering and the pres-
ence of nodes with high betweenness but low
strength could be parsimoniously explained by the
principle of small-worldness. To evaluate this pos-
sibility, we estimated the small-world propensity
(SI Methods, 28);
its value was 0.57, significantly
higher than would be expected of a random net-
work (p < 0.01). This result demonstrates that
the relationships between topics have small-world
properties, with more local clustering than would
be expected of a random network and relatively ef-
ficient pathways between clusters. The presence of
small-worldness then suggests that the landscape
of high-quality scientific research is naturally orga-
nized into a structure that may be well-suited for
advancement within topic clusters and innovation
between them.
Community structure of the topic network
While the presence of small-worldness in the
topic network suggests separation between topic
clusters, it remains an open question whether these
disparate communities are explained by known dis-
ciplinary divisions. To answer this question, we di-
rectly compared the communities inherent in the
data to the communities implied by 16 disciplinary
Figure 2: Relationships among betweenness central-
ity, degree, and strength of topics. Topics are colored
by their betweenness centrality percentile, from lowest (red)
to highest (blue). Lines demonstrate the pattern of degree
and strength for nodes in the first quartile (dark red), second
quartile (light red), third quartile (light blue), and fourth
quartile (dark blue).
classifications formally assigned to each PNAS pub-
lication (see Fig. 1). To extend the disciplinary
classification to individual topics, we assigned each
topic the most common classification among articles
in which it appeared. We then partitioned topics
into communities, where each community was com-
prised only of topics with a given classification. A
visualization of the network according to this classi-
fication partition revealed relatively strong connec-
tions between communities (Fig. 3A).
Next we turned to the problem of identifying a
natural partitioning of the topics based solely on
the structure of the network, with no knowledge of
the disciplinary classifications. We used a Louvain-
like locally greedy algorithm 26 to maximize the
modularity of the network 30, thereby obtaining a
data-driven partition of the network into commu-
nities. The resolution parameter γ was determined
by maximizing the partition's Jaccard similarity 27
with the partition based on disciplinary classifi-
cations in an attempt to optimize comparability
(Fig. S1, see Methods for details). The data-driven
partition yielded only eight distinct communities,
each containing topics from various classifications,
with relatively weak connections between commu-
4
Figure 3: The topic network's community structure. Nodes represent topic communities and edges represent the av-
erage connection strength between affiliated nodes. (A) The graph reflecting communities composed of topics with the same
classification. Labels from 1 to 6 refer to environmental sciences, sustainability science, ecology, plant biology, biophysics,
and developmental biology, respectively. (B) The graph reflecting empirically-identified network communities, derived from
modularity maximizations. Nodes show the proportion of topics with each classification in a given community.
nities (Fig. 3B and Table S2). It can be seen that
communities are typically dominated by topics from
between one and three classifications. In a subse-
quent sensitivity analysis, we demonstrate that the
partition is robust to the exclusion of negative edge
weights (Fig. S2).
With the classification partition and data-driven
partition in hand, we next sought to quantitatively
compare the two. A natural way to formulate this
comparison is to calculate the modularity Q-value
(see Methods for details) for each partition to de-
termine the degree of separation between commu-
nities. As the data-driven partition was obtained
by optimizing modularity, the magnitude of the in-
crease in Q compared to the classification partition
demonstrates the degree to which disciplinary clas-
sifications do not optimally delineate research topic
clusters. We observed that the modularity value
was higher in the data-driven partition (Q = 0.37)
than in the classification partition (Q = 0.25), in-
dicating that the data-driven partition provided a
more natural segregation into topic communities.
Notably, this effect holds across a range of γ values,
as the number of communities in the data-driven
partition is varied from 8 to 16 (Table S3).
As further confirmation of the data-driven par-
tition's characterization of the community struc-
ture, we considered the framework of the weighted
stochastic block model (WSBM; 31), which provides
another means of quantifying how well a partition
fits the data. Specifically, a WSBM assumes a
community structure in which connections within
and between communities occur with an expected
edge weight. To investigate which partition bet-
ter characterized the edge weights between and
within communities, we fit an exponential model
to the edge weights in each within- or between-
community block, and calculated the squared dif-
ference between the observed edge weights and ex-
pected edge weights (see Methods for details). A
paired Wilcoxon rank sum test revealed that devi-
ations from the expected weights were significantly
higher under the classification partition than the
data-driven partition (p < 0.0001). Notably, this
effect also holds across γ values (Table S3). To-
gether, these findings indicate that the data-driven
partition yields both stronger community separa-
tion and greater edge weight consistency within in-
tracommunity and intercommunity blocks.
Critically, not only is the data-driven partition a
better fit to the data, but the communities strik-
ingly differ in composition from those defined by
classification.
In comparison to the classification
partition, we observe that the data-driven parti-
tion displays lower disciplinarity, as measured by
the average proportion of a community's topics
that come from its dominant classification. For
the classification partition, the disciplinarity value
is 1 and for the data-driven partition the value is
0.48, indicating that the average community draws
slightly less than half of its topics from its most
popular classification.
Importantly, the multidis-
5
temporal null model where the order of article ap-
pearance was permuted uniformly at random. The
null trajectories therefore represent change that
would occur if topic prevalence and topic associ-
ations were stable over the full time period.
We first sought to test our hypothesis that the
network would show strengthening connections be-
tween and within communities over time, consis-
tent with increasing and changing patterns of col-
laboration 21,22. We tested for significant tempo-
ral changes in strength and small-world propensity
by comparing the variance explained by the linear
effect of year (R2) to distributions of R2 created
from the trajectories of the 100 temporal null net-
works. Average strength (R2 = 0.75, p < 0.01)
and small-world propensity (R2 = 0.25, p = 0.01)
both showed significant positive linear trends over
time (Fig. 4A; see Table S4 for consistent trends
across network sizes). These results suggest that
since 2000, associations between commonly covered
scientific topics have grown stronger, and the degree
to which these topics demonstrate high clustering
and efficient pathways has increased as well.
Next, we sought to investigate whether the
network's interdisciplinarity showed a meaningful
change over the time period under study. We de-
fined a novel measure of journal interdisciplinarity,
ξ, given by the product of the network's small-world
propensity, φ, and the network's deviance from the
classification partition, taken as the mean of the
edge deviances described in the previous section
(see Methods for details). Therefore, at each tem-
poral window, ξ represents the degree to which the
network has small-world structure that is not well-
characterized by the assigned topic classifications.
We found that classification deviance (R2 = 0.33,
p < 0.01) and interdisciplinarity (R2 = 0.42, p <
0.01) both showed significant positive linear trends.
However, because of the strong linear association
between strength and time, it is difficult to remove
any potential effect of strength on these measures
without also eliminating temporal trends.
Implications of interdisciplinarity
To begin understanding how interdisciplinary re-
search is perceived, we compared the standardized
trajectory of interdisciplinarity to the trajectory of
PNAS 's impact factor. We obtained yearly impact
factors from 2000 to 2016 from the Web of Sci-
ence, and fit a cubic spline to interpolate a smooth
monthly trajectory. Interestingly, the number of ar-
ticles published in a given time window explained
Figure 4: Temporal features of the dynamic topic net-
work.
(A) Temporal trajectories of standardized small-
world propensity (orange) and standardized mean edge
strength (blue) over time.
(B) Temporal trajectories of
publication-residual
impact factor (green) and strength-
residual interdisciplinarity ξ (purple).
ciplinarity of the data-driven partition holds when
the number of communities is varied from 8 to 16
(Table S3). Taken together, these findings sug-
gest that the interdisciplinary nature of research
published in PNAS is underestimated by articles'
disciplinary classifications. This implication is re-
inforced by the fact that only 15% of articles pub-
lished since 2000 were given more than one disci-
plinary classification, whereas 99% of these articles
covered topics from more than one discipline.
Temporal changes in network structure
While the static structure of the topic network is
important, it does not provide insight into whether
and how the landscape of scientific inquiry might
change over time. To address this question, we cre-
ated a dynamic network using a 12-month sliding
window with an 11-month overlap over the period
from January, 2000 to November, 2017 (see Meth-
ods for details). Because some structural change
would be expected due to random chance and pat-
terns of journal publication over time, all measures
were standardized relative to 100 iterations of a
6
61% of the variation in impact factor; we therefore
only considered the residuals. We calculated the
partial correlation between standardized interdis-
ciplinarity and impact factor after accounting for
strength 32, and we compared this value to a null
correlation distribution, obtained using the set of
standardized trajectories drawn from the 100 tem-
poral null networks described previously.
Interdisciplinarity showed a significant, positive
partial correlation with impact factor (r = 0.45,
p = 0.03) (Fig. 4B). This result suggests that in-
creases in the interdisciplinarity of scientific top-
ics covered in PNAS are associated with increases
in the journal's impact. To determine whether
this result was driven by only one of the compo-
nents of ξ, we calculated the correlations for small-
world propensity and classification deviance sepa-
rately. Small-worldness alone was not associated
with impact factor (r = 0.36, p = 0.10), and al-
though deviance did show a significant correlation
(r = 0.39, p = 0.04), the correlation between in-
terdisciplinarity and impact factor was marginally
greater (p < 0.10) and was more robust to changes
in network size (Table S5). These differences indi-
cate that the interdisciplinary small-worldness cap-
tured by ξ is likely more associated with external
measures of literature engagement than either of its
component parts alone.
Discussion
Prior analyses of collaboration and citation net-
works have produced deep insights into the struc-
tures and relationships behind the production of
scientific research 12,13,33,9,11,14. Yet little is known
about the network structure of the scientific ideas
themselves, or what features of this network might
be most effective at facilitating innovation. Here,
we set out to characterize the structure of a re-
search topic network,
investigate the degree to
which topic communities fit into disciplinary clas-
sifications, quantify how the landscape of topics is
changing over time, and determine whether the net-
work's interdisciplinarity may be related to the de-
gree of engagement that its component research re-
ceives.
Structure of the topic network
We constructed a network of research topics using
seventeen years of PNAS articles, and found – un-
surprisingly – that it had features uncharacteristic
7
of a random network. Specifically, the network had
significantly higher clustering and lower efficiency
than a random network. Interestingly, betweenness
centrality of the topics in the network was posi-
tively associated with degree, but negatively asso-
ciated with strength. These results indicate that
the network is made up of clustered topic areas that
commonly co-occur, and high-degree, low-strength
hubs that provide links within and between these
clusters. Further supporting this conceptualization
is the finding that the network shows a moderate
to high degree of small-worldness compared to what
would be expected of a random network. Both the
graph statistical findings and the small-world classi-
fication are consistent with the networks described
in studies of co-authorship and citation 13,14, which
would be expected to share many features with a
network of research topics.
Community structure of the topic network
Although community detection was referenced
only as a future direction in seminal collaboration
network analysis 12, the modular structure found
in the topic network is consistent with the pres-
ence of communities in newer research on country-
specific collaboration networks in both scientific
and nonscientific fields 34,35. Comparisons between
the community structure that arose from manual
disciplinary classification and the empirical com-
munity structure inherent to the data were espe-
cially revealing. Specifically, compared to the par-
tition arising from disciplinary classifications, the
empirical partition showed stronger separation be-
tween communities and provided a better fit to
the within- and between-community edge weights.
Additionally, as opposed to the monodisciplinary
classification-specific communities, the empirical
communities were found to typically contain an ap-
proximately equal balance of topics from two or
three distinct disciplines. One notable exception
was a community made up almost exclusively of
neuroscience topics (Fig. 3B), potentially reflect-
ing neuroscience's unique status as a field both pop-
ular enough to encompass many topics and young
enough to remain largely insular.
The superior fit of the empirical communities
compared to the classification-specific communi-
ties appears to indicate that research published
in PNAS is more interdisciplinary than the arti-
cle classifications suggest, an interpretation that is
bolstered by the fact that 99% of articles contained
topics from multiple fields while only 15% of articles
were classified under multiple fields. These findings
indicate that in spite of the ongoing conflicted dis-
cussion regarding the merits and drawbacks of in-
derdisciplinary research 5,6,7,8, researchers publish-
ing in top journals may already be consciously or
unconsciously integrating topics and ideas across
fields.
Temporal changes in network structure
Though the structure of the static network
yielded valuable insights into the relationships be-
tween topics, the production of scientific research
is far from static. Therefore, it was of great in-
terest to examine temporal changes in the topic
network. At the network scale, while generative
evolution has been considered for authorship rela-
tionships 33,9, the dynamic evolution of large-scale
network properties has rarely been examined in the
context of authorship or citation 36. Here we found
that both edge strength and small-worldness sig-
nificantly increased over time. The strengthening
of connections between seemingly distant research
areas could reflect a convergence of the scientific
landscape towards a more interdisciplinary and in-
terconnected network of ideas. This would repre-
sent an interesting emergent property of the land-
scape, potentially arising from individual scientists
consciously or unconsciously changing their behav-
ior over time to perform more innovative work.
Implications of interdisciplinarity
Despite the prevalence of multidisciplinary topic
communities and the trend towards stronger cross-
field ties, the merits of interdisciplinarity are still
widely debated 5,6. Proponents view interdisci-
plinary work as being crucial for "address[ing] the
great questions of science" 37, while some skeptics
instead believe that it too often represents "am-
ateurism and intellectual voyeurism" 38.
In this
study, we defined a novel measure of network in-
terdisciplinarity, ξ, and found it to be positively
associated with PNAS 's impact factor.
Although this finding only speaks to work of a
high caliber, within that context it suggests that
bodies of work that are more interdisciplinary in
nature may receive more engagement from the sci-
entific community. Yet it remains unclear whether
the increased engagement is reflective of the gen-
eration of more innovative scientific knowledge, or
simply more effective dissemination of the knowl-
edge across fields. In either case, this finding could
reflect an important contribution to the discussion
of interdisciplinary research, as previous research
on the benefits of discipline-spanning has produced
mixed results 6.
Conclusion
In this
study, we investigated the network
characteristics of scientific research topics cov-
ered in PNAS. The topic network displayed small-
world properties and interesting positive degree-
betweenness/negative strength-betweenness associ-
ations, indicating the presence of tightly connected
clusters and high-degree, low-strength hub nodes
serving as conceptual bridges. Community de-
tection showed that assigned classifications map
poorly onto the underlying clusters, with a data-
driven partition revealing the existence of multi-
disciplinary modules that contained topics from a
variety of classifications. By investigating the tem-
poral properties of the network, we found that
both strength and small-worldness have been in-
creasing over time. Interestingly, a novel measure
of network interdisciplinarity was positively associ-
ated with journal impact factor. Overall, this work
demonstrates the value of network analysis in gain-
ing insight into the structure of scientific knowl-
edge, paints a picture of the surprisingly integrated
nature of scientific ideas, and reveals a potentially
important positive relationship between interdisci-
plinarity and scientific engagement.
Acknowledgements
The authors would like to thank Lili Dworkin and
Ipek Oguz for advice on data collection and anal-
ysis, and Ann E. Sizemore and Richard F. Betzel
for helpful feedback on the manuscript. RTS would
like to acknowledge support from the National In-
stitute of Neurological Disorders and Stroke (R01
NS085211 & R01 NS060910). DSB would like to
acknowledge support from the John D. and Cather-
ine T. MacArthur Foundation, the Alfred P. Sloan
Foundation, and the National Science Foundation
CAREER (PHY-1554488). The content is solely
the responsibility of the authors and does not nec-
essarily represent the official views of any of the
funding agencies.
Data Accessibility
Data and code can be downloaded at https:
//www.dropbox.com/sh/p2ksqq8ubvt6haq/
8
AADdlSGfEpX6XL7eA4ua-gl6a?dl=0.
J.D.D. can
be reached for questions regarding the code at
[email protected].
Author Contributions
J.D.D., R.T.S., and D.S.B. designed research;
J.D.D. performed research, wrote the code, and an-
alyzed data; and J.D.D., R.T.S., and D.S.B. wrote
the paper.
References
Quantifying
[1] Dashun Wang, Chaoming Song, and Albert-Lszl
im-
Barabsi.
Science, 342(6154):127–132, October 2013.
pact.
ISSN 0036-8075, 1095-9203.
10.1126/science.
1237825. URL http://www.sciencemag.org/lookup/
doi/10.1126/science.1237825.
long-term scientific
doi:
[2] Daniel E. Acuna, Stefano Allesina, and Konrad P. Ko-
rding. Predicting scientific success: Future impact. Na-
ture, 489(7415):201–202, September 2012. ISSN 0028-
0836, 1476-4687. doi: 10.1038/489201a. URL http:
//www.nature.com/articles/489201a.
[3] E. Erosheva, S. Fienberg, and J. Lafferty. Mixed-
membership models of scientific publications. Pro-
ceedings of the National Academy of Sciences, 101
(Supplement 1):5220–5227, April 2004.
ISSN 0027-
8424, 1091-6490.
10.1073/pnas.0307760101.
URL
http://www.pnas.org/cgi/doi/10.1073/pnas.
0307760101.
doi:
[4] E. M. Airoldi, E. A. Erosheva, S. E. Fienberg,
C. Joutard, T. Love, and S. Shringarpure. Reconceptu-
alizing the classification of PNAS articles. Proceedings
of the National Academy of Sciences, 107(49):20899–
20904, December 2010. ISSN 0027-8424, 1091-6490. doi:
10.1073/pnas.1013452107. URL http://www.pnas.org/
cgi/doi/10.1073/pnas.1013452107.
[5] D. Rhoten. Risks and rewards of an interdisciplinary
research path. Science, 306(5704):2046–2046, December
2004. ISSN 0036-8075, 1095-9203. doi: 10.1126/science.
1103628. URL http://www.sciencemag.org/cgi/doi/
10.1126/science.1103628.
[6] Jerry A. Jacobs and Scott Frickel. Interdisciplinarity:
Annual Review of Sociol-
A critical assessment.
ogy, 35(1):43–65, August 2009.
ISSN 0360-0572,
1545-2115. doi: 10.1146/annurev-soc-070308-115954.
URL
http://www.annualreviews.org/doi/10.1146/
annurev-soc-070308-115954.
[7] Jonathan M. Levitt and Mike Thelwall. Is multidisci-
plinary research more highly cited? A macrolevel study.
Journal of the American Society for Information Sci-
ence and Technology, 59(12):1973–1984, October 2008.
ISSN 15322882, 15322890. doi: 10.1002/asi.20914. URL
http://doi.wiley.com/10.1002/asi.20914.
[8] Erin Leahey and James Moody. Sociological innovation
through subfield integration. Social Currents, 1(3):228–
256, October 2014.
ISSN 2329-4965, 2329-4973. doi:
10.1177/2329496514540131. URL http://journals.
sagepub.com/doi/10.1177/2329496514540131.
[9] M. E. J. Newman. Clustering and preferential at-
tachment in growing networks. Physical Review E, 64
(2), July 2001. ISSN 1063-651X, 1095-3787. doi: 10.
1103/PhysRevE.64.025102. URL https://link.aps.
org/doi/10.1103/PhysRevE.64.025102.
The
[10] Stuart R. Borrett, James Moody, and Achim Edel-
mann.
rise of Network Ecology: Maps
of the topic diversity and scientific collaboration.
Ecological Modelling, 293:111–127, December 2014.
ISSN 03043800.
10.1016/j.ecolmodel.2014.
URL http://linkinghub.elsevier.com/
02.019.
retrieve/pii/S0304380014001136.
doi:
[11] C. Chen. Searching for intellectual turning points: Pro-
gressive knowledge domain visualization. Proceedings of
the National Academy of Sciences, 101(Supplement 1):
5303–5310, April 2004. ISSN 0027-8424, 1091-6490. doi:
10.1073/pnas.0307513100. URL http://www.pnas.org/
cgi/doi/10.1073/pnas.0307513100.
[12] M. E. J. Newman. Coauthorship networks and pat-
terns of scientific collaboration. Proceedings of the Na-
tional Academy of Sciences, 101(Supplement 1):5200–
5205, April 2004.
ISSN 0027-8424, 1091-6490. doi:
10.1073/pnas.0307545100. URL http://www.pnas.org/
cgi/doi/10.1073/pnas.0307545100.
[13] M. E. J. Newman. The structure of scientific collabora-
tion networks. Proceedings of the National Academy of
Sciences, 98(2):404–409, January 2001. ISSN 00278424.
doi: 10.1073/pnas.021544898. URL \left(.
[14] Matthew L. Wallace, Vincent Larivire, and Yves Gin-
gras. A small world of citations? The influence of
collaboration networks on citation practices. PLoS
ONE, 7(3):e33339, March 2012. ISSN 1932-6203. doi:
10.1371/journal.pone.0033339. URL http://dx.plos.
org/10.1371/journal.pone.0033339.
[15] Srinivasan Radhakrishnan, Serkan Erbis, Jacqueline A.
Isaacs, and Sagar Kamarthi.
Novel keyword co-
occurrence network-based methods to foster system-
atic reviews of scientific literature. PLOS ONE, 12
(3):e0172778, March 2017.
doi:
10.1371/journal.pone.0172778. URL http://dx.plos.
org/10.1371/journal.pone.0172778.
ISSN 1932-6203.
[16] Juan Zhang, Jun Xie, Wanli Hou, Xiaochen Tu, Jing
Xu, Fujian Song, Zhihong Wang, and Zuxun Lu. Map-
ping the knowledge structure of research on patient
adherence: Knowledge domain visualization based co-
word analysis and social network analysis. PLoS ONE,
7(4):e34497, April 2012. ISSN 1932-6203. doi: 10.1371/
journal.pone.0034497. URL http://dx.plos.org/10.
1371/journal.pone.0034497.
[17] H.P.F. Peters and A.F.J. van Raan. Co-word-based
science maps of chemical engineering. Part I: Rep-
scaling.
resentations
Research Policy, 22(1):23–45, February 1993.
ISSN
00487333. doi: 10.1016/0048-7333(93)90031-C. URL
http://linkinghub.elsevier.com/retrieve/pii/
004873339390031C.
direct multidimensional
by
[18] Elizabeth Beam, L. Gregory Appelbaum, Jordynn Jack,
James Moody, and Scott A. Huettel. Mapping the
semantic structure of cognitive neuroscience. Journal
of Cognitive Neuroscience, 26(9):1949–1965, September
2014. ISSN 0898-929X, 1530-8898. doi: 10.1162/jocn\
a\ 00604. URL http://www.mitpressjournals.org/
doi/10.1162/jocn_a_00604.
[19] James Moody and Ryan Light. A view from above: The
evolving sociological landscape. The American Sociol-
ogist, 37(2):67–86, June 2006. ISSN 0003-1232, 1936-
4784. doi: 10.1007/s12108-006-1006-8. URL http:
//link.springer.com/10.1007/s12108-006-1006-8.
9
[20] Alejandro F. Frangi, Zeike A. Taylor, and Ali Gooya.
Precision Imaging: more descriptive, predictive and in-
tegrative imaging. Medical Image Analysis, 33:27–32,
October 2016. ISSN 13618415. doi: 10.1016/j.media.
2016.06.024. URL http://linkinghub.elsevier.com/
retrieve/pii/S1361841516301049.
[21] Jarno Hoekman, Koen Frenken, and Robert J.W.
Tijssen.
Research collaboration at a distance:
Changing spatial patterns of scientific collaboration
Research Policy, 39(5):662–673,
within Europe.
June 2010.
doi: 10.1016/j.respol.
2010.01.012. URL http://linkinghub.elsevier.com/
retrieve/pii/S0048733310000260.
ISSN 00487333.
[22] Jian Huang, Ziming Zhuang, Jia Li, and C. Lee Giles.
Collaboration over time: characterizing and modeling
network evolution. page 107. ACM Press, 2008. doi: 10.
1145/1341531.1341548. URL http://portal.acm.org/
citation.cfm?doid=1341531.1341548.
[23] S. Martin, W. M. Brown, R. Klavans, and K. W. Boy-
ack. Drl: Distributed recursive (graph) layout. SAND
Reports, 2936:1–10, 2008.
[24] L.J.P. van der Maaten and G.E. Hinton. Visualizing
high-dimensional data using t-sne. Journal of Machine
Learning Research, 9:2579–2605, 01 2008.
[25] Ernest C. Davenport and Nader A. El-Sanhurry.
Phi/Phimax: Review and synthesis. Educational and
Psychological Measurement, 51(4):821–828, December
1991.
10.1177/
001316449105100403. URL http://journals.sagepub.
com/doi/10.1177/001316449105100403.
ISSN 0013-1644, 1552-3888.
doi:
[26] L.G.S. Jeub, M. Bazzi, I.S. Jutla, and P.J. Mucha.
A generalized Louvain method for community detec-
tion implemented in MATLAB, 2011. URL http:
//netwiki.amath.unc.edu/GenLouvain.
[27] Matthew Steen, Satoru Hayasaka, Karen Joyce, and
Paul Laurienti. Assessing the consistency of com-
munity structure in complex networks. Physical Re-
view E, 84(1), July 2011.
ISSN 1539-3755, 1550-
2376. doi: 10.1103/PhysRevE.84.016111. URL https:
//link.aps.org/doi/10.1103/PhysRevE.84.016111.
[28] Sarah Feldt Muldoon, Eric W. Bridgeford, and
Danielle S. Bassett.
Small-world propensity and
weighted brain networks. Scientific Reports, 6(1), April
2016. ISSN 2045-2322. doi: 10.1038/srep22057. URL
http://www.nature.com/articles/srep22057.
[29] Mikail Rubinov and Olaf Sporns. Weight-conserving
characterization of complex functional brain net-
NeuroImage, 56(4):2068–2079, June 2011.
works.
ISSN 10538119.
10.1016/j.neuroimage.2011.
URL http://linkinghub.elsevier.com/
03.069.
retrieve/pii/S105381191100348X.
doi:
[30] M E J Newman. Modularity and community structure
in networks. Proc. Natl. Acad. Sci. U.S.A., 103(23):
8577–8582, 2006.
[31] C. Aicher, A. Z. Jacobs, and A. Clauset. Learning
latent block structure in weighted networks.
Jour-
nal of Complex Networks, 3(2):221–248, June 2015.
ISSN 2051-1310, 2051-1329.
doi: 10.1093/comnet/
cnu026.
URL https://academic.oup.com/comnet/
article-lookup/doi/10.1093/comnet/cnu026.
[32] Bernadette C. M. van Wijk, Cornelis J. Stam, and An-
dreas Daffertshofer. Comparing brain networks of dif-
ferent size and connectivity density using graph the-
ory. PLoS ONE, 5(10):e13701, October 2010.
ISSN
1932-6203. doi: 10.1371/journal.pone.0013701. URL
10
http://dx.plos.org/10.1371/journal.pone.0013701.
[33] Caroline S. Wagner and Loet Leydesdorff. Network
structure, self-organization, and the growth of interna-
tional collaboration in science. Research Policy, 34(10):
1608–1618, December 2005. ISSN 00487333. doi: 10.
1016/j.respol.2005.08.002. URL http://linkinghub.
elsevier.com/retrieve/pii/S0048733305001745.
[34] Borut Luar, Zoran Levnaji, Janez Povh, and Matja
Perc. Community structure and the evolution of inter-
disciplinarity in Slovenia's scientific collaboration net-
work. PLoS ONE, 9(4):e94429, April 2014.
ISSN
1932-6203. doi: 10.1371/journal.pone.0094429. URL
http://dx.plos.org/10.1371/journal.pone.0094429.
[35] Federico Battiston, Jacopo Iacovacci, Vincenzo Nicosia,
Ginestra Bianconi, and Vito Latora. Emergence of mul-
tiplex communities in collaboration networks. PLOS
ONE, 11(1):e0147451, January 2016. ISSN 1932-6203.
doi: 10.1371/journal.pone.0147451. URL http://dx.
plos.org/10.1371/journal.pone.0147451.
[36] Luka Kronegger, Anuka Ferligoj, and Patrick Dor-
eian. On the dynamics of national scientific sys-
tems. Quality & Quantity, 45(5):989–1015, August
2011.
10.1007/
s11135-011-9484-3. URL http://link.springer.com/
10.1007/s11135-011-9484-3.
ISSN 0033-5177, 1573-7845.
doi:
[37] Facilitating
interdisciplinary research.
National
Academies Press, Washington, D.C., April 2004.
ISBN 978-0-309-09435-1. URL http://www.nap.edu/
catalog/11153. DOI: 10.17226/11153.
[38] Lennard J Davis. A grand unified theory of interdisci-
plinarity. Chronicles of Higher Education, 53(40):B9,
2007.
[39] M. Bordons, M. T. Fern´andez, and I. G´omez. Advan-
tages and limitations in the use of impact factor mea-
sures for the assessment of research performance. Sci-
entometrics, 53:195–206, 02 2002.
[40] Andrew P. Kurmis. Understanding the limitations of
the journal impact factor. The Journal of Bone and
Joint Surgery. American Volume, 85-A(12):2449–2454,
December 2003. ISSN 0021-9355.
Life and times of the impact factor:
[41] M. Chew, E. V Villanueva, and M. B Van Der Wey-
retro-
den.
spective analysis of trends for seven medical
jour-
nals (1994-2005) and their Editors' views. Journal of
the Royal Society of Medicine, 100(3):142–150, March
2007.
10.1258/
jrsm.100.3.142. URL http://www.jrsm.org/cgi/doi/
10.1258/jrsm.100.3.142.
ISSN 0141-0768, 0141-0768.
doi:
[42] R: A language and environment for statistical comput-
ing, 2015.
[43] Gabor Csardi and Tamas Nepusz. The igraph soft-
ware package for complex network research.
Inter-
Journal, Complex Systems:1695, 2006. URL http:
//igraph.org.
[44] Mikail Rubinov and Olaf Sporns. Complex network
measures of brain connectivity: Uses and interpre-
NeuroImage, 52(3):1059–1069, September
tations.
2010.
doi: 10.1016/j.neuroimage.
2009.10.003. URL http://linkinghub.elsevier.com/
retrieve/pii/S105381190901074X.
ISSN 10538119.
[45] Frank E Harrell
Jr, with contributions
and many
2016.
others.
Charles Dupont,
Harrell Miscellaneous,
//CRAN.R-project.org/package=Hmisc.
version 4.0-2.
from
Hmisc:
https:
R package
URL
[46] Linton C. Freeman. Centrality in social networks
conceptual clarification.
Social Networks, 1(3):215–
239, January 1978.
10.
1016/0378-8733(78)90021-7. URL http://linkinghub.
elsevier.com/retrieve/pii/0378873378900217.
ISSN 03788733.
doi:
[47] A. Barrat, M. Barthelemy, R. Pastor-Satorras,
and A. Vespignani.
The architecture of complex
weighted networks.
Proceedings of
the National
Academy of Sciences, 101(11):3747–3752, March 2004.
ISSN 0027-8424, 1091-6490.
10.1073/pnas.
0400087101. URL http://www.pnas.org/cgi/doi/10.
1073/pnas.0400087101.
doi:
[48] Vito Latora and Massimo Marchiori. Efficient behavior
of small-world networks. Physical Review Letters, 87
(19), October 2001. ISSN 0031-9007, 1079-7114. doi:
10.1103/PhysRevLett.87.198701. URL https://link.
aps.org/doi/10.1103/PhysRevLett.87.198701.
[49] D. J. Watts and S. H. Strogatz. Collective dynamics
of 'small-world' networks. Nature, 393(6684):440–442,
June 1998. ISSN 0028-0836. doi: 10.1038/30918.
[50] M. E. J. Newman. Analysis of weighted networks.
ISSN
Physical Review E, 70(5), November 2004.
1539-3755, 1550-2376.
10.1103/PhysRevE.70.
056131. URL https://link.aps.org/doi/10.1103/
PhysRevE.70.056131.
doi:
[51] Sergio Gmez, Pablo Jensen, and Alex Arenas. Anal-
ysis of community structure in networks of corre-
lated data. Physical Review E, 80(1), July 2009.
ISSN 1539-3755, 1550-2376. doi: 10.1103/PhysRevE.
80.016114. URL https://link.aps.org/doi/10.1103/
PhysRevE.80.016114.
[52] Benjamin H. Good, Yves-Alexandre de Montjoye, and
Aaron Clauset. Performance of modularity maximiza-
tion in practical contexts. Physical Review E, 81(4),
April 2010.
doi: 10.
1103/PhysRevE.81.046106. URL https://link.aps.
org/doi/10.1103/PhysRevE.81.046106.
ISSN 1539-3755, 1550-2376.
[53] Yuchung J. Wang and George Y. Wong. Stochastic
blockmodels for directed graphs. Journal of the Amer-
ican Statistical Association, 82(397):8–19, March 1987.
ISSN 0162-1459, 1537-274X. doi: 10.1080/01621459.
1987.10478385. URL http://www.tandfonline.com/
doi/abs/10.1080/01621459.1987.10478385.
11
Supporting Information
Network Measures
SI Text
Limitations
Validity and generalizability of the findings pre-
sented in this paper are limited by a few method-
ological considerations. First, seminal work has
shown that fields of study differ significantly in
the structures of their authorship and citation net-
works 12,13. Therefore it is conceivable that jour-
nals may also have meaningful differences in the
structure and correlates of topic networks. If this is
the case, using journal-specific data may limit the
degree to which the findings in this paper can be
generalized to scientific research more broadly. Fu-
ture work could expand the data source to include
several top-tier journals within and across fields.
Additionally, the restriction of the dataset to key-
word sections and abstracts may ignore potential
information contained in introduction and discus-
sion sections. However, it is plausible that topics
mentioned in introduction and discussion areas may
not be an accurate reflection of the topics truly cov-
ered in a given article, unlike those mentioned in the
abstract and keyword sections. Future work could
examine this assumption directly by implementing
a manual rating system.
Finally, impact factor is widely considered to be
an imperfect measure of scientific engagement with
published research. Although warnings against im-
pact factor's use often highlight its inability to facil-
itate valid comparisons between journals in differ-
ent fields or different countries 39,40, within-journal
changes over time are also incomplete and poten-
tially subject to manipulation through editorial
policies 41. Future work could consider associations
between network structure and other measures of
scientific engagement and journal quality.
SI Methods
Data analysis
Topic networks and temporal null networks were
created, visualized, and analyzed in the R statis-
tical environment 42 using the iGraph package 43.
Benchmark random networks were generated us-
ing the Brain Connectivity Toolbox in MATLAB 44,
but were analyzed using the iGraph package. Com-
munity detection was carried out in MATLAB us-
ing the GenLouvain toolbox 26. Correlation coeffi-
cients and probability values were obtained using
the Hmisc package in R 45.
Here we provide a brief description of the network
measures used in this study.
The degree of a node is the number of edges,
regardless of weight, connected to the node 44. De-
gree then represents one aspect of the node's im-
portance, measured by the number of neighbors it
has in the network. It is defined as follows:
(cid:88)
j∈N
ki =
aij,
where N is the set of all nodes in the network, and
aij is 1 if nodes i and j are connected by an edge
and 0 if not.
The strength of a node is the sum of the weights
of all edges connected to the node 44. This measure
is similar to degree in that it sums a node's con-
necting edges, but strength additionally allows for
edges of varying weights. It is defined as follows:
(cid:88)
j∈N
si =
wij,
where wij is the weight of the edge between nodes
i and j if they are connected and 0 if not.
The betweenness centrality of a node is the
proportion of all shortest paths within the network
that pass through the given node 46. Betweenness
centrality represents the degree to which a specific
node functions as a bridge between nodes in dis-
parate parts of the network. It is defined as follows:
(cid:88)
bi =
1
(n − 1)(n − 2)
h,j∈N ;h(cid:54)=j,h(cid:54)=i,j(cid:54)=i
ρ(i)
hj
ρhj
,
where ρhj is the number of shortest weighted paths
between h and j, ρ(i)
is the number of shortest
hj
weighted paths between h and j that pass through
node i, and n is the number of nodes in the graph.
The clustering coefficient of a node can be
defined as the probability that two of its adjacent
nodes are connected to each other. A node's clus-
tering coefficient then represents the amount of in-
terconnectedness in a node's local neighborhood.
The version used in the current study is a measure
of transitivity, as given by Barrat 47. It is defined
as follows:
12
cw
i =
1
si(ki − 1)
(cid:88)
h,j∈N
(wij + wih)
2
aijaihahj.
The global efficiency of a network can be de-
fined as the average inverse shortest path length
between any two nodes 48. Global efficiency is of-
ten thought of as representing the amount of inte-
gration within and between disparate parts of the
network. It is defined as follows:
(cid:80)
j∈N ;j(cid:54)=i d−1
n − 1
ij
,
(cid:88)
i∈N
Ew =
1
n
where dij is the shortest weighted path length be-
tween node i and node j.
The path length of a network is the average
shortest path length between all node pairs 49. In
many graphs, path length is inversely correlated
with global efficiency, and is therefore often inter-
preted as representing an alternative measure of
network integration. A version of the path length
for a weighted network is as follows:
(cid:88)
i(cid:54)=j
L =
1
n(n − 1)
dij.
The modularity of a network intuitively rep-
resents the degree of separation between nodes in
different groups 50. It quantifies how well the net-
work can be separated into non-overlapping com-
munities, with many within-group connections and
few between-group connections. For a network con-
taining only positive weights, the modularity can be
defined as follows:
Qw =
1
lw
wij − sisj
lw
δmimj ,
(cid:88)
(cid:104)
i,j∈N
(cid:105)
and for a signed network, the modularity can be
defined as follows 51:
(cid:88)
(cid:34)
i s+
wij − s+
lw
+
j
+
s−
i s−
lw−
j
(cid:35)
δmimj ,
Qw
s =
1
lw
+ + lw−
i,j∈N
where lw is the sum of all of the weights in the net-
work, lw
+ is the sum of all of the positive weights
in the network, lw− is the sum of all of the nega-
tive weights in the network, s+
is the strength of a
i
13
i
node's positive edges, s−
is the strength of a node's
negative edges, and δmimj is 1 if i = j and 0 oth-
erwise. Here, we addressed the issue of near degen-
eracy 52 in the modularity landscape by using 100
iterations of a Louvain-like locally greedy algorithm
to maximize the modularity quality function 26, and
we report the consensus partition over those itera-
tions.
The small-world propensity is the degree to
which a network shows similar clustering to that of
a lattice network, and similar average path length
to that of a random network 28. This metric is sim-
ilar to the commonly used small-world index, σ 49,
but has been shown to be unbiased even in the con-
text of networks with varying densities. Both mea-
sures broadly represent how well a network can be
characterized as having both disparate clusters and
high levels of between-cluster integration. Small-
world propensity is defined as follows:
(cid:114)
φ = 1 −
∆2
C + ∆2
L
2
,
where
and
∆C =
Clattice − Cobserved
Clattice − Crandom
,
∆L =
Lobserved − Lrandom
Llattice − Lrandom
,
with C representing the network clustering coeffi-
cient, defined as the average node-specific cw
i values.
The stochastic block model assumes a com-
munity structure in which between- and within-
group connections occur with a specific probabil-
ity (in the unweighted case) or an expected edge
weight (in the weighted case). Unlike modular-
ity, which characterizes a community structure with
many (strong) connections within groups and few
(weak) connections between groups, the stochastic
block model characterizes a community structure
with consistent connection patterns within and be-
tween groups. For the unweighted case 53, it is de-
fined as follows:
(cid:89)
i(cid:54)=j
(cid:0)1 − Bgigj
(cid:1)(1−aij )
,
Pg,B(A) =
Baij
gigj
where g ∈ 1, ..., K n is a vector of community mem-
berships, assuming K distinct communities, and
B ∈ [0, 1]KxK is a matrix of community-wise edge
probabilities.
For the exponential weighted framework used in
the current study 31, the model is defined as follows:
(cid:89)
i(cid:54)=j
Pg,Λ(A) =
Λgigj e
−Λgigj wij ,
where Λ ∈ [0,∞)KxK is a matrix of community-
wise rate parameters.
14
Network Measure
N = 950 N = 1000 N = 1050
Small-world propensity (φ)
Betweenness - degree correlation (r)
Betweenness - strength correlation (r)
0.59**
0.28**
-0.31**
0.58**
0.30**
-0.27**
0.57**
0.31**
-0.23**
Table S1: Effect of network size on the results for the full network. Rows represent different network-level measures reported in
the full text, columns represent their values and statistical significance for different choices of network size. Note: * = p < 0.05,
** = p < 0.01.
Group # of topics Primary topic classification
Secondary topic classification
Tertiary topic classification
1
2
3
4
5
6
7
8
206
178
175
141
117
92
78
13
Biochemistry (49%)
Medical Sciences (68%)
Evolution (29%)
Neuroscience (89%)
Biochemistry (43%)
Microbiology (40%)
Biochemistry (32%)
Biochemistry (38%)
Biophysics and Comp. Biol (18%)
Developmental Biology (4%)
Chemistry (21%)
Cell Biology (19%)
Environmental Sciences (15%) Ecology (13%)
Medical Sciences (4%)
Genetics (20%)
Immunology (37%)
Cell Biology (28%)
Medical Sciences (23%)
Biochemistry (2%)
Medical Sciences (14%)
Medical Sciences (14%)
Medical Sciences (19%)
Neuroscience (23%)
Table S2: Classification composition of empirically obtained topic communities. Rows represent the eight communities, and
columns give the three most common classifications for the topics contained within each community.
Number of
communities
Modularity (Q) Disciplinarity
P-value for test of
WSBM deviance
9
10
11
12
13
14
15
16
0.36
0.35
0.35
0.34
0.34
0.34
0.33
0.33
0.52
0.53
0.53
0.53
0.54
0.55
0.56
0.56
< 0.0001
< 0.0001
< 0.0001
< 0.0001
< 0.0001
< 0.0001
< 0.0001
< 0.0001
Table S3: Effect of the number of communities on features of the empirical partition. Rows represent partitions with between 9
and 16 communities. Columns represent the degree to which the partitions demonstrate modular structure, contain disciplinary
communities, and better explain edge weights compared to the classification partition.
Network Measure
N = 950 N = 1000 N = 1050
Strength by time (R2)
Interdisciplinarity by time (R2)
Small-world propensity by time (R2)
Classification deviance by time (R2)
0.77**
0.41**
0.26*
0.31**
0.75**
0.42**
0.25*
0.33**
0.74**
0.40**
0.20
0.33**
Table S4: Effect of network size on the linear trajectories of the temporal network. Rows represent the variances explained
by time for various measures of the temporal network. Columns represent their values and statistical significance for different
choices of network size. Note: * = p < 0.05, ** = p < 0.01.
Network Measure
N = 950 N = 1000 N = 1050
Interdisciplinarity - impact factor correlation (r)
Small-world propensity - impact factor correlation (r)
Classification deviance - impact factor correlation (r)
0.44*
0.35
0.37
0.45*
0.36
0.39*
0.45*
0.35
0.38
Table S5: Effect of network size on the impact factor correlations of the temporal network. Rows represent the correlations with
PNAS 's impact factor for various measures of the temporal network. Columns represent their values and statistical significance
for different choices of network size. Note: * = p < 0.05, ** = p < 0.01.
15
Figure S1: Visualization of the Jaccard similarity between
the empirical community structure and the assigned topic
classifications. Jaccard similarities are plotted for a range of
γ values, demonstrating the procedure for optimizing Jac-
card similarity over γ that was used when performing com-
munity detection. These values are shown for three different
choices of network size.
Figure S2: Visualization of the consistency, using Jaccard
similarity, of the empirical community structure both (i)
across sizes, and (ii) with or without negative edge weights.
Community structure was consistent across sizes, and was
reasonably consistent between positive weighted networks,
and positive-and-negative weighted networks.
16
|
1309.7698 | 1 | 1309 | 2013-09-30T01:07:06 | Signed Networks, Triadic Interactions and the Evolution of Cooperation | [
"cs.SI",
"cs.GT",
"cs.NE",
"physics.soc-ph"
] | We outline a model to study the evolution of cooperation in a population of agents playing the prisoner's dilemma in signed networks. We highlight that if only dyadic interactions are taken into account, cooperation never evolves. However, when triadic considerations are introduced, a window of opportunity for emergence of cooperation as a stable behaviour emerges. | cs.SI | cs | Signed Networks, Triadic Interactions and the Evolution of
Cooperation
K´aroly Tak´acs
Simone Righi
MTA TK "Lendulet" Research Center for Educational
and Network Studies (RECENS).
Budapest (Hungary)
[email protected]
[email protected]
We outline a model to study the evolution of cooperation in a population of agents playing the pris-
oner's dilemma in signed networks. We highlight that if only dyadic interactions are taken into
account, cooperation never evolves. However, when triadic considerations are introduced, a window
of opportunity for emergence of cooperation as a stable behaviour emerges.
Introduction.
In this paper we examine how cooperation can be supported by negative ties and triadic
interactions. Previous research has demonstrated that cooperation is more likely to evolve in social
dilemma games, such as the Prisoners Dilemma, if the game is played in networks [1, 4, 5, 12]. Besides
sparseness [3, 4, 5], the structure of the network is also important because on top of direct ties, indirect
relations also control behavior and contribute to the establishment of cooperation through reputation
mechanisms, such as image scoring [2]. These ideas have been fruitful in explaining why and under
which conditions can cooperation evolve and be stable among humans. In these studies however, only
positive relations between players are analyzed.
Negative ties could potentially be better enforcers of cooperation than positive ones. At the dyadic
level, social psychological mechanisms of vengeance and anger are manifested through the use of pow-
erful trigger strategies in the repeated Prisoners Dilemma game [7, 8, 9, 10]. Another mechanism is
selectivity that prescribes cooperation with those who are liked and defection with those who are dis-
liked. Experiments demonstrate that subjects play differently in social dilemma games with related and
unrelated others (e.g., [6]). There is also evidence of homophilous selection of partners that can stabi-
lize cooperative regimes [11]. Furthermore, we hypothesize that when interactions happen on a triadic
basis, cooperation can increase. For instance, if A and B are friends, and C is their common enemy, the
presence of the negative ties towards C could strengthen cooperation between A and B. Signed relations
could reliably signal cooperative or non-cooperative intentions, and hence could guarantee the spread of
appropriate reputational information that result in confirming expectations about cooperation.
Model. We incorporate both dyadic and triadic interaction mechanisms in an agent-based model in
which the (random) signed network and cooperation co-evolve. Our model is inspired by the tradition of
computational evolutionary game theory models where the more successful strategies tend to diffuse in
the population. We analyze the evolutionary success of different strategies that are defecting or cooper-
ating and sensitive to the sign of links from their partners to others to a different way and extent. Indeed,
each agent in our setup can be of one of the following three types:
• Unconditional Defector (UD): which will always defect.
• Conditional Player(CO): whose strategy choice is influenced by the sign of his ties. He cooperates
if he likes the opponent (positive tie) and he defects if he does not like the opponent (negative tie).
A. Graudenzi, G. Caravagna, G. Mauri, M. Antoniotti (Eds.):
Wivace 2013 - Italian Workshop on
Artificial Life and Evolutionary Computation
EPTCS 130, 2013, pp. 104 -- 107, doi:10.4204/EPTCS.130.17
c(cid:13) S. Righi, K. Tak´acs
S. Righi, K. Tak´acs
105
• Unconditional Cooperator (UC): It cooperates always regardless to the sign of his ties.
Starting with a population composed of a similar number of agents for each type we iterate the following
steps until an equilibrium is reached:
1. Two (or three in the case of triadic interactions) connected agents are selected randomly.
2. The prisoner's dilemma is played between the two (or three, playing the game between each couple
of the triad) agents selected and the total payoff is calculated for each of them1.
3. The signs of the network ties involved in the interactions evolve as consequence of the actions of
the agents in step 3. In particular:
• if both agents played the Defection strategy then the sign of their tie is turned negative.
• if both agents played the Cooperation strategy then the sign between them is turned positive.
• if one of the agent Cooperates while the other Defects then the tie is turned positive with
probability Ppos and negative with probability Pneg.
4. The agent with higher payoff has a probability Pinv of invading the agent with lower payoff (in case
of equality each agent has the same probability of invasion2).
Studying this setup in the two different cases in which the Prisoner's dilemma is played in couples and
in triads we obtain the preliminary results outlined in the next paragraph3
Outline of the results.
In the presence of negative ties, cooperation cannot be sustained in a random
network where only dyadic considerations affect the agents' behavior. The reason is described by the first
panel of Figure 1. Here we consider the stability, in isolation, of each possible pair of agents and sign of
the tie that links them. If a pair is unstable then the dynamics of the model will transform it in some other
pair. In presence of only dyadic interactions only the pairs circled in blue4 are stable. However, since
the prisoner's dilemma is not played in isolation but in a population of agents, one must also consider
the stability of the dyads to invasion by other types of agents. Indeed, as UD always dominates UC in
a dyadic comparison, the dyad UC+UC is only stable in isolation. Moreover, UD dominates CO in a
dyadic comparison if they are linked by a positive tie, they are equivalent otherwise. So if Pneg > 0 then
CO +CO and CO−CO are also only stable in isolation. Generalizing this result to the whole network
we can conclude that the only stable configuration for the case of dyadic interactions is a population of
Defectors linked by a network of negative signs.
Introducing triadic interactions enlarges the window of opportunity for the diffusion of cooperative
behavior allowing for the emergence of stable cooperative clusters. Indeed, with the same strategy used
above5, we obtain the updating dynamics of the lower left panel of Figure 1: all triads formed of agents
of the same types are stable in isolation. Moreover, as can be seen on the right panel of Figure 1 none of
this triads dominates any other one. This allows us to conclude that if interactions happen in triads it is
possible to observe the emergence of some degree of cooperation in an evolutionary prisoner's dilemma
played on signed networks. The actual emergence of cooperation depends on the values assumed by the
transition probabilities and from the network topology assumed. We are currently designing simulations
to corroborate the conceptual analysis provided here.
1If a triad is selected all three agents need to have connections with each other so that everyone will play exactly twice.
2If there is a payoffs order a > b > c, then only a can invade one of the other agents. However, if the payoffs order is of the
type a = b > c than either a or b can be selected. The selected agent will then randomly choose to invade one of the remaining
players of the triad randomly.
3For reasons of space, in this paper we limit our analysis to a conceptual analysis.
4Namely: UC+UC, CO+CO, UD-UD and CO-CO.
5Signs are not reported in the image so to simplify the drawing.
106
Signed Networks, Triadic Interactions and the Evolution of Cooperation
Figure 1: The first panel shows the effects of model's dynamics on each signed pair for the case in which
only dyadic interactions are considered. The arrows between dyads indicate the possible transformations
from one pair to another allowed by the model's dynamics. Only the four pairs circled in blue (the
four left ones) are stable. The lower left panel repeat the same exercise for triadic interactions. The
lower right panel shows that none of the triads which are stable in isolation is dominated by any other.
The signs are omitted from the figure and each triad represent all possible triads with the combination
of agents' types indicated, regardless of the signs that link them. The arrows between triads indicate
possible transformations from one triad to another, accounting for the possibilities given by different
network signs, allowed by the model's dynamics.
.
References
[1] Hauert C & Doebeli M (2004): Spatial structure often inhibits the evolution of cooperation in the snowdrift
game. Nature 428(6983), pp. 643 -- 646. doi:10.1038/nature02360
[2] Wedekind C & Milinski M (2000): Cooperation through image scoring in humans. Science 288(5467), pp.
850 -- 852. doi:10.1126/science.288.5467.850
[3] Nowak MA (2006): Five rules for the evolution of cooperation. Science 314(5805), pp. 1560 -- 1563.
doi:10.1126/science.1133755
[4] Lieberman E Ohtsuki H, Hauert C & Nowak MA (2006): A simple rule for the evolution of cooperation on
graphs and social networks. Nature 441(7092), pp. 502 -- 505. doi:10.1038/nature04605
[5] Pinheiro FL Pacheco JM & Santos FC (2009): Population structure induces a symmetry break-
PLoS computational biology 5(12), p. e1000596.
ing favoring the emergence of cooperation.
doi:10.1371/journal.pcbi.1000596.g004
[6] Ferraro PJ & Cummings RG: Cultural diversity, discrimination, and economic outcomes: an experimental
analysis. Economic Inquiry 45(2).
[7] Axelrod R (1984): The Evolution of Cooperation. New York, Basic Books.
S. Righi, K. Tak´acs
107
[8] Axelrod R (1997): The Complexity of Cooperation. Agent-Based Models of Competition and Collaboration.
Princeton NJ, Princeton University Press.
[9] Axelrod R & Hamilton WD (1981): The evolution of cooperation. Science 211(4489), pp. 1390 -- 1396.
doi:10.1126/science.7466396.
[10] Trivers RL (1971): The evolution of reciprocal altruism. Quarterly review of biology, pp. 35 -- 57.
[11] Yamagishi T & Hayashi N (1996): Selective Play: Social Embeddedness of Social Dilemmas. In Liebrand
WBG & Messick DM, editors: Frontiers in Social Dilemma Research, Springer, Berlin.
[12] Zhang C Wang S, Szalay MS & Csermely P (2008):
strategy adoption rules expand cooperative network topologies.
doi:10.1371/journal.pone.0001917.s001
Learning and innovative elements of
PLoS One 3(4), p. e1917.
[13] Hayashi N Yamagishi T & Jin N (1994): Prisoners Dilemma Networks: Selection Strategy Versus Action
Strategy. In Albers W Schulz U & Mueller U, editors: Social Dilemmas and Cooperation, Springer Verlag,
Berlin.
|
1703.04837 | 1 | 1703 | 2017-03-14T23:43:15 | SNE: Signed Network Embedding | [
"cs.SI"
] | Several network embedding models have been developed for unsigned networks. However, these models based on skip-gram cannot be applied to signed networks because they can only deal with one type of link. In this paper, we present our signed network embedding model called SNE. Our SNE adopts the log-bilinear model, uses node representations of all nodes along a given path, and further incorporates two signed-type vectors to capture the positive or negative relationship of each edge along the path. We conduct two experiments, node classification and link prediction, on both directed and undirected signed networks and compare with four baselines including a matrix factorization method and three state-of-the-art unsigned network embedding models. The experimental results demonstrate the effectiveness of our signed network embedding. | cs.SI | cs |
SNE: Signed Network Embedding
Shuhan Yuan1, Xintao Wu2, and Yang Xiang1
1 Tongji University, Shanghai, China, Email:{4e66,shxiangyang}@tongji.edu.cn
2 University of Arkansas, Fayetteville, AR, USA, Email:[email protected]
Abstract. Several network embedding models have been developed for unsigned
networks. However, these models based on skip-gram cannot be applied to signed
networks because they can only deal with one type of link. In this paper, we
present our signed network embedding model called SNE. Our SNE adopts the
log-bilinear model, uses node representations of all nodes along a given path,
and further incorporates two signed-type vectors to capture the positive or nega-
tive relationship of each edge along the path. We conduct two experiments, node
classification and link prediction, on both directed and undirected signed net-
works and compare with four baselines including a matrix factorization method
and three state-of-the-art unsigned network embedding models. The experimental
results demonstrate the effectiveness of our signed network embedding.
1
Introduction
Representation learning [1], which aims to learn the features automatically based on
various deep learning models [15], has been extensively studied in recent years. Tra-
ditionally, supervised learning tasks require hand-designed features as inputs. Deep
learning models have shown great success in automatically learning the semantic rep-
resentations for different types of data, like image, text and speech [6, 8, 12]. In this
paper, we focus on representation learning of networks, in particular, signed networks.
Several representation learning methods of unsigned networks have been developed
recently [9, 26, 30, 31]. They represent each node as a low-dimensional vector which
captures the structure information of the network.
Signed networks are ubiquitous in real-world social systems, which have both posi-
tive and negative relationships. For example, Epinions 3 allows users to mark their trust
or distrust to other users on product reviews and Slashdot 4 allows users to specify
other users as friends or foes. Most unsigned network embedding models [9,26,30] are
based on skip-gram [20], a classic approach for training word embeddings. The objec-
tive functions used in unsigned network embedding approaches do not incorporate the
sign information of edges. Thus, they cannot simply migrate to signed networks be-
cause the negative links change the theories or assumptions on which unsigned network
embedding models rely [28].
In this paper, we develop a signed network embedding model called SNE. To the
best of our knowledge, this is the first research on signed network embedding. Our SNE
3 http://www.epinions.com/
4 https://slashdot.org/
2
model adopts the log-bilinear model [21, 22], uses node representations of all nodes
along a given path, and further incorporates two signed-type vectors to capture the pos-
itive or negative relationship of each edge along the path. Our SNE significantly outper-
forms existing unsigned network embedding models which assume all edges are from
the same type of relationship and only use the representations of nodes in the target's
neighborhood. We conduct two experiments to evaluate our model, node classification
and link prediction, on both an undirected signed network and a directed signed net-
work built from real-world data. We compare with four baselines including a matrix
factorization method and three state-of-the-art network embedding models designed
for unsigned networks. The experimental results demonstrate the effectiveness of our
signed network embedding.
2 Preliminary
In this section, we first introduce the skip-gram model, one of commonly used neural
language models to train word embeddings [2]. We then give a brief overview of several
state-of-the-art unsigned network embedding models based on the skip-gram model.
Skip-gram model The skip-gram is to model the co-occurrence probability p(wjwi; θ)
that word wj co-occurs with word wi in a context window. The co-occurrence proba-
bility is calculated based on softmax function:
(cid:80)
p(wjwi; θ) =
exp(vT
wj
j(cid:48)∈V exp(vT
vwi)
wj(cid:48) vwi)
,
(1)
where V is the set of all words and vwj and vwi ∈ Rd are word embeddings for wj and
wi, respectively. The parameters θ, i.e., vwi, vwj , are trained by maximizing the log
likelihood of predicting context words in a corpus:
V(cid:88)
(cid:88)
J =
j∈context(i)
i
log p(wjwi),
(2)
where context(i) is the set of context words of wi.
Network embedding Network embedding aims to map the network G = (V, E) into
a low dimensional space where each vertex is represented as a low dimensional real
vector. The network embedding treats the graph's vertex set V as the vocabulary V
and treats each vertex vi as a word wi in the skip-gram approach. The corpus used for
training is composed by the edge set E, e.g., in [30], or a set of truncated random walks
from the graph, e.g., in [26] and [9].
To train the node vectors, the objective of previous network embedding models is
to predict the neighbor nodes N (vi) of a given source node vi. However, predicting
a number of neighbor nodes requires modeling the joint probability of nodes, which
is hard to compute. The conditional independence assumption, i.e., the likelihood of
observing a neighbor node is independent of observing other neighbor nodes given the
source node, is often assumed [9]. Thus, the objective function is defined as:
J =
log p(N (vi)vi) =
log p(v(cid:48)
ivi),
(3)
(cid:88)
(cid:88)
vi∈V
i∈N (vi)
v(cid:48)
(cid:88)
vi∈V
3
ivi) is softmax function similar to Equation 1 except that the word vectors
where p(v(cid:48)
are replaced with node vectors.
3 SNE: Signed Network Embedding
We present our network embedding model for signed networks. For each node's embed-
ding, we introduce the use of both source embedding and target embedding to capture
the two potential roles of each node.
3.1 Problem definition
Formally, a signed network is defined as G = (V, E+, E−), where V is the set of
vertices and E+ (E−) is the set of positive (negative) edges. Each edge e ∈ E+ ∪ E−
is represented as euv = (u, v, εuv), where u, v ∈ V and εuv indicates the sign value of
edge e, i.e., εuv = 1 if e ∈ E+ and εuv = −1 if e ∈ E−. In the scenario of signed
directed graphs, euv is a directed edge where node node u denotes the source and v
denotes the target. Our goal is to learn node embedding for each vertex in a signed
network while capturing as much topological information as possible. For each vertex
vi] where vvi ∈ Rd denotes its
vi, its node representation is defined as ¯vvi = [vvi : v(cid:48)
source embedding and v(cid:48)
vi ∈ Rd denotes its target embedding.
3.2 Log-bilinear model for signed network embedding
We develop our signed network embedding by adapting the log-bilinear model such that
the trained node embedding can capture node's path and sign information. Recall that
existing unsigned network embedding models are based on the skip-gram which only
captures node's neighbour information and cannot deal with the edge sign.
Log-bilinear model Given a sequence of context words g = w1, ..., wl, the log-bilinear
model firstly computes the predicted representation for the target word by linearly com-
bining the feature vectors of words in the context with the position weight vectors:
l(cid:88)
vg =
cj (cid:12) vwi ,
(4)
j=1
where (cid:12) indicates the element-wise multiplication and cj denotes the position weight
vector of the context word wi. A score function is defined to measure the similarity
between the predicted target word vector and its actual target word vector:
s(wi, g) = vT
g vwi + bwi ,
(5)
where bwi is the bias term. The log-bilinear model then trains word embeddings v and
position weight vectors c by optimizing the objective function similar to the skip-gram.
SNE algorithm In our signed network embedding, we adopt the log-bilinear model to
predict the target node based on its paths. The objective of the log-bilinear model is
to predict a target node given its predecessors along a path. Thus, the signed network
embedding is defined as a maximum likelihood optimization problem. One key idea of
our signed network embedding is to use signed-type vector c+ ∈ Rd (c− ∈ Rd) to
4
represent the positive (negative) edges. Formally, for a target node v and a path h =
[u1, u2, . . . , ul, v], the model computes the predicted target embedding of node v by
linearly combining source embeddings (vui) of all source nodes along the path h with
the corresponding signed-type vectors (ci):
vh =
ci (cid:12) vui,
(6)
l(cid:88)
i=1
(cid:80)
(cid:88)
v∈V
where ci ≡ c+ if εuiui+1 = 1, or ci ≡ c− if εuiui+1 = −1 and (cid:12) denotes element-wise
multiplication. The score function is to evaluate the similarity between the predicted
representation vh and the actual representation v(cid:48)
h v(cid:48)
v of target node v:
s(v, h) = vT
v + bv,
(7)
where bv is a bias term.
To train the node representations, we define the conditional likelihood of target node
v generated by a path of nodes h and their edge types q based on softmax function:
p(vh, q; θ) =
exp(s(v, h))
v(cid:48)∈V exp(s(v(cid:48), h))
,
(8)
where V is the set of vertices, and θ = [vui, v(cid:48)
maximize the log likelihood of Equation 8:
v, c, bv]. The objective function is to
J =
log p(vh, q; ; θ).
(9)
Algorithm 1 shows the pseudo-code of our signed network embedding. We first ran-
domly initialize node embeddings (Line 1) and then use random walk to generate the
corpus (Line 2). Lines 4-11 show how we specify ci based on the sign of edge euiui+1.
We calculate the predicted representation of the target node by combining source em-
beddings of nodes along the path with the edge type vectors (Line 12). We calculate the
score function to measure the similarity between the predicted representation and the
actual representation of the target node (Line 13) and compute the conditional likeli-
hood of target node given the path (Line 14). Finally, we apply the Adagrad method [7]
to optimize the objective function (Line 15). The procedures in Lines 4-15 repeat over
each path in the corpus.
For a large network, the softmax function is expensive to compute because of the
normalization term in Equation 8. We adopt the sampled softmax approach [11] to
reduce the computing complexity. During training, the source and target embeddings
of each node are updated simultaneously. Once the model is well-trained, we get node
embeddings of a signed network. We also adopt the approach in [26] to generate paths
efficiently. Given each starting node u, we uniformly sample the next node from the
neighbors of the last node in the path until it reaches the maximum length L. We then
use a sliding window with size l + 1 to slide over the sequence of nodes generated by
random walk. The first l nodes in each sliding window are treated as the sequence of
path and the last node as the target node. For each node u, we repeat this process t
times.
Algorithm 1: The SNE algorithm
5
Input
Output: Representation of each node ¯vi = [vi : v(cid:48)
: Signed graph G = (V, E+, E−), embedding dimension d, length of path l,
length of random walks L, walks per nodes t
i]
1 Initialization: Randomly initialize the source and target node embeddings vi and v(cid:48)
iof
each node V
if εuiui+1 == 1 then
for j = 1 to l do
ci ≡ c+
2 Generate the corpus based on uniform random walk
3 for each path [u1, u2, . . . , ul, v] in the corpus do
4
5
6
7
8
9
10
11
12
13
14
15
16 end
end
compute vh by Equation 6
compute s(v, h) by Equation 7
compute p(vh, q; θ) by Equation 8
update θ with Adagrad
ci ≡ c−
end
else
end
4 Experiments
To compare the performance of different network embedding approaches, we focus on
the quality of their output, i.e., node embeddings. We use the generated node embed-
dings as input of two data mining tasks, node classification and link prediction. For
node classification, we assume each node in the network is associated with a known
class label and use node embeddings to build classifiers. In link prediction, we use
node embeddings to predict whether there is a positive, negative, or no edge between
two nodes. In our signed network embedding, we use the whole node representation
¯vvi = [vvi : v(cid:48)
vi.
This approach is denoted as SNEst. We also use only the source node vector vvi as the
node representation. This approach is denoted as SNEs. Comparing the performance
of SNEst and SNEs on both directed and undirected networks expects to help better
understand the performance and applicability of our signed network embedding.
Baseline algorithms We compare our SNE with the following baseline algorithms.
vi ] that contains both source embedding vvi and target embedding v(cid:48)
– SignedLaplacian [14]. It calculates eigenvectors of the k smallest eigenvalues of
the signed Laplacian matrix and treats each row vector as node embedding.
– DeepWalk [26]. It uses uniform random walk (i.e., depth-first strategy) to sample
the inputs and trains the network embedding based on skip-gram.
– LINE [30]. It uses the breadth-first strategy to sample the inputs based on node
neighbors and preserves both the first order and second order proximities in node
embeddings.
6
– Node2vec [9]. It is based on skip-gram and adopts the biased random walk strategy
to generate inputs. With the biased random walk, it can explore diverse neighbor-
hoods by balancing the depth-first sampling and breath-first sampling.
Datasets We conduct our evaluation on two signed networks. (1) The first signed net-
work, WikiEditor, is extracted from the UMD Wikipedia dataset [13]. The dataset is
composed by 17015 vandals and 17015 benign users who edited the Wikipedia pages
from Jan 2013 to July 2014. Different from benign users, vandals edit articles in a delib-
erate attempt to damage Wikipedia. One edit may be reverted by bots or editors. Hence,
each edit can belong to either revert or no-revert category. The WikiEditor is built based
on the co-edit relations. In particular, a positive (negative) edge between users i and j is
added if the majority of their co-edits are from the same category (different categories).
We remove from our signed network those users who do not have any co-edit relations
with others. Note that in WikiEditor, each user is clearly labeled as either benign or
vandal. Hence, we can run node classification task on WikiEditor in addition to link
prediction. (2) The second signed network is based on the Slashdot Zoo dataset 5. The
Slashdot network is signed and directed. Unfortunately, it does not contain node label
information. Thus we only conduct link prediction. Table 1 shows the statistics of these
two signed networks.
Table 1: Statistics of WikiEditor and Slashdot
Slashdot
Directed
WidiEditor
Undirected
Type
# of Users (+, -)
# of Links (+, -) 348255 (269251, 79004) 549202 (425072, 124130)
21535 (7852, 13683)
82144 (N/A, N/A)
Parameter settings In our SNE methods, the number of randomly sampled nodes used
in the sampled softmax approach is 512. The dimension of node vectors d is set to
100 for all embedding models except SignedLaplacian. SignedLaplacian is a matrix
factorization approach. We only run SignedLaplacian on WikiEditor. This is because
Slashdot is a directed graph and its Laplacian matrix is non-symmetric. As a result,
the spectral decomposition involves complex values. For WikiEditor, SignedLaplacian
uses 40 leading vectors because there is a large eigengap between the 40th and 41st
eigenvalues. For other parameters used in DeepWalk, LINE and Node2vec, we use their
default values based on their published source codes.
4.1 Node classification
We conduct node classification using the WikiEditor signed network. This task is to
predict whether a user is benign or vandal in the WikiEditor signed network. In our SNE
training, the path length l is 3, the maximum length of random walk path L is 40, and
the number of random walks starting at each node t is 20. We also run all baselines to
get their node embeddings of WikiEditor. We then use the node embeddings generated
by each method to train a logistic regression classifier with 10-fold cross validation.
5 https://snap.stanford.edu/data/
7
Classification accuracy Table 2 shows the comparison results of each method on node
classification task. Our SNEst achieves the best accuracy and outperforms all baselines
significantly in terms of accuracy. This indicates that our SNE can capture the different
relations among nodes by using the signed-type vectors c. All the other embedding
methods based on skip-gram have a low accuracy, indicating they are not feasible for
signed network embedding because they do not distinguish the positive edges from
negative edges. Another interesting observation is that the accuracy of SNEs is only
slightly worse than SNEst. This is because WikiEditor is undirected. Thus using only
source embeddings in the SNE training is feasible for undirected networks.
Visualization To further compare the node representations trained by each approach,
we randomly choose representations of 7000 users from WikiEditor and map them to a
2-D space based on t-SNE approach [19]. Figure 1 shows the projections of node rep-
resentations from DeepWalk, Node2vec, and SNEst. We observe that SNEst achieves
the best and DeepWalk is the worst. Node2vec performs slightly better than DeepWalk
but the two types of users still mix together in many regions of the projection space.
Table 2: Accuracy for node classification on WikiEditor
Accuracy
SignedLaplacian DeepWalk Line Node2vec SNEs SNEst
73.78% 72.36% 73.85% 79.63% 82.07%
63.52%
(a) DeepWalk
(b) Node2vec
(c) SNEst
Fig. 1: Visualization of 7000 users in WikiEditor. Color of a node indicates the type of
the user. Blue: "Vandals", red:"Benign Users".
4.2 Link prediction
In this section, we conduct link prediction on both WikiEditor and Slashdot signed
graphs. We follow the same procedure as [9] to make link prediction as a classification
task. We first use node representations to compose edge representations and then use
them to build a classifier for predicting whether there is a positive, negative or no edge
between two nodes. Given a pair of nodes (u, v) connected by an edge, we use an
8
element-wise operator to combine the node vectors vu and vv to compose the edge
vector euv. We use the same operators as [9] and show them in Table 3. We train and
test the one-vs-rest logistic regression model with 10-fold cross validation by using the
edge vectors as inputs.
Table 3: Element-wise operators for combining node vectors to edge vectors
Definition
Operator
Average euv = 1
2 (vu + vv)
euv = vu ∗ vv
Hadamard
L1 Weight euv = vu − vv
L2 Weight euv = vu − vv2
For Slashdot, we set the path length l = 1 in our SNE training, which corresponds
to the use of the edge list of the Slashdot graph. This is because there are few paths with
length larger than 1 in Slashdot. For WikiEditor, we use the same node representations
adopted in the previous node classification task. We also compose balanced datasets for
link prediction as suggested in [9]. We keep all the negative edges, randomly sample the
same number of positive edges, and then randomly generate an equal number of fake
edges connecting two nodes. At last, we have 79004 edges for each edge type (positive,
negative, and fake) in WikiEditor and we have 124130 edges for each type in Slashdot.
Experimental results Table 4 shows the link prediction accuracy for each approach
with four different operators. We observe that our SNE with Hadamard operator achieves
the highest accuracy on both WikiEditor and Slashdot. SNE also achieves good accu-
racy with the L1 Weight and L2 Weight. For the Average operator, we argue that it is
not suitable for composing edge vectors from node vectors in signed networks although
it is suitable in unsigned networks. This is because a negative edge pushes away the two
connected nodes in the vector space whereas a positive edge pulls them together [14].
When examining the performance of all baselines, their accuracy values are signifi-
cantly lower than our SNE, demonstrating their infeasibility for signed networks.
We also observe that there is no big difference between SNEst and SNEs on WikiEd-
itor whereas SNEst outperforms SNEs significantly on Slashdot. This is because WikiEd-
itor is an undirected network and Slashdot is directed. This suggests it is imperative to
combine both source embedding and target embedding as node representation in signed
directed graphs.
4.3 Parameter sensitivity
Vector dimension We evaluate how the dimension size of node vectors affects the
accuracy of two tasks on both WikiEditor and Slashdot. For link prediction, we use
SNEst with Hadamard operation as it can achieve the best performance as shown in the
last section. Figure 2a shows how the accuracy of link prediction varies with different
dimension values of node vectors used in SNEst for both datasets. We can observe
that the accuracy increases correspondingly for both datasets when the dimension of
node vectors increases. Meanwhile, once the accuracy reaches the top, increasing the
dimensions further does not have much impact on accuracy any more.
Sample size Figure 2b shows how the accuracy of link prediction varies with the sam-
ple size used in SNEst for both datasets. For WikiEditor, we tune the sample size by
9
Table 4: Comparing the accuracy for link prediction
Dataset
Approach
Hadamard Average L1 Weight L2 Weight
WikiEditor
(Undirected)
Slashdot
(Directed)
SignedLaplacian
DeepWalk
Line
Node2vec
SNEs
SNEst
DeepWalk
Line
Node2vec
SNEs
SNEst
0.3308
0.7744
0.7296
0.7112
0.9391
0.9399
0.6907
0.5823
0.6560
0.4789
0.9328
0.5779
0.6821
0.6750
0.6491
0.6852
0.6043
0.6986
0.6822
0.6475
0.5474
0.5810
0.5465
0.4515
0.5205
0.6787
0.8699
0.8495
0.5877
0.6158
0.4595
0.6078
0.8358
0.3792
0.4553
0.4986
0.6809
0.8775
0.8871
0.5827
0.6087
0.4544
0.6080
0.8627
changing the number of random walks starting at each node (t). In our experiment, we
set t = 5, 10, 15, 20, 25 respectively and calculate the corresponding sample sizes. For
Slashdot, we directly use the number of sampled edges in our training as the path length
is one. For both datasets, the overall trend is similar. The accuracy increases with more
samples. However, the accuracy becomes stable when the sample size reaches some
value. Adding more samples further does not improve the accuracy significantly.
(a) Dimension
(b) Sample Size
Fig. 2: The sensitivity of SNE on the WikiEditor and Slashdot
Path length We use WikiEditor to evaluate how the path length l affects the accuracy
of both node classification and link prediction. From Figure 3a, we observe that slightly
increasing the path length in our SNE can improve the accuracy of node classification.
This indicates that the use of long paths in our SNE training can generally capture
more network structure information, which is useful for node classification. However,
the performance of the SNEs and SNEst decreases when the path length becomes too
large. One potential reason is that SNE uses only two signed-type vectors for all nodes
along paths and nodes in the beginning of a long path may not convey much information
10
about the target node. In Figure 3b, we also observe that the accuracy of link prediction
decreases when the path length increases. For link prediction, the performance depends
more on local information of nodes. Hence the inclusion of one source node in the path
can make our SNE learn the sufficient local information.
(a) Node classification
(b) Link prediction
Fig. 3: The sensitivity of SNE on the WikiEditor by changing the path length (l)
5 Related Work
Signed network analysis Mining signed network attracts increasing attention [5,14,16,
27,28]. The balance theory [10] and the status theory [16] have been proposed and many
algorithms have been developed for tasks such as community detection, link prediction,
and spectral graph analysis of signed networks [5, 14, 18, 28, 34, 35, 38]. Spectral graph
analysis is mainly based on matrix decomposition which is often expensive and hard to
scale to large networks. It is difficult to capture the non-linear structure information as
well as local neighborhood information because it simply projects a global matrix to a
low dimension space formed by leading eigenvectors.
Network embedding Several network embedding methods including DeepWalk [26],
LINE [30], Node2vec [9], Deep Graph Kernels [36] and DDRW [17] have been pro-
posed. These models are based on the neural language model. Several network embed-
ding models are based on other neural network model. For example, DNR [33] uses the
deep auto-encoder, DNGR [3] is based on a stacked denoising auto-encoder, and the
work [23] adopts the convolutional neural network to learn the network feature repre-
sentations. Meanwhile, some works learn the network embedding by considering the
node attribute information. In [32, 39] the authors consider the node label information
and present semi-supervised models to learn the network embedding. The heteroge-
neous network embedding models are studied in [4, 25, 29, 37]. HOPE [24] focuses on
preserving the asymmetric transitivity of a directed network by approximating high-
order proximity of a network. Unlike all the works described above, in this paper, we
explore the signed network embedding.
11
6 Conclusion
In this paper, we have presented SNE for signed network embedding. Our SNE adopts
the log-bilinear model to combine the edge sign information and node representations
of all nodes along a given path. Thus, the learned node embeddings capture the infor-
mation of positive and negative links in signed networks. Experimental results on node
classification and link prediction showed the effectiveness of SNE. Our SNE expects
to keep the same scalability as DeepWalk or Node2vec because SNE adopts vectors to
represent the sign information and uses linear operation to combine node representa-
tion and signed vectors. In our future work, we plan to examine how other structural
information (e.g., triangles or motifs) can be preserved in signed network embedding.
Acknowledgments
The authors acknowledge the support from the National Natural Science Foundation
of China (71571136), the 973 Program of China (2014CB340404), and the Research
Project of Science and Technology Commission of Shanghai Municipality (16JC1403000,
14511108002) to Shuhan Yuan and Yang Xiang, and from National Science Foundation
(1564250) to Xintao Wu. This research was conducted while Shuhan Yuan visited Uni-
versity of Arkansas. Yang Xiang is the corresponding author of the paper.
References
1. Y. Bengio, A. Courville, and P. Vincent. Representation learning: A review and new perspec-
tives. TPAMI, 35(8):1798–1828, 2013.
2. Y. Bengio, R. Ducharme, P. Vincent, and C. Jauvin. A neural probabilistic language model.
Journal of Machine Learning Research, 3:1137–1155, 2003.
3. S. Cao, W. Lu, and Q. Xu. Deep neural networks for learning graph representations.
In
AAAI, 2016.
4. S. Chang, W. Han, J. Tang, G.-J. Qi, C. C. Aggarwal, and T. S. Huang. Heterogeneous
network embedding via deep architectures. In KDD, 2015.
5. K.-Y. Chiang, C.-J. Hsieh, N. Natarajan, A. Tewari, and I. S. Dhillon. Prediction and clus-
tering in signed networks: A local to global perspective. arXiv:1302.5145 [cs], 2013.
6. R. Collobert, J. Weston, L. Bottou, M. Karlen, K. Kavukcuoglu, and P. Kuksa. Natural lan-
guage processing (almost) from scratch. Journal of Machine Learning Research, (12):2493–
2537, 2011.
7. J. Duchi, E. Hazan, and Y. Singer. Adaptive subgradient methods for online learning and
stochastic optimization. The Journal of Machine Learning Research, 12:2121–2159, 2011.
8. A. Graves, A.-r. Mohamed, and G. Hinton. Speech recognition with deep recurrent neural
networks. In arXiv:1303.5778 [cs], 2013.
9. A. Grover and J. Leskovec. node2vec: Scalable feature learning for networks. In KDD, 2016.
10. F. Heider. Attitudes and cognitive organization. The Journal of psychology, 21(1):107–112,
1946.
11. S. Jean, K. Cho, R. Memisevic, and Y. Bengio. On using very large target vocabulary for
neural machine translation. arXiv:1412.2007 [cs], 2014.
12. A. Krizhevsky, I. Sutskever, and G. E. Hinton. Imagenet classification with deep convolu-
tional neural networks. In NIPS, 2012.
12
13. S. Kumar, F. Spezzano, and V. Subrahmanian. Vews: A wikipedia vandal early warning
system. In KDD, 2015.
14. J. Kunegis, S. Schmidt, A. Lommatzsch, J. Lerner, E. W. De Luca, and S. Albayrak. Spectral
analysis of signed graphs for clustering, prediction and visualization. In SDM, 2010.
15. Y. LeCun, Y. Bengio, and G. Hinton. Deep learning. Nature, 521(7553):436–444, 2015.
16. J. Leskovec, D. Huttenlocher, and J. Kleinberg. Signed networks in social media. In Pro-
ceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2010.
17. J. Li, J. Zhu, and B. Zhang. Discriminative deep random walk for network classification. In
ACL, 2016.
18. Y. Li, X. Wu, and A. Lu. On spectral analysis of directed signed graphs. CoRR,
abs/1612.08102, 2016.
19. L. V. D. Maaten and G. Hinton. Visualizing data using t-sne. Journal of Machine Learning
Research, 9:2579–2605, 2008.
20. T. Mikolov, G. Corrado, K. Chen, and J. Dean. Efficient estimation of word representations
in vector space. In ICLR, 2013.
21. A. Mnih and G. Hinton. A scalable hierarchical distributed language model. NIPS, 2008.
22. A. Mnih and K. Kavukcuoglu. Learning word embeddings efficiently with noise-contrastive
estimation. In NIPS, 2013.
23. M. Niepert, M. Ahmed, and K. Kutzkov. Learning convolutional neural networks for graphs.
In ICML, 2016.
24. M. Ou, P. Cui, J. Pei, and W. Zhu. Asymmetric transitivity preserving graph embedding. In
KDD, 2016.
25. S. Pan, J. Wu, X. Zhu, C. Zhang, and Y. Wang. Tri-party deep network representation. In
IJCAI, 2016.
26. B. Perozzi, R. Al-Rfou, and S. Skiena. Deepwalk: Online learning of social representations.
In KDD, 2014.
27. J. Tang, C. Aggarwal, and H. Liu. Node classification in signed social networks. In SDM,
2016.
28. J. Tang, Y. Chang, C. Aggarwal, and H. Liu. A survey of signed network mining in social
media. arXiv:1511.07569 [physics], 2015.
29. J. Tang, M. Qu, and Q. Mei. Pte: Predictive text embedding through large-scale heteroge-
neous text networks. In KDD, 2015.
30. J. Tang, M. Qu, M. Wang, M. Zhang, J. Yan, and Q. Mei. Line: Large-scale information
network embedding. In WWW, 2015.
31. F. Tian, B. Gao, Q. Cui, E. Chen, and T.-Y. Liu. Learning deep representations for graph
clustering. In AAAI, 2014.
32. C. Tu, W. Zhang, Z. Liu, and M. Sun. Max-margin deepwalk: Discriminative learning of
network representation. In IJCAI, 2016.
33. D. Wang, P. Cui, and W. Zhu. Structural deep network embedding. In KDD, 2016.
34. L. Wu, X. Wu, A. Lu, and Y. Li. On spectral analysis of signed and dispute graphs. In ICDM,
pages 1049–1054, 2014.
35. L. Wu, X. Ying, X. Wu, A. Lu, and Z. Zhou. Spectral analysis of k-balanced signed graphs.
In PAKDD, pages 1–12, 2011.
36. P. Yanardag and S. Vishwanathan. Deep graph kernels. In KDD, 2015.
37. C. Yang, Z. Liu, D. Zhao, M. Sun, and E. Y. Chang. Network representation learning with
rich text information. In IJCAI, 2015.
38. Y. Yang, R. N. Lichtenwalter, and N. V. Chawla. Evaluating link prediction methods. Knowl-
edge and Information Systems, 45(3):751–782, 2015.
39. Z. Yang, W. W. Cohen, and R. Salakhutdinov. Revisiting semi-supervised learning with
graph embeddings. In ICML, 2016.
|
1201.1589 | 2 | 1201 | 2012-03-12T23:22:21 | The Weakness of Weak Ties in the Classroom | [
"cs.SI",
"physics.soc-ph"
] | Granovetter's "strength of weak ties" hypothesizes that isolated social ties offer limited access to external prospects, while heterogeneous social ties diversify one's opportunities. We analyze the most complete record of college student interactions to date (approximately 80,000 interactions by 290 students -- 16 times more interactions with almost 3 times more students than previous studies on educational networks) and compare the social interaction data with the academic scores of the students. Our first finding is that social diversity is negatively correlated with performance. This is explained by our second finding: highly performing students interact in groups of similarly performing peers. This effect is stronger the higher the student performance is. Indeed, low performance students tend to initiate many transient interactions independently of the performance of their target. In other words, low performing students act disassortatively with respect to their social network, whereas high scoring students act assortatively. Our data also reveals that highly performing students establish persistent interactions before mid and low performing ones and that they use more structured and longer cascades of information from which low performing students are excluded. | cs.SI | cs |
1
The weakness of 'weak ties' in the classroom
Luis M. Vaquero1 and Manuel Cebrian2
1 Hewlett-Packard Laboratories, Bristol BS34 8QZ, UK
2 Department of Computer Science and Engineering, University of California, San Diego, CA 92093, USA
Abstract
Granovetter's "strength of weak ties" hypothesizes that isolated social ties offer limited access to external
prospects, while heterogeneous social ties diversify one's opportunities. We analyze the most complete
record of college student interactions to date (approximately 80,000 interactions by 290 students -- 16
times more interactions with almost 3 times more students than previous studies on educational networks)
and compare the social interaction data with the academic scores of the students. Our first finding is
that social diversity is negatively correlated with performance. This is explained by our second finding:
highly performing students interact in groups of similarly performing peers. This effect is stronger the
higher the student performance is.
Indeed, low performance students tend to initiate many transient
interactions independently of the performance of their target. In other words, low performing students
act disassortatively with respect to their social network, whereas high scoring students act assortatively.
Our data also reveals that highly performing students establish persistent interactions before mid and
low performing ones and that they use more structured and longer cascades of information from which
low performing students are excluded.
Introduction
Computer Supported Collaborative Learning (CSCL) requires appropriate methods for evaluating col-
laboration in a way that researchers and professors can gain more insight into the results of innovative
experiences and lecturing/teaching procedures [1]. However, systematical gathering and analysis of educa-
tional data in-vivo has only recently started. The literature highlights the key role of student interaction
for effective learning. Interaction can take place by using many different tools and frameworks, which
have proven to be useful for the evaluation of student's performance [2]. The study of the social and
participatory aspects of learning is an ideal arena for social network analysis techniques [3]. The anal-
ysis of social networks has demonstrated to be a valuable tool for CSCL applications, indeed, achieving
desirable learning outcomes requires an appropriate social network [4].
Most studies focus their analysis on structural features of the network, such as node centrality. For
instance, Nurmela et al. looked at the structure of the interactions trying to determine the central actors
of the CSCL environment [5].
In this social structure, "key communicators" were assumed to be the
most connected individuals [6]. Similar analyses were carried out by Mart´ınez et al. [2] and Chen and
Watanabe, who focused on other parameters important for the final score: group structure, member's
physical location distribution, and member's social position [7].
While it seems clear that the relevance of the network structure and interactions has been widely
recognized [8], some other factors (e.g. social acceptance or willingness to communicate) affecting the
dynamic interaction patterns of the classroom have recently been recognized as essential ingredients [9].
Granovetter's pioneering work recognized the importance of interaction patterns and proposed his well-
known "strength of weak ties" phenomenon, where he hypothesized that isolated social ties offer limited
access to external prospects, while heterogeneous social ties diversify one's opportunities [10]. Recent
empirical work confirmed that the diversity of individuals' relationships is indeed strongly correlated with
the economic development of communities [11].
It is tempting to make a direct extrapolation to educational contexts. However, understanding whether
this relationship also holds in the classroom may provide insight to help shape better educational strate-
gies. In general, it is not just about knowing who students interact with, but how and when they do it
2
and, importantly, what is the result of these interactions for the educational outcome [12].
Preliminary answers to the "how" come from several works that analyzed the "macroscopic" effects
(effects on structure) depending on relationships reconstructed from the messages sent [13, 14] or also
considering the type of interaction being held [15]. This trend on acquiring knowledge from interactions
was also followed by Erlin et al., who considered the content under discussion in addition to the interac-
tions themselves [16]. Most of the previous analyses correspond to a given static snapshot of the network
at some point in time or a reduced number of samples, for instance, [2] analyze these macroscopic metrics
in the four different assignments the course was structured in ((cid:39) once a month).
This paper tries to gather details on the dynamics and mechanics of collaboration, by characterizing
the type of interactions on temporal terms and relating these types with the final outcome of the course
(student score). We also aimed to answer the "when" question by characterizing network evolution at a
microscopic level (interaction level) at unprecedented temporal resolution. We hypothesize that gaining
insight into these data could be a valuable tool to reduce course dropout rates. More than 1.2 million
students drop out of school every year in the U.S., one every 26 seconds (per day figure derived by dividing
1.23 million by 180 school days per year. Per second figure derived by dividing 1.23 million by 31,536,000
seconds in a full calendar year [17]). 2007 dropouts will cost more than $300 billion in lost wages, taxes
and productivity to the U.S. Dropouts contribute about $60,000 less in federal and state income taxes.
Each cohort of dropouts costs the U.S. $192 billion in lost income and taxes [18]. A dropout student is
more than 8 times as likely to be in jail or prison as a high school graduate and nearly 20 times as likely
as a college graduate [19].
The rest of this paper is organized as follows. The next Section presents the main results obtained
from our analysis. This exposition is followed by a discussion. The materials and methods employed for
data analysis are detailed in the final section of the paper.
Results
We analyzed the most complete record of college student interactions1 to date and compared the social
interaction data with the academic scores of the students. To this end, we analyzed records of 80, 000
interactions by 290 students -- approximately 16 times more interactions with almost 3 times more
students than previous studies on educational networks. The data cover a high resolution of both social
interactions in the classroom and out of the classroom (see Materials and Methods for more details),
being independent of gender differences (correlation of gender to score was -0.04). Figure 1A shows the
social graph for one of the classes being analyzed.
Diversity and Assortativity Analysis
Our first finding is that social diversity is negatively correlated with performance. This is explained by
our second finding: highly performing students interact in groups of similarly performing peers. This
effect is stronger the higher the student performance is. Indeed, low performance students tend to initiate
many transient interactions no matter the performance of the students they interact with. In other words,
low performing students act disassortatively with respect to their social network, whereas high scoring
students act assortatively. In the following we give details of these findings.
We start by comparing the score of each student with diversity metrics associated with the interactions
held by each member of the social network (as shown in Materials and Methods).
The number of connections (students a student has interacted with), number of interactions (times
a user has contacted or been contacted with/by other student) and the topological diversity (a function
of Shannon's entropy, see Materials and Methods) were all positively correlated with the final score
of the student (Pearson's correlations of 0.81, 0.85, 0.74, respectively; p < 0.01), as shown in Figure
1See Course Details in the Materials and Methods scetion for a concrete definition on what we mean by interaction
3
1B. Principal component analysis of these metrics revealed that all of them were closely interrelated,
resulting in non-significant improvement when combined (see Materials and Methods). However, social
diversity negatively correlated with final scores (−0.34, p < 0.01) (Figure 1C), a more diverse number of
interactions resulting in a reduced score.
To further analyze the effects on score, students were grouped into high (> 6.5), mid (between 6.5
and 3.5) and low (< 3.5) scoring. To verify the suggested existence of less effective interactions (Figure
1C), we also classified the type of interactions in two types: 1) persistent, those sustained in time, and
2) transient, those never repeated. We find that 38 ± 12% of the interactions held by highly performing
students were persistent, which is statistically different to those held by mid (17 ± 5%) or low (2 ± 2%)
performance students (n = 290, p < 0.05).
We analyzed the average number of persistent interactions per neighbor: a higher number indicating
more targeted interaction to a reduced number of neighbors. This is illustrated in Figure 5 in the Materials
and Methods (top panel) for one of the three classes under analysis.
The presence of more focused and sustained interactions did not preclude high scoring students from
interacting with colleagues with mid or low scores in a transient manner (similar number of transient
interactions regardless of the score, see Figure 5, bottom panel). An assortativity analysis [20] (r =
0.5, p < 0.05 by using the Jackknife method, see Materials and Methods) on these persistent interactions
indicated the existence of preferential interaction initiation. In other words, similarly scoring students
tended to keep persistent interaction between themselves.
Temporal Analysis
One interesting finding is that the total number of interactions per week (normalized to the maximum
value in all weeks) for all groups increases over time and it saturates around week 6 for mid and high
performing students and around week 4 for high performing student (Figure 2). In both cases, the number
of persistent and transient interactions increase as the week number increases until saturation. However,
the number of interactions for low scoring students behaves in a strikingly different manner. The number
of total interaction increases until week 4, where it starts dropping steadily until the end of the course
(Figure 2).
A closer look at the data reveals that the percentage of persistent interactions increases in all groups,
but at different rates (3A, B, and C).
As indicated in the table in Materials and Methods, the midpoint for the sigmoid function was 6.08,
4.81 and 3.2 for low, mid and high performing students (p < 0.05). This indicates that high performing
students on average establish persistent interactions before mid and low performing students (1 and 2
weeks before, respectively). Also, mid performing students start to establish persistent interactions 1
week before low performing students do. If one takes the slope of the sigmoid as a reference, it can be
observed that there is no significant difference in the rate of change from a "low interaction mode" to a
"higher interaction mode" between mid and high performing students (0.58 vs. 0.4769).
Taking these data on increasing % of persistent student interactions with the assortivity analysis
(students prefer to interact with students in their own group) above is suggesting that at some point
reciprocity Ri,j (measured as the fraction of times a student i in any given group responds to a student j
outside her same group) may start dropping. Reciprocity remained unchanged with time and was similar
between groups ((cid:39) 0.7), suggesting that even when high performing students do not usually initiate
interactions with low performing ones, they answer back when they receive some request.
This could be indicating that low performance is due to a lack of interest of the students or just that
no valuable content was conveyed in these "forced" interactions. Since the content of these interactions
was not logged, we needed to find other mechanism to determine how valuable content flows between
students and groups of students.
4
Figure 1. A: shows a graph of one of the analyzed courses including 82 students. B: Scatter plot and
linear regression for one of the variables analyzed (number of interactions) vs. scoring in one of the
classes (R2 = 0.72). C: Scatter plot and linear regression for social diversity vs. scoring in one of the
classes (R2 = 0.12). D: Normalized social diversity when students were grouped according to their
performance. ∗p < 0.05 as compared to low;#p < 0.05 as compared to mid; n=290.
Figure 2. Temporal evolution of the total number of interactions in all groups. The "y" axis indicates
the number of interactions per group per week normalized to the value of the weeke when the maximum
number of interactions was recorded for that group.
5
Figure 3. Evolution of the % of persistent interactions (relative to the average total # of interactions
of that group) per week and per student group (low, A; mid, B; and high, C) relative to the total
number of interactions per group per week. Continuous lines represent the fit of a curve to the points as
indicated in Section on Materials and Methods.
6
% of Cascades
% trivial
Average Cascade length
% stars
% chain
LOW MID HIGH
13.03
51
34.1
96.36
2.9
1.05
23.71
97.8
2.2
76.29
35.97
65.13
1.95
46.18
53.82
Table 1. Summary of the cascade analysis performed across the three groups of students.
Information Cascades
Information cascades reveal spread mechanisms in which an action or idea becomes widely adopted due to
the inuence of others, typically, neighbors in some network like cascades in the context of a large product
recommendation networks. In order to detect the presence of information cascades and determine the
actual value of the communication, we needed to gain insight on the content of the messages exchanged
by students. Since this would be a clear violation of students' privacy, we decided to analyze another
source of information: file exchange of students in their home directories and in their BSCW accounts
(see "Information Cascades" in Material and Methods below).
We define as trivial cascades those implying a single transfer (a single originating source and a single
destination) of information about the course, and non-trivial cascades, those with more complex patterns.
We found a total of 845 cascades, and 53.37% of which were trivial cascades (T1 in Figure 4), 25% are
non-trivial cascades involving transfer from a single source to many destinations in the same time frame,
and the remaining 11% of the cascades are topologically more complex.
The number of cascades is significantly different across all three groups 51%, 35.97% and 13.03% for
high, mid and low performing students, respectively (see Table 1).
Our data reveal that the length of the cascade (number of synchronous transfers) gradually increases
as the average score of the students involved in the cascade increases. This is also supported by the fact
that among non trivial cascades, the most common pattern for low performing students was star-like (T2
and T3 in Figure 4, 97.8%), while chained cascades (T4, T5 and T6 in Figure 4) were more common for
mid (53.82%) and high (76.29%) performing students.
Discussion and Conclusion
Combining data from a large educational network with each student's individual score, we were able to
gain insight into the following question: Do more diverse ties imply better academic performance?
Our results show that a higher interaction number (independently of the number of distinct students
involved) is usually an indicator of higher score. However, increased social diversity is negatively corre-
lated with high scores, which indicates that not all the interactions are equally productive. The higher
the score of the students, the higher the percentage of their iteractions that were persistent.
As the score of the student increases, these persistent interactions are initiated with a reduced number
of similarly performing colleagues (assortative interaction pattern). Low performing students have a larger
number of transient interactions spread over a large number of neighbors. Social network diversity seems
to be at the very least a strong structural signature for the (negative) academic performance of students.
The fact that the number of interactions per week increases as the course progresses may indicate
that students gain confidence in the course methodology and tools. The dynamics of these interactions
reveal that once students start establishing persistent interactions they do it more and more until a
maximum saturation point is reached. Highly performing students tend to initiate persistent interactions
Figure 4. Most Frequent Cascades for Low Performing (A) and High Performing (B) students.
Students initiating, relaying or receiving a document were supposed to be part of the cascade.
7
before lower performance ones, suggesting a higher willingness to collaborate. A striking fact is that
these highly performing students still maintain more than (cid:39) 70% of transient interactions, mostly with
mid performing students. Our reciprocity analysis shows that students try to contact high performing
students and these feel some sort of obligation to respond.
Evidently, we could not monitor the content of the private message of students and decided to per-
form an information diffusion analysis that could help us to gain insight on the content being actually
exchanged. Our results reveal that low performing students generally exchange documents in a trivial
manner (i.e. in a forwarding manner that spans a single hop). On the contrary, more complex and longer
cascades occur in highly performing groups. This indicates the existence of a highly organized network
where similarly performing students exchange information in a well-structured fashion, following char-
acteristic patterns that are different across groups. While highly performing students mainly exchange
documents in a chained manner, low performing students spread the information to many other students
at the same time, without this document apparently being relayed to other students beyond the recipient.
Indeed, low performing students were not typically included in the information chains developed by high
performing students. By this we do not mean to imply a mean behavior by students, but most likely
it is indicating the presence of a benefit maximization process by which students focus their efforts in
potentially more fruitful connections.
Getting lower value information is just one side of the picture. Low performing students drastically
reduce the number of interactions after week 4, which is indicating a clear lack of motivation that leads
them to drop the course and focus on other tasks. The fact that the percentage of persistent interactions
does not significantly increase indicates that these students initiate and drop interactions in an inefficient
manner. This per se does not let us conclude a lack of skills or motivation by low performing students.
We analysed these data and found that: 1) social diversity is a strong indicator of low performance
and it is linked to weak interactions; 2) low performing students are not typically included in the highly-
structured information exchanges held by highly performing colleagues; 3) low performing students dras-
tically reduce the number of interactions they held. These three elements may be the causes or effects of
a de-motivation phase in low performing students (studies targeted at detecting causality relationships
between these three and scoring are needed).
As part of our future work, we hypothesize that detecting this dropping behavior early in the course
8
and getting low performing students involved in high performing chains could help increase the final score
of the students. Endowing educators with tools to allow them to pay additional attention to those more
likely to drop their interactions and help them to focus on who they interact with. On the other hand,
this may have a negative effect on highly scoring students who will get many more interactions they will
feel obliged to respond to. Such a tool could result in huge benefits for the society in terms of reduced
exclusion of individuals and also in economig terms $60,000 less in federal and state income taxes and
$192 billion in lost income and taxes per dropout in the U.S. [18]
Materials and Methods
Course Details The data are of the interactions of 290 students at Universidad Rey Juan Carlos,
Madrid, Spain, EU during two consecutive years of a 12-week long course on Basic Computer Science
Skills (in Linux such as OpenOffice, GIMP, or content licensing techniques such as Creative Commons)
for freshmen students of journalism.
The students were belonged into three groups depending on their year class and on lab room availabil-
ity. Two groups (79 and 82 students) belonged to the 2010 course and the remaining students were placed
in a single group during the 2011 course. Thus, three different graphs were built to ease the analysis
process and obtain an average behavior for all the students involved in this study. Students voluntarily
signed a collaboration agreement including privacy clauses about their data and specific information on
what was going to be kept.
These data included the logs of class content-related communications between students done via Moo-
dle, a classroom IRC, BSCW and a Canvas Chat application that they included in their Facebook account
(up to 35% of the interactions were done via this canvas). An interaction is defined as a communication
attempt via the aforementioned systems.
In one-to-many communication mechanisms (e.g. a post in
Moodle), the interaction count was increased only if the post received an answer. All students, but one
(who was excluded from the study), were frequent Facebook users (daily utilization: 1.5 ± 0.9hours/day;
average number of friends in Facebook: 142 ± 85).
We transformed interaction data into a network by defining an undirected edge as an exchange of
messages between two nodes, such that each party originated at least one message to the other. We also
kept track of the number of interactions that took place over a given connections. The average age of the
students was 18.5 ± 0.8 years, 65.51% were women.
Data Anonymization and University Approval Student ids were obscured and randomly re-
arranged so that the data analyzer could not track a student. Each recorded interaction was assigned
an ID in each one of the employed systems. This timestamp-based ID was replaced by random, unique
identifier for the different systems employed in this study. While deductive disclosure is always a possi-
bility with logged interaction data, this provided adequate blinding for the study to acquire university's
approval.
Diversity Metrics We used several measures of the diversity in an individuals' social network, includ-
ing topological diversity, assortativity, and structural holes. We characterize the nature and diversity of
interaction ties within an individual's social network. Specifically, topological diversity is calculated as a
j=1 pij log(pij )), where k is the number of i s contacts and pij
, where Vij is the inter-
action volume between node i and j. Then, social diversity is defined as Shannon's entropy associated
function of Shannon's entropy (H(i) = −(cid:80)k
is the proportion of i s total interaction volume that involves j, or pij = Vij(cid:80)k
−(cid:80)k
j=1 Vij
with individual i s communication behavior, normalized by k : Dsocial(i) =
j=1 pij log(pij )
log(k)
[11].
9
satisfied: (cid:80)
ij eij = 1;(cid:80)
Grouping Metrics The correlations between properties of adjacent network nodes are known in the
ecology and epidemiology literature as "assortative mixing".
If a node tends to establish edges with
nodes that present some similarity with it (scoring groups in our setting), then they are said to present
an assortative mixing, otherwise is it a disassortative mixing. In our directed network some rules are
i eij = bj, where eij is the fraction of edges that connect a vertex
of type i to another of type j and ai and bi are the fraction of each type of end of an edge attached
(see [20] for more
to vertices of type i. The assortativity coefficient is defined as: r =
details).
j eij = ai;(cid:80)
(cid:80)
i eii−(cid:80)
1−(cid:80)
i aij bij
i aij bij
Principal Component Analysis After subtracting the mean value for each dimension, we calculated
the covariance matrix for three dimensions: number of connections, interactions and the calculated
topological diversity. We found that the eigenvalue proportions were (cid:39) 0.3 for all three eigenvalues.
Interaction Classification An interaction between students iandj was classified as persistent if the
contact ouccured at least twice (see Figure 5).
Figure 5. (Top) Average number of total persistent interactions per group, (Bottom) Average number
of transient interactions per scoring group. ∗p < 0.05 as compared to low;#p < 0.05 as compared to
mid; n=290.
10
LOW MID HIGH Total
0.9
0.973
5.007
6.08
1.43
0.4769
26.79
3.2
0.58
13.6
4.81
0.44
a
b
c
Table 2. Sigmoid Fitting Results.
Temporal Analysis We first normalized the number of total interactions of the three courses to
their respective maximum value of all weeks, in order to obtain a representative trace of the temporal
course of the appearance of interactions. Then, we plotted the percentage of persistent interactions
for all three groups of students as a function of time. We fitted these curves with a sigmoid function
, where c represents the slope of change and b the midpoint where approximately
y =
a
(1.0+exp(− (x−b)
))
c
50% of the maximum value is reached. See the obtained results in Table 2. For error minimization we set
a, b and c to minimizr the lowest sum of squared absolute error, resulting in a value that was consistently
lower than 0.026.
Information Cascades Students were highly encouraged to use a systematic naming mechanisms for
their files (First author name, year, 4-5 first words of the title). We employed data from BSCW and an
automated mechanism (bash script) to recursively determine the files in the HOME directory for each
user.
From this information we created a subgraph, where students are the nodes and links represent the
"transfer" of a file from a user's account to another's. A directed student to student edge is weighted
with the total number of links occurring between documents in source student and documents in the
HOME of the destination student. Associated with each document is also the time, so we labelled the
edges with the time difference δ between the appearance of the document in the HOME of the source
and the destination. Let tu and tv denote appearance times of a document in the HOME of students u
and v, then δ = tu − tv, where δ > 0 since there are no self-edges.
These subgraphs lead to information cascades, which are induced subgraphs by edges representing
the ow of information. We assumed this flow of information depends on the existence of an edge in the
interaction graph. In other words, those students have interacted within the previous 72h2 prior to the
appearance of the document in the HOME of the destination student.
Acknowledgments
We would like to thank Charles Elkan and Miranda Mowbray for their insightful comments on the
manuscript.
References
1. Neale DC, Carroll JM (1999) Multi-faceted evaluation for complex, distributed activities.
In:
Proceedings of the 1999 conference on Computer support for collaborative learning. International
Society of the Learning Sciences, CSCL '99. URL http://portal.acm.org/citation.cfm?id=
1150240.1150293.
2Please note that the assignments in this course typically consisted on weekly works, so a smaller time adds little
information, while longer periods result in too many events to establish reasonable causality relationships.
11
2. Martinez A, Dimitriadis Y, Rubia B, Gomez E, De La Fuente P (2003) Combining qualitative
evaluation and social network analysis for the study of classroom social interactions. Computers
& Education 41: 353 -- 368.
3. Wasserman S, Faust K (1994) Social network analysis: Methods and applications. Cambridge Univ
Pr.
4. Morrison E (2002) Newcomers' relationships: The role of social network ties during socialization.
Academy of Management Journal 45: 1149-1160.
5. Nurmela K, Lehtinen E, Palonen T (1999) Evaluating cscl log files by social network analysis. In:
Proceedings of the 1999 conference on Computer support for collaborative learning. International
Society of the Learning Sciences, pp. 54 -- es.
6. Cho H, Gay G, Davidson B, Ingraffea A (2007) Social networks, communication styles, and learning
performance in a cscl community. Computers & Education 49: 309 -- 329.
7. Chen Z, Watanabe S (2007) A case study of applying sna to analyze cscl social network.
In:
Advanced Learning Technologies, 2007. ICALT 2007. Seventh IEEE International Conference on.
pp. 18 -20. doi:10.1109/ICALT.2007.3.
8. Sundararajan B (2007) Impact of communication patterns, network positions and social dynam-
ics factors on learning among students in a cscl environment. Ph.D. thesis, Troy, NY, USA.
AAI3286342.
9. Yu AY, Tian SW, Vogel D, Chi-Wai Kwok R (2010) Can learning be virtually boosted? an
investigation of online social networking impacts. Comput Educ 55: 1494 -- 1503.
10. Granovetter M (1973) The strength of weak ties. The American Journal of Sociology 78: 1360 --
1380.
11. Eagle N, Macy M, Claxton R (2010) Network diversity and economic development. Science 328:
1029.
12. Ullrich C, Borau K, Stepanyan K (2010) Who students interact with? a social network analysis
perspective on the use of twitter in language learning.
In: Proceedings of the 5th European
conference on Technology enhanced learning conference on Sustaining TEL: from innovation to
learning and practice. Berlin, Heidelberg: Springer-Verlag, EC-TEL'10, pp. 432 -- 437. URL http:
//portal.acm.org/citation.cfm?id=1889250.1889286.
13. Yeung YY (2005) Macroscopic study of the social networks formed in web-based discussion forums.
In: Proceedings of th 2005 conference on Computer support for collaborative learning:
learning
2005: the next 10 years! International Society of the Learning Sciences, CSCL '05, pp. 727 -- 731.
URL http://portal.acm.org/citation.cfm?id=1149293.1149388.
14. Kepp SJ, Schorr H (2009) Analyzing collaborative learning activities in wikis using social network
analysis. In: Proceedings of the 27th international conference extended abstracts on Human factors
in computing systems. New York, NY, USA: ACM, CHI '09, pp. 4201 -- 4206. doi:http://doi.acm.
org/10.1145/1520340.1520640. URL http://doi.acm.org/10.1145/1520340.1520640.
15. Cho H, Gay G, Davidson B, Ingraffea A (2007) Social networks, communication styles, and learning
performance in a cscl community. Comput Educ 49: 309 -- 329.
12
16. Erlin B, Yusof N, Rahman A (2008) Integrating content analysis and social network analysis
Information Technology, 2008. ITSim 2008.
for analyzing asynchronous discussion forum.
International Symposium on. volume 3, pp. 1 -8. doi:10.1109/ITSIM.2008.4631996.
In:
17. (2007) Diplomas count 2007: Ready for what? preparing students for college careers and life after
high school. Education Week .
18. Rouse C (2005) The labor market consequences of an inadequate education. princeton university
and nber. In: Equity Symposium on The Social Costs of Inadequate Education at Teachers College,
Columbia University.
19. Harlow C (2003) Education and correctional populations. In: U.S. Department of Justice, Bureau
of Justice Statistics.
20. Newman M (2003) Mixing patterns in networks. Physical Review E 67: 026126.
|
1407.7071 | 3 | 1407 | 2015-04-16T15:41:08 | Processing Social Media Messages in Mass Emergency: A Survey | [
"cs.SI",
"cs.CY"
] | Social media platforms provide active communication channels during mass convergence and emergency events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the public can use this information to gain insight into the situation as it unfolds. In particular, many social media messages communicated during emergencies convey timely, actionable information. Processing social media messages to obtain such information, however, involves solving multiple challenges including: handling information overload, filtering credible information, and prioritizing different classes of messages. These challenges can be mapped to classical information processing operations such as filtering, classifying, ranking, aggregating, extracting, and summarizing. We survey the state of the art regarding computational methods to process social media messages, focusing on their application in emergency response scenarios. We examine the particularities of this setting, and then methodically examine a series of key sub-problems ranging from the detection of events to the creation of actionable and useful summaries. | cs.SI | cs | Processing Social Media Messages in Mass Emergency: A Survey
A
Muhammad Imran, Qatar Computing Research Institute
Carlos Castillo, Qatar Computing Research Institute
Fernando Diaz, Microsoft Research
Sarah Vieweg, Qatar Computing Research Institute
Social media platforms provide active communication channels during mass convergence and emergency
events such as disasters caused by natural hazards. As a result, first responders, decision makers, and the
public can use this information to gain insight into the situation as it unfolds. In particular, many social
media messages communicated during emergencies convey timely, actionable information. Processing social
media messages to obtain such information, however, involves solving multiple challenges including: parsing
brief and informal messages, handling information overload, and prioritizing different types of information
found in messages. These challenges can be mapped to classical information processing operations such
as filtering, classifying, ranking, aggregating, extracting, and summarizing. We survey the state of the art
regarding computational methods to process social media messages and highlight both their contributions
and shortcomings. In addition, we examine their particularities, and methodically examine a series of key
sub-problems ranging from the detection of events to the creation of actionable and useful summaries. Re-
search thus far has to a large extent produced methods to extract situational awareness information from
social media; in this survey, we cover these various approaches, and highlight their benefits and their short-
comings. We conclude with research challenges that go beyond situational awareness, and begin to look at
supporting decision-making and coordinating emergency-response actions.
General Terms: Design, Algorithms, Performance
Additional Key Words and Phrases: Social media, Crisis computing, Disaster management, Mass emergen-
cies
1. INTRODUCTION
Crisis situations such as disasters brought on by natural hazards present unique chal-
lenges to those who study them, creating conditions that call for particular research
methods [Stallings 2002]. In this paper, we survey methods for studying disasters from
the perspective of information processing and management, specifically methods for
processing social media content.
Crisis situations—particularly those with little to no warning (known as “sudden
onset crises”)—generate a situation that is rife with questions, uncertainties, and the
need to make quick decisions, often with minimal information. When it comes to in-
formation scarcity, research in recent years has uncovered the increasingly important
role of social media communications in disaster situations, and shown that informa-
tion broadcast via social media can enhance situational awareness during a crisis situ-
ation [Vieweg 2012]. However, social media communications during disasters are now
so abundant that it is necessary to sift through hundreds of thousands, and even mil-
lions, of data points to find information that is most useful during a given event.
The goal of this survey is to provide computer science researchers and software de-
velopers with computational methods they can use to create tools for formal response
agencies, humanitarian organizations, and other end users with a way to success-
fully identify, filter, and organize the overwhelming amount of social media data that
are produced during any given crisis. Such tools can help stakeholders make time-
critical—and potentially life-saving—decisions.
1.1. Social Media During Crisis Situations
Brief History. The use of Internet technologies to gather and disperse information
in disaster situations, as well as to communicate among stakeholders, dates back to
5
1
0
2
r
p
A
6
1
]
I
S
.
s
c
[
3
v
1
7
0
7
.
7
0
4
1
:
v
i
X
r
a
A:2
Imran et al.
the late 1990s. Internet historians point to online newsgroups and email clients that
were used to coordinate protests in Indonesia in 1998 [Poole et al. 2005]. In addition,
there are cases of websites being set up in response to crises in 2003 [Palen and Liu
2007]. To the best of our knowledge, 2004 is the first year in which a user-generated
content website was used in response to a crisis; after the Indian Ocean Tsunami of
December 26 that year, an electronic bulletin board was set up and moderated for 10
days.1 In addition, in the aftermath of Hurricane Katrina, which struck the city of New
Orleans in the United States in 2005, significant emergency response activity took
place on MySpace [Shklovski et al. 2010]. One of the earliest known cases of people
using microblogging service Twitter in an emergency was during severe wildfires that
took place near San Diego, California (in the United States) in 2007.2 Since then, it has
become common practice for affected populations and concerned others to use Twitter
to communicate, ask questions, collect and spread information, and organize response
efforts (among other tasks) [Starbird et al. 2010; Vieweg et al. 2010; Sarcevic et al.
2012; Starbird 2013; Imran et al. 2014a; Cobb et al. 2014].
Today. The growing adoption of social media during disasters has created opportuni-
ties for information propagation that would not exist otherwise. Emergency response
agencies routinely post information such as emergency alerts and advice through these
channels,3 but social media enables much more than “top-down” communications. Peo-
ple post situation-sensitive information on social media related to what they experi-
ence, witness, and/or hear from other sources [Hughes and Palen 2009]. This practice
allows both affected populations and those outside the impact zone to learn about the
situation first hand and in near real-time.
We know that information posted to social media platforms in time- and safety-
critical circumstances can be of great value to those tasked with making decisions in
these fraught situations. Previous research has shown that information which con-
tributes to situational awareness is reported via Twitter (and other social media plat-
forms) during mass emergencies [Vieweg et al. 2010; Vieweg 2012; Imran et al. 2014a].
Now, those tasked with formal response efforts—from local fire departments4 to inter-
national aid agencies—are working to incorporate information broadcast on social me-
dia platforms into their processes and procedures. Many emergency responders and
humanitarian officials recognize the value of the information posted on social me-
dia platforms by members of the public (and others), and are interested in finding
ways to quickly and easily locate and organize that information that is of most use to
them [Hughes 2012].5 Some agencies have even begun to formally incorporate social
media monitoring and communication during mass emergency situations. The Ameri-
can Red Cross (ARC), in a survey, reported the effectiveness of social media and mobile
apps.6 ARC recently opened their Social Media Digital Operations Center for Human-
itarian Relief. The goals of the center are to “source additional information from af-
fected areas during emergencies to better serve those who need help; spot trends and
better anticipate the public’s needs; and connect people with the resources they need,
like food, water, shelter or even emotional support.”7 Though the ARC is currently one
1http://www.thefreelibrary.com/www.p-h-u-k-e-t.com+Has+Served+Its+Purpose+After+the+Tsunami%3B+
Site...-a0126803919
2Eric Frost, personal communication.
3See e.g. https://blog.twitter.com/2013/twitter-alerts-critical-information-when-you-need-it-most
4http://edition.cnn.com/2012/11/01/tech/social-media/twitter-fdny/
5Andrej Verity, personal communication
6http://www.redcross.org/news/press-release/More-Americans-Using-Mobile-Apps-in-Emergencies
7http://www.redcross.org/news/press-release/The-American-Red-Cross-and-Dell-Launch-First-Of-Its-Kind-
Social-Media-Digital-Operations-Center-for-Humanitarian-Relief
Social Media in Mass Emergency
A:3
of the few (possibly the only) formal agencies to support such a center, it is likely that
similar operations will begin within other organizations. Among other similar exam-
ples, the Australia Crisis Tracker,8 which is a machine-learning based tool to filter
spam and categorize data into different event types, is also deployed with the Aus-
tralian Red Cross.9
Though formal response agencies express interest in incorporating social media into
their processes, obstacles exist. For example, a recent survey by the US Congressional
Research Service cites administrative cost as a significant barrier to adopting social
media during emergencies: “The number of personnel required to monitor multiple so-
cial media sources, verify the accuracy of incoming information, and respond to and
redirect incoming messages is also uncertain ... Responding to each message in a
timely manner could be time consuming and might require an increase in the number
of employees ...” [Lindsay 2011] Others have expressed concerns including issues re-
lated to roles, responsibilities, and liabilities; difficulties evaluating the veracity, trust-
worthiness, and reliability of information; and information overload in general [Vieweg
et al. 2014; Hughes et al. 2014a]. Computational methods can help overcome some of
these obstacles, by reducing the amount of information to be examined by humans.
Automatic methods are necessary when human computation is limited, and in the fol-
lowing sections, we detail what those methods entail.
1.2. Background Reading
Sociologists began researching human behavior in mass emergency situations long
before the Internet, or even modern computing. The purpose of this section is not to
provide the reader with an exhaustive list of sociology of disaster literature; we high-
light a few foundational readings that are helpful for the computer science, information
science, technology, and social media scholars to gain quick insight into the rich and
varied field of sociology of disaster.
E.L. Quarantelli’s 2002 chapter “The Disaster Research Center (DRC) Field Studies
of Organized Behavior in the Crisis Time Period of Disasters” (in Methods of Disaster
Research edited by R.A. Stallings [2002]) provides a brief history of one of the foremost
disaster research institutes in the United States. Quarantelli gives background on the
Disaster Research Center, and explains the strategic as well as academically-oriented
decisions that were made in order to highlight the importance of studying the social
science aspects of disaster.
In his edited volume “Disasters by Design,” Dennis S. Mileti [1999] and the con-
tributing authors aim to reach a general (i.e. non-academic) audience and provide
background on disasters caused by natural hazards. The volume is comprised of “syn-
thesized statements of what is known, collectively, about hazards and human cop-
ing strategies.” Mileti and colleagues point to causes of disaster, which happen when
three major systems—the physical, social, and built environments—interact in com-
plex ways. The authors’ goal is to give the reader a way to understand how to study
disaster situations, with a final goal of helping members of the public create more
resilient communities.
When it comes to combining studies of disaster with the use of information technol-
ogy, including social media, the Harvard Humanitarian Initiative [2011] presents an
in-depth analysis of the response to the earthquake in Haiti in January 2010. With
a stronger focus in social media, a recent survey by Hughes, Peterson and Palen con-
siders the motivating factors of emergency responders regarding their use of social
media data. The authors describe the challenges they face, best practices regarding
8http://www.crisistracker.com.au/
9http://www.research.ibm.com/articles/crisis-tracker.shtml
A:4
Imran et al.
the adoption of social media by formal response organizations, and also touch on in-
stances of integrated, end-to-end systems that are currently being built to meet these
needs [Hughes et al. 2014a]. In addition, an article by Palen and Liu [2007] was one
of the first to provide an early assessment regarding how information and communi-
cation technology can support the participation of the public during crisis situations.
Since then, many articles that focus on the role of social media in disaster have been
published, but the two we mention here provide a good “first glance” to readers who
are new to the field.
Our brief overview of foundational reading would not be complete without mention-
ing the much-discussed issue of trust and the use of social media. A recent ACM Com-
puting Survey looks at this very topic [Sherchan et al. 2013]. The authors review the
various definitions of “trust” from a variety of academic disciplines, discuss the factors
that contribute to notions of trust, and combine the complex and much-scrutinized idea
of trust with computing and social network research.
1.3. Scope and Organization
The overarching problem we aim to confront in this article is that of extracting time-
critical information from social media that is useful for emergency responders, affected
communities, and other concerned populations in disaster situations.
We note that social media analysis has been used for a number of applications in
the domains of economics, politics (e.g. Hong and Nadler [2011]) and public health
(e.g. Aramaki et al. [2011]); for a survey, see Weber and Mejova [2013]. Even if we con-
sider only applications to time-critical settings, we note that often the same methods
described in this survey can be applied to the analysis of social media during mass
converge events, such as large political conventions, concerts, or sports events; or for
monitoring the performance of a media campaign or a televised debate, among similar
applications. However, while many of the methods and algorithms that we describe can
be used for other purposes, we explain them from the perspective of their applications
to mass emergencies, a topic that has a specific scientific and technical community, and
that targets a particular set of use-cases.
The following two sections briefly describe our target end-user audience, and their
information needs (Section 2), and end-to-end integrated systems (Section 3). The sub-
sequent sections form the main technical part of this survey and present a systematic
analysis of the computational methods we cover.
— Section 4 starts with a general characterization of social media messages broadcast
during disasters. Next, it introduces methods for programmatically acquiring data
from social media, and for pre-processing the data.
— Section 5 covers methods for the detection of new events, which involves detecting
the first message on a given topic or sub-topic. The section also covers how to track
these events, i.e. how to collect further messages belonging to the same topic.
— Section 6 outlines methods to mine and aggregate information. These methods in-
clude unsupervised classification (and clustering), supervised classification, infor-
mation extraction, and summarization.
— Section 7 presents how semantic technologies can be applied in this domain. This
corresponds, first, to enrich the content with semantic information, and second, to
use an ontology for disaster management to describe the content of the messages.
The final section concludes the survey, and outlines current research directions.
2. USERS AND INFORMATION NEEDS
Much of the research we present here focuses on the computational aspects of pro-
cessing social media messages in time- and safety-critical situations. It is additionally
Social Media in Mass Emergency
A:5
important to consider the end users of these technological solutions; those who benefit
from having curated information that describes a disaster or crisis and enhances sit-
uational awareness, including formal response agencies, humanitarian organizations,
and members of the public.
2.1. Public Participation in Crises
Ideally, to understand how the public participates in social media during crises, we
should start by asking how the public reacts in general to crises.
Contrary to Hollywood renditions of disaster situations, human response to crises
is not one of panic and mayhem [Mitchell et al. 2000]. Victims of disaster do not lose
control, run amok, nor flee the area in fear. Instead, they make quick decisions based
on the information available to them at the time, which often allow them to save their
own lives as well as help those around them [Mitchell et al. 2000]. Neighbors, friends,
and other members of the public are the first to respond when a disaster strikes. They
rush to the scene to perform search and rescue operations, administer first aid, and
perform critical tasks necessary in the first moments of response. Often, these “first
responders” are victims of the disaster themselves [Dynes 1970]. The role of the pub-
lic in disaster response efforts is critical, and with the growing use of social media to
gather and disperse information, organize relief efforts, and communicate, those mem-
bers of the public who can play a valuable role in these situations is no longer limited
to those in the area of impact.
As Dynes [1994] explains, emergencies do not render victims incapable of helping
themselves and others, nor create a situation in which they are unable to make intelli-
gent, personally meaningful decisions. What emergencies do create is an environment
in which new and perhaps unexpected problems are presented, which members of the
public are called upon to solve. Research in recent years on the use of social media
in disasters shows how members of the public, formal response agencies, and other
stakeholders have taken to online outlets to perform tasks such as communicating
about hospital availability [Starbird 2013], coordinating medical responses [Sarcevic
et al. 2012], and communicating with the public during various crises [Cobb et al.
2014], among many others. These users interact in complex ways including producing,
distributing and organizing content [Starbird et al. 2010].
2.2. Differences in Information Needs
The recognition that social media communications are a valid and useful source of in-
formation throughout the disaster lifecycle (preparation, impact, response, and recov-
ery) is increasing among the many stakeholders who take action in disaster situations.
In particular, members of the public, formal response agencies, and local, national and
international aid organizations are all aware of the ability to use social media to gather
and disperse timely information in the aftermath of disaster, but the specific informa-
tion they seek—and their ability to put it to use—may differ [Vieweg 2012].
Depending on the circumstances of the disaster, and what roles and duties the vari-
ous stakeholders are responsible for, their specific information needs will vary. For ex-
ample, in a wildfire situation that affects a community, members of a formal response
organization such as local police or area firefighters can benefit from information such
as where people are smelling smoke, what precautions they are taking (e.g. clearing
brush, watering yards), and what traffic patterns look like. In a large-scale, sudden-
onset disaster such as a typhoon or earthquake, humanitarian agencies, such as the
various branches of the United Nations, benefit from information that details the cur-
rent situation “on the ground,” such as where electricity has been disabled, or where
people are without food and water. In any disaster situation, members of the public
play a variety of roles and take on many tasks; the information they find valuable may
A:6
Imran et al.
Table I: Example systems described in the academic literature that extract crisis-
relevant information from social media.
System name
Data; example capabilities
Twitris
SensePlace2
Twitter; semantic enrichment, classify automatically, geotag
Twitter; geotag, visualize heat-maps based on geotags
EMERSE: Enhanced Messaging for the Emergency Response Sector
Twitter and SMS; machine-translate, classify automatically, alerts
ESA: Emergency Situation Awareness
Twitter; detect bursts, classify, cluster, geotag
Twitcident
Twitter and TwitPic; semantic enrichment, classify
CrisisTracker
Twitter; cluster, annotate manually
Tweedr
Twitter; classify automatically, extract information, geotag
AIDR: Artificial Intelligence for Disaster Response
Twitter; annotate manually, classify automatically
Reference and URL
[Sheth et al. 2010; Purohit and Sheth 2013]
http://twitris.knoesis.org/
[MacEachren et al. 2011]
http://www.geovista.psu.edu/SensePlace2/
[Caragea et al. 2011]
http://emerse.ist.psu.edu/
[Yin et al. 2012; Power et al. 2014]
https://esa.csiro.au/
[Abel et al. 2012]
http://wis.ewi.tudelft.nl/twitcident/
[Rogstadius et al. 2013]
https://github.com/jakobrogstadius/crisistracker
[Ashktorab et al. 2014]
https://github.com/dssg/tweedr
[Imran et al. 2014a]
http://aidr.qcri.org/
be very personal—i.e. hearing that a friend or loved one is safe, or it may be more
broadly applicable, such as the status of a certain neighborhood or town.
Overall, the information any individual, group, or organization finds useful and
seeks out in a disaster will depend upon their goals. Is it a group interested in pro-
viding food to children? Is it an organization that can set up a field hospital? Is it an
individual living in a foreign country who is concerned about her or his family? The
different types of information sought by these different stakeholders may be broadcast
on Twitter, but to find it quickly, users rely on technological methods to sift through
the millions of tweets broadcast at any given time to find useful information. Further
information and a deeper perspective on users of social media in disaster can be found
in Hughes et al. [2014a] and Hughes and Palen [2012].
3. SYSTEMS FOR CRISIS-RELATED SOCIAL MEDIA MONITORING
Table I provides examples of existing systems described in the literature that extract
crisis-relevant information from social media.10 The systems we include have vary-
ing degrees of maturity; some have been deployed in real-life situations, while others
remain under development.
Most existing systems are built around the concept of a dashboard, or a set of vi-
sual displays that provides a summary of social media during the crisis according to
temporal, spatial, and thematic aspects. Common elements in these displays include:
— Lists/timelines showing recent or important messages, sometimes grouping the
messages into clusters or categories.
— Time series graphs representing the volume of a hashtag, word, phrase, or concept
over time, and sometimes marking peaks of activity.
— Maps including geotagged messages or interpolated regions, possibly layered ac-
cording to different topics.
— Pie charts or other visual summaries of the proportion of different messages.
These visual elements are powered by computational capabilities that include:
10The list is not extensive, and does not include tools such as Radian6 (http://www.salesforcemarketingcloud.
com/products/social-media-listening/) that have not been described in the literature, but might be relevant
for other reasons—e.g. in the case of Radian6, because it is used by the American Red Cross.
Social Media in Mass Emergency
A:7
— Collections of social media messages matching a given criterion, from one or multi-
ple social media and/or Short Message Service (SMS) streams, typically with a focus
on Twitter (described in Section 4).
— Natural Language Processing (NLP), including Named Entity Recognition (NER)
and linking of named entities to concepts (described in Section 4.3).
— Extraction of information from the messages, including geotagging (described in
Section 4.4).
— Monitoring the volume of messages (or sets of messages) to detect or help detect
sub-events within a crisis, and sometimes the crisis itself (described in Section 5),
possibly including the generation of user-defined alerts when certain conditions are
met.
— Clustering or automatic grouping of similar messages (described in Section 6.1.3).
— Classification of messages or groups of messages manually or automatically (see
Section 6.1.2).
— Automatic translation of messages.
Though some of these systems are based on input or feedback provided by emergency
responders and other officials, we note that to a large extent they are framed as a
way to process social media data during crisis situations; their goal is not to address
specific needs of emergency responders or other stakeholders. This focus on processing
social media data possibly impacts the adoption of these systems by the practitioner
community. Methodologies such as participatory design have been proposed to improve
the matching between e.g. the needs of public information officers during a crisis, and
the tools built by researchers and developers [Hughes 2014].
When the goal of meeting the specific need of users is stated explicitly in the design of
systems, it often revolves around enhancing situational awareness, defined in [Endsley
1995] as “the perception of elements in the environment within a volume of time and
space, the comprehension of their meaning, and the projection of their status in the
near future.”
For instance, ESA [Yin et al. 2012; Power et al. 2014] aims at enhancing situational
awareness with respect to crises induced by natural hazards, particularly earthquakes.
This is done by presenting information in time (frequency series) and space (maps),
which is achieved by performing event detection, text classification, online clustering
and geotagging. Similarly, SensePlace2 [MacEachren et al. 2011] is presented as a
geovisual analytics system, which filters and extracts geographical, temporal and the-
matic information from tweets in order to present them in a layered map. Data from
social media can also be presented along with data from physical sensors, for instance
to overlay earthquakes detected by seismic sensors on a map presenting social media
data [Avvenuti et al. 2014; Musaev et al. 2014].
In parallel to approaches that use Natural Language Processing (NLP) techniques
to enhance situation awareness, Crisis Mapping emerged as an alternative type of sys-
tem, by employing digital volunteers to collect, classify, and geotag messages [Okolloh
2009; Meier 2015], and eventually by using the input from those volunteers to train
machines to perform these tasks automatically [Imran et al. 2014a].
4. DATA CHARACTERIZATION, ACQUISITION, AND PREPARATION
Both academics and practitioners gather social media data during crisis events. In this
section, we describe the common practices used to collect, represent, and process these
data.
A:8
Imran et al.
4.1. Characteristics of Messages Broadcast on Social Media in Disaster
Social media is a general term that encompasses a variety of platforms on which user-
generated content can be disseminated and consumed, and where users can connect
with others. This definition currently includes blogging and micro-blogging, social net-
working sites, social media sharing platforms, and wikis [van Dijck 2013].
Activities such as staying in touch with friends and family, and connecting with
others, have driven the growth of social media platforms.11 Currently, different social
networking sites are used for different purposes, but commonalities do exist. For in-
stance, the top 3 activities on Twitter are to (1) post about daily activities, (2) upload
and share photos, and (3) comment on posts of others; while on Facebook they are to
(1) upload and share photos, (2) message with friends on a one-on-one basis, and (3)
comment on posts of friends [GlobalWebIndex 2013].
In any of these platforms, an increase in social media communications can be
triggered by a variety of causes, which can be divided into endogenous and exoge-
nous [Crane and Sornette 2008]. Endogenous causes refer to phenomena in which an
idea or “meme” gains popularity by a process of viral contagion or information cascade,
where content spreads rapidly through a network, potentially reaching a significant
fraction of all the users [Chen et al. 2013].
Exogenous causes refer to large-scale events, usually happening in the physical
world, of wide interest to social media users. Emergencies and mass convergence
events are examples of an exogenous cause, and during such events, we know that com-
munications activity increases. For instance, it has been observed that mobile network
usage—both in terms of phone calls and SMS—increases in emergency situations [Gao
et al. 2014]. The same is true for social media usage, which “rises during disasters as
people seek immediate and in-depth information” [Fraustino et al. 2012].12
To illustrate the types of information that affected populations broadcast specifically
on the popular microblogging platform Twitter, we turn to some example messages
that have been highlighted in previous literature:
— “OMG! The fire seems out of control: It’s running down the hills!” (bush fire near
Marseilles, France, in 2009, quoted from Twitter in De Longueville et al. [2009])
— “Red River at East Grand Forks is 48.70 feet, +20.7 feet of flood stage, -5.65 feet of
1997 crest. #flood09” (automatically-generated tweet during Red River Valley floods
in 2009, quoted from Twitter in Starbird et al. [2010])
— “Anyone know of volunteer opportunities for hurricane Sandy? Would like to try and
help in any way possible” (Hurricane Sandy 2013, quoted from Twitter in Purohit
et al. [2013])
— “My moms backyard in Hatteras. That dock is usually about 3 feet above water
[photo]” (Hurricane Sandy 2013, quoted from Reddit in Leavitt and Clark [2014])
— “Sirens going off now!! Take cover...be safe!” (Moore Tornado 2013, quoted from
Twitter in Blanford et al. [2014])
Though the above are only a few examples, they convey a sense of the types of in-
formation posted during an event, and show that it is varied. Vieweg [2012] points to
this variation in her research that is based on a detailed study of four crisis events,
in which she identifies in Twitter 35 types of information in three broad categories
defined by Mileti [1999]: social environment, built environment, and physical environ-
ment. She points out that social environment messages describe anything having to do
11http://www.pewinternet.org/2011/11/15/why-americans-use-social-media/
12For instance, activity on Facebook was observed to increase significantly in the areas most affected
by the August 2014 earthquake in California, USA https://www.facebook.com/notes/facebook-data-science/
on-facebook-when-the-earth-shakes/10152488877538859
Social Media in Mass Emergency
A:9
with people and their reactions to the crisis, built environment messages correspond to
information and updates about property and infrastructure, and physical environment
messages include updates about the hazard agent, weather, and other environmental
factors (see Section 6.1.1 for details on different ways of categorizing this information).
Quantifying the amount of information found in social media based on type is even
more difficult than locating that information in the first place. Important variations
have been observed across crises (even for similar events) and at different stages of
a crisis [Blanford et al. 2014; Imran et al. 2013a]. Olteanu et al. [2014] looked at
the prevalence of three broad categories of information in tweets related to six cri-
sis events. The results show large variabilities in the number of tweets reporting the
negative consequences of an event (20%-60%), those offering or asking for donations
(15%-70%) and those warning about risks or providing advice (5%-20%).
Using tweets as an indication of spatial zones during a disaster is also possible. For
instance, Acar and Muraki [2011] examine the use of Twitter during an earthquake in
Japan and observed that tweets from affected areas include more requests for help and
more warnings, while tweets from other areas which are far from the disaster epicenter
tend to mostly include other types of information, such as concern and condolences.
4.2. Data Acquisition
Most large social media platforms provide programmatic access to their content
through an Application Programming Interface (API). However, the details of these
APIs vary substantially from one platform to another, and also change over time.
APIs to access social media data typically belong to one of two types: those allowing
to query an archive of past messages (also known as search APIs), and those allow-
ing data collectors to subscribe to a real-time data feed (also known as streaming or
filtering APIs). Both types of APIs typically allow data collectors to express an infor-
mation need, including one or several of the following constraints: (i) a time period, (ii)
a geographical region for messages that have GPS coordinates (which are currently
the minority), (iii) a set of keywords that must be present in the messages, which re-
quires the use of a query language whose expressiveness varies across platforms. In
the case of archive/search APIs, messages are returned sorted by relevance (a com-
bination of several factors, including recency), or just by recency. In the case of real-
time/streaming/filtering APIs, messages are returned in order of their posting time.
Data collection strategies impact the data obtained and analytic results. For in-
stance, selecting messages in the geographical region affected by a disaster vs. select-
ing messages based on a keyword-based query may return datasets having different
characteristics [Olteanu et al. 2014].
Data availability. In addition to issues regarding network connectivity during disas-
ters [Jennex 2012], access to social media data is in general limited, which is a serious
obstacle to research and development in this space [Reuter and Scholl 2014].
First, historical, archived social media can typically only be queried through search
APIs, which are limited in terms of number of queries or data requested per unit of
time. The exceptions are (i) a 1% data sample collected from Twitter by the Internet
Archive,13 and (ii) collections created by researchers using automatic data collection
methods (e.g. web crawling), which are against the terms of services of most social
media platforms.
Second, access to real-time data is quite limited. Twitter offers a public streaming
API providing a random sample of 1% of all postings, plus the possibility of filtering
13Available at https://archive.org/details/twitterstream
A:10
Imran et al.
all public postings by keywords.14 This is in contrast with most large social media
platforms, which do not offer this level of data access publicly.15
The consequence of these limitations is that most work on crisis-related messages is
done using Twitter data (with few exceptions e.g. Facebook [Bird et al. 2012] and Red-
dit [Leavitt and Clark 2014]), which provides an incomplete view of a crisis situation,
as there are many different online social media sites that might be used for different
purposes. Limitations in the amount of data that can be collected and in general a de-
pendency on a small set of data providers or APIs, further reduces the efficiency and
effectiveness of tools for handling crisis-related social media messages.
4.3. Data Pre-Processing
Most researchers and practitioners prepare social media data by pre-processing it, us-
ing some of the methods outlined below, before performing the actual analysis. Many
pre-processing techniques are available, and the choice depends on the type of data at
hand and the goals of the analysis.
Natural Language Processing (NLP). The text of the messages can be pre-
processed by using an NLP toolkit. Typical operations include tokenization, part-
of-speech tagging (POS), semantic role labeling, dependency parsing, named entity
recognition and entity linking. A number of off-the-shelf implementations of these op-
erations are available online, e.g. the Stanford NLP16 or NLTK for Python.17 Social
media-specific NLP toolkits can also be used. For instance, ArkNLP [Owoputi et al.
2013], which is trained on Twitter data, is able to recognize Internet idioms such as
“ikr” (I know, right?) and assign them the correct Part Of Speech (POS) tag (inter-
jection, in this case). Additionally, higher-level operations can be applied, including
applying sentiment analysis methods to infer aspects of the emotion conveyed by a
piece of text [Pang and Lee 2008].
Feature extraction. For many automatic information processing algorithms (e.g. ma-
chine learning), each data item must be represented accurately as an information
record. The representation of choice for text is typically a numerical vector in which
each position corresponds to a word or phrase—this is known as the vector space model
in information retrieval. The value in each position can be a binary variable, indicating
the presence or absence of that word or phrase in the message, or a number following
some weighting scheme, such as TF-IDF, which favors terms that are infrequent in the
collection [Baeza-Yates and Ribeiro-Neto 2011]. To avoid having too many variables,
textual features can be discarded by removing stopwords and functional words, or by
normalizing words using stemming or lemmatization (e.g. considering “damaging” and
“damage” as equivalent), or other means.
Additionally, other text-based features can be added, such as the length of the text in
words or characters, and the number of question or exclamation marks. If some NLP
pre-processing is performed on the text—such as part-of-speech-tagging—a feature
such as noun:fire (instead of verb:fire) can be used to distinguish that the word “fire”
is being used in a message as a noun (“I heard a fire alarm”) instead of a verb (“They
should fire him”).
In the case of tweets, characteristics such as the presence of user mentions (“@user”),
URLs, or hashtags can be included as features. In the case of images or video, content-
based features such as colors, textures and shapes can be included (see e.g. Liu et al.
14Available at https://dev.twitter.com/docs/api/streaming
15As of November 2014, we found no publicly-available equivalent of Twitter’s streaming API in Sina Weibo,
Facebook, YouTube, Google Plus, or Tumblr.
16http://www-nlp.stanford.edu/software/
17http://www.nltk.org/
Social Media in Mass Emergency
A:11
[2007] for a survey). Additionally, features such as the date of a message, tags associ-
ated with it, the number of views/comments it has received, or information about its
author, are often available in a platform-dependent manner.
Obviously, one can spend a great deal of time constructing features by hand. In
order to guide this exploration, both researchers and practitioners should prioritize
the development and understanding of features likely to be correlated with the target
variable (e.g. tweet classification). By the same token, features valuable to one target
variable may not be important at all for a different target variable. Although often
under-appreciated, feature engineering is perhaps the most important part of a mod-
eling exercise.
De-duplication. Further reduction of the amount of data to be processed can be
achieved by removing near-duplicate messages. Given that in many social media plat-
forms the number of people re-posting a message can be interpreted as a measure of
its importance, whenever removing near-duplicates it is advisable to save the number
of near-duplicates that have been found (e.g. as done in Rogstadius et al. [2013] to pri-
oritize highly-reposted stories). De-duplication can be done by applying a clustering
method (see Section 6.1.3).
Filtering. A fraction of the messages collected will not be relevant for a given crisis.
This fraction depends on the specific collection method used, as discussed by Olteanu
et al. [2014], and on other factors, such as the presence of off-topic messages using
the same tags or keywords as the on-topic ones [Qu et al. 2011]. These messages can
be post-filtered using human labeling or crowdsourcing, keyword-based heuristics, or
automatic classification.
Additionally, many messages are posted automatically on social media for financial
gain, exploiting the attention that a certain hashtag has received. These unsolicited
commercial messages are known as spam [Gupta and Kumaraguru 2012; Uddin et al.
2014] and there are well-studied methods that can remove a substantial portion of
them [Benevenuto et al. 2010]. Finally, in some cases we might want to also remove
messages posted by automatic agents or social media bots. Their identification is sim-
ilar to that of spammers.
4.4. Geotagging and geocoding
Attaching geographical coordinates to a message (a process known as geotagging) is
useful for a number of tasks in disaster response [Graham et al. 2014; Ikawa et al.
2013; Lingad et al. 2013]. Geotagging allows the retrieval of information about a lo-
cal event, by filtering the messages corresponding to a particular geographical region.
It allows the visualization of information about an event on a map, possibly making
it more actionable for emergency responders. Geotagging can also be used for higher-
level tasks, such as helping predict epidemic transmission of diseases based on geo-
graphical proximity [Brennan et al. 2013].
The availability of machine-readable location information in social media messages,
in the form of metadata, depends on the user’s device having the capacity to know
its location (e.g. via Global Positioning System (GPS)), on the specific client software
having the capability to read this from the device, and most importantly, on the user
enabling this feature explicitly (opting-in). In practice, only 2% of crisis-related mes-
sages include machine-readable location information [Burton et al. 2012].
However, while explicit metadata about locations may be absent, many messages in
social media do contain implicit references to names of places (e.g. “The Christchurch
hospital is operational”). Geocoding refers to finding these geographical references in
the text, and linking them to geographical coordinates. This can be done by using
a named entity extractor to extract potential candidates, and then comparing those
A:12
Imran et al.
candidates with a list of place names. This is the approach used by e.g. MacEachren
et al. [2011] which uses Gate18 for the first task and Geonames19 for the second.
While building a comprehensive database of geospatial information, including place
names, is an important component of geotagging (see e.g. Middleton et al. [2014]), geo-
tagging is not merely a dictionary look-up process because of ambiguities. These ambi-
guities are known as “geo/non-geo” and “geo/geo.” A geo/non-geo ambiguity occurs for
instance in the message “Let’s play Texas Hold ’em,” that does not refer to the state
of Texas in the USA. A geo/geo ambiguity is found in the message “There is a fire in
Paris,” which may refer to the capital of France, or to any of more than a dozen places
on Earth sharing the same name. For instance, in Sultanik and Fink [2012], authors
proposed an unsupervised approach to extract and disambiguate location mentions in
Twitter messages during crisis situations.
In general, geotagging is done through probabilistic methods (see e.g. Cheng et al.
[2010]), often exploiting contextual clues. These clues may include the general loca-
tion of a crisis, information about nearby places, and location information indicated by
users in their profiles [Gelernter and Mushegian 2011].
4.5. Archived versus Live Data Processing
Depending on the urgency with which the output of an analysis is required, data may
be provided to an algorithm either as an archive, for retrospective analysis, or as a
live data feed, for real-time analysis. These correspond to two standard concepts in
computer science: off-line processing and on-line processing.
Retrospective data analysis (off-line processing) starts with a batch of data relevant
to an event, usually containing messages over the entire time range of interest. For
example, we might consider re-constructing a timeline of events in the aftermath of an
earthquake, by looking at all of the tweets from the moment of the earthquake up to
two weeks after. In deciding how to build the timeline, we have the complete context
of events during this two week window.
Live data analysis (on-line processing) is done over a stream of data relevant to
the event, usually provided in real-time or with a short delay. For example, we might
consider constructing a timeline of the events in the aftermath of an earthquake as
we observe new tweets; in deciding how to build the timeline, we have an incomplete
context of the events and their future repercussions.
It is possible for algorithms to lie in between, operating on small batches of data
at regular intervals (e.g. hourly, daily). The trade-off between retrospective and live
data is a matter of accuracy versus latency. Retrospective data analysis maximizes our
context and, as a result, gives us an accurate picture of the data. However, because
we have to wait for the data to accumulate, we incur latency between when an event
happens and when it is processed. Live data analysis, on the other hand, minimizes the
latency but, because we have partial information, we may incur lower accuracy. The
choice of collection methodology depends on the use case. Crisis responders may want
lower latency in order to better respond to a developing situation; forensic analysts
may want higher accuracy and have the benefit of waiting for data to be collected.
While developing an algorithm, we can use retrospective data to simulate live data.
This is a standard experimental methodology that has been used in the past for in-
formation filtering tasks [Voorhees and Harman 2005] and, more recently, for crisis
informatics [Guo et al. 2013; Aslam et al. 2013].
18https://gate.ac.uk/
19http://geonames.org/
Social Media in Mass Emergency
A:13
4.6. Challenges
There are a number of challenges associated with the processing of social media mes-
sages. In this section, we group them into two high-level categories: scalability and
content. We defer specific challenges (e.g. challenges to event detection) to their re-
spective technical sections.
Scalability issues. Large crises often generate an explosion of social media activity.
Data size may be an issue, as for crises that last several days, millions of messages may
be recorded. While the text of each message can be sorted, a data record for e.g. a Twit-
ter message (140 characters of text) is around 4KB when we consider the metadata
attached to each message. Thus, a Twitter collection for a crisis is then on the order
of several hundred megabytes to a few gigabytes. In addition, multimedia objects such
as images and videos may significantly increase the storage space requirements.
Data velocity may be a more challenging issue, especially considering that data does
not flow at a constant rate but experiences drastic variations. The largest documented
peak of tweets per minute during a natural hazard that we are aware of is 16,000
tweets per minute.20
Finally, redundancy, which is commonly cited as a scalability challenge, to some
extent cannot be avoided in this setting. Repeated (re-posted/re-tweeted) messages
are common in time-sensitive social media, even encouraged, as in some platforms
messages that gain more notoriety are those that are simply repeated more.
Content issues. Microblog messages are brief and informal. In addition, this type
of messaging is often seen by users to be more akin to speech, as opposed to a form
of writing, which—compounded with technological, cross-lingual and cross-cultural
factors—implies that on the Internet “we find language that is fragmentary, laden
with typographical errors, often bereft of punctuation, and sometimes downright inco-
herent” [Baron 2003]. This poses significant challenges to computational methods, and
can lead to poor and misleading results by what is known as the “garbage in, garbage
out” principle.
Messages are also highly heterogeneous, with multiple sources (e.g. traditional me-
dia sources, eyewitness accounts, etc.), and varying levels of quality. Quality itself
is an important and complex question for crisis managers, and encompasses a num-
ber of attributes including objectivity, clarity, timeliness and conciseness, among oth-
ers [Friberg et al. 2011]. Additionally, different languages can be present in the same
crisis and sometimes in the same message—a phenomena known as “borrowing,” and
“code switching.” This makes it difficult for both machines and humans (e.g. content
annotators) to understand or classify messages.
Finally, brief messages sent during a crisis often assume a shared context from which
only a minor part is sometimes made explicit. The area of study in linguistics known as
pragmatics focuses on “communication in context,” and explains how people are able
to infer the meaning of the communications because humans are very adept at under-
standing context. So, in the case of Twitter communications, a reader can understand
the tweet author’s intent because she or he knows the context within which that tweet
is being broadcast. Current computational methods are not able to make the same in-
ferences humans do, and thus cannot achieve the same level of understanding [Vieweg
and Hodges 2014].
Privacy issues. Social media, since it is, by definition, content directly created by end
users, might carry personally identifiable information (PII). Researchers and practi-
tioners should be mindful of any explicit or inferred PII in the data. For example, an
20During Hurricane Sandy in 2012: http://www.cbsnews.com/news/social-media-a-news-source-and-tool-
during-superstorm-sandy/
A:14
Imran et al.
individual may not explicitly reveal PII such as location for privacy reasons; infer-
ring this user’s location may be in conflict with her expectation of privacy. As a result,
academic work may have to be approved by a human subjects review process (ethics
approval). Practitioners, on the other hand, may be subject to a response organization’s
own standards and policies (see e.g. Gilman and Baker [2011] and ICRC [2013]).
5. EVENT DETECTION AND TRACKING
Most systems for social media processing during crises start with event detection. An
event is the occurrence of something significant which is associated with a specific
time and location [Brants et al. 2003]. However, due to the online nature of social
media communications, events as they play out in social media may or may not be
necessarily associated with a physical location. In the context of social media, Dou et
al. [2012] define an event as: “An occurrence causing changes in the volume of text data
that discusses the associated topic at a specific time. This occurrence is characterized
by topic and time, and often associated with entities such as people and location”.
Crisis and emergency situations typically fall into two broad categories: predicted (or
forewarned) and unexpected. Some disaster events can be predicted to a certain level
of accuracy based on meteorological or other data (e.g. this is the case with most large
storms and tornadoes), and information about them is usually broadcast publicly be-
fore the actual event happens. Sometimes an event may not be explicitly anticipated,
for example as with a mass protest, but still may be forecast from social media and
other data [Ramakrishnan, Naren et al. 2014]. Other events cannot be predicted (e.g.
earthquakes), and in this case an automatic detection method is useful to find out
about them as quickly as possible once they happen. In this section, we study tech-
niques available for the automatic detection of both predicted, and unexpected events.
Historically, methods for event detection and tracking in social media in the context
of crises and emergencies, are adaptations of methods to perform these tasks with a
more general scope: that of detecting news. These methods, in turn, are adaptations of
methods to find new topics in general document collections.
5.1. Background on Event Detection and Discovery
A well-studied problem in Information Retrieval is detecting events in a stream of
documents (see e.g. Allan [2002]). These documents can be news articles from tra-
ditional media sources, or posts on social media (e.g., tweets, Facebook posts, Flickr
images). Traditionally, the Topic Detection and Tracking (TDT) research community
uses newswires as source data streams for event detection.
Various techniques are employed in TDT including story segmentation, topic de-
tection, new event detection, link detection, and topic tracking. Story segmentation
focuses on determining story boundaries from streaming speech recognition output,
usually from radio or television broadcasts. Topic detection groups related documents
together into cohesive topics. New event detection processes each new document to
decide if it describes a previously unseen story. Link detection detects that if two docu-
ments are similar or not. Finally, event tracking follows the evolution of an event/topic
to describe how it unfolds.
Event detection on social media is different from the traditional event detection ap-
proaches that are suitable for other document streams. Social media data emerge more
quickly, and in larger volumes than traditional document streams. In addition, social
media data are composed of short, noisy, and unstructured content that often require
a different approach than what is used with traditional news articles. Considering the
unique characteristics of social media streams, we focus the remainder of this section
on new event detection and event tracking. Nevertheless, techniques and evaluation
Social Media in Mass Emergency
A:15
metrics from the TDT community provide insight into methods that might work for
the Twitter domain.
5.2. New Event Detection (NED)
In the context of mass emergencies, New Event Detection (NED) refers to the task of
discovering the first message related to an event by continuously monitoring a stream
of messages. NED decides whether a message is about something new that has not
been reported in previous messages, or not [Yang et al. 2009]. “New” is normally opera-
tionalized as sufficiently different according to a similarity metric. Hellinger similarity,
Kullback-Leibler divergence, and cosine similarity are among the metrics commonly
used in NED [Kumaran et al. 2004].
As observed in Section 4.5, we can do retrospective (off-line) or on-line analysis [Yang
et al. 1998]. While the most useful NED systems for emergencies are those who per-
form this analysis on-line, they are often adaptations or improvements of off-line meth-
ods, which we discuss next.
5.2.1. Retrospective New Event Detection. Retrospective NED refers to the process of
identifying events using messages or documents that have arrived in the past. Meth-
ods for retrospective NED involve the creation of clusters of documents or messages
based on a suitable definition of similarity between them, which may involve more
than one dimension of them, e.g. using similar words, involving similar groups of peo-
ple, occurring close to each other in time and/or space, etc.
For instance, Zhao et al. [2007] introduce a retrospective NED method that uses
textual, social and temporal characteristics of the documents to detect events on social
streams such as weblogs, message boards, and mailing lists. They build multi-graphs
using social textual streams, where nodes represent social actors, and edges represent
the flow of information between actors. Clustering techniques and graph analysis are
combined to detect an event.
Sayyadi et al. [2009] introduce a retrospective NED approach that overlays a graph
over the documents, based on word co-occurrences. They assume that keywords co-
occur between documents when there is some topical relationship between them. Next,
a community detection method over the graph is used to detect and describe events.
Pohl et al. [2012] describe a two-phase clustering approach to identify crisis-related
sub-events in photo-hosting site Flickr and video-hosting site YouTube. During the
first phase, which is to identify sub-events, clusters are formed by using only items
that contain geographical coordinates. These coordinates are added automatically by
the device used to capture the photo or video, or are added later by its author/uploader.
Next, they calculate term-based centroids of the identified clusters using cosine dis-
tance to further describe the identified sub-events.
Another retrospective NED approach is presented in Chen and Roy [2009], with
experiments run on Flickr. It uses photos, user-defined tags, and other meta-data in-
cluding time and location to detect events. This approach simultaneously analyzes the
temporal and geographical distribution of tags, and determines the event type (e.g.
whether it is recurring) to form clusters. Finally, for each tag cluster, the correspond-
ing photos are retrieved.
Ritter et al. [2012] extract significant events from Twitter by focusing on certain
types of words and phrases. In their system, called TwiCal, they extract event phrases,
named entities, and calendar dates. To extract named entities, they use a named entity
tagger trained on 800 randomly selected tweets. To extract event mentions they use a
Twitter-tuned part-of-speech tagger [Ritter et al. 2011]. The extracted events are clas-
sified retrospectively into event types using a latent variable model that first identifies
event types using the given data, and then performs classification.
A:16
Imran et al.
Li et al. [2012b] introduce Twevent, a system that uses message segments instead of
individual words to detect events. The authors claim that a tweet segment, which rep-
resents one or more consecutive words in tweets, contains more meaningful informa-
tion than unigrams. The Twevent approach works in phases. First, the individual tweet
is segmented, and bursty segments are identified using the segments’ frequency in a
particular time window. Next, identified segments are retrospectively clustered using
K-Nearest Neighbors (KNN) clustering. Finally, a post-filtering step uses Wikipedia
concepts to filter the detected events.
5.2.2. Online New Event Detection. Online new event detection does not use previously
seen messages or any prior knowledge about the events to be identified. Online NED is
typically performed with low latency (in real-time), in the sense that the time between
seeing a document corresponding to a new event, and reporting that a new event has
been detected, is relatively short.
Methods based on keyword burst. A straightforward approach is to assume that
words that show sharp frequency increases over time are related to a new event. For
instance, Robinson et al. [2013a] introduce a system to detect earthquakes using Twit-
ter. The earthquake detector, which is based on the Emergency Situation Awareness
(ESA) platform [Power et al. 2014], checks for the keywords “earthquake” and “#eqnz”
in the real-time Twitter stream, and applies a burst detection method to analyze word
frequencies in fixed-width time-windows and compare them to historical word frequen-
cies. Unusual events are identified if the observed frequencies are much higher than
those recorded in the past. Earle et al. [2012] have compared simple keyword-based ap-
proaches with data from seismological sensors, finding that while many earthquakes
are not detected by Twitter users, detections are fast, “considerably faster than seis-
mographic detections in poorly instrumented regions of the world.”
Marcus et al. [2011] introduced TwitInfo, a system for detecting, summarizing and
visualizing events on Twitter. TwitInfo collects tweets based on a user-defined query
(e.g. keywords used to filter the Twitter stream). It then detects events by identifying
sharp increases in the frequency of tweets that contain the particular user-defined
query as compared to the historical weighted running average of tweets that contain
that same query. Further, tweets are obtained from the identified events to identify and
represent an aggregated sentiment (i.e., classifying tweets into positive and negative
classes). The authors evaluated the system on various events such as earthquakes and
popular football games.
A similar system, TwitterMonitor [Mathioudakis and Koudas 2010], also collects
tweets from the Twitter stream and detects trends (e.g. emerging topics such as break-
ing news, or crises) in real-time. The trend detection approach proposed in their paper
works in two phases. During the first phase, TwitterMonitor identifies bursty keywords
which are then grouped based on their co-occurrences. Once a trend is identified, ad-
ditional information from the tweets is extracted to analyze and describe the trend.
For example, the system uses Grapevine’s entity extractor [Angel et al. 2009] which
identifies entities mentioned in the trends.
Another Twitter-specific event detection approach introduced by Petrovi´c et al.
[2010] uses Locality Sensitive Hashing (LSH) for hashing a fixed number of recent
documents in a bounded space, and processed in a bounded time, to increase the per-
formance of nearest neighbors search.
With so many event detection systems, it is interesting to think about how they
compare. McMinn et al. [2013] describe a corpus to evaluate event detection methods,
composed of 500 news events sampled over a four-week period, and including tweet-
level relevance judgments for thousands of tweets referring to these events. While
Social Media in Mass Emergency
A:17
existing NED systems have not been evaluated against this corpus, we anticipate this
calibration of systems to occur in the future.
Beyond keyword bursts. There are well-known problems of relying on increases in
the frequency of a keyword (or a segment) to detect events. For instance, consider pop-
ular hashtags such as “#musicmonday,” which is used to suggest music on Mondays,
or “#followfriday/#ff,” which are used to suggest people to follow on Fridays. In these
cases, there should be big pseudo-events detected every Monday and every Friday.
To address this problem, Becker et al. [2011] present an approach to classify real-
world events from non-events using Twitter. They use four types of features, which are
temporal, social, topical, and Twitter-specific, to identify real events using the Twit-
ter stream in real-time. First, based on temporal features (i.e., volume of messages
posted during an hour), they form initial clusters using the most frequent terms in the
messages. Clusters are then refined using social features (i.e., users’ interactions like
re-tweets, replies, mentions). Next, they apply heuristics, for example, a high percent-
age of re-tweets and replies often indicates a non-event, whereas a high percentage of
mentions indicates that there is an event. Further, cluster coherence is estimated using
a cosine similarity metric between messages and cluster centroid. Finally, as the au-
thors report that multi-word hashtags (e.g. “#musicmonday” and “#followfriday”) are
highly indicative of some sort of Twitter specific discussion and do not represent any
real event, they check the frequency of such hashtags used in each cluster to further
refine the results.
Weng et al. [2011] present an algorithm for event detection from tweets using clus-
tering of wavelet-based signals. Their approach involves three steps. First, they use
wavelet transformation and auto correlation to find bursts in individual words, and
keep only the words with high signal auto-correlations as event features. Then, the
similarity for each pair of event-features is measured using cross correlation. Finally,
they use a modularity-based graph partitioning algorithm to detect real-life events.
One of the strong points of this approach over the traditional event detection ap-
proaches is the capability of differentiating real-life big events from trivial ones. This is
achieved mainly by two factors: the number of words, and the cross-correlation among
the words related to an event.
Unlike the approaches presented above, Corley et al. [2013] present a method to de-
tect and investigate events through meta-data analytics and topic clustering on Twit-
ter. Various features such as re-tweets, usage of different terms, and hashtags are
analyzed for a certain time period to determine a baseline and a noise ratio. An event
is detected once a particular feature value exceeds its noise boundaries and expected
threshold. Once an event has been detected, its related topics are identified using the
topic clustering approach.
Domain-specific approaches. As in many natural language processing applications,
approaches that are specific to a certain domain generally perform better than the
approaches that are open-domain or generic.
For instance, Phuvipadawat and Murata [2010] describe a method for detecting
breaking news from Twitter. First, tweets containing the hashtag “#breakingnews”
or the phrase “breaking news” are fetched from the Twitter streaming API. Group-
ing of the extracted tweets is then performed, based on content similarity, and using
a variant of the TF-IDF technique. Specifically, the similarity variant assigns a high
similarity score to hashtags and proper nouns, which they identify using the Stanford
Named Entity Recognizer (NER) implementation.
The authors consider three types of features associated with tweets: statistical fea-
tures (i.e., number of words in a tweet, position of the query word within a tweet),
keyword-based features (i.e., the actual words in a tweet), and contextual features
A:18
Imran et al.
(e.g., words appearing nearby the query term, for instance if “earthquake” is a query,
terms such as “magnitude” and “rocks” would be features in the tweet “5.3 magnitude
earthquake rocks parts of Papua New Guinea”). In order to determine if a tweet corre-
sponds to one of these hazards or crises, they use Support Vector Machines (SVM)—
a known supervised classification algorithm (more about supervised classification in
Section 6.1.2).
Data from traditional media sources can also be used for detecting newsworthy
events. Not surprisingly, traditional media and social media have different editorial
styles, perceived levels of credibility, and response delays to events. Tanev et al. [2012]
find news articles describing security-related events (such as gun fights), and use key-
words in their title and first paragraph to create a query. This query is issued against
Twitter to obtain tweets related to the event. Dou et al. [2012] describe LeadLine, an
interactive visual analysis system for event identification and exploration. LeadLine
automatically identifies meaningful events in social media and news data using burst
detection. Further, named entities and geo-locations are extracted from the filtered
data to visualize them on a map through their interface.
Another domain-specific event-detection method is based on pre-specified rules and
introduced in Li et al. [2012a]. Their system, TEDAS, detects, analyzes, and identifies
relevant crime and disaster related events on Twitter. First, tweets are collected based
on iteratively refined rules (e.g., keywords, hashtags) from Twitter’s streaming API.
Next, tweets are classified via supervised learning based on content as well as Twitter-
specific features (i.e., URLs, hashtags, mentions). Additionally, location information is
extracted using both explicit geographical coordinates and implicit geographical refer-
ences in the content. Finally, tweets are ranked according to their estimated level of
importance.
Sakaki et al. [2010] detect hazards and crises such as earthquakes, typhoons, and
large traffic jams using temporal and spatial information. LITMUS [Musaev et al.
2014] detects landslides using data collected from multiple sources. The system, which
depends on the USGS seismic activity feed provider, the TRMM (NASA) rainfall feed,
and social sensors (e.g. Twitter, YouTube, Instagram), detects landslides in real-time
by integrating multi-sourced data using relevance ranking strategy (Bayesian model).
Social media data is processed in a series of filtering steps (keyword-based filtering,
removing stop-words, geotagging, supervised classification) and mapped based on geo-
information either obtained from meta-data or from content. Events with high rele-
vancy are identified as “real events.”
5.3. Event Tracking and Sub-Event Detection
Event tracking. Event tracking refers to the task of studying how events evolve and
unfold. For a general discussion on the subject, see Allan [2002] and Lee et al. [2013].
The way in which emergency response agencies deal with crisis events varies as a
crisis unfolds. Emergency situations typically consist of four phases: warning, impact,
emergency, and recovery [Killian 2002, page 51]. During the warning phase, the focus
is on monitoring the situation. Impact is when the disaster agent is actually at work,
while the emergency phase is the immediate post-impact period during which rescue
and other emergency activities take place. Recovery is the period in which longer-term
activities such as reconstruction and returning to a “normal” state occur.
Various techniques have been proposed to identify event phases. For instance, Iyen-
gar et al. [2011] introduce an approach to automatically determine different phases
of an event on Twitter. The approach, which is mainly based on content-based fea-
tures of tweets, uses an SVM classifier and a hidden Markov model. Various content-
specific features such as bag of words, POS (part-of-speech) tags, etc. are used to au-
Social Media in Mass Emergency
A:19
Table II: Some of the event detection tools surveyed. The table includes the types of
events for which the tool is built (open domain or specific), whether detection is per-
formed in real-time, the type of query (open or “kw”=keyword-based), and whether it
has spatio/temporal or sub-event detection capabilities. Sorted by publication year.
System/tool
Approach
Event types
TwitterMonitor burst detection
open domain
TwitInfo
earthquakes+
burst detection
Twevent
burst segment detection open domain
TEDAS
supervised classification crime/disasters
LeadLine
burst detection
TwiCal
supervised classification conflicts/politics
Tweet4act
dictionaries
ESA
burst detection
disasters
open domain
open domain
Spatio-
temporal
Real-
time
yes
yes kw
yes
no
no
no
yes kw
yes kw
Query
type
open no
Sub-
events
no
yes
no
open no
no
yes
kw
kw
no
yes
open temporal no
no
no
spatial
no
spatial
Reference
[Mathioudakis and Koudas 2010]
[Marcus et al. 2011]
[Li et al. 2012b]
[Li et al. 2012a]
[Dou et al. 2012]
[Ritter et al. 2012]
[Chowdhury et al. 2013]
[Robinson et al. 2013a]
tomatically classify tweets into three phases of an event: before, during, and after. A
disaster-specific lexicon of discriminative words for each phase of the event can also be
employed [Chowdhury et al. 2013].
Sub-event detection. The detection of large-scale events has been studied with more
attention than the detection of small-scale “sub-events” that happen as a crisis unfolds.
Pohl et al. [2012] show the importance of sub-event detection during crisis situa-
tions. They use multimedia meta-data (tags and title) associated with content found
on social media platforms such as YouTube and Flickr. Their framework uses a cluster-
ing approach based on self-organizing maps to detect sub-events. First, a pre-selection
of the data is performed based on user-identified keywords. The selected data is then
passed to a sub-event detection module that performs clustering to further split the
data into sub-events.
Khurdiya et al. [2012] present a system for event and sub-event detection using
Conditional Random Fields (CRF) [Lafferty et al. 2001]. Their system consists of four
main modules: (1) a CRF-based event extractor to first extract actor, action, date, and
location; event titles are also extracted using using CRFs; (2) an event resolution to
find similar events; (3) an event compiler that characterizes events; and (4) an event
reporting module which is the end-user interface used to browse events details.
Hua et al. [2013] introduce STED, a semi-supervised targeted-interest event and
sub-event detection system for Twitter. To minimize the human effort required for
labeling, they introduce an automatic label creation and expansion technique, which
takes labels obtained from newspaper data and transfers them to tweets. They also
propagate labels using mentions, hashtags, and re-tweets. Next, they build mini-
clusters using a graph partitioning method to group words related to the event, and
use supervised learning to classify other tweets using the examples provided by each
mini-cluster. A final step on the classified output is to perform a location estimation
using information from geo-coded tweets.
Table II lists event detection systems. The majority of them are surveyed above;
additional tools are covered in the following sections.
5.4. Challenges
In addition to the discussion of general data challenges in Section 4.6, the following
are particularly relevant to event detection.
Inadequate spatial information. Spatial and temporal information are two integral
components of an event. Most systems that rely on Twitter data for event detection face
challenges to determine geographical information of tweets that lack GPS information.
In this case, automatic text-based geotagging can be used, as described on Section 4.4.
A:20
Imran et al.
Mundane events. People post mundane events on social media sites. These data
points introduce noise, which creates further challenges for an event detection algo-
rithm to overcome. For such cases, separation of real-life big events from trivial ones
is required.
Describing the events. Creating a description or label for a detected event is in gen-
eral a difficult task. Often the keywords that are more frequent during the event are
presented as a description for the event in the form of a list of words (e.g. { sandy,
hurricane, new york } ), but that list does not constitute a grammatically well-formed
description (e.g. “Hurricane Sandy hits New York”). We will see one approach to ad-
dress this in Section 6.2.2.
6. CLUSTERING, CLASSIFICATION, EXTRACTION AND SUMMARIZATION
Once we have found social messages related to a crisis event or topic, there are several
ways in which we might process them. In this section, we describe some approaches.
Broadly, we separate techniques into those classifying the data item as a whole and
those extracting useful information from the content of one or more data items.
6.1. Classifying Social Media Items
In many situations, we are interested in classifying social media items into one or
more categories. In this section, we will describe three methods of classification with
decreasing levels of manual human supervision. Text classification is a large field of
research, so we will cover literature relevant to disasters. Interested readers should
refer to other sources for a broader discussion [Srivastava and Sahami 2009].
6.1.1. Content Categories. There is not a single standard or widely-accepted way of cat-
egorizing crisis-related social media messages. While some crisis-related ontologies
have been proposed (see Section 7.2), in general, different works use different ap-
proaches.
Table III summarizes various dimensions of social media content that different re-
search articles have used to classify information:
(1) By factual, subjective, or emotional content: to separate between facts (or combi-
nations of facts and opinions), from opinions, or expressions of sympathy.
(2) By information provided: to extract particular categories of information that are
useful for various purposes.
(3) By information source: to select messages coming from particular groups of users,
e.g. eyewitness accounts or official government sources.
(4) By credibility: to filter out messages that are unlikely to be considered credible.
(5) By time: to filter messages that refer to different stages of an event, when temporal
boundaries for the event are unclear.
(6) By location: to select messages according to whether they originate from or near
the place that was affected by an event, or from areas that were not affected.
Other classification dimensions can be envisioned. In general, we observe that the
selection of the set of categories used by researchers and practitioners is usually driven
by two main factors: the data that is present in social media during crises, and the
information needs of response agencies. None of these factors is static, as both can
change substantially from one crisis situation to another. We also remark that different
types of disaster elicit different distributions of messages [Olteanu et al. 2015].
6.1.2. Supervised Classification. When a set of example items in each category is pro-
vided, a supervised classification algorithm can be used for automatic classification.
This type of algorithm ‘learns’ a predictive function or model from features of these
examples (see Section 4.3) in order to label new, unseen data items. This set of exam-
Social Media in Mass Emergency
A:21
Table III: Classification of various dimensions of content posted on social media during
high impact events with description and related work references.
Description/examples
Classification dimension
By factual, subjective, or emotional content
Factual information
Opinions
Sympathy
Antipathy
Jokes
By information provided
Caution and advice
Affected people
Infrastructure/utilities
Needs and donations
Other useful information
By information source
Eyewitnesses/Bystanders
Government
NGOs
News Media
By credibility
Credible information
Rumors
By time
Pre-phase/preparedness
Impact-phase/response
Post-phase/recovery
By location
Ground-zero
Near-by areas
Outsiders
(Examples under “By information provided”)
opinions, criticism (e.g. of government response)
condolences, sympathy [Kumar et al. 2013]; condolences [Acar and Muraki 2011]; sup-
port [Hughes et al. 2014b]; thanks, encouragement [Bruns 2014]; prayers [Olteanu
et al. 2014]
schadenfreude, animosity against victims (e.g. because of long-standing conflict)
jokes, trolling [Metaxas and Mustafaraj 2013]
caution and advice [Imran et al. 2013b]; warnings [Acar and Muraki 2011]; hazard,
preparation [Olteanu et al. 2014]; tips [Leavitt and Clark 2014]; advice [Bruns 2014];
status, protocol [Hughes et al. 2014b]
people trapped, news [Caragea et al. 2011]; casualties, people missing, found or
seen [Imran et al. 2013b]; self reports [Acar and Muraki 2011]; injured, missing,
killed [Vieweg et al. 2010]; looking for missing people [Qu et al. 2011]
infrastructure damage [Imran et al. 2013b]; collapsed structure [Caragea et al. 2011];
built environment [Vieweg et al. 2010]; closure and services [Hughes et al. 2014b]
donation of money, goods, services [Imran et al. 2013b]; food/water shortage [Caragea
et al. 2011]; donations or volunteering [Olteanu et al. 2014]; help requests, relief coor-
dination [Qu et al. 2011]; relief, donations, resources [Hughes et al. 2014b]; help and
fundraising [Bruns 2014]
hospital/clinic service, water sanitation [Caragea et al. 2011]; help requests, reports
about environment [Acar and Muraki 2011]; consequences [Olteanu et al. 2014]
members of public [Metaxas and Mustafaraj 2013], victims, citizen reporters, eyewit-
nesses [Diakopoulos et al. 2012; Olteanu et al. 2014; Bruns 2014]
administration/government [Olteanu et al. 2014]; police and fire services [Hughes et al.
2014b]; government [Bruns 2014]; news organization and authorities [Metaxas and
Mustafaraj 2013]
non-government organizations [De Choudhury et al. 2012]
news organizations and authorities, blogs [Metaxas and Mustafaraj 2013], journalists,
media, bloggers [De Choudhury et al. 2012]; news organizations [Olteanu et al. 2014];
professional news reports [Leavitt and Clark 2014]; media [Bruns 2014]
newsworthy topics, credibility [Castillo et al. 2013]; credible topics [Canini et al. 2011];
content credibility [Gupta and Kumaraguru 2012]; users and content credibility [Gupta
et al. 2014]; source credibility [Thomson et al. 2012]; fake photos [Gupta et al. 2013]
rumor [Hughes et al. 2014b; Castillo et al. 2013]
posted before an actual event occurs, helpful for the preparedness phase of emergency
management [Petak 1985]; pre-disaster, early information [Iyengar et al. 2011; Chowd-
hury et al. 2013]
posted during the impact phase of an event, helpful for the response phase of emer-
gency management [Petak 1985]; during-disaster [Iyengar et al. 2011; Chowdhury
et al. 2013]
posted after the impact of an event, helpful during the recovery phase [Petak 1985];
post-disaster information [Chowdhury et al. 2013; Iyengar et al. 2011]
information from ground zero (victims reports, bystanders) [De Longueville et al. 2009;
Ao et al. 2014]
information originating close to the affected areas [De Longueville et al. 2009]
information coming from other parts of world, sympathizers [Kumar et al. 2013]; dis-
tant witness (in the sense of [Carvin 2013]); not on the ground [Starbird et al. 2012];
location inference [Ikawa et al. 2012]
A:22
Imran et al.
ples is referred to as the training set. After a model has been learned from the training
data, it is evaluated using a different, hold-out set of labeled items, not used during
the training. This second set of examples is referred to as the testing set.
Depending on the nature of data in hand, different pre-processing techniques can be
used. In any case, the input items are transformed into feature vectors, following the
methods described in Section 4.3.
Training examples. The number of training examples required to achieve good accu-
racy depends on many factors, including the number of categories into which messages
have to be classified, and the variability of messages inside each category. Typical sizes
of training sets range from a few hundred [Yin et al. 2012] to a few thousand [Imran
et al. 2014a]. More examples yield better results in general, with diminishing results
after a certain point. In general, the accuracy of models created using training data
from one crisis decreases when applied to a different crisis, or when applied to the
same crisis but at a different point in time [Imran et al. 2014b].
Feature selection. Even if messages are brief, the feature space in which they are
represented is typically high dimensional (e.g. one dimension for every possible term).
This introduces a number of problems including the amount of computational re-
sources required for the data analysis, and it also increases the chances of over-fitting
the training data. In this case, a feature selection method (e.g. mutual information)
should be employed as a first step to discard input features that have little or no cor-
relation with the given training labels. Feature selection is an active area of machine
learning research and state of the art techniques can be found in modern textbooks or
journals (e.g. Guyon and Elisseeff [2003]).
Learning algorithms. After features have been extracted and selected, a machine
learning algorithm can be applied. Supervised classification algorithms include, among
others, naıve Bayes, Support Vector Machines (SVM), logistic regression, decision
trees, and random forests. The choice of a method is largely dependent on the spe-
cific problem setting. For instance, ESA [Yin et al. 2012; Power et al. 2014] uses naıve
Bayes and SVM, EMERSE [Caragea et al. 2011] uses SVM, AIDR [Imran et al. 2014a]
uses random forests, and Tweedr [Ashktorab et al. 2014] uses logistic regression. While
in most cases algorithms are used to predict a single label for each element, adapta-
tions of these algorithms that generate multiple labels for each element are sometimes
employed (e.g. Caragea et al. [2011]).
Ensemble/stacked classification. In some cases an explicit model of a certain fac-
tor is desired, as exemplified by the work of Verma et al. [2011]. They observe that
messages that contribute the most to situational awareness are also those that are ex-
pressed using objective (as opposed to subjective) language. In this case, one can cre-
ate a stacked classifier in which at one level certain characteristics of the message are
modeled (e.g. by having a classifier that classifies messages as objective or subjective)
and at the next level these characteristics are combined with other characteristics also
modeled by specific classifiers (e.g. writing styles such as formal or informal), and with
features from the message itself. Verma et al. [2011] find that this approach performs
better than directly using the input features.
Comparison in terms of classification effectiveness/accuracy is a non-trivial task.
This is due to the use of different datasets, different baselines, and different perfor-
mance measures (e.g. AUC, F1, precision). However, classification accuracies reported
by most of the systems we have reviewed for this survey range from 0.60 to 0.90. Recent
collections available for research may contribute to make systems easier to compare.21
21http://crisislex.org/
Social Media in Mass Emergency
A:23
6.1.3. Unsupervised Classification. Clustering is an unsupervised machine learning
method; a family of methods that seek to identify and explain important hidden pat-
terns in unlabeled data. Unsupervised machine learning methods include clustering,
dimensionality reduction (e.g. principal component analysis), and hidden Markov mod-
els, among others.
The process of performing clustering, begins by ingesting a set of items (e.g., docu-
ments, tweets, images) which are then processed with the objective of grouping sim-
ilar items together. In general, the goal is to form clusters in such a way that ele-
ments within a cluster are more similar to each other than to the elements that belong
to other clusters. Many clustering algorithms have been developed based on differ-
ent approaches, examples include K-means (centroid-based), hierarchical clustering
(connectivity-based), DBSCAN (density-based), among many others. For an overview
of clustering methods, see Zaki and Meira [2014, Part III].
In the context of dealing with social media data during crises, clustering can help
reduce the number of social media messages that need to be processed/examined by hu-
mans, for instance by displaying multiple equivalent messages as a single item instead
of multiple ones. This is the approach used by CrisisTracker [Rogstadius et al. 2013],
which is a crowdsourced social media curation system for disaster awareness. The
system, which collects data from Twitter based on predefined filters (i.e., keywords,
bounding box), groups these tweets into stories, which are clusters of tweets. These
stories are then curated/classified by humans, whose effort can be greatly reduced if
they are asked to classify entire clusters instead of single tweets. The specific cluster-
ing method employed in this case is locality-sensitive hashing, an efficient probabilistic
technique that uses hash functions to detect near-duplicates in data. Another exam-
ple is SaferCity [Berlingerio et al. 2013], which identifies and analyzes incidents re-
lated to public safety in Twitter, adopting a spatio-temporal clustering approach based
on the modularity maximization method presented in Blondel et al. [2008] for event
identification. Clusters are then classified using a semantic labeling approach using a
controlled vocabulary and based on a rank score provided by the Lucene library.22
In addition to clustering methods that partition the items into groups, there are soft
clustering methods that allow an item to simultaneously belong to several clusters
with varying degrees. This is the case of topic modeling methods, out of which Latent
Dirichlet Allocation (LDA) is one of the most popular. In the crisis domain, Kireyev
et al. [2009] use topics extracted using LDA, including a weighting scheme that ac-
counts for the document frequency (number of tweets containing a word) of the words
in the tweet, as well as for the length of the tweet. When applied to data from an
Earthquake in Indonesia in 2009, it detects topics that cover different aspects of the
crisis such as { tsunami, disaster, relief, earthquake }, { dead, bodies, missing, victims
} and { aid, help, money, relief }. There is free software available for creating these
topics models, such as MALLET [McCallum 2002], which has been applied to crisis
data by Karandikar [2010].
6.1.4. Discussion. In the context of social media data analysis, many factors influence
the choice of a learning approach (i.e. supervised vs. unsupervised). For instance, ap-
proaches based on unsupervised learning certainly have advantages over supervised
ones in cases where obtaining training examples would be prohibitively costly, would
introduce an unacceptable delay or would simply not be possible. Unsupervised ap-
proaches are more useful in cases where information classes are completely unknown
from a information seeker point of view.
22http://lucene.apache.org/
A:24
Imran et al.
However, in terms of usefulness, the output of an unsupervised approach might be
considered less useful than an approach based on supervised learning. Emergency re-
sponders may be used to specific categorizations and methodologies (e.g. the MIRA
framework used by the United Nations23) and may expect that software tools output
the same categories.
6.2. Sub-Document Analysis
In contrast to text classification schemes which make predictions about data items,
sub-document analysis techniques extract granular information from the content of the
data items. In this section we present two important sub-document analysis methods
in the context of crisis situations: information extraction and text summarization.
6.2.1. Information Extraction. The task of automatically extracting structured informa-
tion from unstructured (e.g., plain text documents) or semi-structured (e.g., web pages)
data is known as Information Extraction (IE). The most common information extrac-
tion task is named entity extraction, which consists of detecting regions of a text refer-
ring to people, organizations, or locations [Liu et al. 2011; Ritter et al. 2011]. This is
the first step towards semantic enrichment (see Section 7.1).
In the context of crisis-related social media, information extraction can be used,
for instance, to transform tweets reporting injured people in natural language (e.g.
“5 injured and 10 dead in Antofagasta”) to normalized records such as {<people-
affected=5, report-type=injury, location=Antofagasta, Chile>, <people-affected=10,
report-type=fatal-casualty, location=Antofagasta, Chile>}. These records are machine-
readable, which means they can be easily filtered, sorted, or aggregated.
Information extraction from social media is a challenging task because of the infor-
mal writing style and the presence of many ungrammatical sentences, as was noted
in Section 4.6. State-of-the-art approaches to information extraction involve the use
of probabilistic sequential models such as hidden Markov models, conditional Markov
models, maximum-entropy Markov models, or conditional random fields. Heuristics
based on regular expressions can also be applied to this problem, although these are
in general less effective than probabilistic methods.
Varga et al. [2013] use linguistic patterns and supervised learning to find “trouble
expressions” in social media messages. For instance, in a tweet such as “My friend
said infant formula is sold out. If somebody knows shops in Sendai-city where they still
have it in stock, please let us know,” the nucleus of the problem is the sentence “infant
formula is sold out.” This extraction is then used to match tweets describing problems
to tweets describing solutions to those problems.
Imran et al. [2013a; 2013b] apply conditional random fields to the extraction of in-
formation from tweets. Their method proceeds in two steps. First, tweets are classified
to consider categories such as “infrastructure damage,” “donations,” and “caution and
advice.” Then, a category-dependent extraction is done, where for instance for “infras-
tructure damage” tweets, the specific infrastructure reported damaged is extracted,
while for “donations” tweets, the item being offered in donation is extracted.
6.2.2. Summarization. Another approach to dealing with information overload involves
presenting users with a text-based representation of the evolving event. Text summa-
rization refers to the generation of a text summary of a document or set of documents
[Nenkova and McKeown 2011]. Text summarization systems are optimized to gener-
ate a text summary that contain only the core topics discussed in the set of documents.
Most systems produce this summary by extracting key sentences from the input docu-
23https://docs.unocha.org/sites/dms/Documents/mira final version2012.pdf (accessed Nov. 2014).
Social Media in Mass Emergency
A:25
Table IV: Example summary from the TREC 2013 Temporal Summarization Track.
Updates reflect new or updated information as it is reported.
time
Nov 21, 2012 10:52
Nov 22, 2012 20:49
Nov 26, 2012 04:33
Nov 26, 2012 14:49
Nov 29, 2012 04:55
Nov 30, 2012 05:22
Nov 30, 2012 06:47
update
Tel Aviv bus bombing; 13 injuries; reported on bus line 142; occured on Shaul Hamelech street;
No claims of responsibility; 3 badly hurt; occured in the heart of Tel Aviv near military hdqtrs
occurred in an area with many office buildings; occured in area with heavy pedestrian traf-
fic; first notable bombing in Tel Aviv since 2006; At least 28 people were wounded; Hamas’
television featured people praising the attack; Khaled Mashal, leader of Hamas, categorically
rejected any connection of the bombing to his group; ...
an Israeli Arab man was arrested on charges of planting the explosive device on the bus; Sus-
pect was reportedly connected to Hamas; Suspect was reportedly connected to the Islamic Ji-
had
The Romanian Foreign Minister condemned the bombing,
govt rep refers to attack as terrorist attack
Fears about Bus Bomb Before the Cease-Fire: Could derail peace talks
The suspect remotely detonated the explosive device; suspect hid device in advance on the bus;
The explosive device contained a large quantity of metal shrapnel designed to cause maximum
casualties; The suspect later on confessed to carrying out the bus attack; suspect prepared the
explosive device; suspect chose the target of the attack; ...
ment. This is in contrast to systems that produce a summary by abstracting or gener-
ating new sentences.
During crisis events, text summarization must be done in an incremental and tem-
poral manner. Incremental text summarization, also known as update summarization,
refers to generating a summary given: (1) the set of documents to be summarized, and
(2) a reference set of documents which the user has read. The objective for the sys-
tem is to produce a summary only of data the user has not already read [Dang and
Owczarzak 2008]. Temporal text summarization refers to creating an extractive sum-
mary from a set of time-stamped documents, usually in retrospect [Allan et al. 2001;
Nallapati et al. 2004; Feng and Allan 2009].
Drawing on the work from summarization research, the TREC Temporal Summa-
rization track focuses on generating updates relating to unfolding crisis events imme-
diately after their occurrence [Aslam et al. 2013]. Table IV presents an example of this
type of summary. The focus of this initiative is to first define standardized metrics for
the task and then to encourage the development of systems optimizing them. These
metrics include time-sensitive versions of precision and recall, ensuring that systems
are penalized for latency: delivering information about an event long after it occurred.
In addition, the metrics include a redundancy penalty to prevent systems from de-
livering repetitive information. In order to optimize these metrics, systems can use
staged text analysis with standard information retrieval measures [McCreadie et al.
2013]. Alternatively, systems can use regression-based combinations of features from
classic text summarization literature [Guo et al. 2013; Xu et al. 2013]. Other methods
are purely content-based, hierarchically clustering sentence text [Wang and Li 2010].
In the context of social media, Shou et al. [2013] propose a system for online update
summarization based on incremental clustering. The performance is evaluated under
experimental conditions different from the TREC track, making it difficult to compare
with other results.
Although algorithms for summarization exist for crisis events, their development is
still preliminary and several challenges remain. Foremost, the relative importance of
different features is not well understood. To date, research has primarily used features
from batch text summarization. A second challenge is scale. Many algorithms require
aggressive inter-sentence similarity computation, a procedure which scales poorly.
A:26
Imran et al.
6.3. Challenges
In addition to the discussion on generic data-related challenges in Section 4.6, the
following are particularly relevant to mining:
Combining manual and automatic labeling. In a supervised learning setting, hu-
man labels are necessary, but they may be costly to obtain. This is particularly prob-
lematic in crises that attract a multilingual population, or for tasks that require do-
main knowledge (e.g. people who know informal, local place names in Haiti, and who
speak Haitian Creole). Labeled data are not always reliable, and may not be available
at the time of the disaster; in this case, a hybrid approach that mixes human labeling
and automatic labeling can be employed [Imran et al. 2013c]. The selection of items
to be labeled by humans can be done using active learning, a series of methods to
maximize the improvement in classification accuracy as new labels are received.
Domain adaptation. Ideally, one would like to avoid having to re-train an automatic
classifier every time a new crisis occurs. However, simply re-using an existing clas-
sifier trained on data from a previous crisis does not perform well in practice, as it
yields a substantial loss in accuracy, even when the two crises have several elements
in common [Imran et al. 2013a].
In machine learning, domain adaptation (or domain transfer) is a series of methods
designed to maximize the accuracy of a classifier trained on one dataset, adapting it to
continue to perform well on a dataset with different characteristics. To the best of our
knowledge, these methods have not been applied to crisis-related social media data.
7. SEMANTIC TECHNOLOGIES IN DISASTER RESPONSE
One of the main goals of semantic technologies is to allow users to easily search
through complex information spaces, and to find, navigate, and combine information.
In the context of social media use during crises and mass convergence events, this is
achieved by linking data elements to concepts in a machine-readable way, enabling the
representation of a situation as a complex and interrelated set of elements.
7.1. Semantic Enrichment of Social Media Content
Semantic technologies are particularly useful in social media, because they provide a
powerful method for dealing with the variety of expressions that can be used to refer
to the same concept, and with the many relationships that can exist between concepts.
For instance, suppose we are looking for messages related to infrastructure damage
using a keyword-query search. We would think that searching for something such as
“damage AND (airport OR port OR bridge OR building ...)” would be sufficient, until
we notice that it is not only difficult to cover every particular type of infrastructure
(airport, port, bridge, building, etc.) but also to cover every particular instance of that
type (for instance, there are tens of thousands of airports in the world).
Named entity linking is a widely-used semantic technology that deals with the above
problem. It operates in two phases. First, a named entity recognizer module detects
entities—such as names of persons, places, and organizations. Second, for each named
entity that is found, a concept is located that more closely matches the meaning of
that named entity in that context. Concepts are generally operationalized as Uniform
Resource Locators (URLs). For instance, Zhou et al. [2010] link named entities to the
URLs of articles on Wikipedia. In a phrase such as “Terminal 2 of JFK was dam-
aged,” the named entity corresponding to the segment “JFK” would be linked to the
URL https://en.wikipedia.org/wiki/John F. Kennedy International Airport. There are
Social Media in Mass Emergency
A:27
several free, and commercial services that can be used to perform named entity link-
ing, including Alchemy,24 Open Calais,25 and Zemanta.26
Once an element is linked to a concept, further automatic annotation can be done
by following links from the concept. Returning to our example of “Terminal 2 of
JFK was damaged,” if we go to its Wikipedia page,27 we can learn that “JFK” is
an instance of the class “airport.” The airport concept is represented in this case
by the URL of a Wikipedia category page to which the JFK Airport page belongs
(https://en.wikipedia.org/wiki/Category:Airports), which in turn belongs to the cat-
egory of transport building and structures (https://en.wikipedia.org/wiki/Category:
Transport buildings and structures).
After named entity linking, messages that have been semantically enriched can be
used to provide faceted search, a popular approach to interactively search through
complex information spaces. In faceted search the information of interest can be found
not only by specifying a related keyword, but also by specifying a concept or concepts
associated with the items of interest. In the example, we could select “airport” from a
list of buildings and structures and then find a series of social media messages that
are relevant, but that do not necessarily include the specific word “airport” in them.
Abel et al. [2011], present an adaptive faceted search framework to find relevant
messages on Twitter. The framework enriches tweets with semantics by extracting
entities (i.e. persons, locations, organization), and then finding and linking those en-
tities with external resources to create facets. Each facet enables search and navi-
gation of relevant semantically related content. In follow-up work [Abel et al. 2012],
they introduce Twitcident, a system that supports semantic filtering, faceted search
and summarization of tweets. The semantic-based approach is also implemented in
Twitris 2.0 [Jadhav et al. 2010] and EDIT [Traverso et al. 2014], which present event-
related social media capturing semantics in terms of spatial, temporal, and thematic
dimensions.
7.2. Ontologies for Disaster Management
Information technologies to support disaster response often involve interactions be-
tween software operated by different agencies, and/or provided by different developers
or vendors. Allowing computer systems to communicate information in a unified way is
a key challenge in general, but especially during crisis events where different agencies
must address different dimensions of a problem in coordination with each other [Hiltz
et al. 2011]. Interoperability at the semantic level requires centralized specifications
describing machine-understandable common vocabularies of concepts and linkages be-
tween them. An effective way of achieving this is to use machine-understandable on-
tologies that define, categorize and maintain relationships between different concepts
to facilitate common understanding, and unified communication.
Table V lists some of the ontologies that have been introduced in recent years. Some
examples from this table:
— The Humanitarian eXchange Language (HXL)28 is an ontology created in 2011 and
2012 and is currently under review; it describes 49 classes and 37 properties. The
focus of HXL is mainly on four areas: organization (i.e., formal response agencies
like military, charities, NGOs), disaster (i.e., classification of disasters such as nat-
24http://www.alchemyapi.com/
25http://www.opencalais.com/
26http://developer.zemanta.com/
27Or to its related semantic resource, DBPedia http://dbpedia.org/.
28http://hxl.humanitarianresponse.info/
A:28
Imran et al.
Table V: Crisis ontologies, including some of the classes and attributes they cover, and
the format in which they are specified (OWL: Ontology Web Language, RDF: Resource
Description Framework).
Coverage
Format Reference
Ontology
Name
SOKNOS
HXL
SIADEX
OTN
MOAC
FOAF
AktiveSA
IntelLEO
ISyCri
WB-OS
resources, damage, disasters
damage, geography, organization, disasters
processes, resources, geography
specific to infrastructure
damage, disasters, processes, resources
emergency management people
transportation, meteorology, processes, resources, people OWL [Smart et al. 2007]
response organizations
damages, processes, disasters
features, components and information to build crisis
management web sites
OWL [Babitski et al. 2011]
RDF
RDF
OWL [Lorenz et al. 2005]
RDF
RDF
RDF
http://www.intelleo.eu/
OWL [B´enaben et al. 2008]
XML
[Chou et al. 2011]
http://hxl.humanitarianresponse.info/
[de la Asunci´on et al. 2005]
http://observedchange.com/moac/ns/
http://www.foaf-project.org/
EDXL-RM data exchange language for resource management
XML
https://www.oasis-open.org/
ural, man-made), geography (i.e., event location, geo-location of displaced people),
and damage (i.e., damages related to humans, infrastructure).
— Management of A Crisis (MOAC)29 is an ontology with 92 classes and 21 proper-
ties covering four areas: disaster, damage, processes (i.e., rescue, search, evacuation
processes), and resources (i.e., services, vehicles, tents). HXL and MOAC have el-
ements in common: in both cases the objective is to describe different aspects of a
crisis, including its effects, the needs of those affected, and the response to the crisis.
— Integrated Data for Events Analysis (IDEA)30 is a framework for coding social, eco-
nomic and political events. It is used in the Global Database of Events, Language
and Tone (GDELT),31 which is a machine-generated list of event data extracted from
news reports.
— Service-orientierte ArchiteKturen zur Unterst utzung von Netzwerken im Rahmen
Oeffentlicher Sicherheit (“Service-oriented architectures supporting networks of
public security,” SOKNOS)32 is an ontology for information integration for resource
planning, including damage and resource categorization during disasters.
To support communication among different ontology-based systems, the problem of
ontology heterogeneity needs to be solved by performing an ontology mapping, which
is the process of mapping the concepts of two ontologies from the same or from overlap-
ping domains. Many approaches have been proposed to perform ontology mapping. For
instance, Tang et al. [2006] treated this as a decision-making problem and proposed
an approach based on Bayesian decision theory. For a survey on ontology mapping
techniques, see Noy [2004].
The ontologies in Table V are crisis-specific, but not social-media specific. However,
they can be combined with ontologies describing social media concepts such as users,
tagging, sharing, and linking. For instance, the “Semantically Interlinked Online Com-
munities” (SIOC)33 ontology, originally developed to model sites such as blogs and
online forums, has recently been extended to support the modeling of microblogs by
adding concepts such as follower or follows. An ontology specific to Twitter appears
in Celino et al. [2011] and includes user sentiments and locations, while Passant and
29http://observedchange.com/moac/ns/
30http://vranet.com/IDEA.aspx
31http://gdeltproject.org/
32http://soknos.de/
33http://sioc-project.org/
Social Media in Mass Emergency
A:29
Laublet [2008] enables semantic tagging of social media data through an ontology
called Meaning-Of-A-Tag (MOAT). For a survey on ontologies developed for social me-
dia, see Bontcheva and Rout [2012].
8. SUMMARY AND FUTURE RESEARCH DIRECTIONS
In a relatively short time period—roughly 4 to 6 years—the research community work-
ing on the topics we have covered here has achieved a fairly high degree of maturity
with respect to filtering, classifying, processing, and aggregating social media data
during crises.
However, the underlying (although sometimes explicitly stated) claim behind this
line of work, i.e. that this research is useful for the public and/or formal response
agencies, that it has the potential to save lives and/or property during an emergency,
remains to be seen. While there are notable exceptions including the American Red
Cross, the US Federal Emergency Management Agency, UN Office for the Coordination
of Humanitarian Affairs and the Filipino Government, among others, the use of social
media is still experimental for many organizations and not yet part of their normal,
day-to-day operations.
There are two main directions in which we see future research going. First, continue
deepening the data processing capabilities that have been the main focus of comput-
ing research on this topic thus far. Second, engage more deeply with human-centered
approaches toward making the computing research the foundation of viable systems
that emergency responders can implement.
8.1. Deepening Data Processing Capabilities
From situational awareness to decision support. The systems we described in
Section 3 for processing social media during disasters have a strong focus on situa-
tional awareness, which is an important first step but might not be enough for emer-
gency management. During an emergency, social media is used as an information
source in order to make decisions. Therefore, next-generation systems should be de-
signed and evaluated in terms of their decision-support capabilities. This might even
include forecasting using signals from social media.
Extending to other types of media. Data from various sources should be pro-
cessed and integrated: “The strategies of emergency services organizations must also
recognize the significant interweaving of social and other online media with conven-
tional broadcast and print media.” [Bruns 2014]. There are some examples of the pro-
cessing of other types of information items during crises, including short messages
(SMS) [Melville et al. 2013], news articles in traditional news media and blogs [Lee-
taru and Schrodt 2013], and images [Abel et al. 2012].
Verifying information. Systems that receive user-generated content are always ex-
posed to abuse, which can be countered by a mixture of automatic and manual meth-
ods. For instance, algorithms to detect false product reviews are deployed by most ma-
jor online retailers [Liu 2012, Chapter 10]. In the crisis domain, determining the cred-
ibility of information posted on social media is a major concern for those who process
information (e.g. computer scientists, and software engineers), and for the informa-
tion consumers (e.g. the public and formal response organizations) [Hiltz et al. 2011;
Hughes et al. 2014a].
Automatic classification can be used to filter out content that is unlikely to be con-
sidered credible [Gupta and Kumaraguru 2012; Castillo et al. 2013], or to annotate
messages seen by users with credibility scores automatically [Gupta et al. 2014]. Ad-
ditionally, the public itself can be mobilized to confirm or discredit a claim through
crowdsourcing [Popoola et al. 2013].
A:30
Imran et al.
8.2. Beyond Data Processing
Designing with the users. Considering the number of systems that have been de-
signed and built so far, there is little research on how usable and useful are those
systems (with some exceptions, e.g. [Robinson et al. 2013b; Tucker et al. 2012]).
How should information be presented to users? How should users interact with it?
The key to answering these question lies with the users themselves, who should be
brought into the process of designing the systems, dashboards, and/or visualizations
they require to serve their needs. A highly regarded methodology for achieving this is
participatory design [Hughes 2014].
Helping governments and NGOs communicate with the public. Three days be-
fore Typhoon Pablo made its landfall in the Philippines in 2012, government officials
were already calling users to use the hashtag “#pabloph” for updates about the ty-
phoon. An effective use of hashtags has also been encouraged by the United Nations
Office for the Coordination of Humanitarian Affairs [UN OCHA 2014]. Computational
methods can be used not only to help formal response agencies choose which hashtags
to use, but more generally, to help them design and evaluate effective communication
strategies in social media (see Veil et al. [2011] regarding best practices for crisis com-
munications using social media).
The conversation between the public and formal organizations can also be conducted
through platforms that, instead of passively waiting for people to post information,
ask them directly to answer certain questions that are relevance for the emergency
response or relief operations [Ludwig et al. 2015].
Social media for coordinating actions. The final output of the processing of social
media messages is not limited to the presentation of information in a given format.
Computational methods can be applied to augment the information in a number of
ways. For instance, Varga et al. [2013] match problem-tweets (“infant formula is sold
out in Sendai”) to solution-tweets (“Jusco supermarket is selling infant formula”), and
Purohit et al. [2013] match tweets describing urgent need of resources (“we are coor-
dinating a clothing drive for families affected”) with tweets describing the intention to
donate them (“I’ve a bunch of clothes I want to donate”). We regard these efforts as
preliminary results towards the ability to use social media as a mechanism for coordi-
nation of action in future emergency situations. A recent special issue of the Journal
on Computer Supported Collaborative Work explores various ways in which computing
can support collaboration and coordination during an emergency [Pipek et al. 2014].
Acknowledgments. We are thankful to Jakob Rogstadius and Per Aarvik who
pointed us to historical information. We would like to thank our collaborators and
co-authors Patrick Meier, Alexandra Olteanu, and Hemant Purohit.
REFERENCES
Fabian Abel, Ilknur Celik, Geert-Jan Houben, and Patrick Siehndel. 2011. Leveraging the semantics of
tweets for adaptive faceted search on twitter. In The Semantic Web. Springer, 1–17.
Fabian Abel, Claudia Hauff, Geert-Jan Houben, Richard Stronkman, and Ke Tao. 2012. Semantics + filtering
+ search = Twitcident. Exploring information in social web streams. In Proc. of Hypertext. 285–294.
Adam Acar and Yuya Muraki. 2011. Twitter for crisis communication: lessons learned from Japan’s tsunami
disaster. International Journal of Web Based Communities 7, 3 (2011), 392–402.
James Allan. 2002. Topic detection and tracking: event-based information organization. Springer.
James Allan, Rahul Gupta, and Vikas Khandelwal. 2001. Temporal summaries of new topics. In Proc. of
SIGIR. ACM, 10–18.
Albert Angel, Nick Koudas, Nikos Sarkas, and Divesh Srivastava. 2009. What’s on the grapevine?. In Proc.
of SIGMOD. ACM, 1047–1050.
Ji Ao, Peng Zhang, and Yanan Cao. 2014. Estimating the Locations of Emergency Events from Twitter
Streams. Procedia Computer Science 31 (2014), 731–739.
Social Media in Mass Emergency
A:31
Eiji Aramaki, Sachiko Maskawa, and Mizuki Morita. 2011. Twitter catches the flu: detecting influenza epi-
demics using Twitter. In Proc. of EMNLP. Association for Computational Linguistics, 1568–1576.
Zahra Ashktorab, Christopher Brown, Manojit Nandi, and Aron Culotta. 2014. Tweedr: Mining Twitter to
inform disaster response. In Proc. of ISCRAM.
Javed A. Aslam, Fernando Diaz, Matthew Ekstrand-Abueg, Virgil Pavlu, and Tetsuya Sakai. 2013. TREC
2013 Temporal Summarization. In Proc. of TREC.
Marco Avvenuti, Stefano Cresci, Andrea Marchetti, Carlo Meletti, and Maurizio Tesconi. 2014. EARS (earth-
quake alert and report system): a real time decision support system for earthquake crisis management.
In Proc. of KDD. ACM, 1749–1758.
Grigori Babitski, Simon Bergweiler, Olaf Grebner, Daniel Oberle, Heiko Paulheim, and Florian Probst.
2011. SoKNOS–Using Semantic Technologies in Disaster Management Software. In The Semanic Web:
Research and Applications. Springer, 183–197.
Ricardo Baeza-Yates and Berthier Ribeiro-Neto. 2011. Modern Information Retrieval: The Concepts and
Technology behind Search (2 ed.). Addison-Wesley Professional.
N. S. Baron. 2003. Language of the Internet. In The Stanford handbook for language engineers, A. Farghali
(Ed.). CSLI publications, Stanford, CA, USA, 59–127.
Hila Becker, Mor Naaman, and Luis Gravano. 2011. Beyond Trending Topics: Real-World Event Identifica-
tion on Twitter. Proc. of ICWSM (2011), 438–441.
Fr´ed´erick B´enaben, Chihab Hanachi, Matthieu Lauras, Pierre Couget, and Vincent Chapurlat. 2008. A
metamodel and its ontology to guide crisis characterization and its collaborative management. In Proc.
of ISCRAM.
Fabrıcio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgılio Almeida. 2010. Detecting spammers on
twitter. In Proc. of CEAS, Vol. 6. 12.
Michele Berlingerio, Calabrese Francesco, Lorenzo Giusy, Di, Dong Xiaowen, Gkoufas Yiannis, and Dim-
itrios Mavroeidis. 2013. SaferCity: A System for Detecting and Analyzing Incidents from Social Media.
In Proc. of ICDMW. 1077–1080.
Deanne Bird, Megan Ling, and Katharine Haynes. 2012. Flooding Facebook-the use of social media during
the Queensland and Victorian floods. The Australian Journal of Emergency Management 27, 1 (2012).
Justine I Blanford, Jase Bernhardt, Alexander Savelyev, Gabrielle Wong-Parodi, Andrew M Carleton,
David W Titley, and Alan M MacEachren. 2014. Tweeting and Tornadoes. In Proc. of ISCRAM.
Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding
of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment 10 (2008).
Kalina Bontcheva and Dominic Rout. 2012. Making sense of social media streams through semantics: a
survey. Semantic Web (2012).
Thorsten Brants, Francine Chen, and Ayman Farahat. 2003. A system for new event detection. In Proc. of
SIGIR. ACM, 330–337.
Sean Brennan, Adam Sadilek, and Henry Kautz. 2013. Towards understanding global spread of disease
from everyday interpersonal interactions. In Proc. of IJCAI. AAAI Press, 2783–2789.
Axel Bruns. 2014. Crisis Communication. The Media and Communications in Australia (2014), 351–355.
Scott H Burton, Kesler W Tanner, Christophe G Giraud-Carrier, Joshua H West, and Michael D Barnes.
2012. ”Right Time, Right Place” Health Communication on Twitter: Value and Accuracy of Location
Information. Journal of Medical Internet Research 14, 6 (Nov-Dec 2012), e156.
Kevin Robert Canini, Bongwon Suh, and Peter L Pirolli. 2011. Finding credible information sources in social
networks based on content and social structure. In Proc. of PASSAT. IEEE, 1–8.
Cornelia Caragea, Nathan McNeese, Anuj Jaiswal, Greg Traylor, H Kim, Prasenjit Mitra, Dinghao Wu, A
Tapia, Lee Giles, Bernard J Jansen, and others. 2011. Classifying text messages for the Haiti earth-
quake. In Proc. of ISCRAM.
Andy Carvin. 2013. Distant Witness. CUNY Journalism Press.
Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. 2013. Predicting information credibility in time-
sensitive social media. Internet Research 23, 5 (2013), 560–588.
Irene Celino, Daniele Dell’Aglio, Emanuele Della Valle, Yi Huang, Tony Kyung-il Lee, Stanley Park, and
Volker Tresp. 2011. Making Sense of Location-based Micro-posts Using Stream Reasoning. In Proc. of
MSM. 13–18.
Ling Chen and Abhishek Roy. 2009. Event detection from flickr data through wavelet-based spatial analysis.
In Proc. of CIKM. ACM, 523–532.
Wei Chen, Laks V.S. Lakshmanan, and Carlos Castillo. 2013. Information and Influence Propagation in
Social Networks. Synthesis Lectures on Data Management 5, 4 (2013), 1–177.
A:32
Imran et al.
Zhiyuan Cheng, James Caverlee, and Kyumin Lee. 2010. You Are Where You Tweet: A Content-
based Approach to Geo-locating Twitter Users. In Proc. of IKM (CIKM ’10). ACM, 759–768.
DOI:http://dx.doi.org/10.1145/1871437.1871535
Chen-Huei Chou, Fatemeh Zahedi, and Huimin Zhao. 2011. Ontology for developing Web sites for natu-
ral disaster management: methodology and implementation. IEEE Transactions on Systems, Man and
Cybernetics, Part A: Systems and Humans 41, 1 (2011), 50–62.
Soudip Roy Chowdhury, Muhammad Imran, Muhammad Rizwan Asghar, Sihem Amer-Yahia, and Carlos
Castillo. 2013. Tweet4act: Using Incident-Specific Profiles for Classifying Crisis-Related Messages. In
Proc. of ISCRAM.
Camille Cobb, Ted McCarthy, Annuska Perkins, Ankitha Bharadwaj, Jared Comis, Brian Do, and Kate
Starbird. 2014. Designing for the Deluge: Understanding & Supporting the Distributed, Collaborative
Work of Crisis Volunteers. In Proc. of CSCW.
Courtney D Corley, Chase Dowling, Stuart J Rose, and Taylor McKenzie. 2013. SociAL Sensor Analytics:
Measuring phenomenology at scale. In Proc. of ISI. IEEE, 61–66.
Riley Crane and Didier Sornette. 2008. Robust dynamic classes revealed by measuring the response function
of a social system. PNAS 105, 41 (2008), 15649–15653.
H.T. Dang and K. Owczarzak. 2008. Overview of the TAC 2008 Update Summarization Task. In Proc. of
TAC.
Munmun De Choudhury, Nicholas Diakopoulos, and Mor Naaman. 2012. Unfolding the Event Landscape
on Twitter: Classification and Exploration of User Categories. In Proc. of CSCW.
Marc de la Asunci´on, Luis Castillo, Juan Fdez-Olivares, ´Oscar Garc´ıa-P´erez, Antonio Gonz´alez, and Fran-
cisco Palao. 2005. SIADEX: An interactive knowledge-based planner for decision support in forest fire
fighting. AI Communications 18, 4 (2005), 257–268.
Bertrand De Longueville, Robin S Smith, and Gianluca Luraschi. 2009. OMG, from here, I can see the
flames!: a use case of mining location based social networks to acquire spatio-temporal data on forest
fires. In Proc. of LBSN. ACM, 73–80.
Nicholas Diakopoulos, Munmun De Choudhury, and Mor Naaman. 2012. Finding and assessing social media
information sources in the context of journalism. In Proc. of CHI.
Wenwen Dou, Xiaoyu Wang, Drew Skau, William Ribarsky, and Michelle X Zhou. 2012. Leadline: Interactive
visual analysis of text data through event identification and exploration. In Proc. of VAST. IEEE, 93–
102.
Russell R. Dynes. 1970. Organized Behavior in Disaster. Heath LexingtonBooks.
Russell R. Dynes. 1994. Community emergency planning: False assumptions and inappropriate analogies.
(1994).
Paul S Earle, Daniel C Bowden, and Michelle Guy. 2012. Twitter earthquake detection: earthquake moni-
toring in a social world. Annals of Geophysics 54, 6 (2012).
Mica R Endsley. 1995. Toward a theory of situation awareness in dynamic systems. Human Factors: The
Journal of the Human Factors and Ergonomics Society 37, 1 (1995), 32–64.
Ao Feng and James Allan. 2009. Incident Threading for News Passages. In Proc. of CIKM. ACM, 1307–1316.
Julia D. Fraustino, Brooke Liu, and Yan Jin. 2012. Social Media Use during Disasters: A Review of the
Knowledge Base and Gaps (Final Report, START). Technical Report. Human Factors/Behavioral Sci-
ences Division, Science and Technology Directorate, U.S. Department of Homeland Security.
Therese Friberg, Stephan Prodel, and Rainer Koch. 2011. Information quality criteria and their importance
for experts in crisis situations. In Proc. of ISCRAM. 145–149.
Liang Gao, Chaoming Song, Ziyou Gao, Albert-Laszlo Barabasi, James P. Bagrow, and Dashun Wang. 2014.
Quantifying Information Flow During Emergencies. 4 (2014).
Judith Gelernter and Nikolai Mushegian. 2011. Geo-parsing Messages from Microtext. Transactions in GIS
15, 6 (2011), 753–773.
Daniel Gilman and Leith Baker. 2011. Humanitarianism in the Age of Cyber-warfare: Towards the Princi-
pled and Secure Use of Information in Humanitarian Emergencies. Technical Report. United Nations
Office for the Coordination of Humanitarian Affairs.
GlobalWebIndex. 2013. Stream Social Survey 2013 Q2. (9 2013).
Mark Graham, Scott A. Hale, and Devin Gaffney. 2014. Where in the World Are You? Geolocation and
Language Identification in Twitter. The Professional Geographer 66, 4 (2014), 568–578.
Qi Guo, Fernando Diaz, and Elad Yom-Tov. 2013. Updating Users about Time Critical Events. In Advances
in Information Retrieval. Springer Berlin Heidelberg, 483–494.
Social Media in Mass Emergency
A:33
Aditi Gupta and Ponnurangam Kumaraguru. 2012. Credibility ranking of tweets during high impact events.
In Proc. of PSOSM. ACM, 2.
Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. TweetCred: Real-Time
Credibility Assessment of Content on Twitter. In Proc. of SocInfo. Springer, 228–243.
Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking Sandy: charac-
terizing and identifying fake images on Twitter during Hurricane Sandy. In Proc. of WWW (companion).
IW3C2, 729–736.
Isabelle Guyon and Andr´e Elisseeff. 2003. Special issue on variable and feature selection. Journal of Ma-
chine Learning Research 3 (March 2003).
Harvard Humanitarian Initiative. 2011. Disaster Relief 2.0 Report: The Future of Information Sharing in
Humanitarian Emergencies. Washington, DC and Berkshire, UK.
Starr Roxanne Hiltz, Paloma Diaz, and Gloria Mark. 2011. Introduction: Social media and collaborative sys-
tems for crisis management. ACM Transactions on Computer-Human Interaction (TOCHI) 18, 4 (2011).
Sounman Hong and Daniel Nadler. 2011. Does the early bird move the polls?: the use of the social media
tool’Twitter’by US politicians and its impact on public opinion. In Proc. of DGR. ACM, 182–186.
Ting Hua, Feng Chen, Liang Zhao, Chang-Tien Lu, and Naren Ramakrishnan. 2013. STED: semi-supervised
targeted-interest event detectionin in twitter. In Proc. of KDD. ACM, 1466–1469.
Amanda L. Hughes. 2012. Supporting the Social Media Needs of Emergency Public Information Officers with
Human-Centered Design and Development. Ph.D. Dissertation. University of Colorado at Boulder.
Amanda L. Hughes. 2014. Participatory Design for the Social Media Needs of Emergency Public Information
Officers. In Proc. of ISCRAM.
Amanda L. Hughes and Leysia Palen. 2009. Twitter adoption and use in mass convergence and emergency
events. Int. Journal of Emergency Management 6, 3 (2009), 248–260.
Amanda L. Hughes and Leysia Palen. 2012. The evolving role of the public information officer: An exami-
nation of social media in emergency management. Journal of Homeland Security and Emergency Man-
agement (2012), 1–20.
Amanda L. Hughes, Steve Peterson, and Leysia Palen. 2014a. Social Media in Emergency Management.
In Issues in Disaster Science and Management: A Critical Dialogue Between Scientists and Emergency
Managers. FEMA in Higher Education Program.
Amanda L. Hughes, Lise A. St. Denis, Leysia Palen, and Kenneth Anderson. 2014b. Online Public Commu-
nications by Police & Fire Services During the 2012 Hurricane Sandy. In Proc. of CHI.
ICRC. 2013. Professional Standards for Protection Work Carried out by Humanitarian and Human Rights
Actors in Armed Conflict and Other Situations of Violence. Technical Report. International Committee
of the Red Cross.
Yohei Ikawa, Miki Enoki, and Michiaki Tatsubori. 2012. Location inference using microblog messages. In
Proc. of WWW. ACM, 687–690.
Yohei Ikawa, Maja Vukovic, Jakob Rogstadius, and Akiko Murakami. 2013. Location-Based Insights from
the Social Web. In Proc. of SWDM. IW3C2.
Muhammad Imran, Carlos Castillo, Ji Lucas, Patrick Meier, and Sarah Vieweg. 2014a. AIDR: Artificial
intelligence for disaster response. In Proc. of WWW (companion). IW3C2, 159–162.
Muhammad Imran, Carlos Castillo, Ji Lucas, M Patrick, and Jakob Rogstadius. 2014b. Coordinating human
and machine intelligence to classify microblog communications in crises. Proc. of ISCRAM (2014).
Muhammad Imran, Shady Elbassuoni, Carlos Castillo, Fernando Diaz, and Patrick Meier. 2013a. Practical
extraction of disaster-relevant information from social media. In Proc. of WWW (Companion). 1021–
1024.
Muhammad Imran, Shady Mamoon Elbassuoni, Carlos Castillo, Fernando Diaz, and Patrick Meier. 2013b.
Extracting information nuggets from disaster-related messages in social media. In Proc. of ISCRAM.
Muhammad Imran, Ioanna Lykourentzou, and Carlos Castillo. 2013c. Engineering Crowdsourced Stream
Processing Systems. CoRR abs/1310.5463 (2013).
Akshaya Iyengar, Tim Finin, and Anupam Joshi. 2011. Content-based prediction of temporal boundaries for
events in Twitter. In Proc. of PASSAT. IEEE, 186–191.
Ashutosh Jadhav, Hemant Purohit, Pavan Kapanipathi, Pramod Ananthram, Ajith Ranabahu, Vinh
Nguyen, Pablo N Mendes, Alan Gary Smith, and Amit Sheth. 2010. A.: Twitris 2.0: Semantically em-
powered system for understanding perceptions from social data. In Proc. of SWC.
Murray E Jennex. 2012. Social Media–Truly Viable For Crisis Response. Proc. of ISCRAM (2012), 1–5.
Anand Karandikar. 2010. Clustering short status messages: A topic model based approach. Master’s thesis.
University of Maryland.
A:34
Imran et al.
Arpit Khurdiya, Lipika Dey, Diwakar Mahajan, and Ishan Verma. 2012. Extraction and Compilation of
Events and Sub-events from Twitter. In Proc. of WI-IAT. IEEE Computer Society, 504–508.
Lewis M. Killian. 2002. Methods for Disaster Research: Unique or Not? In Methods of Disaster Research,
Robert A. Stallings (Ed.). Xlibris, Philadelphia, USA, 49–93.
Kirill Kireyev, Leysia Palen, and K Anderson. 2009. Applications of topics models to analysis of disaster-
related twitter data. In NIPS Workshop on Applications for Topic Models: Text and Beyond, Vol. 1.
Shamanth Kumar, Fred Morstatter, Reza Zafarani, and Huan Liu. 2013. Whom should I follow?: identifying
relevant users during crises. In Proc. of Hypertext.
Girdhar Kumaran, James Allan, and Andrew McCallum. 2004. Classification models for new event detection.
Technical Report. University of Massachusetts Amherst.
John Lafferty, Andrew McCallum, and Fernando CN Pereira. 2001. Conditional random fields: Probabilistic
models for segmenting and labeling sequence data. (2001).
Alex Leavitt and Joshua A. Clark. 2014. Upvoting Hurricane Sandy: Event-based News Production Pro-
cesses on a Social News Site. In Proc. of CHI. ACM, 1495–1504.
Pei Lee, Laks VS Lakshmanan, and Evangelos E Milios. 2013. Event Evolution Tracking from Streaming
Social Posts. arXiv preprint arXiv:1311.5978 (2013).
Kalev Leetaru and Philip A. Schrodt. 2013. GDELT: Global Database of Events, Language, and Tone. In
Proc. of ISA. http://gdelt.utdallas.edu/
Chenliang Li, Aixin Sun, and Anwitaman Datta. 2012b. Twevent: segment-based event detection from
tweets. In Proc. of CIKM. ACM, 155–164.
Rui Li, Kin Hou Lei, Ravi Khadiwala, and KC-C Chang. 2012a. Tedas: A twitter-based event detection and
analysis system. In Proc. of ICDE. IEEE, 1273–1276.
Bruce R. Lindsay. 2011. Social Media and Disasters: Current Uses, Future Options, and Policy Considera-
tions. Technical Report. Congressional Research Service.
John Lingad, Sarvnaz Karimi, and Jie Yin. 2013. Location Extraction from Disaster-related Microblogs. In
Proc. WWW (Companion) (WWW ’13 Companion). IW3C2, 1017–1020.
Bing Liu. 2012. Sentiment Analysis and Opinion Mining. Morgan & Claypool.
Xiaohua Liu, Shaodian Zhang, Furu Wei, and Ming Zhou. 2011. Recognizing named entities in tweets. In
Proc. of ACL. Association for Computational Linguistics, 359–367.
Ying Liu, Dengsheng Zhang, Guojun Lu, and Wei-Ying Ma. 2007. A survey of content-based image retrieval
with high-level semantics. Pattern Recognition 40, 1 (2007), 262–282.
Bernhard Lorenz, Hans J urgen Ohlbach, and Laibing Yang. 2005. Ontology of transportation networks.
(2005).
Thomas Ludwig, Tim Siebigteroth, and Volkmar Pipek. 2015. CrowdMonitor: Monitoring Physical and Dig-
ital Activities of Citizens During Emergencies. In Proc. of CHI. 421–428.
Alan M MacEachren, Anuj Jaiswal, Anthony C Robinson, Scott Pezanowski, Alexander Savelyev, Prasenjit
Mitra, Xiao Zhang, and Justine Blanford. 2011. Senseplace2: Geotwitter analytics support for situa-
tional awareness. In Proc. of VAST. IEEE, 181–190.
Adam Marcus, Michael S Bernstein, Osama Badar, David R Karger, Samuel Madden, and Robert C Miller.
2011. Twitinfo: aggregating and visualizing microblogs for event exploration. In Proc. of CHI. 227–236.
Michael Mathioudakis and Nick Koudas. 2010. Twittermonitor: trend detection over the twitter stream. In
Proc. of SIGMOD. ACM, 1155–1158.
Andrew Kachites McCallum. 2002. Mallet: A machine learning for language toolkit.
Richard McCreadie, M-Dyaa Albakour, Stuart Mackie, Nut Limosopathan, Craig Macdonald, Iadh Ounis,
and B. Taner Dinc¸er. 2013. Experiments with Terrier in Contextual Suggestion, Temporal Summarisa-
tion and Web Tracks. In Proc. of TREC.
Andrew J. McMinn, Yashar Moshfeghi, and Joemon M. Jose. 2013. Building a Large-scale Corpus for Eval-
uating Event Detection on Twitter. In Proc. of CIKM. ACM, 409–418.
Patrick Meier. 2015. Digital Humanitarians. CRC Press.
Prem Melville, Vijil Chenthamarakshan, Richard D. Lawrence, James Powell, Moses Mugisha, Sharad
Sapra, Rajesh Anandan, and Solomon Assefa. 2013. Amplifying the Voice of Youth in Africa via Text
Analytics. In Proc. of KDD. ACM, 1204–1212. DOI:http://dx.doi.org/10.1145/2487575.2488216
Panagiotis Metaxas and Eni Mustafaraj. 2013. The rise and the fall of a citizen reporter. In Proc. of WebSci.
Stuart E. Middleton, Lee Middleton, and Stefano Modafferi. 2014. Real-Time Crisis Mapping of Natural
Disasters Using Social Media. Intelligent Systems, IEEE (2014), 9–17.
Dennis Mileti. 1999. Disasters by Design: A Reassessment of Natural Hazards in the United States. Joseph
Henry Press.
Social Media in Mass Emergency
A:35
Jeffrey T Mitchell, Deborah SK Thomas, Arleen A Hill, and Susan L Cutter. 2000. Catastrophe in reel life
versus real life: perpetuating disaster myth through Hollywood films. International Journal of Mass
Emergencies and Disasters 18, 3 (2000), 383–402.
Aibek Musaev, De Wang, and Calton Pu. 2014. LITMUS: Landslide Detection by Integrating Multiple
Sources. Proc. of ISCRAM (2014).
Ramesh Nallapati, Ao Feng, Fuchun Peng, and James Allan. 2004. Event threading within news topics. In
Proc. of CIKM. ACM, 446–453.
Ani Nenkova and Kathleen McKeown. 2011. Automatic Summarization. Vol. 5. 103–233 pages.
Natalya F. Noy. 2004. Semantic integration: a survey of ontology-based approaches. ACM Sigmod Record
33, 4 (2004), 65–70.
Ory Okolloh. 2009. Ushahidi, or’testimony’: Web 2.0 tools for crowdsourcing crisis information. Participatory
learning and action 59, 1 (2009), 65–70.
Alexandra Olteanu, Carlos Castillo, Fernando Diaz, and Sarah Vieweg. 2014. CrisisLex: A Lexicon for Col-
lecting and Filtering Microblogged Communications in Crises. In Proc. of ICWSM.
Alexandra Olteanu, Sarah Vieweg, and Carlos Castillo. 2015. What to Expect When the Unexpected Hap-
pens: Social Media Communications Across Crises. In Proceedings of the 18th ACM Conference on Com-
puter Supported Cooperative Work and Social Computing (CSCW ’15). ACM, New York, NY, USA, 994–
1009. DOI:http://dx.doi.org/10.1145/2675133.2675242
Olutobi Owoputi, Brendan O’Connor, Chris Dyer, Kevin Gimpel, Nathan Schneider, and Noah A Smith.
2013. Improved part-of-speech tagging for online conversational text with word clusters. In Proc. of
NAACL-HLT. 380–390.
Leysia Palen and Sophia B Liu. 2007. Citizen communications in crisis: anticipating a future of ICT-
supported public participation. In Proc. of CHI. ACM, 727–736.
Bo Pang and Lillian Lee. 2008. Opinion mining and sentiment analysis. Foundations and trends in informa-
tion retrieval 2, 1-2 (2008), 1–135.
Alexandre Passant and Philippe Laublet. 2008. Meaning Of A Tag: A collaborative approach to bridge the
gap between tagging and Linked Data.. In Proc. of LDOW.
William J Petak. 1985. Emergency management: A challenge for public administration. Public Administra-
tion Review (1985), 3–7.
Sasa Petrovi´c, Miles Osborne, and Victor Lavrenko. 2010. Streaming first story detection with application
to twitter. In Proc. of ACL. Association for Computational Linguistics, 181–189.
Swit Phuvipadawat and Tsuyoshi Murata. 2010. Breaking news detection and tracking in twitter. In Proc.
of WI-IAT, Vol. 3. IEEE, 120–123.
Volkmar Pipek, Sophia Liu, and Andruid Kerne (Eds.). 2014. Special Issue: Crisis Informatics and Collabo-
ration. Computer Supported Cooperative Work, Vol. 23.
Daniela Pohl, Abdelhamid Bouchachia, and Hermann Hellwagner. 2012. Automatic identification of crisis-
related sub-events using clustering. In Proc. of ICMLA, Vol. 2. IEEE, 333–338.
Hilary W Poole, Laura Lambert, Chris Woodford, and Christos JP Moschovitis. 2005. The Internet: a histor-
ical encyclopedia. Abc-Clio Inc.
Abdulfatai Popoola, Dmytro Krasnoshtan, Attila-Peter Toth, Victor Naroditskiy, Carlos Castillo, Patrick
Meier, and Iyad Rahwan. 2013. Information verification during natural disasters. In Proc. of WWW
(companion). IW3C2, 1029–1032.
Robert Power, Bella Robinson, John Colton, and Mark Cameron. 2014. Emergency situation awareness:
Twitter case studies. In Proc. of ISCRAM Med. 218–231.
Hemant Purohit, Carlos Castillo, Fernando Diaz, Amit Sheth, and Patrick Meier. 2013. Emergency-relief co-
ordination on social media: Automatically matching resource requests and offers. First Monday (2013).
Hemant Purohit and Amit Sheth. 2013. Twitris v3: From citizen sensing to analysis, coordination and action.
In Proc. of ICWSM.
Yan Qu, Chen Huang, Pengyi Zhang, and Jun Zhang. 2011. Microblogging after a major disaster in China:
a case study of the 2010 Yushu earthquake. In Proc. of CSCW.
Enrico L. Quarantelli. 2002. The Disaster Research Center (DRC) field studies of organized behavior in
disasters. In Methods of Disaster Research, Robert A. Stallings (Ed.). Xlibris, Philadelphia, USA, 94–
116.
Ramakrishnan, Naren et al. 2014. ’Beating the News’ with EMBERS: Forecasting Civil Unrest Using Open
Source Indicators. In Proc. of KDD. ACM, 1799–1808.
Christian Reuter and Simon Scholl. 2014. Technical Limitations for Designing Applications for Social Media.
In Mensch & Computer 2014–Workshopband. Walter de Gruyter GmbH & Co KG, 131.
A:36
Imran et al.
Alan Ritter, Sam Clark, Oren Etzioni, and others. 2011. Named entity recognition in tweets: an experimental
study. In Proc. of EMNLP. Association for Computational Linguistics, 1524–1534.
Alan Ritter, Oren Etzioni, Sam Clark, and others. 2012. Open domain event extraction from twitter. In Proc.
of KDD. ACM, 1104–1112.
A Robinson, Alexander Savelyev, Scott Pezanowski, and Alan M MacEachren. 2013b. Understanding the
utility of geospatial information in social media. In Proc. ISCRAM. 918–922.
Bella Robinson, Robert Power, and Mark Cameron. 2013a. A sensitive Twitter earthquake detector. In Proc.
of WWW (companion). IW3C2, 999–1002.
Jakob Rogstadius, Maja Vukovic, Claudio Teixeira, Vassilis Kostakos, Evangelos Karapanos, and Jim Alain
Laredo. 2013. CrisisTracker: Crowdsourced social media curation for disaster awareness. IBM J. of
Research and Development 57, 5 (2013), 4–1.
Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time
event detection by social sensors. In Proc. of WWW. ACM, 851–860.
Aleksandra Sarcevic, Leysia Palen, Joanne White, Kate Starbird, Mossaab Bagdouri, and Kenneth Ander-
son. 2012. Beacons of hope in decentralized coordination: learning from on-the-ground medical twitter-
ers during the 2010 Haiti earthquake. In Proc. of CSCW. ACM, 47–56.
Hassan Sayyadi, Matthew Hurst, and Alexey Maykov. 2009. Event Detection and Tracking in Social
Streams. In Proc. of ICWSM.
Wanita Sherchan, Surya Nepal, and Cecile Paris. 2013. A Survey of Trust in Social Networks. ACM Comput.
Surv. 45, 4, Article 47 (Aug. 2013), 33 pages. DOI:http://dx.doi.org/10.1145/2501654.2501661
Amit Sheth, Hermant Purohit, Ashutosh Jadhav, Pavan Kapanipathi, and Lu Chen. 2010. Understanding
events through analysis of social media. In Proc. of WWW.
Irina Shklovski, Moira Burke, Sara Kiesler, and Robert Kraut. 2010. Technology Adoption and Use in the
Aftermath of Hurricane Katrina in New Orleans. American Behavioral Scientist (2010), 1228–1246.
Lidan Shou, Zhenhua Wang, Ke Chen, and Gang Chen. 2013. Sumblr: Continuous Summarization of Evolv-
ing Tweet Streams. In Proc. of SIGIR. ACM, 533–542.
Paul R Smart, Alistair Russell, Nigel R Shadbolt, Leslie A Carr, and others. 2007. Aktivesa: A technical
demonstrator system for enhanced situation awareness. Comput. J. 50, 6 (2007), 703–716.
Ashok Srivastava and Mehran Sahami. 2009. Text Mining: Classification, Clustering, and Applications (1st
ed.). Chapman & Hall/CRC.
Robert A. Stallings. 2002. Methods for Disaster Research: Unique or Not? In Methods of Disaster Research,
Robert A. Stallings (Ed.). Xlibris, Philadelphia, USA, 21–44.
Kate Starbird. 2013. Delivering patients to sacr´e coeur: collective intelligence in digital volunteer commu-
nities. In Proc. of CHI. ACM, 801–810.
Kate Starbird, Grace Muzny, and Leysia Palen. 2012. Learning from the crowd: Collaborative filtering tech-
niques for identifying on-the-ground Twitterers during mass disruptions. Proc. of ISCRAM (2012).
Kate Starbird, Leysia Palen, Amanda L Hughes, and Sarah Vieweg. 2010. Chatter on the red: what hazards
threat reveals about the social life of microblogged information. In Proc. of CSCW. ACM, 241–250.
Evan A Sultanik and Clayton Fink. 2012. Rapid Geotagging and Disambiguation of Social Media Text via
an Indexed Gazetteer. In Proc. of ISCRAM, Vol. 190. 1–10.
Hristo Tanev, Maud Ehrmann, Jakub Piskorski, and Vanni Zavarella. 2012. Enhancing Event Descriptions
through Twitter Mining.. In Proc. of ICWSM.
Jie Tang, Juanzi Li, Bangyong Liang, Xiaotong Huang, Yi Li, and Kehong Wang. 2006. Using Bayesian
decision for ontology mapping. Web Semantics: Science, Services and Agents on the World Wide Web 4, 4
(2006), 243–262.
Robert Thomson, Naoya Ito, Hinako Suda, Fangyu Lin, Yafei Liu, Ryo Hayasaka, Ryuzo Isochi, and Zian
Wang. 2012. Trusting Tweets: The Fukushima disaster and information source credibility on twitter. In
Proc. of ISCRAM. 10.
Stefania Traverso, Valentina Cerutti, Kristin Stock, and Mike Jackson. 2014. EDIT: A Methodology for the
Treatment of Non-authoritative Data in the Reconstruction of Disaster Scenarios. In Proc. of ISCRAM
Med. 32–45. DOI:http://dx.doi.org/10.1007/978-3-319-11818-5 4
S Tucker, V Lanfranchi, N Ireson, A Sosa, G Burel, and F Ciravegna. 2012. “Straight to the information I
need:” assessing collational interfaces for emergency response. In Proceedings of the 9th international
ISCRAM conference. Vancouver.
Muhammad Moeen Uddin, Muhammad Imran, and Hassan Sajjad. 2014. Understanding Types of Users on
Twitter. In Proc. of SocialCom.
Social Media in Mass Emergency
A:37
UN OCHA. 2014. Hashtag Standards For Emergencies. Technical Report. United Nations Office for the
Coordination of Humanitarian Affairs.
Jose van Dijck. 2013. The Culture of Connectivity: A Critical History of Social Media. Oxford Uni. Press.
Istv´an Varga, Motoki Sano, Kentaro Torisawa, Chikara Hashimoto, Kiyonori Ohtake, Takao Kawai, Jong-
Hoon Oh, and Stijn De Saeger. 2013. Aid is Out There: Looking for Help from Tweets during a Large
Scale Disaster.. In Proc. of ACL. 1619–1629.
Shari R Veil, Tara Buehner, and Michael J Palenchar. 2011. A Work-In-Process Literature Review: Incorpo-
rating Social Media in Risk and Crisis Communication. Journal of contingencies and crisis management
19, 2 (2011), 110–122.
Sudha Verma, Sarah Vieweg, William J Corvey, Leysia Palen, James H Martin, Martha Palmer, Aaron
Schram, and Kenneth Mark Anderson. 2011. Natural Language Processing to the Rescue? Extracting
”Situational Awareness” Tweets During Mass Emergency.. In Proc. of ICWSM.
Sarah Vieweg. 2012. Situational Awareness in Mass Emergency: A Behavioral and Linguistic Analysis of
Microblogged Communications. Ph.D. Dissertation. University of Colorado at Boulder.
Sarah Vieweg, Carlos Castillo, and Muhammad Imran. 2014. Integrating Social Media Communications
into the Rapid Assessment of Sudden Onset Disasters. In Proc. of SocInfo. 444–461.
Sarah Vieweg and Adam Hodges. 2014. Rethinking Context: Leveraging Human and Machine Computation
in Disaster Response. Computer 47, 4 (April 2014), 22–27. DOI:http://dx.doi.org/10.1109/mc.2014.97
Sarah Vieweg, Amanda L. Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging During Two Nat-
ural Hazards Events: What Twitter May Contribute to Situational Awareness. In Proc. of CHI.
Ellen M. Voorhees and Donna K. Harman (Eds.). 2005. TREC: Experiment and Evaluation in Information
Retrieval. MIT Press.
Dingding Wang and Tao Li. 2010. Document update summarization using incremental hierarchical cluster-
ing. In Proc. of CIKM. ACM, 279–288.
Ingmar Weber and Yelena Mejova. 2013. Twitter and the Real World. CIKM’13 tutorial. (2013). https://sites.
google.com/site/twitterandtherealworld/home
Jianshu Weng and Bu-Sung Lee. 2011. Event Detection in Twitter. In Proc. of ICWSM.
Tan Xu, Paul McNamee, and Douglas W. Oard. 2013. HLTCOE Temporal Summarization. In Proc. of TREC.
Christopher C Yang, Xiaodong Shi, and Chih-Ping Wei. 2009. Discovering event evolution graphs from news
corpora. IEEE Transactions on Systems, Man and Cybernetics (2009), 850–863.
Yiming Yang, Tom Pierce, and Jaime Carbonell. 1998. A study of retrospective and on-line event detection.
In Proc. of SIGIR. ACM, 28–36.
Jie Yin, Andrew Lampert, Mark Cameron, Bella Robinson, and Robert Power. 2012. Using social media to
enhance emergency situation awareness. IEEE Intelligent Systems 27, 6 (2012), 52–59.
Mohammed J. Zaki and Wagner Meira. 2014. Data Mining and Analysis: Fundamental Concepts and Algo-
rithms. Cambridge University Press.
Qiankun Zhao, Prasenjit Mitra, and Bi Chen. 2007. Temporal and information flow based event detection
from social text streams. In Proc. of AAAI, Vol. 7. 1501–1506.
Yiping Zhou, Lan Nie, Omid Rouhani-Kalleh, Flavian Vasile, and Scott Gaffney. 2010. Resolving surface
forms to wikipedia topics. In Proc. of COLING. Association for Computational Linguistics, 1335–1343.
|
1207.3603 | 1 | 1207 | 2012-07-16T08:49:05 | Qualitative Comparison of Community Detection Algorithms | [
"cs.SI",
"cs.CV",
"physics.soc-ph"
] | Community detection is a very active field in complex networks analysis, consisting in identifying groups of nodes more densely interconnected relatively to the rest of the network. The existing algorithms are usually tested and compared on real-world and artificial networks, their performance being assessed through some partition similarity measure. However, artificial networks realism can be questioned, and the appropriateness of those measures is not obvious. In this study, we take advantage of recent advances concerning the characterization of community structures to tackle these questions. We first generate networks thanks to the most realistic model available to date. Their analysis reveals they display only some of the properties observed in real-world community structures. We then apply five community detection algorithms on these networks and find out the performance assessed quantitatively does not necessarily agree with a qualitative analysis of the identified communities. It therefore seems both approaches should be applied to perform a relevant comparison of the algorithms. | cs.SI | cs | Qualitative Comparison of Community Detection
Algorithms
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
1 Galatasaray University, Computer Science Department, Istanbul, Turkey
2 University of Burgundy, LE2I UMR CNRS 5158, Dijon, France
[email protected]
Abstract. Community detection is a very active field in complex networks
analysis, consisting in identifying groups of nodes more densely interconnected
relatively to the rest of the network. The existing algorithms are usually tested
and compared on real-world and artificial networks, their performance being
assessed through some partition similarity measure. However, artificial
networks realism can be questioned, and the appropriateness of those measures
is not obvious. In this study, we take advantage of recent advances concerning
the characterization of community structures to tackle these questions. We first
generate networks thanks to the most realistic model available to date. Their
analysis reveals they display only some of the properties observed in real-world
community structures. We then apply five community detection algorithms on
these networks and find out the performance assessed quantitatively does not
necessarily agree with a qualitative analysis of the identified communities. It
therefore seems both approaches should be applied to perform a relevant
comparison of the algorithms.
Keywords: Complex Networks, Community Detection, Community Properties,
Algorithms Comparison.
1
Introduction
The use of networks as modeling tools has spread through many application fields
during
the
last decades: biology,
sociology, physics, computer
science,
communication, etc. (see [1] for a very complete review of applied studies). Once a
system has been modeled, the resulting network can be analyzed or visualized thanks
to some of the many tools designed for graph mining. Such large real -world networks
are characterized by a heterogeneous structure, leading to specific properties. In
particular, a heterogeneous distribution of links often results in the presence of a so -
called community structure [2]. A community roughly corresponds to a group of
nodes more densely interconnected, relatively to the rest of the network [3]. The way
such a structure can be interpreted is obviously dependent on the modeled system.
However, independently from the nature of this system, it is clear the community
structure conveys some very
important
information, necessary
to a proper
2
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
understanding [4]. Detecting communities is therefore an essential part of modern
network analysis.
Many different community detection algorithms exist [2], which can diverge in two
ways: first the process leading to an estimation of the community structure, but also
the nature of the estimated communities themselves. This raises a question regarding
the comparison of these algorithms, from both a theoretical and a practic al point of
view. Authors traditionally test their community detection algorithms on real -world
and/or artificial networks [5, 6]. The performance is assessed by comparing the
estimated communities with some community structure of reference using a quality
(e.g. modularity [3]) or association (e.g. Normalized Mutual Information [7])
measure. This single value is then compared with those obtained when applying
preexisting algorithms on the same data. The ma in problem with this approach is its
purely quantitative aspect: it completely ignores the nature of the considered
community structures. Two algorithms can reach the exact same level of performance,
but still estimate very different community structures.
Besides performance evaluation, the data used to perform the tests are also subject
to some limitations. For realism reasons, it is necessary to apply the algorithms to
real-world networks, but these are not sufficient because 1) reference communities
(i.e. ground truth) can rarely be defined objectively, and 2) the topology of the
selected networks can hardly be diverse enough to represent all types of systems.
Testing on artificial networks can be seen as complementary, because they overcome
these limitations. Indeed, a random model allows generating as many networks as
desired, while controlling some of their topological properties. The only issue is the
realism of the obtained networks, which should mimic closely real -world networks in
order to get relevant test results.
Some properties common to most real -world networks are well-identified: power-
law distributed degree, small-worldness, non-zero degree correlation and relatively
high transitivity [8]. Additionally, networks with a community structure are
characterized by a power-law distributed community size [9]. Several generative
models with increasing realism were successively designed [6] before finally meeting
these constraints [6, 10, 11]. However, recent studies showed other properties besides
the community size distribution can be used to characterize real-world community
structures [4, 12], such as community-wise density and average distance, hub
dominance, embeddedness. They allow giving a more detailed description of the
internal topology of the communities, and of the way they are interconnec ted.
To our opinion, these new results have two important consequences on the problem
of community detection assessment. First, the question to know whether the artificial
networks used as benchmark also exhibit these properties arises naturally. But more
importantly, it is now possible to perform a qualitative comparison of the
communities identified by different algorithms, instead of relying only on a single
performance measure. In this article, we try to answer both questions using the
realistic generative model LFR [6] and a representative set of community detection
algorithms. In section 2, we review in greater details the properties used to describe
community structures in complex networks. In section 3, we shortly present the LFR
model and its properties, and introduce an adjustment allowing to improve the realism
Qualitative Comparison of Community Detection Algorithms
3
of the networks it generates. We also review the various approaches used in the
literature to define the concept of community, and describe a selection of community
detection algorithms from this perspective. In section 4, we first analyze the
properties of the generated networks. We then compare the community structures
detected by the selected algorithms on these networks. We consider both their
similarity to the community structure of interest, and how community properties
differ from one algorithm to the other. Finally, we discuss our results and explain how
our work could be extended.
2
Characterization of a Community Structure
Complex networks are often characterized at microscopic and macroscopic levels , i.e.
by studying the characteristics of nodes taken individually and of the network
considered as a whole, respectively. The microscopic approach focuses on some
nodes of interest, and tries to identify which features allow distinguishing them from
the rest of the network (degree, centrality, local transitivity, etc.). At the macroscopic
level, one can take advantage of the multiplicity of nodes to derive statistics or
distributions summarizing some of the network features (degree distribution, degree
correlation, average distance, transitivity, etc.). The development of community
detection corresponds to the apparition of a mesoscopic level, and highlights the need
for adapted tools to characterize the community structure. In this section, we present a
selection of the mesoscopic measures recently proposed and indicate how real -world
networks behave relatively to them. In some cases, no general observation can be
made, and one has to consider the class of the network: communication, biological,
social, etc. Note other measures exist besides those described here, such as the
network community profile [12] or roles distribution [13].
The community size distribution is considered as an important characteristic of the
community structure. It has been largely studied in real-world networks, and seems to
follow a power law [9, 14] with exponent ranging from to [15]. This means
their sizes are heterogeneous, with many small communities and only a few very large
ones.
The embeddedness measure assesses how much the direct neighbors of a node
belong to its own community. It is defined as the ratio of the internal degree to
the total degree of the considered node [4]:
(1)
This internal degree is the number of links the nodes has with other nodes from the
same community, by opposition to its external degree , which corresponds to
connections with nodes located in other communities. The maximal embeddedness of
is reached when all the neighbors are in its community ( ), whereas the
minimal value of corresponds to the case where all neighbors belong to different
communities ( ). In real-world networks, a majority of nodes, usually with
low degree, have a very high embeddedness. The rest are distributed depending on the
considered class: communication, Internet and biological networks exhibit a peak
4
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
around , whereas social and information networks have a more uniform
distribution. In all cases, the whole range of is significantly represented, even small
values [4].
The density of a community is defined as the ratio of links it actually contains,
noted , to the number of links it could contain if all its nodes were connected. In
the case of an undirected network, the latter is , where is the number
of nodes in the community, and we therefore get
. When
compared to the overall network density, the density allows assessing the cohesion of
the community: by definition, a community is supposed to be denser than the network
it belongs to. The scaled density is a variant obtained by multiplying the density by
the community size [4]:
(2)
If the considered community is a tree, it has only links, and .
If it is a clique (completely connected subgraph), then and we
have . The scaled density therefore allows charactering the structure of the
community. Some real-world networks such as the Internet or communication
networks have essentially tree-like communities. On the contrary, for other classes
like social and information networks, the scaled density increases with the community
size. Finally, biological networks exhibit a hybrid behavior, their small communities
being tree-like whereas the large ones are denser and close to cliques [4].
The distance between two nodes corresponds to the length of their shortest path.
When averaged over all pairs of nodes in a community, it allows assessing the
cohesion of this community. In real-world networks, small communities ( )
are supposedly small-world, which means the average distance should increase
logarithmically with the community size [4]. For larger communities, the average
distance still increases, but more slowly, or even stabilizes for certain cla sses like
communication networks. A small average distance can be explained by a high
density (social), the presence of hubs (communication, Internet), or both (biological,
information).
From a community structure perspective, a hub is a node connected to many of the
other nodes belonging to the same community. The presence of a central hub in a
community can be assessed using the hub dominance measure, which corresponds
to the following ratio:
The numerator is the maximal internal degree found in , and the denominator is the
maximal degree theoretically possible given the community size. The hub dominance
therefore reaches when at least one node is connected to all other nodes in the
community. It can be only if no nodes are connected, which is unlikely for a
community. In real-world networks, the behavior of this property depends on the
considered class. For communication networks, it is close to the maximum for all
community sizes, meaning hubs are present in all communities. Considering their
communities are sparse and tree-like, one can conclude they are star-shaped. Other
(3)
Qualitative Comparison of Community Detection Algorithms
5
classes do not have as many hubs in their large communities, which is why the ir hub
dominance generally decreases with community size increase [4].
3 Methods
Our experiment is two-stepped: first we generate a set of artificial networks and study
the realism of their community-related topological properties; second we apply a
selection of community detection algorithms on these networks and analyze the
properties of the community structure they estimate. In this section, we first describe
the LFR model we applied during the first step, which supposedly a llows generating
the most realistic networks in terms of overall properties (degree distribution, small -
worldness, etc.) [6, 10, 11]. Then, we shortly describe the community detection
algorithms we selected, and explain how they differ on the way they handle the
concept of community.
3.1 Network Generation
Only a few models have been designed to generate networks possessing a community
structure. Girvan and Newman seemingly defined the first one [5], which produces
networks taking roughly the form of sets of small interconnected Erdős -Rényi
networks [16]. Although widely used to test and compare community detection
algorithms, the Girvan-Newman method is limited in terms of realism [6], mainly
because the degree is not power -law distributed and the communities are small, few,
and even-sized. Several variants were defined, allowing to produce larger networks
and communities with heterogeneous sizes [2, 7, 17]. More recently, a different
approach appeared, based on a rewiring process [6, 18]. It increased the realism level
even more by generating networks with power-law distributed degree. Among these
newer models, we selected the LFR model, which seems to be the more realistic and
was previously used as a benchmark to compare community detection algorithms [6,
10, 19].
The LFR model was proposed by Lancichinetti et al. [6] to randomly generate
undirected and unweighted networks with mutually exclusive communities. The
model was subsequently extended to generate weighted and/or directed networks,
with possibly overlapping communities [19]. However, in this article, we focus on
undirected unweighted networks with non-overlapping communities, because the
community structure-related properties we want to study have been defined and/or
used only for this type of networks. The model allows to control directly the
following parameters: number of nodes , desired average and maximum
degrees, exponent for the degree distribution, exponent for the community size
distribution, and mixing coefficient . The latter represents the desired average
proportion of links between a node and nodes located outside its community, called
inter-community links. Consequently, the proportion of intra-community links is – .
A node of degree has therefore an external degree of and an internal
degree of .
6
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
The generative process first uses the configuration model (CM) [20] to generate a
network with average degree , maximum degree and power-law degree
distribution with exponent . Second, virtual communities are defined so that their
sizes follow a power-law distribution with exponent . Each node is randomly
affected to a community, provided the community size is greater or equal to the node
internal degree. Third, an iterative process takes place to rewire certain links, in order
to approximate , while preserving the degree distribution. For each node, the to tal
degree is not modified, but the ratio of internal and external links is changed so that
the resulting proportion gets close to .
By construction, the LFR method guaranties to obtain values considered as realistic
[1, 8] for several properties: size of the network, power law distributed degrees and
community sizes. Other properties are not directly controlled, but were studied
empirically [10]. It turns out LFR generates small-world networks, with relatively
high transitivity and degree correlation. This is realistic [8], but holds only under
certain conditions. In particular, transitivity and degree correlation are dramatically
affected by changes in , and become clearly unrealistic when it gets different from .
An adjustment was proposed to solve this issue, consisting in using a different
generative model during the first step [11]. By applying Barabási & Albert’s
preferential attachment model (BA) [21] instead of the CM, the degree correlation and
transitivity become more stable relatively to changes in .
It is rather clear the mixing coefficient is complementary to the embeddedness
presented in section 2 (eq. 1): . Yet, it was mentioned in the same section
the embeddedness varies much from one node to the other in real -world networks,
exhibiting bimodal and flat distributions. From this point of view, the LFR model is
not realistic, since it produces networks whose nodes have all roughly the same
mixing coefficient. To solve this problem, we implemented a small adjustment
allowing to specify the complete distribution of in place of a single objective value.
3.2 Community Detection
Because of their number and great diversity, it is difficult to categorize community
detection algorithms. Here, we chose to characterize them not by considering the
process they implement, as it is usually done, but rather the definition of the
community concept they rely upon. We selected a representative set of algorithms,
favoring fast ones because of the size of the analyzed networks. We give very partial
descriptions in this section, so the reader might want to consult the review by
Fortunato [2] to find more information concerning community detection. A very
widespread informal definition of the community concept considers it as a group of
nodes densely interconnected compared to the other nodes [2, 14, 22]. In other terms,
a community is a cohesive subset clearly separated from the rest of the network.
Formal definitions differ in the way they translate and combine both these aspects of
cohesion and separation.
A direct translation of the informal definition given above consists in first
specifying two distinct measures to assess separately cohesion and separation, and
then processing an overall measure by considering their difference or ratio. This
Qualitative Comparison of Community Detection Algorithms
7
approach led to many variants, differing on how the measures are defined and
combined. The most widespread one is certainly the modularity, a chance -corrected
measure which assesses cohesion and separation through the number of intra - and
inter-community links, respectively. We selected two modularity optimization
algorithms, which differ in the way they perform this optimization. Fast Greedy
applies a basic greedy approach [3], and Louvain includes a community aggregation
step to improve processing on large networks [23].
Another family of approaches is based on node simi larity measures. Such a
measure allows translating the topological notions of cohesion and separation in terms
of intra-community similarity and inter-community dissimilarity. In other terms: a
community is viewed as a group of nodes which are similar to each other, but
dissimilar from the rest of the network. Once all node -to-node similarities are known,
detecting a community structure can be performed by applying a similarity-based
classic cluster analysis algorithm [24]. We selected the Walktrap algorithm, which
uses a similarity based on random walks and applies a hierarchical agglomerative
clustering approach [17].
Some approaches based on data compression do not use the cohesion and
separation concepts like the previous definitions. They consider the community
structure as a set of regularities in the network topology, which can be used to
represent the whole network in a more compact way. The best community structure is
supposed to be the one maximizing compactness while minimizing information loss.
The quality of the representation is assessed through measures derived from mutual
information. Algorithms essentially differ in the way they represent the community
structure and how they assess the quality of this representation. We selected the
InfoMap algorithm [25], whose representation is based on coded ids affected to nodes.
The definition of the community concept is not always explicit: procedural
approaches exist, in which the notion of community is implicitly defined as the result
of the processing. To illustrate this, we selected the MarkovCluster algorithm, which
simulates a diffusion process in the network to detect communities [26]. This
approach relies on the transfer matrix of the network, which describes the transition
probabilities for a random walker evolving in this network. Two transformations are
iteratively applied on this matrix until convergence. The resulting matrix can be
interpreted as the adjacency matrix of a network with disconnected components,
which correspond to communities in the original network.
We have to mention another family of algorithms based on link centrality. They
iteratively remove the most central links until disconnected components are obtained ,
which are interpreted as the network communities. The community structure largely
depends on the selected centrality measure, e.g. edge -betweenness [5]. However, the
computational cost of such algorithms is very high and we were not able to apply
them to our data.
8
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
4
Results and Discussion
4.1
Properties of the Generated Communities
Using our review of the literature, we selected realistic values for the parameters the
LFR model
lets us control. We used
three different network
sizes:
, constant average and maximal degrees ,
, and exponent for the degree power -law distribution. The
exponent was for the community size distribution, whose bounds were
and . The mixing coefficient was distributed uniformly over its definition
domain . We generated instances of network for each combination of
parameter values, in order to check for consistency.
Among the community-related properties we described in section 2, two are
directly controlled by the LFR model: the community size and embeddedness
distributions. Our measurements confirm on all networks that the community sizes
follow a power-law distribution as expected (cf. Fig. 1). Note the range of these sizes
varies much from one real-world network to the other, and it is therefore difficult to
describe a typical set of values. However, we can say the communities we generated
are very similar in size to those from real-world networks of comparable size. For
instance, we have communities containing between and nodes for
, which is compliant with what was observed in networks of this size [4]. For
the embeddedness, we obtained a uniform distribution, as expected. It is close enough
to what can be observed in social and information networks. The main difference is
we do not have as many nodes with very high embeddedness as in those real-world
networks. This could be easily corrected though, by specifying a more appropriate
distribution when applying the modified LFR model.
We now focus our attention on the uncontrolled properties. The results are very
similar independently from the size of the network. The only difference seems to be
that values measured on larger networks exhibit slightly smaller dispersion. For this
reason we present only results for networks with size .
The scaled density increases from to along with the community size. This
means the smallest communities are clique-like ( ), and no tree-like
communities are generated ( ). These features cannot be considered as
realistic: as mentioned before, in real-world networks the small communities are tree -
like and the large ones are either tree-like too, or much more clique-like. In other
words: real-world networks exhibit two different behaviors, but the generated
networks can be compared to none of them. It seems the links are distributed too
homogeneously over the generated networks, making small communities too dense
and large ones too sparse.
As shown in Fig. 1, the average distance increases regularly from to along
with the community size. The main difference with real-world networks is these have
a much lower average distance for smallest communities, reaching values slightly
greater than . Consequently, we do not observe for the generated networks the fast
increase of average distance which was characteristic of the real-world networks. For
the rest of the communities, the observed distribution is comparable with
Qualitative Comparison of Community Detection Algorithms
9
communication networks though, with a stable average distance for medium and large
communities. Moreover, the values measured for these communities are also realistic
in terms of magnitude.
Fig. 1. Properties of the generated communities. Each network instance is represented with a
different shape/color. Points are averages over logarithmic bins of the community size. The
dotted lines in the scaled density plot represents its limits ( and , cf. section 2).
Hub dominance is very high for the smallest communities, with values close to .
For large communities, there is no general trend in networks: the property
varies much over the networks we generated. This dispersion decreases when the
network size increases though, and networks show a hub dominance
decrease with community size increase, reaching values close to . This behavior is
compatible with most classes of real-world networks, which exhibit hubs dominance
mainly for small communities. Moreover, the same dispersion was also observed on
real-world networks [4]. This measure completely relies on the way high degree
nodes are distributed over communities, since it directly depends on the maximal
internal degree found in communities. The fact there are much less large
communities, due to their power law-distributed sizes, can explain this dispersion. A
possible solution would be to consider a measure based on the highest internal
degrees of the community instead of a single one.
To summarize our observations: the generated communities exhibit some, but not
all, of the properties observed on real-world networks. Their sizes are realistic, but the
distribution of links is not always appropriate. The small communities are too dense
and clique-like, when they should be sparser and tree-like, with a smaller average
distance. In other terms, they should be star-shaped. They possess the high hub
dominance characteristic of such structures though, but this is certainly due to their
clique-like configuration. The fact their average distance is much higher than in
comparable real-world communities is a surprise. Indeed, one would expect such
dense, hub-dominated communities to have a lower average distance. It turns out they
are constituted of a clique core and a few very low degree nodes connected to this
1011021030.00.20.40.60.81.0HubDominanceCommunitySize10110210312345AverageDistanceCommunitySize101100102ScaledDensity10−410−310−210−1100Frequency10
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
core: the latter explain the relatively high average distance. The larger communities,
on the contrary, should be substantially denser and more clique-like. In some cases,
their hub dominance is relatively low despite their small average distance and low
density, which seems to indicate they do not contain a main central hub, but several
interconnected medium ones. By definition, this feature is not reflected by the hub
dominance measure, which only considers the maximal degree in the community.
Another issue is the fact generated networks do not comply with a specific class of
real-world networks, but rather have similarities with different classes depending on
the considered property. Their average distance have common points with
communication networks, whereas this is not the case at all for their embeddedness
and hub dominance distributions, which look like social and biological networks.
Despites these limitations, the model produces what we think to be the most realistic
networks to date, which is why the generated networks constitute an appropriate
benchmark to analyze community detection algorithms.
4.2 Comparison of the Estimated Communities
We applied the selected community detection algorithms on the generated networks:
Louvain (LV), Fast Greedy (FG), MarkovCluster (MC), InfoMap (IM) and Walktrap
(WT). For time matters, it was possible to process networks with sizes and
, but not . We however generated denser networks, with
(instead of ), in order to study the effect of density. Table 1
displays the performance of each algorithm expressed in terms of Normalized Mutual
Information (NMI), which is a measure assessing the similarity of two partitions (in
our case: the reference and estimated community structures). It is considered to be a
good performance measure for community detection, and was used in several studies
[6, 7, 10]. According to the NMI, IM clearly finds the closest community structure to
the reference, followed by MC, LV, and WT, while FG is far behind. This type of
quantitative analysis is characteristic of existing works dealing with algorithms
comparison. In the rest of this section, we complete it with a qualitative analysis
based on the previously presented community properties.
We first focus on the results obtained on networks. As we can see on
Fig. 2, most algorithms have found communities whose sizes distribution is
reminiscent of the power-law used during network generation. However, important
differences exist between them. First, MC visibly finds many very small communities
( ), and the other sizes are consequently strongly under-represented. A more
thorough verification showed most of these communities are even single nodes, which
is particularly problematic since community identification consists in grouping them .
It is important to remark this does not appear on the NMI values, since MC has the
second best score. This raises a question regarding the appropriateness of this measure
to assess community detection performance. IM also finds some small communities,
but much less than MC, and the rest of the distribution is more similar to the
reference. Compared to the reference and the other algorithms, communities detected
by FG and LV have sizes distributed rather uniformly. Interestingly, these two
algorithms have very different performances in terms of NMI, so despite the relatively
Qualitative Comparison of Community Detection Algorithms
11
similar sizes of their communities, their community structures are probably very
different too. For WT, the size distribution is very close to the reference. Again, this
fact alone is not equivalent to a high NMI value, since its performance is substantially
lower to IM.
Table 1. Algorithms performances, as measured with the Normalized Mutual Information.
Algorithm
, ,
Louvain
Fast Greedy
MarkovCluster
InfoMap
Walktrap
For the embeddedness, MC and WT are clearly different from the reference,
displaying a distribution with very few extreme embeddedness values. The small
numbers of highly embedded nodes and the fact almost half the nodes have very low
embeddedness with MC seems to be linked to the community size distribution. Many
of the smallest communities identified by MC are certainly grouped together in the
reference, leading to a smaller number of intercommunity links. Compared to the
reference, WT does not contain nodes with low embeddedness, whereas it has more
nodes with medium embeddedness. In this case, it cannot be related to the community
sizes though, since they are comparable to those of the reference. Maybe the lack of
low embeddedness nodes can be interpreted as a failure to classify interface nodes,
located at the limit of their community and largely connected with other commu nities.
The embeddedness distributions observed for FG and LV are again very similar. They
also lack low embeddedness nodes, but not as much as WT . Finally, IM presents the
values the most similar to the reference.
When considering the scaled density (Fig. 2), IM, MC and WT are very close to
the reference, except IM and MC present very low values for their smallest
communities (meaning these are tree-like). For FG and LV, the scaled density is
relatively stable, and does not present the slow increase which is characteristic of the
reference. This can be interpreted as the fact the communities detected by these
algorithms all present the same structure, independently from their size.
The average distances measured on the FG and LV communities are much
dispersed and do not follow the evolution observed for the reference. FG, in
particular, has a much higher average distance than the reference and the other
algorithms. This property is a good indicator of cohesion, so it seems this quality is
absent from the communities identified by FG. The remaining algorithms (IM, MC,
WT) are very close to the reference. IM displays two outliers though: the average
distance is surprisingly high for its smallest and largest communities.
For hub dominance, IM, MC and WT seem to follow the reference, with a positive
bias. The fact these algorithms have slightly higher scaled -density and lower hub
dominance, relatively to the reference, is consistent with their slightly lower average
distance. The inverse observation is valid for the smallest and largest communities
12
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
detected by IM: sparse and non-centralized communities lead to high average
distance. FG and LV once again display similar behaviors, with hub dominance
values clearly bellow the reference. When also considering their stable scaled density,
this can explain their increasing average distance.
Fig. 2. Properties of the detected communities. Each shape/color corresponds to a different
algorithm, whereas the reference is represented by a solid line. Points are averages over
logarithmic bins of the community size. The dotted lines in the scaled density plot represent the
limits of this property, as in Fig. 1.
The topological analysis of the estimated community structures gives a new
perspective to the quantitative performance measures. The communities detected by
IM, the best algorithm in terms of NMI, are unsurprisingly very close to the reference
ones. However, MC, the second algorithm and not far from IM, presents a very
different community structure, characterized by much more very small communities.
On the contrary, most of the properties of the communities identified by WT are very
similar to the reference. It only differs clearly in terms of embeddedness distribution,
which is apparently sufficient to rank it only fourth in terms of NMI , relatively far
from IM. It thus seems there is no equivalence between a high NMI value and a
community structure with properties close to the reference. We conclude both
approaches are complementary to perform a relevant analysis of community detection
results. It is worth noticing LV and FG, both based on modularity optimization,
1011021030.00.20.40.60.81.0HubDominanceCommunitySize10110210312345AverageDistanceCommunitySize101102103ScaledDensityCommunitySize10110010200.20.40.60.8110−310−210−1100EmbeddednessFrequency10110210310−510−410−310−210−1100FrequencyCommunitySizeReferenceLouvainFastGreedyMarkovClusterInfoMapWalktrapQualitative Comparison of Community Detection Algorithms
13
comparably differ from the reference, which confirms the importance of considering
the community definition which characterizes an algorithm.
Fig. 3. Community size distributions for size networks, with (left) and
(right). Shapes/colors meaning is the same as in Fig. 2, and points are also averages over
logarithmic bins of the community size.
On size networks, FG and LV find communities much larger than the
reference ones, as shown in Fig. 3. For these algorithms, roughly ranges from
to , when it goes from to in the reference. Both are based on
modularity optimization, so this might be due to the resolution limit characteristic of
this measure [27], which prevents them from finding smaller communities. IM is
relatively close to the reference, but not as much as it is on networks. WT
is also very similar to the reference, but it departs from it by finding a very large
community ( ). MC results are relatively similar to those obtained on the
networks, i.e. it finds many very small communities. In order to separate
the effects of network size and density on the algorithms, we generated additional
networks with the same size, but maximal degree (instead of ).
This reduces slightly the overestimation of FG and LV community sizes, whereas MC
has roughly the same results. On the contrary, IM and WT properties are excellent,
they follow almost perfectly the reference values.
5
Conclusion
In this study, we took advantage of recent advances relative to the characterization of
community structures in complex networks to tackle two questions: 1) Do artificial
networks used as benchmark exhibit real-world community properties? 2) How do
community detection algorithms compare in qualitative terms, by opposition to the
usual quantitative measurement of their performances. We first applied a variant of
the LFR model [6] to generate a set of artificial networks with realistic parameters
retrieved from the literature. We studied their properties and concluded some of them
are realistic (community sizes, hub dominance), some are only partly realistic
(embeddedness, average distance), and others are not realistic at all (scaled density).
We then applied on these networks a representative set of five fast community
detection algorithms: Fast Greedy, InfoMap, Louvain, MarkovCluster and Walktrap.
101102103104CommunitySize10110210310410−510−410−310−210−1100FrequencyCommunitySize14
Günce Keziban Orman1,2, Vincent Labatut1 and Hocine Cherifi2
It turns out the performance assessed quantitatively through the widely used
Normalized Mutual Information (NMI) measure does not necessarily agree with a
qualitative analysis of the identified communities. On the one hand, MarkovCluster,
ranked second in terms of NMI, actually found an extremely large number of very
small communities and almost no large community. On the other hand, the properties
of the community structure estimated by Walktrap are very close from the reference
ones, but the algorithm comes fourth in terms of NMI, with a score relatively far from
MarkovCluster’s one. It therefore seems both approaches should be applied to
perform a relevant comparison of the algorithms.
Our contributions are as follow. First, we introduced a slight modification to the
LFR model, in order to make the embeddedness distribution more realistic in the
generated networks. Second, we studied these generated networks in terms of
community-centered properties. This complements some previous analyses focusing
on network-centered properties such as transitivity or degree correlation [6, 10, 11].
Third, we applied several community detection algorithms on these networks and
characterized their results relatively to the same community-centered properties.
Previous studies adopted a quantitative approach based on some performance measure
[6, 7, 10, 11, 18].
Our work can be extended in various ways. First, it seems necessary to either
increase the realism of the LFR model or to define a completely new approach able to
generate more realistic networks. Second, by lack of time, we could test only a few
algorithms, on a few relatively large networks. A more thorough analysis would
consist in using much larger networks, with more repetitions to improve statistical
significance. Moreover, applying several algorithms relying on the same definition of
the community concept would allow to compare their properties and maybe associate
a certain type of community structure to a certain family of algorithms. It could
additionally be interesting to use other performance measures than the NMI to assess
their relevance with the studied topological properties. Third, it would noticeably be
interesting to apply classic network-wise measures to communities (transitivity,
degree correlation, centrality, etc.), and to consider additional community specific
measures, such as those designed in [13], which seem complementary to the
embeddedness, and the concept of community profile [12], although this one looks
particularly costly from a computational point of view.
Acknowledgments. This project is supported by the Galatasaray University Research
Fund.
References
1. da Fontura Costa, L., Oliveira Jr., O.N., Travieso, G., Rodrigues, r.A., Villas Boas , P.R.,
Antiqueira, L., Viana, M.P., da Rocha, L.E.C.: Analyzing and Modeling Real -World
Phenomena with Complex Networks: A Survey of Applications. arXiv physics.soc -ph,
0711.3199 (2008)
2. Fortunato, S.: Community Detection in Graphs. Phys Rep 486, 75 -174 (2010)
Qualitative Comparison of Community Detection Algorithms
15
3. Newman, M.E.J., Girvan, M.: Finding and Evaluating Community Structure in Networks.
Phys Rev E 69, 026113 (2004)
4. Lancichinetti, A., Kivelä, M., Saramäki, J., Fortunato, S.: Characterizing the Community
Structure of Complex Networks. PLoS ONE 5, e11976 (2010)
5. Girvan, M., Newman, M.E.J.: Community Structure in Social and Biological Networks.
PNAS 99, 7821-7826 (2002)
6. Lancichinetti, A., Fortunato, S., Radicchi, F.: Benchmark Graphs for Testing Community
Detection Algorithms. Phys Rev E 78, 046110 (2008)
7. Danon, L., Diaz-Guilera, A., Arenas, A.: The Effect of Size Heterogeneity on Community
Identification in Complex Networks. J Stat Mech 11010 (2006)
8. Newman, M.E.J.: The Structure and Function of Complex Networks. SIAM Rev 45, 167 -
256 (2003)
9. Guimerà, R., Danon, L., Díaz-Guilera, A., Giralt, F., Arenas, A.: Self-Similar Community
Structure in a Network of Human Interactions. Phys Rev E 68, 065103 (2003)
10. Orman, G.K., Labatut, V.: A Comparison of Community Detection Algorithms on Artificial
Networks. Lecture Notes in Artificial Intelligence 5808, 242–256 (2009)
11. Orman, G.K., Labatut, V.: The Effect of Network Realism on Community Detection
Algorithms. In: ASONAM, 301-305, Odense, DK (2010)
12. Leskovec, J., Lang, K.J., Dasgupta, A., Mahoney, M.W.: Statistical Properties of
Community Structure in Large Social and Information Networks. In: WWW, ACM, Beijing,
CN (2008)
13. Guimerà, R., Amaral, L.A.N.: Functional Cartography of Complex Metabolic Networks.
Nature 433, 895-900 (2005)
14. Newman, M.E.J.: Detecting Community Structure in Networks. Eur Phys J B 38, 321 -330
(2004)
15. Palla, G., Derenyi, I., Farkas, I., Vicsek, T.: Uncovering the Overlapping Community
Structure of Complex Networks in Nature and Society. Nature 435, 814 -818 (2005)
16. Erdõs, P., Rényi, A.: On Random Graphs. Publ Math 6, 290 -297 (1959)
17. Pons, P., Latapy, M.: Computing Communities in Large Networks Using Random Walks.
LNCS 3733, 284-293 (2005)
18. Bagrow, J.P.: Evaluating Local Community Methods in Networks. J Stat Mech - (2008)
19. Lancichinetti, A., Fortunato, S.: Community Detection Algorithms: A Comparative
Analysis. Phys Rev E 80, 056117 (2009)
20. Molloy, M., Reed, B.: A Critical Point for Random Graphs with a Given Degree Sequence.
Random Structures and Algorithms 6, 161-179 (1995)
21. Barabási, A.-L., Albert, R.: Emergence of Scaling in Random Networks. Science 286, 509
(1999)
22. Danon, L., Duch, J., Arenas, A., Díaz-Guilera, A.: Community Structure Identification.
Large Scale Structure and Dynamics of Complex Networks: From Information Technology
to Finance and Natural Science, 93-113. World Scientific (2007)
23. Blondel, V.D., Guillaume, J.-L., Lambiotte, R., Lefebvre, E.: Fast Unfolding of
Communities in Large Networks. J Stat Mech P10008 (2008)
24. Gan, G.a.M., C. and Wu, J.: Data Clustering: Theory, Algorithms, and Applications. Society
for Industrial and Applied Mathematics, Philadelphia, US-PA (2007)
25. Rosvall, M., Bergstrom, C.T.: Maps of Random Walks on Complex Networks Reveal
Community Structure. PNAS 105, 1118 (2008)
26. van Dongen, S.: Graph Clustering Via a Discrete Uncoupling Process. SIAM J Matrix Anal
Appl 30, 121-141 (2008)
27. Fortunato, S., Barthelemy, M.: Resolution Limit in Community Detection. PNAS 104, 36 -
41 (2007)
|
1302.2376 | 1 | 1302 | 2013-02-10T22:29:35 | Modeling Morphology of Social Network Cascades | [
"cs.SI",
"physics.soc-ph"
] | Cascades represent an important phenomenon across various disciplines such as sociology, economy, psychology, political science, marketing, and epidemiology. An important property of cascades is their morphology, which encompasses the structure, shape, and size. However, cascade morphology has not been rigorously characterized and modeled in prior literature. In this paper, we propose a Multi-order Markov Model for the Morphology of Cascades ($M^4C$) that can represent and quantitatively characterize the morphology of cascades with arbitrary structures, shapes, and sizes. $M^4C$ can be used in a variety of applications to classify different types of cascades. To demonstrate this, we apply it to an unexplored but important problem in online social networks -- cascade size prediction. Our evaluations using real-world Twitter data show that $M^4C$ based cascade size prediction scheme outperforms the baseline scheme based on cascade graph features such as edge growth rate, degree distribution, clustering, and diameter. $M^4C$ based cascade size prediction scheme consistently achieves more than 90% classification accuracy under different experimental scenarios. | cs.SI | cs | Modeling Morphology of Social Network Cascades
Department of Computer Science and Engineering, Michigan State University, East Lansing, MI, USA
M. Zubair Shafiq and Alex X. Liu
{shafiqmu,alexliu}@cse.msu.edu
3
1
0
2
b
e
F
0
1
]
I
S
.
s
c
[
1
v
6
7
3
2
.
2
0
3
1
:
v
i
X
r
a
ABSTRACT
Cascades represent an important phenomenon across vari-
ous disciplines such as sociology, economy, psychology, po-
litical science, marketing, and epidemiology. An important
property of cascades is their morphology, which encompasses
the structure, shape, and size. However, cascade morphol-
ogy has not been rigorously characterized and modeled in
prior literature.
In this paper, we propose a Multi-order
Markov Model for the Morphology of Cascades (M 4C) that
can represent and quantitatively characterize the morphol-
ogy of cascades with arbitrary structures, shapes, and sizes.
M 4C can be used in a variety of applications to classify
different types of cascades. To demonstrate this, we apply
it to an unexplored but important problem in online social
networks -- cascade size prediction. Our evaluations using
real-world Twitter data show that M 4C based cascade size
prediction scheme outperforms the baseline scheme based
on cascade graph features such as edge growth rate, degree
distribution, clustering, and diameter. M 4C based cascade
size prediction scheme consistently achieves more than 90%
classification accuracy under different experimental scenar-
ios.
Categories and Subject Descriptors
C.4 [Computer System Organization]: Performance of
Systems -- Modeling techniques; J.4 [Computer Applica-
tions]: Social and Behavioral Sciences
General Terms
Experimentation, Measurement, Theory
Keywords
Cascades, Markov Chains, Social Networks
Permission to make digital or hard copies of all or part of this work for
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific
permission and/or a fee.
Copyright 2013 ACM X-XXXXX-XX-X/XX/XX ...$10.00.
1.
INTRODUCTION
1.1 Background and Motivation
The term cascade describes the phenomenon of something
propagating along the links in a social network. That some-
thing can be information such as a URL, action such as a
monetary donation, influence such as buying a product, dis-
cussion such as commenting on a blog article, and a resource
such as a torrent file. Based on what is being propagated, we
can categorize cascades into various classes such as informa-
tion cascades [6], action cascades [8], influence cascades [20],
discussion cascades [13], and resource cascades [33]. Con-
sider a toy example where user A, connected to users B and
C in a social network, broadcasts a piece of information (e.g.
a picture or a news article) to his neighbors. Users B and
C, after receiving it from user A, may further rebroadcast
it to their neighbors resulting in the formation of a cascade.
Cascade phenomenon has been a fundamental topic in
many disciplines such as sociology, economy, psychology, po-
litical science, marketing, and epidemiology with research
literature tracing back to the 1950s [30]. A key challenge
in these studies is the lack of large scale cascade data.
As online social networks have recently become a primary
way for people to share and disseminate information, the
massive amount of data available on these networks pro-
vides unprecedent opportunities to study cascades at a large
scale. Recent events, such as the Iran election protests, Arab
Spring, Japanese earthquake, and London riots, have been
significantly impacted by campaigns via cascades in online
social networks [36, 27, 10]. Studying cascades in online so-
cial networks will benefit a variety of domains such as social
campaigns [36], product marketing and adoption [25], online
discussions [13], sentiment flow [26], URL recommendation
[29], and meme tracking [14].
1.2 Problem Statement
The goal of this paper is to study the morphology of cas-
cades in online social networks. Cascade morphology en-
compasses many aspects of cascades such as their structures,
shapes, and sizes. Specifically, we aim to develop a model
that allows us to represent and quantitatively characterize
cascade morphology; which are extremely difficult without
a model. There are two important requirements on the de-
sired model of cascade morphology. First, this model should
have enough expressivity and scalability to allow us to repre-
sent and describe cascades with arbitrary structures, shapes,
and sizes. Real-world cascades sometimes have large sizes,
containing thousands of nodes and edges [22]. Second, this
model should allow us to quantitatively characterize and rig-
orously analyze cascades based on the features extracted
from this model.
1.3 Limitations of Prior Art
Despite the numerous publications regarding different as-
pects of online social networks, little work has been done on
the morphology of cascades. Recently some researchers have
studied the structure of cascades [23, 22, 36, 13]; however,
their analysis of cascade structures is limited to basic struc-
tural properties such as degree distribution, size, and depth.
These structural properties of cascades are important; how-
ever, they are far from being sufficient to precisely describe
and represent cascade morphology.
1.4 Proposed Model
In this paper, we propose a Multi-order Markov Model
for the Morphology of Cascades (M 4C) that can represent
and quantitatively characterize the morphology of cascades
with arbitrary structures, shapes, and sizes. M 4C has two
key components: a cascade encoding algorithm and a cas-
cade modeling method. The cascade encoding algorithm
uniquely encodes the morphology of a cascade for quantita-
tive representation. It encodes a cascade by first perform-
ing a depth-first traversal on the cascade graph and then
compressing the traversal results using run-length encoding.
The cascade modeling method models the run-length en-
coded sequence of a cascade as a discrete random process.
This random process is further modeled as a Markov chain,
which is then generalized into a multi-order Markov chain
model. M 4C satisfies the aforementioned two requirements.
First, this model can precisely represent cascades with arbi-
trary structures, shapes, and sizes. Second, this model al-
lows us to quantitatively characterize cascades with different
attributes using the state information from the underlying
multi-order Markov chain model.
1.5 Experimental Evaluation
To demonstrate the effectiveness of our M 4C model in
quantitatively characterizing cascades, we use it to investi-
gate an unexplored but important problem in online social
networks -- cascade size prediction: given the first τ1 edges in
a cascade, we want to predict whether the cascade will have
a total of at least τ2 (τ2 > τ1) edges over its lifetime. This
prediction has many real-world applications. For example,
media companies can use it to predict social media stories
that can potentially go viral [15, 29]. Furthermore, solving
this problem enables early detection of epidemic outbreaks
and political crisis. Despite its importance, this problem has
not been addressed in prior literature.
We validate the effectiveness of M 4C based cascade size
prediction scheme on a real-world data set collected from
Twitter containing more than 8 million tweets, involving
more than 200 thousand unique users. The results show
that our M 4C based cascade size prediction scheme consis-
tently achieves more than 90% classification accuracy under
different experimental scenarios. We also compare our M 4C
based cascade size prediction scheme with a baseline predic-
tion scheme based on cascade graph features such as edge
growth rate, degree distribution, clustering, and diameter.
The results show that M 4C allows us to achieve significantly
better classification accuracy than the baseline method.
1.6 Key Contributions
In this paper, we not only propose the first cascade mor-
phology model, but also propose the first cascade size pre-
diction scheme based on our model. In summary, we make
the following key contributions in this paper.
1. We propose M 4C for representing and quantitatively
characterizing the morphology of cascades with arbi-
trary structures, shapes, and sizes.
2. To demonstrate the effectiveness of our M 4C model in
quantitatively characterizing cascades, we develop a
cascade size prediction scheme based on M 4C features
and compare its performance with that based on non-
M 4C features.
The rest of this paper proceeds as follows. We first review
related work in Section 2. We then introduce our proposed
model in Section 3. We describe the details of our Twitter
data set in Section 4. We present the experimental results
of the aforementioned application in Section 5. Finally, we
conclude in Section 6 with an outlook to our future work.
2. RELATED WORK
Cascades in online social networks have attracted much
attention and investigation; however, little work has been
done on cascade morphology. Below we summarize the prior
work related to cascade morphology.
2.1 Shape
Zhou et al. studied Twitter posts (i.e., tweets) about the
Iranian election [36]. In particular, they studied the fre-
quency of pre-defined shapes in cascades. Their experimen-
tal results showed that cascades tend to have more width
than depth. The largest cascade observed in their data has
a depth of seven hops. Leskovec et al. studied patterns in
the shapes and sizes of cascades in blog and recommenda-
tion networks [24, 23]. Their work is also limited to studying
the frequency of fixed shapes in cascades.
2.2 Structure
Kwak et al. investigated the audience size, tree height, and
temporal characteristics of the cascades in a Twitter data set
[22]. Their experimental results showed that the audience
size of a cascade is independent of the number of neighbors
of the source of that cascade. They found that about 96%
of the cascades in their data set have a height of 1 hop and
the height of the biggest cascade is 11 hops. They also found
that about 10% of cascades continue to expand even after
one month since their start. Romero et al. specifically stud-
ied Twitter cascades with respect to hashtags in terms of
degree distribution, clustering, and tie strengths [31]. The
results of their experiments showed that cascades from di-
verse topics (identified using hashtags), such as sports, mu-
sic, technology, and politics, have different characteristics.
Similarly, Rodrigues et al. studied structure-related proper-
ties of Twitter cascades containing URLs [29]. They stud-
ied cascade properties like height, width, and the number
of users for cascades containing URLs from different web
domains. Sadikov et al. investigated the estimation of the
sizes and depths of information cascades with missing data
[32]. Their estimation method uses multiple features includ-
ing the number of nodes, the number of edges, the number
(a) Follower Graph
(b) Cascade
(c) Depth First Tree
Figure 1: Toy example of cascade construction and encoding.
of isolated nodes, the number of weakly connected compo-
nents, node degree, and non-leaf node out-degree. Their em-
pirical evaluation using a Twitter data set showed that their
method accurately estimates cascade properties for varying
fractions of missing data.
2.3 Simulation
Gomez et al. studied the structure of discussion cascades
in Wikipedia, Slashdot, Barrapunto, and Meneame using
features solely based on the depth and degree distribution of
cascades [13]. They also developed a generative model based
on the maximum likelihood estimation of preferential at-
tachment process to simulate synthetic discussion cascades.
However, their model does not capture morphological prop-
erties of cascades and is limited to generation of synthetic
discussion cascades.
3. PROPOSED MODEL
In this section, we present M 4C for quantitatively repre-
senting the morphology of cascades in online social networks.
It consists of two major components. The first component
encodes a given cascade graph for quantitative represen-
tation such that its morphological information is retained.
The second component models the encoded sequence using
a multi-order Markov chain. Before we describe these two
components, we first present the details of the cascade graph
construction process.
3.1 Cascade Graph Construction
A social network can be represented using two graphs, a
relationship graph and a cascade graph. Both graphs share
the same set of nodes (or vertices) V , which represents the
set of all users in a social network. A relationship graph rep-
resents the relationships among users in a social network.
In this graph, nodes represent users and edges represent the
relationship among users. If the edges are directed, where a
directed edge from user u to user v denotes that v is a fol-
−→
lower of u, then this graph is called a follower graph, denoted
Ef is the set of
as (V,
directed edges. If the edges are undirected, where an undi-
rected edge between user u and user v denotes that u and
v are friends, then this graph is called a friendship graph,
−→
Ef ), where V is the set of users and
denoted as (V, Ef ), where V is the set of users and Ef is the
−→
set of undirected edges. By the nature of our study, we focus
on the follower graph denoted as Gf = (V,
Ef ). The cascade
graph represents the dynamic activities that are taking place
in a social network (such as users sharing a URL or joining a
−→
group). A cascade graph is an acyclic directed graph denoted
as Gc = (V,
Ec is a set
of directed edges where a directed edge e = (u, v) from user
u to user v represents the propagation of something from
Ec
and output is the time when the propagation along edge e
happens.
u to v, and T is a function whose input is an edge e ∈ −→
−→
Ec, T ) where V is the set of users,
While the static relationship graph is easy to construct
from a social network, the dynamic cascade graph is non-
trivial to construct because there maybe multiple propaga-
tion paths from the cascade source to a node. So far there
is no consensus on cascade graph construction in prior liter-
ature. In this paper, we use a construction method that is
similar to the method described in [32]. We next explain our
construction method through a Twitter example. Consider
the follower graph in Figure 1(a). Let (u, t) denote a user u
performing an action, such as posting a URL on u's Twit-
ter profile, at time t. Suppose the following actions happen
in the increasing time order: (A, t1), (B, t2), (D, t3), (C, t4),
(E, t5), where t1 < t2 < t3 < t4 < t5. Suppose (A, t1) de-
notes that A posts a URL on his Twitter profile, and all
other actions (namely (B, t2), (D, t3), (C, t4), and (E, t5))
are reposting the same URL from A.
The cascade graph regarding the propagation of this URL
is constructed as follows. First, A is the root of the cascade
graph because it is the origin of this cascade. Second, B
reposting A's tweet (which is a URL in this example) at
time t2 must be under A's influence because there is only
one path from A to B in the follower graph in Figure 1(a).
Therefore, in the cascade graph in Figure 1(b), there is an
edge from A to B with time stamp t2. Note that each repost
(or retweet in Twitter's terminology) contains the origin of
the tweet (A in this example). Third, however, D reposting
A's tweet at time t3 could be under either A's influence
(because there is a path from A to D in the follower graph in
Figure 1(a) and t1 < t3) or B's influence (because there is a
path from B to D in the follower graph as well and t2 < t3).
Note that even if D sees A's tweet through B's retweet,
the repost of A's tweet on D's profile does not contain any
information about B and only shows that the origin of the
tweet is A. In this scenario, we assume that D is partially
influenced by both A and B, instead of assuming that D is
influenced by either user B or A, because this way we can
retain more information with respect to the corresponding
follower graph. Therefore, there is an edge from A to D and
another edge from B to D in the cascade graph shown in
Figure 1(b), where the time stamps of both edges are t3.
Similarly, we add the edge from B to C with a time stamp
t4 and the edge from D to E with a time stamp t5 in the
cascade graph.
3.2 Cascade Encoding
The first step in cascade encoding is to encode the con-
structed cascade graph as a binary sequence that uniquely
represents the structure of the cascade graph. Graph encod-
ing has been studied for a wide range of problems across
several domains such as image compression, text and speech
recognition, and DNA profiling [28, 3, 16]. The typical goal
of graph encoding is to transform large geometric data into a
succinct representation for efficient storage and processing.
However, our goal here is to encode a given cascade graph
in a way that its morphological information is captured. To-
wards this end, we use the following graph encoding algo-
rithm.
We first conduct a depth-first traversal of the constructed
cascade graph starting from the root node, which results
in a spanning tree. To result in a unique spanning tree,
at each node in the cascade graph, we sort the outgoing
edges in the increasing order of their time stamps, i.e.,
sort the outgoing edges e1, e2,··· , ek of a node so that
T (e1) < T (e2) < ··· < T (ek); and then traverse them in this
order. For each edge, we use 1 to encode its downward traver-
sal and 0 to encode its upward traversal. Figure 1(c) shows
the traversal of the cascade graph in Figure 1(b) and the
encoding of each downward or upward traversal. The binary
−→
encoding results from this traversal process is 11011000. Let
C represent the binary code of a cascade graph G = (V,
E ).
Then the length of the binary code C is always twice the
size of the edge set −→
E. Furthermore, let
C[i] be the i-th element of the binary code and I(C[i]) be
an indicator function so that I(C[i]) = 1 if C[i] = 1, and
I(C[i]) = −1 if C[i] = 0. Because each edge is exactly tra-
versed twice, one downward and one upward, we have:
E, i.e., C = 2−→
C(cid:88)
I(C[i]) = 0.
i=1
The second step in cascade encoding is to convert the bi-
nary sequence, which is obtained from the depth-first traver-
sal of the cascade graph, into the corresponding run-length
encoding. A run in a binary sequence is a subsequence where
all bits in this subsequence are 0s (or 1s) but the bits before
and after the subsequence are 1s (or 0s), if they exist. By
replacing each run in a binary sequence with the length of
the run, we obtain the run-length encoding of the binary se-
quence [19]. For example, for the binary sequence 11011000,
the corresponding run-length encoding is 2123. Since the bi-
nary sequence obtained from our depth-first traversal of a
cascade graph always starts with 1, the run-length encoding
uniquely and compactly represents the binary sequence.
3.3 Markov Chain Model of Cascades
We want to model cascade encoding to capture charac-
teristics of cascades so that they can be used to identify
the similarities and differences among cascades. This model
should allow us to extract morphological features for differ-
ent classes of cascades and then use these features to classify
them. We first present our model, and then demonstrate its
usefulness in classifying cascades.
Consider the run-length encoded sequence C of a cascade
graph G. We can model this sequence using a discrete ran-
dom process { Ck}, k = 1, 2, ..., C. Basic analysis of this pro-
cess reveals that there is some level of dependencies among
the consecutive symbols emitted by the random process. In
other words, it would be unreasonable to assume that the
process is independent or memoryless. Meanwhile, to bal-
ance between capturing some of the dependencies within
the process and to simplify the mathematical treatment of
this encoded sequence, we resort to invoking the Markovian
assumption [5]. As we show later, this assumption can be
reasonably justified (to some extent) by analyzing the au-
tocorrelation function of the underlying process { Ck}. For
a first order Markov process, this implies the following as-
sumption: P r[ Cn = cn C1 = c1, C2 = c2, ..., Cn−1 = cn−1] =
P r[ Cn = cn Cn−1 = cn−1]. Equivalently:
P r[c1, c2, ..., cn] = P r[c1]P r[c2c1]...P r[cncn−1].
(1)
In other words, we invoke the Markovian assumption about
the underlying cascade process and its morphology, which is
represented by the encoded sequence C.
Given the Markovian assumption with homogeneous time-
invariant transition probabilities, C can be represented using
a traditional Markov chain. Figure 2 shows the Markov chain
corresponding to the toy example in Figure 1, where each
unique symbol in C is represented as a state. The Markov
chain in Figure 2 has 3 states because there are 3 unique
symbols in its run-length encoding.
Figure 2: Markov chain model for the toy example.
A Markov chain can also be specified in terms of its state
transition probabilities, denoted as T . Hence, for the toy
example of Figure 2, we have:
P11 P12 P13
P21 P22 P23
P31 P32 P33
,
T =
where Pij represents the conditional probabilities P r[ Cn =
i Cn−1 = j]. The Markov chain framework allows us to quan-
231P12P31P23P13P11P22P33P21P31tify the probability of an arbitrary sequence of states by us-
ing Equation 1. This will help us to identify sequences that
are more (or less) probable in one class of cascades. We next
further generalize the above basic Markov chain model.
3.4 Multi-order Generalization
Each element of the state transition matrix of a Markov
chain is equivalent to a sub-sequence of C, which in turn is
equivalent to a subgraph of the corresponding cascade. We
can generalize a Markov chain model by incorporating multi-
ple consecutive transitions as a single state in the state tran-
sition matrix, which will allow us to specify arbitrary sized
subgraphs of cascades. Such generalized Markov chains are
called multi-order Markov chains and are sometimes referred
to as full-state Markov chains [21]. The order of a Markov
chain represents the extent to which past states determine
the present state. The basic Markov chain model introduced
earlier is of order 1.
Autocorrelation is an important statistic for selecting ap-
propriate order for a Markov chain model [5]. For a given
lag t, the autocorrelation function of a stochastic process,
Xm (where m is the time or space index), is defined as:
E{X0Xt} − E{X0}E{Xt}
,
ρ[t] =
σX0 σXt
(2)
where E(·) represents the expectation operation and σXi is
the standard deviation of the random variable at time or
space lag i. The value of the autocorrelation function lies
in the range [−1, 1], where ρ[t] = 1 indicates perfect cor-
relation at lag t and ρ[t] = 0 means no correlation at lag
t. Figure 3 plots the sample autocorrelation function of the
run-length encoding of an example cascade. The dashed hor-
izontal lines represent the 95% confidence envelope. For this
particular example, we observe that sample autocorrelation
values jump outside the confidence envelope at lag = 3. This
indicates that the underlying random process has the third
order dependency. Thus, we select the third order for Markov
chain model for this particular cascade. The autocorrelation-
based analysis of more complex cascades can lead to even
higher order Markov chains.
Figure 3: Sample autocorrelation function for the
toy example.
The number of possible states of a Markov chain increase
exponentially with an increase in the order of the Markov
chain model. For the n-th order extension of a Markov chain
with k states, the total number of states is kn. Figure 4 shows
the plot of the second order extension of the 3-state, 1-st
order Markov chain model shown in Figure 2. This second
order Markov chain contains a total of 32 = 9 states, 4
of which are shown in the figure due to space limitations.
In this second order Markov chain model, the conditional
probabilities are in the form Pi,jk,l and the state transition
matrix is now defined as follows.
T2 =
P1,11,1 P1,11,2 P1,11,3
P1,21,1 P1,21,2 P1,21,3
P1,31,1 P1,31,2 P1,31,3
.
.
.
.
.
.
P3,21,1 P3,21,2 P3,21,3
P3,31,1 P3,31,2 P3,31,3
... P1,13,3
... P1,23,3
... P1,33,3
. . .
. . .
... P3,23,3
... P3,33,3
.
.
Figure 4: Multi-order generalization of the Markov
chain model for the toy example.
For a set of cascade encoding sequences, let T denote the
set of selected orders as per the aforementioned criterion.
We select the maximum value in T, denoted by Tmax, as
the order of a single Markov chain model that we want to
employ.
3.5 Cascade Classification
As mentioned in Section 1.2, an important desirable prop-
erty for our proposed model is to identify differentiating fea-
tures of cascade morphology that can be potentially lever-
aged for automated classification of cascades. We now show
how to use the aforementioned Markov chain model to clas-
sify cascades.
3.5.1 Feature Selection
The essence of our modeling approach is to capture the
morphology of a cascade through the states of the multi-
order Markov model. Each state in the Markov chain repre-
sents a likely sub-structure of cascades' morphology. Thus,
we can use these states to serve as underlying features that
can be used to characterize a given cascade and to determine
the class that it might belong to. However, as mentioned
earlier, the number of states in a Markov chain increase ex-
ponentially for higher orders and so does the complexity
of the underlying model. Furthermore, higher order Markov
05101520−0.4−0.200.20.40.60.8LagSample Autocorrelation1,21,31,1P1,11,2P1,21,1P1,31,2P1,31,1P1,21,3P1,11,33,3P3,31,1...P1,13,3P3,31,2P3,31,3P1,33,3P1,23,3P1,11,1P1,21,2P1,31,3P3,33,3chains require a large amount of training data to identify a
subset of states that actually appear in the training data.
In other words, a Markov chain model trained with limited
data is typically sparse. Therefore, we use the following two
approaches to systematically reduce the number of states in
the Markov chain of order Tmax.
First, we can combine multiple states in the Markov chain
to reduce its number of states. By combining states in a
multi-order Markov chain, we are essentially using states
from lower order Markov chains. We need to establish a
criterion to combine states in the Markov chain. Towards
this end, we use the concept of typicality of Markov chain
states. Typicality allows us to identify a typical subset of
Markov chain states by generating its realizations [5]. Be-
fore delving into further details, we first state the well-
known typicality theorem below: For any stationary and
irreducible Markov process X and a constant c, the se-
quence x1, x2, ..., xm is almost surely (n, )-typical for every
n ≤ c log m as m → ∞. A sequence x1, x2, ..., xm is called
(n, )-typical for a Markov process X if P (x1, x2, ..., xn) = 0,
whenever P (x1, x2, ..., xn) = 0, and
(cid:12)(cid:12)(cid:12)(cid:12) < , when P (x1, x2, ..., xn) > 0.
− 1
(cid:12)(cid:12)(cid:12)(cid:12) P (x1, x2, ..., xn)
P (x1, x2, ..., xn)
Here P (x1, x2, ..., xn) and P (x1, x2, ..., xn) are the empirical
relative frequency and the actual probability of the sequence
x1, x2, ..., xn, respectively. In other words,
P (x1, x2, ..., xn) ≈ P (x1, x2, ..., xn).
This theorem shows us a way of empirically identifying typ-
ical sample paths of arbitrary length for a given Markov
process. Based on this theorem, we generate realizations (or
sample paths) of arbitrary lengths from the transition ma-
trix of the Markov process. By generating a sufficiently large
number of sample paths of a given length, we can identify
a relatively small subset of sample paths that are typical.
Using this criterion, we select a subset of up to top-100, 000
typical states as potential features, whose lengths vary in
the range [0, Tmax]. In what follows, we further short-list
the Markov states from the top-100, 000 typical subset and
use them as features to classify cascades.
Second, to further reduce the number of features to be
employed in a classifier, we need to prioritize the aforemen-
tioned typical Markov states. The prioritization of features
can be based on their differentiation power. An information
theoretic measure that can be used to quantify the differ-
entiation power of features (Markov states in our case) is
information gain [7]. In this context, information gain is the
mutual information between a given feature Xi and the class
variable Y . For a given feature Xi and the class variable Y ,
the information gain of Xi with respect to Y is defined as:
IG(Xi; Y ) = H(Y ) − H(Y Xi),
where H(Y ) denotes the marginal entropy of the class vari-
able Y and H(Y Xi) represents the conditional entropy of
Y given feature Xi. In other words, information gain quan-
tifies the reduction in the uncertainty of the class variable
Y given that we have complete knowledge of the feature Xi.
Note that, in this paper, the class variable Y is {0, 1} because
we apply our morphology modeling framework to problems
that require differentiating between two classes of cascades
(as described later). In this study, we eventually only select
the top-100 features with highest information gain.
3.5.2 Classification
Let us assume that the presence of a state i is represented
by a binary random variable Xi, i = 1, 2, ..., 100. Hence,
P (Xi = 1) represents the probability for the presence of
state Xi. We can think of the Xis as the variables repre-
senting potential features. Thus, our training process pro-
ceeds as follows. For a given class Y of cascades, we evalu-
ate the presence of a given feature (state) Xi in Y by an-
alyzing a sufficiently large number of sample cascades that
belong to the class Y . Subsequently, we are able to evaluate
the a-priori conditional probability P (XiY ) for each class
Y ∈ {1, 2, ..., k}, where the number of classes k is usually
very small. In our case, we are interested in the traditional
binary classifier with k = 2. However, note that this classifi-
cation methodology can be extended to the cases with k > 2
using the well-known one-against-one (pairwise) or multiple
one-against-all formulations [17].
We can jointly use multiple features to differentiate be-
tween two sets of cascades belonging to different classes. In
particular, given the top-100 features with respect to infor-
mation gain, we can classify cascades by deploying a ma-
chine learning classifier. In this study, we use a Bayesian
classifier to jointly utilize the selected features to classify cas-
cades. Naıve Bayes is a popular probabilistic classifier that
has been widely used in the text mining and bio-informatics
literature, and is known to outperform more complex tech-
niques in terms of classification accuracy [35]. It trains us-
ing two sets of probabilities: the prior, which represents the
marginal probability P (Y ) of the class variable Y ; and the a-
priori conditional probabilities P (XiY ) of the features Xi
given the class variable Y . As previously explained, these
probabilities can be computed from the training set.
Now, for a given test instance of a cascade with observed
features Xi, i = 1, 2, ..., n, the a-posteriori probability
P (Y X (n)) can be computed for both classes Y ∈ {0, 1},
where X (n) = (X1, X2, ..., Xn) is the vector of observed
features in the test cascade under consideration:
P (Y X (n)) =
P (X (n), Y )
P (X (n))
=
P (X (n)Y )P (Y )
P (X (n))
(3)
n(cid:89)
The naıve Bayes classifier then combines the a-posteriori
probabilities by assuming conditional independence (hence
the "naıve" term) among the features.
P (X (n)Y ) =
P (XiY ).
(4)
i=1
Although the independence assumption among features
makes it feasible to evaluate the a-posteriori probabilities
with much lower complexity, it is unlikely that this assump-
tion truly holds all the time. For our study, we mitigate the
effect of the independence assumption by pre-processing the
features using the well-known Karhunen-Loeve Transform
(KLT) to uncorrelate them [9].
In the following section, we provide details of the data set
that we have collected to demonstrate the usefulness of our
M 4C model.
(a) Radial layout of
example cascade # 1
(b) Circular layout of
example cascade # 1
(c) Radial layout of
example cascade # 2
(d) Circular layout of
example cascade # 2
Figure 5: Typical examples of real-world Twitter cascades.
4. DATA SET
4.1 Data Collection
Among the popular online social networks, Twitter is one
of the social networks that allows systematic collection of
public data from its site. Therefore, we chose to study the
morphology of cascades appearing on Twitter. To collect
data from Twitter, we focused on tweets related to the Arab
Spring event, which represents an ideal case study because
it spans several months. For countries involved in the Arab
Spring event, we collected data from Twitter during one
complete week in March 2011. We provide more details of
the data collection process in the following text.
For our study, we separately collected two data sets from
Twitter. The first data set was collected using Twitter's
streaming API, which allows the realtime collection of public
tweets matching one or more filter predicates [2]. To collect
tweet data pertaining to a given country, we provided rel-
evant keywords as filter predicates. For example, we used
the keywords 'Libya' and 'Tripoli' to collect tweets related
to Libya. In total, we collected tweets for 8 countries over a
period of a week in March 2011. Using Twitter's streaming
API, we collected more than 8 million tweets involving more
than 200 thousand unique users.
As mentioned in Section 3.1, we cannot accurately con-
struct cascade graphs without information about whom the
users are following. The one-way following policy of Twit-
ter results in three types of relationships between two given
users: (1) both follow each other, (2) only one of them fol-
lows the other, and (3) they do not follow each other. Twitter
provides follower information for a given user via a separate
interface called REST API [2]. REST API employs aggres-
sive rate limiting by allowing clients to make only a limited
number of API calls in an hour. Twitter applies this limit
based on the public IP address or authentication token from
the client who issues the request. Currently, rate limiting
for REST API permits only 150 requests per hour for unau-
thenticated users and 350 requests per hour for authenti-
cated users. In our tweet data set, we encountered more
than 200, 000 unique users and we were required to make at
least one request per user to get the follower list. For each
user who follows more than 5000 users, we had to make
a separate call to get each subset of 5000 users. Here it is
noteworthy that some users were following or were being fol-
lowed by millions of users, requiring thousands of separate
calls for each user. It would take us several months to collect
this data if we were to use a single authentication token or
a single external IP address. To overcome this limitation,
we utilized dozens of public proxy servers to parallelize calls
to Twitter's REST API [34]. Using this methodology, we
collected follower lists of all users in less than a month.
Twitter provides a "re-tweet" functionality which allows
users to re-post the tweet of other users to their profiles.
The reference to the user with original tweet is maintained
in all subsequent re-tweets. There is no information on in-
termediate users in re-tweets. Using the follower graph, we
constructed cascade graphs for all sets of re-tweets which
are essentially cascades. Therefore, the overall graph is a
union of all cascades in our data. In Figure 5, we visualize
two cascades in our data set using radial and circular layout
methods in Graphviz [1]. In a radial layout, we choose the
user with original tweet as a center vertex (or root vertex
in general) and the remaining vertices are put in concen-
tric circles based on their proximity to the center vertex.
In a circular layout, all components are plotted separately
with their respective vertices in a circular format. Visualiza-
tion of two example cascades provides us interesting insights
about their morphology. From the first example, we observe
that the degree of vertices typically decreases as their dis-
tance from the root vertex increases. However, for the second
example, we observe that subsequent vertices have degrees
comparable to the root vertex. In this paper, our aim is to
capture such differences in an automated fashion using our
proposed model.
4.2 Data Analysis
We now analyze the structural features of the cascades
in our collected data set in terms of degree, path, and con-
nectivity. Later in Section 5, we will use these features for
baseline comparison with our proposed model in terms of
classification accuracy. For structural features that can only
be computed from undirected graphs, such as clustering co-
efficient and diameter, we compute them on the undirected
versions of cascade graphs.
4.2.1 Degree Properties
We first jointly study the number of edges and the number
of nodes for all cascades in our data set. The cascade graphs
in our data set are connected and each user in the cascade
graph has at least one inward or outward edge. Therefore,
the number of edges in a cascade graph E has the lower
(a) Edge and node counts
(b) Root node degree and average path length
(c) Diameter
(d) Number of spanning trees
(e) Clustering coefficient
(f) Clique number
Figure 6: Distributions of various cascade graph attributes in the Twitter data set.
bound: E ≥ V − 1, where V is the number of users par-
ticipating in the cascade. Figure 6(a) shows the scatter plot
between edge and node counts for all cascades in our data
set. Note that we use the logarithmic scale for both axes.
From this figure, we observe that the scatter plot takes the
form of a strip whose thickness represents the average num-
ber of additional edges for each node. The average thickness
of this strip approximately corresponds to having twice the
number of edges compared to the number of nodes.
4.2.2 Path Properties
Another important characteristic of a cascade is the degree
of the root node (user who initiated the cascade), which typ-
ically has the highest degree compared to all other nodes in
a cascade graph. In our data set, the root node has the high-
est degree compared to all other nodes in cascade graphs for
more than 92% of the cascades. The degree of the root node
essentially represents the number of different routes through
which cascade propagates in an online social network. Note
that these paths may merge together after the first hop;
however, we expect some correlation between the degree of
100101102103100101102103Edge CountNode Count10010110210311.522.533.54Root Node DegreeAverage Shortest Path Length024681000.20.40.60.81DiameterProbability1020304050607080901000.850.90.951Spanning Tree Count (ex) CDF0.00.10.20.30.40.50.60.70.80.91.00.860.880.90.920.940.960.981Average Clustering CoefficientCDF123456700.20.40.60.81Clique NumberProbabilityroot node and the number of unique routes through which
a cascade propagates. One relevant characteristic of a graph
is average (shortest) path length (AP L), which denotes the
average of all-pair shortest paths [4].
(cid:88)
AP L =
∀i,j∈V,i(cid:54)=j
d(i, j)
V (V − 1)
,
where d(i, j) is the shortest path length between users i and
j. We expect the average path length of a cascade to be pro-
portional to the degree of the root node. Figure 6(b) shows
the scatter plot of the root node degree and the average path
length. As expected, we observe that cascades with higher
root node degrees tend to have larger average path lengths.
We have changed the x-axis to logarithm scale to emphasize
this relationship.
Another fundamental characteristic of a graph is called
diameter, which denotes the largest value of all-pair shortest
paths [4]. Figure 6(c) shows the distribution of diameter of
cascades in our data set. The bars represent the probability
mass function and the line represents the cumulative density
function (CDF). The minimum diameter is 1 because the
minimum number of nodes in a cascade is 2. Cascades with
more than 2 nodes can have a diameter of 1 only if they are
cliques. In our data set, approximately 40% cascades have a
diameter of 1. The largest cascades in our data set have a
diameter of 9.
Finally, we can characterize the number of unique paths
that connect nodes in a graph by using the notion of span-
ning trees. For a given graph, the number of unique paths
between nodes is proportional to the number of spanning
trees. The number of spanning trees of a graph G, denoted
by t(G), is given by the product of non-zero eigenvalues of
the Laplacian matrix and the reciprocal of the number of
nodes [4].
t(G) =
1
n
λ1λ2...λn−1,
where n is the number of nodes of the graph and λi is the
i-th eigenvalue of the Laplacian matrix of the graph and
λi (cid:54)= 0,∀i. Figure 6(d) shows the CDF of the number of
spanning trees for cascades in our data set. Note that the
x-axis is converted to logarithm scale. We observe that only
a small fraction (< 15%) of cascades have more than one
spanning tree in our data set, which highlights their sparsity.
4.2.3 Connectivity Properties
The clustering coefficient of a vertex vi is denoted by ci
and is defined as the ratio of the number of existing edges
among vi and vi's neighbors and the number of all possible
edges among them [4]. Using ∆i to denote the number of
triangles containing vertex vi and di to denote the degree of
vertex vi, the clustering coefficient of vertex vi is defined as:
∆i(cid:0)di
(cid:1) =
2
ci =
2∆i
di(di − 1)
The average clustering coefficient of a graph G with n nodes
is simply the mean of clustering coefficients of individual
nodes.
(cid:88)
∀i
ci
Cavg =
1
n
Figure 6(e) shows the CDF of the average clustering coeffi-
cient for all cascades in our data set. We note that approx-
imately 86% of all cascades in our data set have average
clustering coefficient value equal to 0, i.e., they do not have
a single triangle. Only a small fraction (less than 2%) of
cascades in our data set have clustering coefficient values
greater than 0.5, which again highlights their sparsity.
We are also interested in investigating the sizes of cliques
in cascades that have one or more triangles. Towards this
end, we study the clique numbers of all cascade graphs in
our data set. The clique number of a graph is the number
of vertices in its largest clique [4]. Figure 6(f) shows the
distribution of clique number for all cascades in our data
set. Similar to our observation in Figure 6(e), we observe
that approximately 86% of cascades have a clique number
of 2, which means that they do not have a triangle. A little
more than 10% of cascades have at least one triangle. The
largest clique number observed in our data set is 6.
5. CASCADE SIZE PREDICTION
To demonstrate the effectiveness of our M 4C model in
quantitatively characterizing cascades, we use it to investi-
gate an unexplored but fundamental problem in online social
networks - cascade size prediction: given the first τ1 edges in
a cascade, we want to predict whether the cascade will have
a total of at least τ2 (τ2 > τ1) edges over its lifetime. Be-
sides serving the purpose of validating the relevance of our
M 4C model, this prediction has many real-world applica-
tions. For instance, it is useful for media organizations to
forecast popular news stories [15]. Likewise, popular videos
on social media -- if predicted early -- can be cached by con-
tent distribution networks at their servers to achieve better
performance [29]. Furthermore, solving this problem enables
the early detection of epidemic outbreaks and political crisis.
To the best of our knowledge, this problem has not been
investigated in prior literature. The closest effort is that
Galuba et al. analyzed the cascades of URLs on Twitter
to predict URLs that users will tweet [12]. Their proposed
approach achieved about 50% true positive rate with about
15% false positive rate. Unfortunately, this accuracy is not
much useful in practice.
We compare the prediction performance of M 4C based
scheme with a baseline scheme that uses the following 8 cas-
cade graph features with Naıve Bayes classifier: (1) edge
growth rate, (2) number of nodes, (3) degree of the root
node, (4) average shortest path length, (5) diameter, (6)
number of spanning trees, (7) clustering coefficient, and
(8) clique number. We evaluate the effectiveness of these
schemes in terms of the following decision sets.
1. True Positives (TPs): The set of cascades that are cor-
rectly predicted to have a total of at least τ2 edges over
their lifetime.
2. False Positives (FPs): The set of cascades that are
incorrectly predicted to have a total of at least τ2 edges
over their lifetime.
3. True Negatives (TNs): The set of cascades that are
correctly predicted to have a total of less than τ2 edges
over their lifetime.
4. False Negatives (FNs): The set of cascades that are
incorrectly predicted to have a total of less than τ2
edges over their lifetime.
We further quantify the effectiveness of both cascade size
prediction schemes in terms of the following three Receiver
(a) Detection Rate
(b) False Positive Rate
(c) Precision
Figure 7: Classification results of M 4C and baseline schemes for varying values of τ1, at τ2 − τ1 = 10.
Figure 8: Evaluation setup for varying τ1.
Figure 9: ROC plot of M 4C based scheme for varying
τ1.
Operating Characteristic (ROC) metrics [11].
T P s
T P s + F N s
Detection Rate =
False Positive Rate =
F P s
F P s + T N s
Precision =
T P s + T N s
T P s + T N s + F P s + F N s
(5)
(6)
(7)
the values of τ1 and τ2 − τ1 are, the more imbalanced the
two classes are. To mitigate the potential adverse effect of
class imbalance [18], we employ instance re-sampling to en-
sure that both classes have equal number of instances before
the cross-validation evaluations. Below we discuss the clas-
sification accuracies of both schemes as we vary the values
of τ1 and τ2.
To ensure that the classification results are generalizable,
we divide the data set into k folds and use k − 1 of them for
training and the left over for testing. We repeat these exper-
iments k times and report the average results in the follow-
ing text. This setup is called stratified k-fold cross-validation
procedure [35]. For all experimental results reported in this
paper, we use the value of k = 10.
In this paper, we treat the cascade size prediction prob-
lem to an equivalent cascade classification problem: given a
cascade with τ1 edges, classify it into two classes: the class of
cascades that will have less than τ2 edges over their lifetime
and the class of cascades that will have greater than or equal
to τ2 edges over their lifetime. We use the initial τ1 edges to
train both the cascade size prediction scheme based on our
M 4C model and the baseline scheme that is based on the
known cascade graph features. For thorough evaluation, we
vary the values of τ1 and τ2. Because the distribution of the
number of edges in our data set is skewed, that is, most cas-
cades having only a few edges over their lifetime, the larger
Impact of Varying τ1
5.1
Figure 8 shows the evaluation setup as we vary the values
of τ1 ∈ {10, 50, 100}, while keeping τ2 − τ1 fixed at 10. The
solid, dashed, and dotted vertical black lines corresponds to
τ1 = 10, 50, and 100. The solid, dashed, and dotted vertical
grey lines all correspond to τ2 − τ1 = 100. The value of τ1
impacts the classification results because it determines the
number of edges in each cascade that are available for train-
ing. Therefore, larger values of τ1 generally improve training
quality of both cascade size prediction schemes and lead to
better prediction accuracy.
Figure 7 plots the detection rate, false positive rate,
and precision of M 4C and baseline schemes for varying
τ1 ∈ {10, 50, 100}, while keeping τ2 − τ1 fixed at 10. Overall,
we observe that M 4C consistently outperforms the baseline
scheme with peak precision of 96% at τ1 = 100, τ2−τ1 = 10s.
With some exceptions, we generally observe that the effec-
tiveness of both schemes decreases as the value of τ1 is in-
10501000.50.60.70.80.91τ1Detection Rate M4CBaseline105010000.10.20.30.4τ1False Positive Rate M4CBaseline10501000.60.70.80.91τ1Precision M4CBaseline1001011021030.40.50.60.70.80.91Number of EdgesCDFτ1 = 10 →τ1 = 50 →τ1 = 100 →00.10.20.30.40.50.50.60.70.80.91False Positive RateDetection Rate τ1 = 100τ1 = 50τ1 = 10(a) Detection Rate
(b) False Positive Rate
(c) Precision
Figure 11: Classification results of M 4C and baseline schemes for varying values of τ2 − τ1, at τ1 = 10.
Figure 10: Evaluation setup for varying τ2 − τ1.
creased. The standard ROC threshold plots of M 4C shown
in Figure 9 also confirm this observation.
5.2
Impact of Varying τ2 − τ1
Figure 10 shows the evaluation setup as we vary the values
of τ2 − τ1 ∈ {10, 50, 100}, while keeping τ1 fixed at 10. The
solid vertical black line corresponds to τ1 = 10. The solid,
dashed, and dotted vertical grey lines correspond to τ2−τ1 =
10, 50, and 100, respectively. The value of τ2−τ1 also impacts
the classification results because it determines the separation
or distance between the two classes. Therefore, larger values
of τ2 − τ1 generally lead to better prediction accuracy.
Figure 11 plots the detection rate, false positive rate, and
precision of M 4C and baseline schemes for varying values
of τ2 − τ1. Once again, we observe that M 4C consistently
outperforms the baseline scheme with peak precision of 99%
at τ2 − τ1 = 100, τ1 = 10. We also observe that the classifi-
cation performance of both methods improves as the value
of τ2 − τ1 is increased. The standard ROC threshold plots
of M 4C shown in Figure 12 also confirm this observation.
Figure 12: ROC plot of M 4C based scheme for vary-
ing τ2 − τ1.
terize the morphology of cascades with arbitrary structures,
shapes, and sizes. We then demonstrate the relevance of our
M 4C model in solving the cascade size prediction problem.
The experimental results using a real-world Twitter data
set showed that M 4C significantly outperforms the base-
line scheme in terms of prediction accuracy. In summary,
our M 4C model allows us to formally and rigorously study
cascade morphology, which is otherwise difficult.
In this paper, we applied our M 4C model in the context of
online social networks; however, our model is generally appli-
cable to cascades in other contexts as well such as sociology,
economy, psychology, political science, marketing, and epi-
demiology. Applications of our model in these contexts are
interesting future work to pursue.
7. REFERENCES
[1] Graphviz - graph visualization software.
http://www.graphviz.org.
[2] Twitter API documentation.
https://dev.twitter.com/docs.
6. CONCLUSIONS AND FUTURE WORK
In this paper, we first propose M 4C, a multi-order Markov
chain based model to represent and quantitatively charac-
[3] A. Biem. Minimum classification error training for
online handwriting recognition. IEEE Transactions on
Pattern Analysis and Machine Intelligence,
28:1041 -- 1051, 2006.
10501000.50.60.70.80.91τ2 − τ1Detection Rate M4CBaseline105010000.10.20.30.4τ2 − τ1False Positive Rate M4CBaseline10501000.60.70.80.91τ2 − τ1Precision M4CBaseline1001011021030.40.50.60.70.80.91Number of EdgesCDFτ1 = 10 →←τ2−τ1 = 10←τ2−τ1 = 50←τ2−τ1 = 10000.10.20.30.40.50.50.60.70.80.91False Positive RateDetection Rate τ2 − τ1 = 100τ2 − τ1 = 50τ2 − τ1 = 10[4] A. Bondy and U. Murty. Graph Theory. Springer,
[24] J. Leskovec, A. Singh, and J. Kleinberg. Patterns of
influence in a recommendation network. In
Pacific-Asia Conference on Knowledge Discovery and
Data Mining (PAKDD), 2006.
[25] X. Li. Informational cascades in IT adoption.
Communications of the ACM, 47(4), 2004.
[26] M. Miller, C. Sathi, D. Wiesenthal, J. Leskovec, and
C. Potts. Sentiment flow through hyperlink networks.
In AAAI ICWSM, 2011.
[27] T. Ray. The 'story' of digital excess in revolutions of
the arab spring. Journal of Media Practice,
12(2):189 -- 196, 2011.
[28] M. Reid, R. Millar, and N. D. Black.
Second-generation image coding: An overview.
Second-Generation Image Coding: An Overview,
29:3 -- 29, 1997.
[29] T. Rodrigues, F. Benevenuto, M. Cha, K. P.
Gummad, and V. Almeida. On word-of-mouth based
discovery of the web. In ACM IMC, 2011.
[30] E. M. Rogers. Diffusion of Innovations. Cambridge
University Press, 2003.
[31] D. M. Romero, B. Meeder, and J. Kleinberg.
Differences in the mechanics of information diffusion
across topics: Idioms, political hashtags, and complex
contagion on Twitter. In ACM WWW, 2011.
[32] E. Sadikov, M. Medina, J. Leskovec, and
H. Garcia-Molina. Correcting for missing data in
information cascades. In WSDM, 2011.
[33] J. A. Starr and I. C. MacMillan. Resource cooptation
via social contracting: Resource acquisition strategies
for new ventures. Strategic Management Journal,
11:79 -- 92, 1990.
[34] L. Wang, K. Park, R. Pang, V. Pai, and L. Peterson.
Reliability and security in the CoDeeN content
distribution network. In USENIX Annual Technical
Conference, 2004.
[35] I. H. Witten, E. Frank, and M. A. Hall. Data Mining:
Practical Machine Learning Tools and Techniques.
Morgan Kaufmann, 2011.
[36] Z. Zhou, R. Bandar, J. Kong, H. Qian, and
V. Roychowdhury. Information resonance on Twitter:
Watching Iran. In SOMA, 2010.
2008.
[5] P. Bremaud. Markov Chains. Springer, 2008.
[6] M. Cha, A. Mislove, and K. P. Gummadi. A
measurement-driven analysis of information
propagation in the Flickr social network. In ACM
WWW, 2009.
[7] T. M. Cover and J. A. Thomas. Elements of
Information Theory. Wiley-Interscience, 1991.
[8] K. Dave, R. Bhatt, and V. Varma. Modelling action
cascades in social networks. In AAAI Conference on
Weblogs and Social Media, 2011.
[9] R. Dony. The Transform and Data Compression
Handbook, Chapter 1. CRC Press, 2001.
[10] T. Douglas. Social media's role in the riots. BBC
news, August 2011.
[11] T. Fawcett. ROC Graphs: Notes and Practical
Considerations for Researchers. Technical report, HP
Laboratories, 2004.
[12] W. Galuba, K. Aberer, D. Chakraborty,
Z. Despotovic, and W. Kellerer. Outtweeting the
twitterers - predicting information cascades in
microblogs. In Workshop on Online Social Networks,
2010.
[13] V. Gomez, H. J. Kappen, and A. Kaltenbrunner.
Modeling the structure and evolution of discussion
cascades. In ACM HT, 2011.
[14] M. Gomez-Rodriguez, J. Leskovec, and A. Krause.
Inferring networks of diffusion and influence. In ACM
KDD, 2010.
[15] D. Gruhl, R. Guha, R. Kumar, J. Novak, and
A. Tomkins. The predictive power of online chatter. In
ACM KDD, 2005.
[16] S.-Y. Hsieha, C.-W. Huanga, and H.-H. Choub. A
DNA-based graph encoding scheme with its
applications to graph isomorphism problems. Applied
Mathematics and Computation, 203:502 -- 512, 2008.
[17] C.-W. Hsu and C.-J. Lin. A comparison of methods
for multiclass support vector machines. IEEE
Transactions on Neural Networks, 13(2):415 -- 425,
2002.
[18] N. Japkowicz and S. Stephen. The class imbalance
problem: A systematic study. Intelligent Data
Analysis, 6(5):429 -- 449, 2002.
[19] N. S. Jayant and P. Noll. Digital Coding of
Waveforms: Principles and Applications to Speech and
Video. Prentice Hall, 1984.
[20] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing
the spread of influence through a social network. In
proceedings of KDD, 2003.
[21] S. A. Khayam and H. Radha. Markov-based modeling
of wireless local area networks. In ACM Mobicom
Workshop on Modeling, Analysis and Simulation of
Wireless and Mobile Systems, 2003.
[22] H. Kwak, C. Lee, H. Park, and S. Moon. What is
Twitter, a social network or a news media? In ACM
WWW, 2010.
[23] J. Leskovec, M. McGlohon, C. Faloutsos, N. Glance,
and M. Hurst. Cascading behavior in large blog
graphs. In SIAM International Conference on Data
Mining (SDM), 2007.
|
1608.08278 | 1 | 1608 | 2016-08-29T22:47:05 | Optimal Deployment of Resources for Maximizing Impact in Spreading Processes | [
"cs.SI",
"cond-mat.stat-mech",
"physics.soc-ph"
] | The effective use of limited resources for controlling spreading processes on networks is of prime significance in diverse contexts, ranging from the identification of "influential spreaders" for maximizing information dissemination and targeted interventions in regulatory networks, to the development of mitigation policies for infectious diseases and financial contagion in economic systems. Solutions for these optimization tasks that are based purely on topological arguments are not fully satisfactory; in realistic settings the problem is often characterized by heterogeneous interactions and requires interventions over a finite time window via a restricted set of controllable nodes. The optimal distribution of available resources hence results from an interplay between network topology and spreading dynamics. We show how these problems can be addressed as particular instances of a universal analytical framework based on a scalable dynamic message-passing approach and demonstrate the efficacy of the method on a variety of real-world examples. | cs.SI | cs |
Optimal Deployment of Resources for Maximizing Impact in Spreading Processes
Andrey Y. Lokhov1 and David Saad2
1Center for Nonlinear Studies and Theoretical Division T-4,
Los Alamos National Laboratory, Los Alamos, NM 87545, United States
2The Nonlinearity and Complexity Research Group,
Aston University, Birmingham B4 7ET, United Kingdom
The effective use of limited resources for controlling spreading processes on networks is of prime
significance in diverse contexts, ranging from the identification of "influential spreaders" for maxi-
mizing information dissemination and targeted interventions in regulatory networks, to the devel-
opment of mitigation policies for infectious diseases and financial contagion in economic systems.
Solutions for these optimization tasks that are based purely on topological arguments are not fully
satisfactory; in realistic settings the problem is often characterized by heterogeneous interactions
and requires interventions over a finite time window via a restricted set of controllable nodes. The
optimal distribution of available resources hence results from an interplay between network topol-
ogy and spreading dynamics. We show how these problems can be addressed as particular instances
of a universal analytical framework based on a scalable dynamic message-passing approach and
demonstrate the efficacy of the method on a variety of real-world examples.
Spreading corresponds to omnipresent processes de-
scribing a vast number of phenomena in social, natural
and technological networks [1 -- 4] whereby information,
viruses and failures propagate through their edges via the
interactions between individual constituents. Spreading
cascades have a huge impact on the modern world, be
it negative or positive. An 11 minute power grid distur-
bance in Arizona and California in 2011 led to cascading
outages and left 2.7 million customers without power [5].
As many as 579,000 people around the world could have
been killed by the H1N1 influenza pandemic character-
ized by a rapid spreading through the global transporta-
tion networks [6]. The U.S. economy losses from the 2008
financial crisis resulted from cascading bankruptcies of
major financial institutions are estimated at the level of
$22 trillion [7]. Therefore, it is not surprising that ef-
ficient prediction and control of these undesired spread-
ing processes are regarded as fundamental questions of
paramount importance in developing policies for opti-
mal placement of cascade-preventing devices in power
grid, real-time distribution of vaccines and antidotes to
mitigate epidemic spread, regulatory measures in inter-
banking lending networks and other modern world prob-
lems, such as protection of critical infrastructures against
cyber-attacks and computer viruses [8].
On the other hand, spreading processes can also be
considered beneficial. The ice bucket challenge campaign
in social networks raised $115 million donations to the
ALS association fighting the Amyotrophic Lateral Scle-
rosis, in particular due to a significant involvement of
celebrities acting as "influencers" [9]. In the context of
political campaigning, there are already winners [10, 11]
and losers, and this division is likely to become more pro-
nounced and critical in the future [12]. Winners are those
who use communication and social networks effectively to
set the opinions of voters or consumers, maximizing the
impact of scarce resource such as activists or advertise-
ments by applying control to the most influential groups
of nodes at the right time; while losers will spend their re-
source sub-optimally relying on intuition and serendipity.
Additional examples of domains where optimal resource
allocation plays a crucial role in enhancing the effect of
spreading include viral marketing campaigns [13], tar-
geted chemically-induced control of dynamic biological
processes [14]; drug discovery [15]; and even gaining mil-
itary advantage through the propagation of disinforma-
tion [16]. All these applications share several important
common properties such as restricted budget, finite-time
windows for control interventions and the need for fast
and scalable optimization algorithms which can be de-
ployed in real time.
There exists a large body of work on optimal resource
deployment in various spreading settings. A widely
addressed formulation focuses on identifying influential
spreaders, i.e. nodes that play important role in the dy-
namical process. Identification is often done by employ-
ing different centrality measures based on the topology
of the underlying interaction network, including selec-
tion strategies based on high-degree nodes [17], neighbors
of randomly selected vertices [18], betweenness central-
ity [19], random-walk [20], graph-partitioning [21], and
k-shell decomposition [22], to name a few.
It is quite
natural that algorithms based exclusively on topological
characteristics appear to have variable performance de-
pending on particular network instances and dynamical
models used [23, 24]. Another line of work consists in
studying the NP-complete problem of network disman-
tling [25 -- 27]: the underlying reasoning is that removal
of nodes breaking the giant component to small pieces
is likely to prevent the global percolation of the conta-
gion. The localization of an optimal immunization set
has been addressed using a belief propagation algorithm
built on top of percolation-like equations for SIR (Sus-
ceptible, Infected, Recovered) and SIS (Susceptible, In-
fected, Survived) models [28], based on cavity method
techniques developed previously for deterministic thresh-
old models [29, 30]. This formulation is close to the prob-
lem of finding optimal seeds, i.e. the smallest set of initial
nodes which maximizes the spread asymptotically [13].
It was rigorously analyzed [31, 32] for two simple diffu-
sion models with a special submodularity property, In-
dependent Cascade (IC) and Linear Threshold, and was
shown to be NP-hard for both. A greedy algorithm based
on a sampling subroutine has been explored for the IC
model [33] in the setting of finite time horizon. For other
spreading models the impact maximization problem at fi-
nite time and resources has been addressed in the setting
of optimal control as reported in a recent survey [34].
However, only deterministic mean-field dynamics have
been considered so far; this approximation ignores the
topology of the specific network considered and yields
non-distributed solutions to the control problem.
All of these techniques consider the problem of static
(open-loop) resource allocation, preplanned at some ini-
tial time. A less explored direction consists in developing
an online policy of assigning a limited remedial budget
dynamically based on real-time feedback, also known as
a closed-loop control. The impact of vaccination of the
largest degree nodes or of those with the largest number
of infected neighbors was investigated in [35, 36], while
an alternative strategy is focused on the largest reduction
in infectious edges [37]. Finally, an online policy based on
the resolution of the minimal maxcut problem was intro-
duced [38], where optimization is carried out with respect
to the expected time to extinction of the SIS epidemic.
We introduce a general optimization framework which
accommodates both dynamical and topological aspects
of the problem and which allows for a broad range of
objectives. The framework is principled, probabilistic,
computationally efficient and incorporates the topologi-
cal properties of the specific network under consideration.
It facilitates the optimization of objective functions be-
yond the maximization or minimization of the spread,
including: targeting specific nodes at specific times given
a subset of accessible nodes; a limited global budget, pos-
sibly distributed over time; and an optimal dynamic vac-
cination strategy using the feedback from the spreading
process. The problem is stated in a dynamical control
setting with finite-time horizon that requires an explicit
resolution of the dynamics, which is addressed via a dis-
tributed message-passing algorithm. We test the efficacy
of the method on particular synthetic optimization prob-
lems as well as on a set of real-world instances.
2
I. RESULTS
A. Model
A large number of spreading models have been sug-
gested in the literature to describe stochastic dynam-
ical processes in epidemiology, information and rumor
propagation, and cascades in biological and infrastruc-
ture networks [2 -- 4]. They all share the same common
features:
the nodes transition from inactive to active
state due to spontaneous activation mechanism associ-
ated with the nodes themselves, or due to interactions
with active neighbours through the network edges. As
an illustration of our approach, we have chosen a pop-
ular stochastic spreading process known as susceptible-
infected-recovered, or SIR model, which is often used to
describe propagation of infectious diseases or information
spreading [2]. More precisely, we consider a generalized
version of the discrete-time SIR model defined as follows.
A node i in the interaction graph G = (V, E), where V de-
notes the set of nodes, and E is the set of pairwise edges,
at time step t can be found in either of three states σt
i :
"susceptible" σt
i = I or "recovered"
σt
i = R. At each time step, an infected (or, depending on
the application domain, informed or active) individual i
can transmit the activation signal to one of its suscep-
tible (respectively, uninformed or inactive) neighbors j
with probability αij, associated with the edge connecting
them. Independently on the interaction between nodes a
node i in the S state can turn active, assuming state I,
with the probability νi(t), or spontaneously become re-
covered (uninterested, protected) with probability µi(t)
at time step t. The first mechanism corresponds to a
node activation due to an external influence such as ad-
vertisement in the context of information spreading. In
the case of the epidemic spreading the second mechanism
models the effect of vaccination: once a node goes to the
protected R state, it becomes immune to the infection
at all times. These probabilistic transmission rules at
each time step t can be summarized using the following
schematic rules:
i = S, "infected" σt
S(i) + I(j)
νi(t)−−−→ I(i),
S(i)
αji−−→ I(i) + I(j),
µi(t)−−−→ R(i).
S(i)
(1)
(2)
In the definition of the dynamic rules (1) and (2), νi(t)
and µi(t) represent control parameters we could manip-
ulate with a certain degree of freedom defined by a par-
ticular instance of the problem. In what follows, we as-
sume that the spreading couplings αij are known (or can
be estimated) and are fixed in time.
In some applica-
tions, αij may vary in time (e.g. this is true for temporal
networks) or may represent a set of control parameters
themselves. We outline such scenarios in the Discussion
section; the optimization scheme presented below can be
straightforwardly generalized to include the edge-related
control parameters. However, for simplicity we will only
present optimization involving node-related control pa-
rameters.
3
To quantify the success of the spreading process, one
may look for instance at the expected spread (the total
number of infected nodes) at finial time horizon T , S(T ),
given by
(cid:34)(cid:88)
i∈V
(cid:35)
(cid:88)
i∈V
S(T ) =E
1[σT
i = I]
=
P i
I (T ),
(3)
S(T ) and P i
where the expectation is taken with respect to the re-
alization of the stochastic dynamics and P i
I (T ) denotes
the marginal probability of node i to be found in the
state I at time T . The quantities P i
R(T ) can
be defined in a similar way for the susceptible and re-
covered states, respectively. Hence, it is important to
understand how to compute approximately the marginal
probabilities P i
σ(t) on a given network, σ assuming the
corresponding state; note that in the general case, an ex-
act estimation of marginals in the SIR model is an NP-
hard problem [39]. We use the recently introduced Dy-
namic Message-Passing (DMP) equations [40 -- 42] which
provide the estimates (asymptotically exact on sparse
graphs) of the probabilities P i
σ(t) with a linear computa-
tional complexity in the number of edges and time steps.
When applied to real-world loopy networks, the DMP
algorithm typically yields a accurate prediction of the
marginal probabilities as validated empirically [42] for a
large class of spreading models on real-world networks.
In the Methods section, we provide an intuitive derivation
of the corresponding DMP equations for the generalized
SIR model. An example of the DMP performance on
real-world networks is provided in the Figure 1, where
the method predictions are compared to values obtained
through extensive Monte Carlo simulations of the SIR
dynamics on a network of flights between major U.S.
hubs (a detailed description of this data set is provided
in the Results section and in the Appendix A). The accu-
racy of marginals estimation supports the use of the DMP
equations at the core of our optimization algorithm.
B. Optimization framework
We formulate the dynamic allocation of resource as a
general optimization problem with respect to an objec-
tive function O and a set of constraints associated with
the budget of available resources B, accessible values of
control parameters P, initial conditions I and the dy-
namical model equations D. We employ the Lagrangian
formulation of the constrained optimization problem:
L = O(cid:124)(cid:123)(cid:122)(cid:125)
(cid:124)
(cid:123)(cid:122)
(cid:125)
objective
constraints
+B + P + I + D
.
(4)
FIG. 1: Performance of DMP equations for the generalized
SIR model on a network of flights between major US air-
ports. The network represents M = 383 flight routes between
the N = 61 largest US hubs. The weights αij are propor-
tional to the average number of transported passengers on
each route and are distributed in the interval [0.05, 0.5]; νi
and µi are generated at random in the range [0, 0.1]. The
scatter plot represents marginal probabilities P i
I (T ) obtained
from the DMP equations and by averaging over 107 Monte
Carlo simulations. There is one randomly selected active node
at the initial time and the dynamics is simulated for t = 5 time
steps.
O - Many objective functions of interest relate to the
delivered information at particular times defined for each
node. So for the general case we define:
(cid:34)(cid:88)
i∈U
O =E
(cid:35)
(cid:88)
i
1[σti
i = I]
=
P i
I (ti),
(5)
where ti is the required activation time for node i and the
sum is over the subset of nodes U ⊂ V that is required
to be activated. We refer to this general formulation as
the targeting problem. The popular problem of maximiz-
ing the total spread S(T ) is a special case whereby U = V
and ti = T for all i ∈ V .
B - In many relevant situations, resources are not fully
available at a given time, but rather become available on
the fly, and their amount may vary across the time steps.
For example, it takes some time to develop and produce
the vaccines or the advertisement budget is allocated in
stages depending on the success of the campaign. Hence,
we define the budget constraints in the following form:
νi(t) = Bν(t),
µi(t) = Bµ(t),
(6)
(cid:88)
i∈V
(cid:88)
i∈V
where Bν(t) and Bµ(t) denote the available total budget
for the control parameters νi(t) (spontaneous infection)
and µi(t) (recovery) at time t. The constraint B reads
T−1(cid:88)
t=0
(cid:34)(cid:88)
i∈V
(cid:35)
B =
λν
B(t)
νi(t) − Bν(t)
,
(7)
Let us discuss the form of each term in the expression (4).
with a similar expression for the parameters µi(t), where
B(t) and λµ
λν
B(t) are the associated Lagrange multipliers,
0.30.50.70.90.30.50.70.9MC-predictedPiI(t)DMP-predictedPiI(t)respectively. Clearly, one is not forced to use the whole
available budget at each time step; in this case, we as-
sume that Bν(t) and Bµ(t) are reallocated accordingly at
subsequent time steps. However, in cases where specific
targeting times are not required, using monotonicity ar-
guments, it is easy to show that it is always advantageous
to use all available budget fully at each step for maximiz-
ing the impact at a later stage. Allocation of budget at
the initial time only corresponds to the optimal seeding
problem.
P - In an unrestricted scenario, where all nodes are ac-
cessible, control parameters associated with node i, νi(t)
and µi(t), may take arbitrary values from zero to one de-
pending on total budget. However, in realistic situations
access level to different nodes may differ:
for example,
only a subset W ⊆ V of nodes may be controllable to-
gether with additional restrictions on parameter values.
The parameter block P is introduced to enforce parame-
ters νi(t) to take values in the range [νt
i ] at each time
step. This can be accomplished with the help of "bar-
rier" functions, widely used in constrained optimization,
assuming the form
i , νt
P =
log
νi(t) − νt
i
+ log
i − νi(t)
νt
,
(8)
(cid:104)
T−1(cid:88)
(cid:88)
(cid:16)
t=0
i∈V
(cid:105)
(cid:104)
(cid:105)(cid:17)
where is a small regularization parameter chosen to
minimize the impact on the objective O in the regime of
allowed νi(t) values, away from the borders. An equiva-
lent expression can be written for the constraints on the
µi(t) values.
I and D - Finally, the constraints I and D enforce the
given initial conditions and dynamics of the system via
the associated Lagrange multipliers. For example, if no
active individuals are present at initial time, then we set
I (0) = 0 for all nodes using the constraint set I; if some
P i
infected or recovered nodes are present, they assume an
initial values 1 for the respective marginal probabilities.
The set D encodes the evolution of the marginal probabil-
ities with the DMP equations, as explained in the Meth-
ods section.
The extremization of the Lagrangian (4) is done as
follows. Variation of L with respect to the dual vari-
ables (Lagrange multipliers) results in the DMP equa-
tions starting from the given initial conditions, while
derivation with respect to the primal variables (control
and dynamic parameters) results in a second set of equa-
tions, coupling the Lagrange multipliers and the primal
variable values at different times. We solve the coupled
systems of equations by forward-backward propagation,
a widely used method for learning and optimization in ar-
tificial neural networks [43], detailed in the Methods sec-
tion. This method has a number of advantages compared
to other localized optimization procedures such as gradi-
ent descent and its variants. In particular, it is simple to
implement, is of modest computational complexity, does
not require any adjustable parameters and is less prone
to being trapped in local minima since the optimization
is performed globally [44].
4
C. Targeting problem
We first demonstrate the approach using the general
targeting problem, one of the new features of the sug-
gested framework. In this toy example, we consider dis-
information spreading on a small network extracted from
the study of terrorists associations [46]. We assume that
the spreading dynamics follows a particular case of the
dynamical model with µi(t) = 0 ∀ t and i ∈ V , cor-
responding to the Susceptible-Infected, or SI model with
controlled spontaneous transition to the informed state I
due to external influence via the control parameters νi(t).
The activation of nodes is required in a predefined prior-
ity order, targeting selected nodes at specific times. The
DMP-based optimization scheme converges to a unique
optimal solution within a few forward-backward itera-
tions as reported in Figure 2. The resources are al-
located dynamically over time such that the activation
path meets the targeting requirements: P i
I (ti) > 0.95 is
achieved at all nodes, with the majority of nodes targeted
with probability one.
Targeting is quite a general task and can provide al-
gorithms to solve a number of related problems. For
instance, identifying the origin of the spreading process
from measurements at sparsely located sensors at differ-
ent times [47] is a difficult problem that has been ad-
dressed by other approaches [48, 49] but can be equally
viewed as optimally allocating a budget at time zero in
order to target the sensor nodes at specific times that
correspond to the times when measurements were taken.
D. Optimal seeding
The majority of existing algorithms [17 -- 22, 25, 28, 31]
have been designed to solve the seeding problem -- finding
an optimal set of nodes which would lead to the maxi-
mum number of activations at subsequent times. In the
SI model of information spreading, even a single active
node at initial time will ultimately lead to the activa-
tion of the whole connected network. However, a more
interesting problem is the one of finding the best initial
conditions which would lead to the maximum impact at
finite time T . In the formulation involving control pa-
rameters νi(t), setting the initial conditions at time t = 1
is equivalent to distributing the activation budget at time
t = 0 in the system where all nodes are at state S; optimal
distribution of the budget at time t = 0 would thus lead
through spontaneous infection to the maximum spread
S(T + 1).
5
FIG. 2: Optimal targeting with the DMP algorithm on a small network of terrorists associations. Edge thickness
indicates the strength of the corresponding pairwise transmission probability αij, generated uniformly at random in the interval
[0, 1]. The size of nodes relates to the time activation requirements: large nodes should be activated by the corresponding time.
In this example, two chosen nodes should be activated at time t = 2, another two nodes by time t = 4, three particular nodes
by time t = 6 and all remaining nodes by time t = 9; available budget for each time step has been fixed to Bν (t) = 0.1 · N .
Color intensity (gradually from white to black) indicates the value of the marginal probabilities P i
I (t) which result from the
dynamics using the optimal distribution of resources provided by the DMP algorithm. The visualization has been created using
the MuxViz software [45].
For demonstration and validation purposes, we first
consider the small network of relations between Slovene
parliamentary parties in 1994; links represent estimated
similarity relations based on a sociological survey of the
parliament members who were asked to estimate the
distance between each pair of parties in the political
space [50]. Given the total campaigning budget Bν(0),
the goal is to maximize the total informational "influ-
ence" at time T by optimally distributing the "lobby-
ing" budget at initial time. One advantage of this small
test case is that we can check the validity of the scheme
via an explicit symbolic solution of the DMP equations,
obtaining a closed-form expression of the objective func-
tion O = S(T + 1) that represents the final information
spread as a function of the independent control param-
eters; a more in-depth description of this procedure is
given in the Appendix B. As in the previous example,
the forward-backward optimization scheme in this case
quickly converges to a unique optimal solution starting
from an arbitrary initial values of the control parame-
ters. The ground-truth optimal values of parameters can
be established by a direct maximization of the objective
function O plotted in the Figure 3. The optimal solu-
tion is in full agreement with the solution of the forward-
backward iteration scheme up to the insignificant domain
border perturbations due to the finite value of , the regu-
larization parameter that keeps values away from border
values. This example validates our optimization proce-
dure on this small scale problem.
Studies of the optimal seeding problem usually fo-
cus on a limited setting of homogeneous strength of
links under deterministic dynamics and a search for the
integer-valued deterministic budget deployment to spe-
cific nodes. To test the efficacy of the DMP-optimization
approach on large scale instances we compare its per-
formance to that of popular heuristics for this restricted
setting. Although one should point out that our method
addresses a broad range of problems and has not been
optimized for this particular task, it is useful to assess
its performance in the case where the structure of the
ground-truth solution is known:
for the deterministic
SI spreading, it is clear that the initial distribution of
seeds should target some combination of the high-degree
nodes, and a number of well-performing centrality tech-
niques [17, 22, 25] are known to select the respective com-
bination (see the Appendix B for a detailed discussion of
methods used for comparison).
Table I presents the normalized total spread for some
of the best-performing centrality measures and the DMP
algorithm after T = 3 time steps of the dynamics on
different benchmark networks of various topologies and
sizes. The transmission probabilities have been set to
a uniform value α = 0.99, and the total available seed-
ing budget is equal to Bν(0) = 0.05 N . Note that the
DMP-estimated marginals provide a natural and conve-
nient measure for comparing the performance of different
algorithms in the finite time horizon setting, especially on
large graphs where running extensive Monte Carlo simu-
6
TABLE I: Comparison of the DMP algorithm for the seeding problem in the setting of deterministic dynamics
with popular well-performing heuristics on various real-world networks. The left of the Table provides topological
information on the networks considered [51 -- 54]. On the right are presented values of the normalized total spread S(T )/N at
time T = 3 for the different algorithms: assignment to randomly-selected nodes, an adaptive version of the high-degree strategy
of [17] (HDA), k-shell decomposition [22], Collective Influence CIl [25] (with l = 2 and l = 4), uniform assignment and the
DMP algorithm. For different test cases, solutions obtained by DMP span the range between delocalized and node-centric
assignments and are on par with the best-performing centrality heuristics.
Network
Road EU
Protein
US Power Grid
GR Collaborations
Internet
Web-sk
N
1174
2361
4941
5242
22963
121422
M
1417
6646
6594
14484
48436
334419
Random
0.305
0.736
0.367
0.565
0.880
0.645
HDA
0.480
0.863
0.602
0.644
0.998
0.833
k-shell
0.160
0.769
0.209
0.296
0.969
0.239
CI2
0.500
0.861
0.605
0.660
0.996
0.751
CI4
0.468
0.838
0.565
0.658
0.994
0.734
Uniform
0.324
0.752
0.397
0.634
0.891
0.699
DMP
0.513
0.856
0.601
0.710
0.972
0.837
This suggests that the DMP algorithm performs well also
for more general dynamic resource allocation problems
with heterogeneous couplings, for which other principled
methods do not exist. In terms of computational com-
plexity, solving the dynamics with DMP is linear in T
and E; the number of forward-backward iterations is
typically small and can be controlled, as explained in the
Methods section. This compares well against the other al-
gorithms even in the considered restricted setting where
taking into account the dynamics is not required, and
allows one to use the DMP approach for very large real-
world networks. Additional implementation details and
remarks are given in the Appendix B.
Given that the problem is NP-hard, it is not surprising
that the optimization landscape is much more complex in
the case of large networks due to a presence of multiple
solutions with comparable costs; the forward-backward
iteration scheme no longer converges to a unique op-
timum as in the case of small networks considered be-
fore. Instead, the algorithm "jumps" between local op-
tima that representing different control-parameter distri-
butions that obey the budget constraints (6). This is an
indication that it is arguably more appropriate to view
the different seeding sets as a collective phenomenon,
rather than assigning "influence" measure to individual
nodes.
In principle, several different initializations for
νi(t) can be used to achieve the best solution; the results
reported here correspond to the uniform starting values
of the control parameters. Note that the initial distri-
bution of νi(t) does not have to satisfy the budget con-
dition (6), but the solutions obey the constraint already
after the first forward-backward iteration.
FIG. 3: Validation of the DMP algorithm on a small
network of relations between Slovene parliamentary
parties with an explicit evaluation of the objective
function. Edge weights have been renormalized such that
the maximum pairwise mutual "influence" receives the value
αmax
ij = 0.5 and other weights are distributed proportionally
to the survey data. We assume that only three nodes in
this network belong to a controllable set W = {1, 3, 5}, and
the total campaigning budget Bν (0) = 1.5 so that ν3(0) =
1.5−ν1(0)−ν5(0). The plotted surface represents the the total
informational "influence" O(ν1(0), ν5(0)) as a function of two
independent seeding control parameters ν1(0) and ν5(0), com-
puted via a symbolic solution of the DMP equations. Color
variations reflect the change of the value of the objective,
changing gradually from the minimum (blue) to the maximum
(red). The DMP algorithm correctly recovers the parameter
values that maximize the total spread at the finial time (the
corresponding solution is marked by a green circle).
lations is computationally prohibitive. Results presented
in the Table I show that the DMP algorithm is close to
the best-performing heuristics in all cases, showing a con-
sistently good performance. Notice that our method does
not rely explicitly on topological features such as target-
ing high-degree nodes, but instead explores a large space
of parameters with impact on the full dynamic trajectory.
E. Online mitigation of epidemic spreading
To illustrate the suitability of the DMP algorithm to
online deployment of resources in a dynamic setting with
feedback we employ a prototypical example: developing
an effective mitigation policy for confining an infectious
00.511.500.511.533.64.24.8ν5(0)ν1(0)DMPdisease -- a practical and challenging question of public
concern. A SIR model with vaccination is an appropri-
ate dynamic model in this case, where the νi(t) variables
are set to zero, and the parameters µi(t) play the role
of vaccination control, allowing the nodes to assume a
protected state R. In contrast to the seeding problem,
the initial conditions (origin of the epidemic) are speci-
fied in this setting and the vaccination budget has to be
allocated dynamically according to the current state of
the spreading process (monitored at each time step) in
order to suppress the epidemic. The goal is to deploy
the resources optimally so that the total number of in-
fected nodes S(T ) at the final time is minimized. The
assumption of a time-distributed budget Bµ(t) is highly
reasonable due to the restricted vaccine availability.
Previously developed real-time strategies for mitigat-
ing contagion on a given network [35, 37, 38] explored
policies that are based on topological characteristics of
the graph under the assumption of homogeneous trans-
mission probabilities. The common denominator of ex-
isting approaches consists in local interventions which
ensure the islanding of infected nodes. We generalize
the methods [35, 38] to the case of heterogeneous trans-
mission probabilities using a "high-risk" [36] ranking of
nodes according to their probability of getting infected at
the next time step. This measure is defined in our case
as
i (S → I) = 1 − (cid:89)
P t
j∈∂i
(1 − αji1[σt
j = I]),
(9)
where ∂i denotes the set of neighbors of node i. A reason-
able local intervention strategy for benchmarking consists
in distributing the vaccination budget to priority nodes
with a high-risk measure (9). This algorithm will be re-
ferred to as the greedy strategy.
Several policies can be conceived using the DMP
optimization framework. As a reference, we consider
the planned deployment of resources which does not take
into account feedback from an actual realization of the
process, but merely follows the solution of the dynamic
resource allocation problem with a specified initial condi-
tion. Two other closed-loop strategies take into account
the real-time information on the spreading process, us-
ing the seeding formulation as a subroutine: (a) The first,
termed DMP-greedy, is close in spirit (but differs in the
algorithmic implementation, based here on the DMP op-
timization framework) to the greedy algorithm and uses
the current state of the epidemic as the initial condition,
aiming to minimize the spread at the next time step only.
(b) The second utilizes the full power of the DMP frame-
work by exploiting the up-to-date information available
to reinitialize the dynamics at each time step t to allocate
the resources at the next time step t + 1, by running the
optimization procedure for the remaining T−t time steps.
This DMP-optimal policy is similar to the planned strat-
egy, but takes advantage of the new information available
from the realization of the process.
7
We compare these strategies for the case of infection
spreading mediated by air traffic, which has been recog-
nized to play an important role in recent world's pan-
demics [56]. As a particular example, we study the real-
world transportation network of busiest flight routes be-
tween major U.S. airports, extracted from the Bureau of
Transportation Statistics data (BTS) [55] and depicted
in Figure 4 (a). We employ a plausible assumption that
the infection transmission probability associated with a
link between airports is proportional to the number of
passengers carried along this route, see the Appendix C
for a detailed description of the network and data used.
The "vaccination" interventions on this network can be
interpreted as quarantine measures taken in different air-
ports using the updates on the new infected cases. In the
simulations, we assume that the epidemic starts at the
largest airport hub of Atlanta.
The comparison of different mitigation algorithms is
given in Figure 4 (b), showing the average number of
infected sites as a function of time under different miti-
gation strategies. As expected, the DMP-optimal scheme
represents the best performing policy, which leads to sta-
bilization of the expected number of infected nodes by
t = 6, at a lower level compared to the greedy algorithm
that optimizes the spread at the next time step only. No-
tice that on a short time scale, the greedy algorithm has
a slightly better performance, which represents a typi-
cal situation when localized and immediate optimal deci-
sions lead ultimately to sub-optimal global optimization
results.
II. DISCUSSION
We introduced an efficient, versatile and principled op-
timization framework for solving dynamic resource allo-
cation problems in spreading processes, which allows for
the synthesis of previously studied settings using a gen-
eral targeting formulation. This probabilistic framework
allows for the study of problems that involve a finite-time
horizon, which requires an explicit solution of the dynam-
ics, the targeting of specific nodes at given times and it
accommodates scenarios where only a subset of the nodes
is accessible. This is done in our scheme using the DMP
equations for spreading processes. Although in this work
we focused on the examples involving the discrete-time
generalized SIR model, the approach can be straightfor-
wardly applied to the case of continuous dynamics (the
continuous formulation is expounded in the Appendix D)
and to other spreading models, such as cascading and
threshold models as well as rumor dynamics [42]. An-
other possible application area of the present framework
relates to systems defined on temporal graphs, where net-
work dynamics can be encoded into the time-dependent
coefficients αij(t) within the existing framework.
Although we showed that the method can be employed
in the case where transmission probabilities are uniform
8
FIG. 4: Online mitigation of air-traffic mediated epidemic on the network of flights between major U.S. hubs. (a)
A geographical layout of the air transportation sub-network extracted from the BTS data [55]. The transmission probabilities
are indicated by the thickness of the corresponding edges, which is proportional to the aggregated traffic between airports.
Different colors of airports (yellow, red and green) represent an outcome of a single realization of the spreading dynamics
(nodes in the susceptible, infected and recovered states, respectively) under the DMP-optimal policy.
(b) Comparisons of
mitigation strategies showing the average number of infected sites as a function of time, averaged over 100 random realizations
of the dynamics, as a result of applying different policies. In the simulations the epidemic starts at the largest airport hub of
Atlanta; a budget of Bµ(t) = 0.5 N is available at each time step and the objective is to suppress the epidemic by T = 10. The
DMP-optimal algorithm demonstrates the best performance in the number of infected nodes at time T . (c) An illustration of
a radically different decisions taken by the DMP-optimal and greedy algorithms already at the first step of the optimization:
the greedy policy chooses to vaccinate nodes which are most "in danger" at the next time step, while the decision done by the
DMP-optimal scheme takes into account the forecasted evolution of the dynamics.
and only the detailed topology of the network is known,
its major advantage consists in the ability to incorporate
efficiently detailed information on transmission probabil-
ities when such prior information is available, or can be
either estimated (as in the examples of the Slovene polit-
ical parties or flight transportation networks) or learned
from observations of the dynamics [57].
The optimization method used is interesting in itself
being based on changes to the entire trajectory instead
of taking incremental improvement steps in the direction
of the gradient; thus, the suggested algorithm results in
large steps and arguably explores more effectively the pa-
rameter space. In spite of the global budget constraints
involving all network nodes the resulting message-passing
scheme is fast and distributed, requiring a number of op-
erations which grows linearly in time and with respect
to the number of edges in the network. An attractive
property of the suggested framework is its versatility: in-
stead of optimizing the spread given a fixed budget one
can minimize the budget needed to meet certain require-
ments on the spread, imposed as a constraint in the La-
grangian formulation. Another interesting scenario is the
optimization over the spreading parameters αij: this for-
mulation is useful in the design of technological networks
or for mitigation of an epidemic by removing and adding
links in the graph. Finally, it would be interesting to ap-
ply the presented optimization scheme to the percolation-
type equations describing the asymptotic T → ∞ limit
of the spreading dynamics with heterogeneous couplings.
Work on these research directions are underway.
III. METHODS
A. Dynamic message-passing equations
Dynamic message-passing belongs to the family of al-
gorithms derived using the cavity method of statistical
physics and may be given an interpretation of passing
messages along the graph edges. The obtained marginals
are exact on tree graphs, and asymptotically exact on
sparse random networks. We provide an intuitive deriva-
tion of the DMP equations for the adopted generalized
SIR model, defined by (1) and (2). On a given in-
stance of a network, these equations allow one to com-
pute the marginal probability distributions P i
σ(t), where
σ ∈ {S, I, R} denotes the node state. The first key equa-
tion reads:
(1 − νi(t(cid:48)))(1 − µi(t(cid:48)))
θk→i(t).
(cid:32)t−1(cid:89)
t(cid:48)=0
P i
S(t) = P i
S(0)
(cid:33) (cid:89)
k∈∂i
(10)
It states the probability of node i to be susceptible at
time t and is equal to the probability that i was in the S
state at initial time P i
S(0) and remained so until time t.
It neither changed states by following the ν and µ mech-
anisms (in brackets), nor by being infected by a neighbor
qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqSIRa 0 10 20 30 40 50 60 0 2 4 6 8 10I(t)tbno controlgreedyDMP-greedyDMP-plannedDMP-optimalqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqATLLGAFLLMCOTPADFWPHXLAXDMP-optimalgreedycSEA(final term on right); the dynamic message θk→i(t) has a
meaning of the probability that node k did not pass an
activation message to node i until time t. Strictly speak-
ing, Eq. (10) is only valid on a tree graph; only in this
case θk→i(t) are independent for all k ∈ ∂i, so that the
corresponding probability is factorized as in (10). How-
ever, in practice the decorrelation assumption holds to a
good precision even on general networks, even with small
loops, see [42] for in-depth discussions and supporting nu-
merical experiments. The quantities θk→i(t) are updated
as follows:
θk→i(t) = θk→i(t−1) − αkiφk→i(t−1),
(11)
which corresponds to the fact that θk→i(t) can only de-
crease if an activation signal is passed along the directed
link (ki); the corresponding probability equals the prod-
uct of αki and the dynamic variable φk→i(t− 1), which
has a meaning of the probability that node k is in the
state I at time t, but has not infected node i until time
t−1. To simplify further explanations we introduce the
dynamic messages P k→i
R (t), which
denote the probabilities that node k is found at time t in
the states S, I or R, respectively, conditioned on node i
remaining in state S. Alternatively, these variables can
be thought of as the probabilities of k being susceptible,
infected or recovered on a cavity graph, on which node i
has been removed. Formally,
(t) and P k→i
(t), P k→i
S
I
P k→i
S
(t) = P k
S (0)
(1−νk(t(cid:48)))(1−µk(t(cid:48)))
θl→k(t),
(cid:33) (cid:89)
l∈∂k\i
(cid:32) t−1(cid:89)
t(cid:48)=0
9
The marginals P i
tained using (10), while P i
via
S(t) used throughout the text are ob-
R(t) are computed
I (t) and P i
R(t−1)+µi(t−1)P i
S(t−1),
P i
R(t) = P i
I (t) = 1−P i
P i
S(t)−P i
R(t).
(17)
(18)
The computational complexity of the DMP equations for
solving the dynamics up to time T is given by O(ET ),
where E is the number of edges in the graph, which
makes them scalable to sparse networks with millions of
nodes.
B. Enforcing dynamical constraints and backward
equations
The dynamics D and initial conditions I constraints
are enforced in a similar way to that of P and the bud-
get B constraints in Eqs. (7) and (8). To each generic
dynamic variable ξi(t) and message χk→i(t) we associate
the corresponding Lagrange multipliers λξ
k→i(t)
which enforce the relation between dynamic variables at
subsequent times. For instance, the evolution of the
R(t)}i∈V in the Lagrangian L is enforced
quantities {P i
i (t) and λχ
via the term(cid:88)
T−1(cid:88)
i (t+1)(cid:2)P i
λR
i∈V
t=0
R(t+1)−P i
R(t)−µi(t)P i
S(t)(cid:3) .
(12)
which coincides with the expression (10), except that
θi→k(t) is not included in the product on the right (∂k\i
denotes the set of neighbors of k without i). We also
have
P k→i
R (t) = P k→i
R (t−1) + µk(t−1)P k→i
S
(t),
(13)
which expresses the monotonic increase of P k→i
each time step with the probability µk(t−1)P k→i
R (t) at
(t), and
S
P k→i
I
(t) = 1−P k→i
S
(t)−P k→i
R (t)
(14)
due to the properties of linked probabilities. We are now
ready to formulate the last relation which leads to the
closure of the system of message-passing equations. The
evolution of the message φk→i(t) reads:
I
I
I
(t−1)
(t)−P k→i
(t−1) ≡ P k→i
φk→i(t) = (1−αki)φk→i(t−1)+∆P k→i
(15)
(t−1). The phys-
where ∆P k→i
ical meaning of equation (15) is as follows: φk→i(t) de-
creases if the activation signal is actually transmitted
(first term) and increases if node k transitions to the state
I at the current time step. Equations (10)-(15) can be
iterated in time starting from the given initial conditions
{P i
R(0)}i∈V , with
S(0), P i
I
I (0), P i
θi→j(0) = 1, φi→j(0) = δσ0
i ,I = P i
I (0).
(16)
Variation with respect to the dual variables λξ
i (t) and
λχ
k→i(t) returns the forward DMP equations (10)-(18),
while setting to zero the derivative of L with respect to
the primal dynamic variables yields the relations between
the Lagrange multipliers at subsequent times, which
we interpret as the backward dynamic equations in our
scheme. Similarly to (10)-(15), the backward equations
have a distributed message-passing structure with linear
computational complexity O(ET ), and are used to up-
date the values of control parameters νi(t) and µi(t) at
each iteration, taking into account the budget require-
ments (6). Specifically, initializing the control parame-
ters νi(t) and µi(t) to some arbitrary values (e.g., uniform
over all nodes and times), we first propagate the DMP
equations forward in time, up to the horizon T ; then,
using the existing primal parameter values we fix end-
point conditions for the dual parameters and propagate
the equations for the dual parameters backward in time,
updating the control parameters respecting the budget
and variation constraints. These two steps are iterated
for a predefined number of times or until global conver-
gence of the process.
In the large-scale problems, where the algorithm ex-
plores the space of parameters by hopping from one so-
lution to another, we choose a simple strategy: we run
the forward-backward algorithm for several iterations for
a range of values of the regularization parameter which
appears in the P block, and keep track of the best local
optimum which provides the solution to the optimization
problem after a maximum number of iterations (kept be-
low the desired threshold which determines the compu-
tational complexity) is reached. The choice of impacts
on the type of solution obtained: larger values of cor-
respond to solutions where the budget is disseminated
more uniformly across nodes, while smaller values lead
to weight concentration on particular nodes. Depending
on the application and the level of control over nodes,
one type of solution can be preferred to another; this
flexibility represents an attractive feature of the DMP
algorithm. An explicit form of the Lagrangian for the
problems considered in this work together with additional
details is given in the Appendices B and C.
10
Acknowledgments
The authors are grateful to M. Chertkov, S. Misra
and M. Vuffray for fruitful discussions and valuable com-
ments. A.Y. Lokhov acknowledges support from the
LDRD Program at Los Alamos National Laboratory
by the National Nuclear Security Administration of the
U.S. Department of Energy under Contract No. DE-
AC52-06NA25396. D. Saad acknowledges support from
the Leverhulme Trust RPG-2013-48.
Appendix A: Model and DMP equations
All models considered in the main text represent variants of a SIR model with possible spontaneous infection and vaccination
transitions. We refer to this model as generalized SIR model, because usually the spontaneous S → I and S → R transitions
are not considered; instead, the standard SIR model contains a spontaneous recovery transition I → R which was not relevant
for the examples considered in the paper and therefore was ignored. However, the inclusion of this transition in the DMP
equations is very easy and has been done in [42]. Hence, the model we consider here is defined as follows: at each time step t,
the transitions from the state S to I and R occur with the probabilities summarized in the Figure 5 for individual nodes and
edges. In the discrete time setting considered throughout the work, it may occur that both transitions to I and R states are
realized at the same time; in this case, we assume that the transition to the R state effectively takes place. Note that in the
continuous time setting (see Section D), this effect is of a second order in the discretization step dt, and hence this tie-breaking
rule is not required for sufficiently small dt.
FIG. 5: Transition diagram summarizing dynamic rules in the generalized SIR model considered in this work. In the case of a
simultaneous transition of a susceptible node (marked in yellow) to the states I (infected - red) and R (recovered - green) at
time t, it assumes a recovered state at the next time step.
The DMP equations associated with this model, as well as the intuition behind them are described in the Methods section
of the main text. We repeat them here for consistency:
(cid:32) t−1(cid:89)
(cid:33)(cid:32) t−1(cid:89)
P k→i
S
(t) = P k
S (0)
(1 − νk(t
(cid:48)
))
t(cid:48)=0
t(cid:48)=0
R (t − 1) + µk(t − 1)P k→i
P k→i
R (t) = P k→i
θk→i(t) = θk→i(t − 1) − αkiφk→i(t − 1),
φk→i(t) = (1 − αki)φk→i(t − 1) +
P k→i
(cid:104)(cid:16)
S
S
(t − 1),
(cid:33) (cid:89)
l∈∂k\i
(1 − µk(t
(cid:48)
))
θl→k(t),
(cid:17) −(cid:16)
R (t) − P k→i
P k→i
R (t − 1)
(t − 1) − P k→i
S
(t)
The initial conditions are
θi→j(0) = 1,
φi→j(0) = δσ0
i ,I = P i
I (0) = 1 − P i
S(0).
(cid:17)(cid:105)
.
(A1)
(A2)
(A3)
(A4)
(A5)
ijijISαijiν (t)iiIISIiμ (t)iiRS11
(A6)
(A7)
(A8)
(A9)
The marginal probabilities for nodes to be in the states S or I at time t are computed via
(cid:32) t−1(cid:89)
P i
S(t) = P i
(1 − νi(t
(cid:48)
S(0)
R(t − 1) + µi(t − 1)P i
t(cid:48)=0
))
P i
R(t) = P i
I (t) = 1 − P i
P i
S(t) − P i
R(t).
(cid:33) (cid:89)
k∈∂i
(1 − µi(t
(cid:48)
))
θk→i(t),
(cid:33)(cid:32) t−1(cid:89)
t(cid:48)=0
S(t − 1),
As explained in the main text, the optimization problem is stated in the form of a Lagrangian to be extremized:
L = O(cid:124)(cid:123)(cid:122)(cid:125)
(cid:124)
+B + D + I + P
,
(cid:123)(cid:122)
(cid:125)
objective
constraints
where O is the objective function one would like to maximize, and B, D, I and P correspond to the constraints representing
budget, dynamics, initial conditions and limits on the parameters, respectively. Below we discuss in detail how to obtain an
approximate solution to the optimal control problem using this framework, for the examples of the spread maximization or
minimization under different constraints. In all examples, we assume that budget constraints for spontaneous infections or
vaccination take a global form over a subset W ⊆ V of nodes in the network, and are specified at each time step:
νi(t) = Bν (t),
µi(t) = Bµ(t).
(A10)
(cid:88)
i∈W
(cid:88)
i∈W
Without loss of generality and for the sake of simplicity, in the equations below we assume that all nodes in the network are
controllable, W = V ; this case is the hardest in terms of the optimization procedure. Extending the derivation to the general
case of any subset W is straightforward (an illustration for the case W (cid:54)= V will be given in the Section B 3 below).
Appendix B: Maximizing information spread under special targeting policy
In this section, we write the detailed form of the Lagrangian for the targeting problem, explained in the main text: we assume
that for each node i ∈ V the activation is required at a predefined time ti. We derive the corresponding forward and backward
equations for the particular case of the generalized SIR model without a vaccination transition, i.e. assuming µi(t) = 0 for all
i ∈ V and t ∈ [0, T − 1].
1. Lagrangian formulation
The Lagrangian in this case takes the following form:
(cid:34)(cid:88)
(cid:123)(cid:122)
(cid:17)
(cid:125)
T−1(cid:88)
(cid:124)
(cid:34)
t=0
L =
S(ti)
+
λν
B(t)
νi(t) − Bν (t)
i∈V
B
S(t)(1 − νi(t))
S(t + 1) − P i
P i
λS
i (t + 1)
(cid:3) + log
(cid:104)
+
(cid:35)
(cid:125)
(cid:124)
(cid:89)
k∈∂i
T−1(cid:88)
(cid:88)
(cid:16)
t=0
i∈V
log(cid:2)νi(t) − νt
(cid:123)(cid:122)
(cid:35)
P
i
θk→i(t + 1)
θk→i(t)
θl→k(t + 1)
θl→k(t)
(cid:89)
(cid:105)
l∈∂k\i
(cid:105)(cid:17)
i − νi(t)
(cid:125)
νt
D
(cid:105)
λS
k→i(t + 1)
(t + 1) − P k→i
S
(t)(1 − νk(t))
λθ
k→i(t + 1)
θk→i(t + 1) − θk→i(t) + αkiφk→i(t)
S
P k→i
(cid:104)
(cid:104)
λφ
k→i(t + 1)
φk→i(t + 1) − (1 − αki)φk→i(t) − P k→i
(t) + P k→i
S
(t + 1)
S(0) − 1 + δσ0
(cid:104)
P i
θk→i(0) − 1
i ,I
+
+
λθ
k→i(0)
λS
k→i(0)
P k→i
S
(0) − 1 + δσ0
(cid:105)
k,I
λφ
k→i(0)
φk→i(0) − δσ0
.
k,I
(cid:105)
(cid:105)
(cid:88)
(cid:88)
(ki)∈E
(ki)∈E
(cid:104)
(cid:104)
(cid:105)
S
I
O
t=0
i∈V
i∈V
1 − P i
(cid:16)
(cid:88)
(cid:124)
(cid:123)(cid:122)
T−1(cid:88)
(cid:88)
T−1(cid:88)
(cid:88)
T−1(cid:88)
(cid:88)
T−1(cid:88)
(cid:88)
(cid:104)
(cid:88)
(cid:88)
λS
i (0)
(ki)∈E
(ki)∈E
(ki)∈E
i∈V
t=0
t=0
t=0
(ki)∈E
+
+
+
+
+
+
12
k→i(t) in D and I enforce the dynamics given by the
k→i(t) and λφ
In this expression, the dual variables λS
DMP equations as well as the initial conditions at time zero, while λν
B(t) is the corresponding Lagrange multiplier for the
budget constraint in B. The parameter constraint P has a form of the logarithmic barrier function, often used in constrained
optimization, forcing each of the parameters νi(t) to take vales inside the interval [νt
i ]; for sufficiently small value of a
positive coefficient , this regularization has a negligible impact on the objective function away from the extreme values.
k→i(t), λθ
i (t), λS
i , νt
Note that in the formulation above we have made an implicit assumption that αki < 1 for all (ki) ∈ E, so that the ratios
θk→i(t+1)
θk→i(t) are correctly defined. In most situations, the case αki = 1 for some (ki) ∈ E is somewhat trivial, because there is no
need for control for the nodes adjacent to these links. This assumption can be easily avoided by introducing other auxiliary
variables in order to decouple θk→i(t) at different times, which results in a slightly more complicated formulation.
2. Forward and backward equations
Once the form of the Lagrangian is established, we use a standard derivation with respect to primal and dual variables. The
k→i(t) give us back the direct DMP equations (A1)-(17),
B(t) yields the cost constraint (A10). Setting the derivatives with respect to the primal
variation with respect to the multipliers λS
while the variation with respect to λν
variables to zero leads to the following set of dual equations:
k→i(t) and λφ
k→i(t), λθ
i (t), λS
αkiλθ
k→i(t + 1) − (1 − αki)λφ
k→i(t + 1)
k→i(t) = 0,
∂L/∂φk→i(t) =
∂L/∂P k→i
S
(t) = λS
k→i(t) + λφ
k→i(t)
k→i(t + 1)(1 − νk(t))
∂L/∂θk→i(t) = λθ
k→i(t) − λθ
(cid:89)
θl→k(t + 1)
θl→k(t)
l∈∂k\i
k→i(t + 1)1[t (cid:54)= T ]
i→l(t)P i→l
λS
S
(t − 1)(1 − νi(t − 1))
−
λS
− (cid:88)
(cid:88)
+
l∈∂i\k
l∈∂i\k
i→l(t + 1)P i→l
λS
S
(t)(1 − νi(t))
1
θk→i(t)
− λS
i (t)P i
S(t − 1)(1 − νi(t − 1))
+ λS
i (t + 1)P i
S(t)(1 − νi(t))
1
∂L/∂P i
S(t) = −1[t = ti] + λS
θk→i(t − 1)
1
(cid:89)
m∈∂i\k
θm→i(t + 1)
θk→i(t)
i (t) − λS
θm→i(t)
m∈∂i
i (t + 1)(1 − νi(t))
(cid:105)
1[t (cid:54)= T ] + λφ
1[t (cid:54)= T ] = 0,
(cid:89)
θm→i(t)
+ λφ
k→i(t + 1)
θm→i(t − 1)
1[t (cid:54)= 0]
θk→i(t − 1)
1
(cid:89)
(cid:89)
m∈∂i\l
m∈∂i\{k,l}
θm→i(t + 1)
θm→i(t)
θm→i(t)
θm→i(t − 1)
1[t (cid:54)= T ]
1[t (cid:54)= 0]
1[t (cid:54)= T ] = 0.
(cid:89)
k∈∂i
θk→i(t + 1)
θk→i(t)
1[t (cid:54)= T ] = 0.
(cid:104)
(cid:88)
l∈∂i
(B1)
(B2)
(B3)
(B4)
(B5)
Finally, the variation with respect to the parameters νi(t) for t < T gives
∂L/∂νi(t) = λν
B(t) +
i→l(t + 1)P i→l
λS
S
(t)
(cid:89)
m∈∂i\l
+ λS
i (t + 1)P i
S(t)
θm→i(t + 1)
θm→i(t)
(cid:16)
+
νi(t) − νt
i
(cid:17) −
(cid:16)
i − νi(t)
νt
(cid:89)
(cid:17) = 0.
m∈∂i
θm→i(t + 1)
θm→i(t)
This set of forward and backward equations is sufficient for determining {νi}i∈V , using the following optimization procedure,
analogous to [43, 44]. First, Initialize νi(t) to some initial values, for example using the uniform assignment νi(t) = 1/N T for
all i ∈ V and t ∈ [0, T − 1]. Then repeat the following steps for a fixed number of iterations or until convergence:
1. Starting from the initial values for the dynamics variables (A5), propagate the DMP equations (A1)-(A8) forward, storing
the values of dynamic messages at different times.
2. Use equations (B1)-(B5) for fixing the boundary values of Lagrange multipliers at time T :
• (B1) assigns λφ
• (B2) gives λS
k→i(T ) = 0;
k→i(T ) = 0;
13
• (B4) gives λS
• (B5) sets λν
i (T ) = δti,T ;
B(T − 1) and νi(T − 1) through λS
(cid:16)
λν
B(t) + ψi(t) +
we first express νi(T − 1) for each i ∈ V as a function of λν
control parameters can take all possible values between 0 and 1, meaning that νt
t ∈ [0, T − 1], then there are two a priori possible solutions:
B(t) + ψi(t) − 2 ±(cid:112)(λν
λν
±
i (t) =
ν
B(t) + ψi(t))2 + 42
2λν
B(t) + 2ψi(t)
i (T ) and λS
νi(t) − νt
i
i − νi(t)
νt
(cid:17) = 0,
k→i(T ). Writing (B5) as
(cid:16)
(cid:17) −
B(T − 1) as a solution of the second order equation. When
i = 1 for all i ∈ V and
i = 0 and νt
(B6)
.
(B7)
Assuming that is positive, we choose the solution with the positive sign in front of the square root which always
i (t) < 1, thus expressing {νi(T − 1)}i∈V as a function of λν
B(T − 1)
leads to 0 < ν+
i (T − 1)}i∈V ) from the numerical solution of the budget constraint equation (A10).
(and hence {ν
±
• (B3) gives λθ
k→i(T ) through λS
B(T − 1). We then determine λν
k→i(T ) and νi(T − 1).
i (T ), λS
3. Using the computed values for dynamic messages at different times, propagate the equations (B1)-(B5) backward to
compute the values of the Lagrange multipliers and parameters at all times (compute values at time t given values at
times t + 1):
• Eq. (B1) gives λφ
• solve (B2) and (B4) for evaluating λS
• compute λν
k→i(t);
k→i(t) and λS
i (t), correspondingly.
B(t − 1) and νi(t − 1) using (B5) and (A10) in the same way as it has been done for t = T − 1, see
equation (B7);
• Eq. (B3) gives λθ
k→i(t) through λθ
k→i(t + 1), λS
i (t + 1), λS
k→i(t + 1), λS
i (t), λS
k→i(t), νi(t) and νi(t − 1).
4. Using the updated values of νi(t) in the step 1.
At each iteration, this procedure leads to "jumps" between local optima of the objective O verifying the budget con-
straint (A10), where we keep track of the best local optimum which provides the solution to the optimization problem after
a maximum number of iterations is reached. Additionally, several different initializations for {νi(t)}i,t and can be used in
this scheme in order to achieve the best solution. Note that the initial distribution of {νi(t)}i,t does not have to satisfy the
budget condition (A10), but the solutions obey the constraint already after the first forward-backward iteration. In the case
of a small number of nodes in the network N which corresponds to a simpler optimization landscape, we observed that the
scheme quickly converges to a unique optimum starting from an arbitrary initial condition. In the next subsection, we describe
tests of this scheme on a number of real-world networks.
3. Tests on real-world networks and comparisons with popular heuristics
For validating the optimization scheme and its performance against existing approaches, we test the algorithm on a particular
case of the targeting setting: the optimal seeding problem which corresponds to optimizing the initial conditions. Indeed, the
initial conditions at time one can be defined as an optimization over {νi(0)}i∈V at time t = 0 at which nodes will have a
spontaneous probability of switching to the infected state at time zero. This leads to a more general space of possible initial
conditions, without restrictions to a selection of an integer number of infected seeds. A classical setting corresponding to the
selection of a group of "influential spreaders" at initial time t = 1 can be recovered in our framework by imposing additional
constraints to the domain of variation of {νi(0)}i∈V , restricting them to take only values close to zero or one (e.g. using an
appropriate barrier potential).
a. Comparison with an explicit symbolic resolution of the DMP equations
As a validation example considered in the main text, we run the optimization scheme on a small network of relations between
Slovene parliamentary parties in 1994, depicted in the Figure 6. The nodes in this network correspond to Slovene political
parties in 1994, and the links represent the similarity relations estimated from a sociological survey of the parliament members
which were asked to estimate the distance between pairs of parties in the political space [50]. We have renormalized the weights
of edges in such a way that the maximum pairwise mutual "influence" receives the value αmax
ij = 0.5, and the other weights are
distributed proportionally to the survey data. We use this real-world network for the first tests in the seeding problem, which
14
FIG. 6: A small network of relations between Slovene parliamentary political parties from the social study of [50]. The edge
thickness is proportional to the estimated mutual "influence" αij between a pair of parties. Only red nodes are assumed to
be controllable in this network. The sizes of the nodes reflect the optimal distribution of the seeding budget Bν (0) = 1.5
for maximizing the global impact: small-size nodes do not require any control, and the spontaneous activation probabilities
associated with the medium and large-size nodes are equal to 0.5 and 1.0, respectively.
was defined as follows. We assumed that three nodes in this network belong to a controllable set W = 1, 3, 5, corresponding to
the parties SKD, ZS-ESS and SDSS, correspondingly. Given the total campaigning budget Bν (0) = 1.5, the goal is to maximize
the total informational "influence" at time T = 3 by finding the optimal initial distribution of the associated control parameters
ν1(0), ν5(0) and ν3(0) = 1.5 − ν1(0) − ν5(0).
O =(cid:80)
As suggested in subsection B 3, the forward-backward optimization scheme in this case converges to a unique optimal solution
in about 7 iterations with = 5 · 10−4 starting from an arbitrary initial values of the control parameters, outputting the values
ν∗
1 (0) = 0.993217 and ν∗
5 (0) = 0.505758. One advantage of this small test case is that we can check of the validity of the
scheme via an explicit symbolic resolution of DMP equations, obtaining a closed-form expression of the objective function
I (T ), representing the final spread at time T as a function of the independent control parameters ν1(0) and ν5(0):
O = − 0.0213192ν5(0)3ν1(0) − 0.0113728ν5(0)4 − 0.00149759ν5(0)3 + 0.125857ν5(0)2ν1(0)
i∈V P i
+ 1.19019ν5(0)2 + 1.05873ν5(0)ν1(0) − 1.5701ν5(0) − 0.00130489ν1(0)4 + 0.0456274ν1(0)3
− 0.754842ν1(0)2 + 1.74962ν1(0) − 0.00124248ν1(0)3ν5(0)2 − 0.00274613ν1(0)2ν5(0)3
− 0.00470875ν1(0)2ν5(0)2 + 0.00523158ν1(0)3ν5(0) + 0.121085ν1(0)2ν5(0) − 0.0017293ν1(0)ν5(0)4
− 2.9969 · 10
+ 0.000238133ν1(0)2ν5(0)4 + 0.000244127ν1(0)ν5(0)5 − 0.000234529ν5(0)5 + 8.23747 · 10
+ 2.10571 · 10
−6ν5(0)5ν1(0)2
+ 8.42285 · 10
−7ν5(0)4ν1(0)3 + 1.26343 · 10
−7ν5(0)7 + 3.63985.
−7ν5(0)3ν1(0)4 + 8.42285 · 10
−7ν5(0)6ν1(0) + 2.10571 · 10
−5ν1(0)3ν5(0)3 + 8.88018 · 10
−5ν5(0)6
−6ν1(0)4ν5(0)2 + 7.3384 · 10
−6ν1(0)4ν5(0)
The optimal parameter values can be obtained by a direct maximization of O(ν1(0), ν5(0)) plotted in Figure 2 of the main text.
The optimal parameter values are given in this case by ν∗
5 (0) = 0.5, see Figure 6, in full agreement with the
solution of the forward-backward iteration scheme up to domain border perturbations due to the finite value of .
1 (0) = 1.0 and ν∗
b. Description of popular heuristics used for comparisons on large real-world networks
In the main text, we described the performance of the DMP algorithm for the seeding problem on real-world networks of
different nature, topology and size, and presented comparisons with well-preforming heuristics in the case of deterministic
spreading in the SI model. Here we briefly describe the algorithms used for comparisons.
1. Naive strategies. As a reference, we present results obtained by a naive allocation of budget to randomly-selected
nodes (Random) and a uniform allocation of the budget in a probabilistic way (Uniform).
2. High degree adaptive (HDA). The algorithm is based on the idea that the best spreaders correspond to nodes with
the highest degree [17], which is a valid and reasonable assumption for a large number of models, including the SI model
considered here. The budget is iteratively attributed to the nodes with the current largest degree. Note the adaptive
nature of the algorithm: once the node is selected, it is effectively removed from the network, and the degrees of all nodes
SKDZLSDSDSSLDSZS-ESSZSDSSLSSPSSNSare recomputed accordingly; this strategy is much more efficient than the allocation of the budget to the high-degree
nodes computed once and for all nodes in the original graph.
3. k-shell decomposition.
In this algorithm, the influential spreaders are ranked according to their belonging to the
k-core with maximum k. However, it has been noted in [22] that while this strategy is successful in identifying a single
"influential" node, it performs badly when a group of nodes is selected, which is confirmed by our findings.
15
4. Collective influence. The relation between the destruction of the giant component and "optimal percolation" has been
suggested in [25], where the authors have put forward another topological centrality measure called Collective Influence,
defined as
CIl = (di − 1)
(dj − 1),
(cid:88)
j∈∂B(i,l)
(B8)
where ∂B(i, l) denotes the set of nodes at a distance l from node i. This topological characteristic results from mapping
the spreading process asymptotically onto percolation [58] (in a particular instance of the Linear Threshold model [59]).
The intuition behind this measure is that the "collective influence" of node i is not only given by its degree, but also
by the contribution of the degrees of nodes at a certain distance from it. However, on many graphs the number of
nodes in the set ∂B(i, l) grows exponentially with l, which makes the computation of CIl rather involved even for small
values of l. Similarly to HDA, the algorithm is adaptive: after an allocation of resources to the node with the highest
score, the measure is recomputed for all nodes. It is intuitive that in the case of a finite-time horizon objective, the best
performance should be attained for l ≤ T ; indeed, we find that l = 2 realizes the best choice for the algorithm, with CI4
leading to sub-optimal results in this near-deterministic spreading case.
Note that studying the minimization of the spread on networks is less interesting, because the optimal solution corresponds
to activating nodes in clusters which are disconnected from the majority of nodes belonging to the giant component.
Appendix C: Offline and online mitigation of epidemic via optimal vaccination
Here we consider the problem of spread minimization, for example in the case of an undesired spreading process such as
the propagation of epidemic. The minimization of the spread at time T is achieved by an effective distribution of vaccines
to vulnerable susceptible nodes in a dynamical fashion. We use the variant of the generalized SIR model with a vaccination
transition: the optimization parameters in this case are given by {µi(t)}i∈V for t ∈ [0, T − 1], and we assume that the
spontaneous transition to the I state is absent, meaning that νi(t) = 0 for all i and t. Modifications with respect to the case
considered previously in the Section B include:
1. We are interested in maximizing the objective(cid:80)
(cid:0)1 − P i
I (T )(cid:1) =(cid:80)
i∈V
(cid:0)P i
has a different sign with respect to the previous case of the spread maximization;
R(T )(cid:1) at this time, so the objective
i∈V
S(T ) + P i
2. Since now nodes can transit to the R state, we additionally need to keep track of the evolution of the quantities P i
R(t)
and P i→j
R (t);
3. Similarly to the formulation in the spread maximization, it is possible to include additional information on a list of target
nodes which require priority protection, thus forcing the optimization to minimize the probability of infection on "key"
nodes first;
4. In the setting of "online" mitigation of the spreading process one should reinitialize the optimization process at each
time step once the new state of the network is available, getting a more accurate and updated account of the state of
the system. One then solves the optimization problem of spread minimization at the horizon t = T for the allocation
of resources at the next time step only (seeding problem) using new data as initial conditions for the DMP equations.
Running optimization for a few more time steps results in a vaccine distribution plan with forcasted estimates, which
might be an important feature in realistic settings.
1. Lagrangian and forward-backward equations
The corresponding Lagrangian in the case of spreading minimization under vaccination constraints takes the following form:
L =
S(T ) + P i
P i
R(T )
µi(t) − Bµ(t)
(cid:17)
(cid:125)
T−1(cid:88)
(cid:124)
t=0
+
λµ
B(t)
(cid:34)(cid:88)
(cid:123)(cid:122)
i∈V
B
(cid:34)
(cid:104)
λS
i (t + 1)
S(t + 1) − P i
P i
S(t)(1 − µi(t))
λR
i (t + 1)
R(t + 1) − P i
P i
R(t) − µi(t)P i
S(t)
(cid:35)
(cid:125)
+
(cid:124)
T−1(cid:88)
t=0
(cid:88)
(cid:35)
i∈V
θk→i(t + 1)
θk→i(t)
(cid:89)
(cid:105)
k∈∂i
16
(cid:3) + log
(cid:16)
log(cid:2)µi(t) − µt
(cid:123)(cid:122)
i
P
(cid:104)
(cid:105)(cid:17)
i − µi(t)
(cid:125)
µt
(cid:123)(cid:122)
O
t=0
t=0
i∈V
i∈V
i∈V
(cid:16)
(cid:88)
(cid:124)
T−1(cid:88)
(cid:88)
(cid:88)
T−1(cid:88)
T−1(cid:88)
(cid:88)
(cid:88)
T−1(cid:88)
T−1(cid:88)
(cid:88)
(cid:88)
T−1(cid:88)
(cid:88)
(cid:88)
λS
i (0)
(ki)∈E
(ki)∈E
(ki)∈E
(ki)∈E
i∈V
t=0
t=0
t=0
t=0
+
+
+
+
+
+
+
+
(ki)∈E
(cid:104)
λS
k→i(t + 1)
λR
k→i(t + 1)
(t + 1) − P k→i
S
(t)(1 − µk(t))
R (t + 1) − P k→i
P k→i
R (t) − µk(t)P k→i
S
(t)
λθ
k→i(t + 1)
θk→i(t + 1) − θk→i(t) + αkiφk→i(t)
θl→k(t + 1)
θl→k(t)
(cid:89)
l∈∂k\i
(cid:105)
(cid:105)
S
P k→i
(cid:104)
(cid:104)
(cid:104)
(cid:105)
(cid:88)
λφ
k→i(t+1)
φk→i(t+1)−(1−αki)φk→i(t)−P k→i
S
(t)+P k→i
S
(t+1)−P k→i
R (t)+P k→i
R (t+1)
(cid:105)
(cid:88)
(cid:104)
(cid:105)
+
i ,S
S(0) − δσ0
(cid:104)
P i
i∈V
R (0) − δσ0
P k→i
(cid:105)
k,R
λR
k→i(0)
λR
i (0)
R(0) − δσ0
(cid:104)
P i
λθ
k→i(0)
+
i ,R
(ki)∈E
θk→i(0) − 1
(cid:105)
+
(ki)∈E
λS
k→i(0)
P k→i
S
(cid:88)
+
(ki)∈E
(0) − δσ0
(cid:104)
k,S
λφ
k→i(0)
φk→i(0) − δσ0
k,I
(cid:104)
(cid:88)
(cid:105)
D
I
(cid:105)
.
The variation of the Lagrangian with respect to the dual variables yield the forward DMP equations (A1)-(A8). The
derivation of the backward equations follow the same principles as in the case of the SI model, with obvious modifications:
change of the control parameters νi(t) → µi(t), additional equations
∂L/∂P i
∂L/∂P k→i
R(t) = 1[t = T ] + λR
k→i(t) − λR
R (t) = λR
i (t + 1)1[t (cid:54)= T ] = 0,
i (t) − λR
k→i(t + 1)1[t (cid:54)= T ] + λφ
k→i(t) − λφ
k→i(t + 1)1[t (cid:54)= T ] = 0,
and additions to the previous backward equations due to the new terms
S(t) = −λR
∆∂L/∂P i
∆∂L/∂P k→i
∆∂L/∂µi(t) = −λR
(t) = −λR
S
i (t + 1)µi(t)1[t (cid:54)= T ],
k→i(t + 1)µk(t)1[t (cid:54)= T ],
S(t) − (cid:88)
k∈∂i
i (t + 1)P i
i→k(t + 1)P i→k
λR
S
(t).
(C1)
(C2)
(C3)
(C4)
(C5)
2. Description of the data set used for tests
As a test example for the vaccination problem, we constructed a transportation network of busiest flight routes between
major U.S. airports, extracted from the publicly available Bureau of Transportation Statistics data [55]. We used the data table
providing the number of transported passengers by different companies between U.S. airports over the past several years. First
of all, we extracted the sub-table of flights between 61 biggest airports in terms of the total number of emplaned passengers per
year, including 30 "major" and 31 "largest" hubs according to the BTS classification. Then multiple entries corresponding to
the same route have been aggregated, and the routes carrying less then 10% of the passengers transported by the busiest route
have been pruned as less significant ones, primarily for rending the network reasonably sparse for a clear visualization. This
resulted in a network with M = E = 383 edges. Finally, we have assigned the spreading couplings αij (ij)∈E proportionally to
the number of carried passengers in such a way that the lightest route had the value αmin
ij = 0.05, and hence the busiest route
ij (cid:39) 0.495. This choice is based on a reasonable assumption that the probability of infection transmission
received the value αmax
along each link is proportional to the number of carried passengers on this route.
Appendix D: Case of continuous dynamics
17
The optimization procedure described in this work can be directly applied to the case of continuous dynamics, which might
be more relevant in other applications. In the continuous case, the backward equations are obtained through the variation of
the Lagrangian resulting in the continuous Euler-Lagrange equations. In this section, we illustrate the approach in the setting
of maximizing the spread in the SI model using the continuous version of the DMP equations.
1. Maximization of spread at the time horizon T
In the continuous case, the marginal probability for node i to be in the state S at time t reads
P i
S(t) = P i
S(0)
θk→i(t).
(D1)
−νi(t(cid:48))t(cid:48)(cid:19) (cid:89)
(cid:48)
dt
e
(cid:18)(cid:90) t
0
k∈∂i
In the case of constant rates αij, we define the transmission function as fij(t) = αije−αij t. Then the functions θi→j(t) are
computed as follows [40]:
(cid:90) t
0
θi→j(t) = 1 −
dτ fij(τ )
−αij t + P i
= e
S(0)αije
1 − P i
(cid:90) t
−αij t
S(0)
(cid:18)(cid:90) t−τ
0
dτ eαij τ
(cid:48)
−νi(t(cid:48))t(cid:48)(cid:19) (cid:89)
(cid:18)(cid:90) τ
e
k∈∂i\j
−νi(t(cid:48))t(cid:48)(cid:19) (cid:89)
(cid:48)
dt
dt
e
0
0
k∈∂i\j
θk→i(t − τ )
θk→i(τ ).
(D2)
In order to compute the dynamic messages θi→j(t), we can either integrate the Eq. (D2) numerically, or transform it into an
ordinary differential equation by differentiating with respect to t:
θi→j(t) = −αijθi→j(t) + αijP i
S(0)
(cid:48)
dt
e
θk→i(t),
(D3)
(cid:18)(cid:90) t
0
−νi(t(cid:48))t(cid:48)(cid:19) (cid:89)
k∈∂i\j
which represents the dynamics of θi→j(t) (the dot notation represents d
conditions θi→j(0) = 1. To derive the dynamics of P i
S(t) one can differentiate (D1) to obtain:
dt ) and can be solved numerically starting from initial
Maximizing O =(cid:80)
P i
S(t) = P i
S(0)e
θk→i(t) + P i
S(t)
−νi(t)t (cid:89)
k∈∂i
(cid:88)
k∈∂i
i∈V P i
I (T ) is equivalent to minimizing
O(T ) =
P i
S(T ) =
(cid:90) T
0
(cid:88)
i∈V
P i
S(t)dt
under the constraints imposed by (D3), (D4) and the budget constraint (A10)
(cid:88)
i∈V
(cid:88)
i∈V
νi(t) = Bν (t).
θk→i(t)
θk→i(t)
.
(D4)
(D5)
(D6)
All constraints will be imposed by the corresponding Lagrange multipliers. The Lagrangian to be extremized takes the form
(cid:18)(cid:90) t
0
S(0)
P i
S(t) + λν
λθ
i→j(t)
i∈V
B(t)
(cid:34)(cid:88)
νi(t) − Bν (t)
(cid:35)
θi→j(t) + αijθi→j(t) − αijP i
(cid:35)
−νi(t)t (cid:89)
(cid:34)(cid:88)
S(0)e
νi(t) − Bν (t)
k∈∂i
B(t)
P i
S(t) + λν
(cid:20)
i∈V
λθ
i→j(t)
θi→j(t) + αijθi→j(t) − αij
P i
S(t)
θj→i(t)
S(t) − P i
P i
θk→i(t) − P i
S(t)
0
i∈V
(i,j)∈E
(cid:40)(cid:88)
(cid:90) T
(cid:88)
(cid:88)
(cid:40)(cid:88)
(cid:90) T
(cid:88)
(cid:88)
(i,j)∈E
λS
i (t)
i∈V
i∈V
λS
i (t)
0
i∈V
(cid:34)
(cid:34)
L =
+
+
=
+
+
S(t) − P i
P i
S(0)e
θk→i(t)
18
(D7)
−νi(t(cid:48))t(cid:48)(cid:19) (cid:89)
(cid:35)(cid:41)
k∈∂i\j
θk→i(t)
θk→i(t)
dt
(cid:35)(cid:41)
dt
θk→i(t)
θk→i(t)
e
(cid:48)
dt
(cid:88)
k∈∂i
(cid:88)
k∈∂i
(cid:21)
−νi(t)t (cid:89)
(cid:90) T
k∈∂i
L =
0
θk→i(t) − P i
S(t)
F (t, y, y) dt
Variational maximization of a Lagrangian
where F (t, y, y) is a function of some variable t, y and y its derivative with respect to t, is carried out by varying y with respect
to a small perturbation → 0, throughout the t interval [60], to y + δy. Extremizing L by setting dL
d = 0 and using integration
by parts one obtains the optimization condition
Both the Euler-Lagrange equation
Varying (D7) with respect to δP i
(cid:12)(cid:12)(cid:12)(cid:12)=0
dL
d
(cid:20) ∂F
(cid:90) T
(cid:105)
0
(cid:21)
(cid:20) ∂F
(cid:21)T
(cid:104) ∂F
∂ y
0
should be zero.
− d
dt
∂F
∂ y
λS
=
∂y
∂ y
0
∂F
∂ y
dt
= 0 .
δy dt +
(cid:88)
λθ
i→jαij
θj→i(t)
and the boundary conditions
(cid:104) ∂F
∂y − d
S(t) and δθi→j(t) results in the following differential equations:
i (t) = −(cid:88)
P j
i→j(t)αij − (cid:88)
(cid:105)T
(cid:89)
+ λS
−νj (t)t (cid:89)
k∈∂j/i
j→k(t)αjkP j
λθ
S(t)
θk→j(t)θi→j(t)
θk→j(t) − P j
θk→i(t)
θk→i(t)
i→j(t)αij + λθ
P j
S(t)
θi→j(t)
S(t)
θi→j(t)
− δt,0λS
− δt,0λS
θk→i(0),
[θi→j(t)]2
(cid:89)
j→i(t)αji
− λS
j (0)P j
− λS
= λθ
S(0)e
S(t)
S(t)
i (0)
k∈∂i
k∈∂i
j∈∂i
j (t)
j (t)
i (t)
P j
λθ
i→j(t) = λθ
k∈∂j/i
θk→i(0),
k∈∂j/i
(D8)
(D9)
,
where the expression for θk→i(t) in both equations (D8) and (D9) are calculated on the basis of (D3) and the expressions for
λS
j (t) and P j
S(t) in (D9) are taken from (D8) and (D4), respectively, and were employed in the simplifications of (D9). These
equations will be integrated back on the basis of end points.
Varying (D7) with respect to δνi(t) one obtains:
which can be re-written as
Using the condition(cid:80)
B(t) = −tλS
λν
i (t)P i
S(0)e
(cid:20)
νi(t) = − 1
t
ln
−
k∈∂i
−νi(t)t (cid:89)
S(0)(cid:81)
(cid:34)
B(t)
λν
θk→i(t) ,
(cid:21)
k∈∂i θk→i(t)
−tλS
i (t)P i
S(0)
.
(cid:35)
.
θk→i(t)
(cid:89)
k∈∂i
tλS
i (t)P i
(cid:88)
i∈V
1
t
ln
i∈V νi(t) = Bν (t) we obtain
Bν (t) = − N
t
ln λν
B(t) +
(D10)
(D11)
(D12)
That leads to a straightforward solution for λν
(cid:34)
−tλS
i (t)P i
S(0)
ln
19
(cid:89)
k∈∂i
θk→i(t)
(cid:35)
− t
N
(cid:41)
Bν (t)
,
(D13)
(cid:40)
B(t)
(cid:88)
i∈V
1
N
λν
B(t) = exp
from which the νi(t) values can be calculated.
Remark: An alternative path to the derivation of (D11) and (D13) consists in directly using the normalized representation
e−βi(t)
j∈V e−βj (t) Bν (t) .
instead of enforcing the budget constraint with the Lagrange multiplier λν
βi(t) in this case it is then possible to use
νi(t) =
(cid:80)
Optimization with respect to βi(t) gives
νi(t) =
which is equivalent to (D11) and (D13). (cid:4)
= −(cid:88)
j∈V
∂
∂βk
(cid:80)
[δjkνk(t) − νk(t)νj(t)]
∂
∂νj
.
λS
i (t)P i
j∈V λS
j (t)P j
k∈∂i θk→i(t)
k∈∂j θk→j(t)
S(0)e−νi(t)t(cid:81)
S(0)e−νj (t)t(cid:81)
(cid:105)
(cid:104)
1 + λS
i (0)
S(0)
(cid:35)
j (T )
S(T )λS
θj→i(T )
− δθi→j(0)
(cid:104)
(cid:34)
(cid:105) − δP i
i (T )
i→j(T ) − P j
λθ
0 = δP i
S(T )
1 + λS
0 = δθi→j(T )
Additionally, one should enforce the boundary conditions in the two sets of equations:
Since δP i
S(0) = δθi→j(0) = 0 ∀i, j ∈ V it provides the end conditions:
i (T ) = −1
λS
P j
S(T )
θj→i(T )
λθ
i→j(T ) =
.
B(t) in (D7). For the optimization with respect to
Bν (t) ,
(D14)
(cid:34)
i→j(0) − P j
λθ
j (0)
S(0)λS
θj→i(0)
(cid:35)
.
(D15)
(D16)
(D17)
(D18)
Note that λS
λS
i (T ) = 1.
i (T ) = −1 is a result of the minimization of O(T ); a maximization of O would provide a boundary condition of
The optimization process should be carried out as follows:
1. Using the initial conditions θi→j(0) = 1 ∀i and P i
S(0) according to the case studied, and some valid initial set of νi(t)
(can be uniform), one can solve forward the equations (D3) and (D4) to obtain (and register) values throughout the
dynamics t = 0 → T .
2. Using the boundary conditions (D18) and (D17) one solve backward (D8) and (D9) and updates the values of νi(t)
according to (D13) and (D11).
3. The process is repeated until it converges and the final νi(t) values represent the solution.
2. Continuous dynamics with targeted and accessible nodes
In this variant of the problem one targets specific nodes i ∈ U where U ⊆ V is the subset of all nodes V , aiming to maximize
the impact at predefined times ti, which may be different for each of the nodes. We will define T ≡ maxi∈U ti. We also assume
one has access to a subset on the nodes i ∈ W where W ⊆ V and W ∩ U = ∅. Again, maximizing O is equivalent to minimizing
Since the budget for nodes i /∈ W is zero by definition νi(t) = 0,∀i /∈ W,∀t, and the cost constraint corresponding to (A10)
becomes
νi(t) = Bν (t) ,
(D20)
P i
S(ti) =
P i
S(t) dt .
(D19)
(cid:88)
i∈U
O =
(cid:90) ti
(cid:88)
i∈U
0
(cid:88)
i∈W
(i,j)∈E
0
P i
(cid:90) ti
(cid:40) (cid:88)
(cid:34)
P i
λS
i (t)
(cid:90) ti
(cid:40) (cid:88)
(cid:34)
0
λS
i (t)
(i,j)∈E
0
i∈U
(cid:88)
(cid:90) T
(cid:88)
(cid:88)
(cid:90) T
(cid:88)
i∈U
i∈V
0
i∈V
L =
+
+
=
+
+
S(t) dt
λθ
i→j(t)
S(t) − P i
P i
S(t) dt
(cid:20)
θi→j(t) + αijθi→j(t) − αijP i
−νi(t)t (cid:89)
θk→i(t) − P i
S(0)e
S(t)
k∈∂i
S(0)
(cid:48)
e
dt
θk→i(t)
−νi(t(cid:48))t(cid:48)(cid:19) (cid:89)
(cid:35)(cid:41)
k∈∂i\j
θk→i(t)
θk→i(t)
dt
(cid:18)(cid:90) t
(cid:88)
0
k∈∂i
(cid:21)
(cid:88)
k∈∂i
where we can use the normalized representation where βi(t) = −∞,∀i /∈ W,∀t,
(cid:80)
e−βi(t)
j∈V e−βj (t) Bν (t) .
νi(t) =
20
The Lagrangian to be extremized takes the form (the budget constraint on accessible nodes (D19) is embedded in the
corresponding ν variables through β, as remarked in Sec. D 1
Alternatively, the first term can be written as
λθ
i→j(t)
θi→j(t) + αijθi→j(t) − αij
P i
S(t)
θj→i(t)
S(t) − P i
P i
S(0)e
θk→i(t) − P i
S(t)
(cid:35)(cid:41)
dt
θk→i(t)
θk→i(t)
(D21)
−νi(t)t (cid:89)
(cid:90) T
(cid:88)
k∈∂i
0
i∈U
S(t)Θ(ti − t) dt.
P i
Since the first term does not contribute to the Euler-Lagrange equation, varying (D21) with respect to δP i
δνi(t) results in the same differential equations for λS
i (t) (D8) and λij(t) (D9).
Optimization with respect to βi(t) or νi(t) gives a similar expression for i ∈ W (D14) but νi(t) = 0,∀i /∈ W and ∀t.
Additionally, one should enforce the boundary conditions in the two sets of equations (D15) and (D16). For j ∈ U (D15)
and (D16) are the same as in the non-targeted case, but for j /∈ U there is no constant (of value 1) in (D15) leading to:
S(t), δθi→j(t) and
(cid:40)−1 ∀ i /∈ U
(cid:40)0
∀ i /∈ U
0
P j
S (tj )
θj→i(tj )
∀ i /∈ U
∀ j ∈ U
.
(D22)
(D23)
λS
i (T ) =
λθ
i→j(tj) =
The optimization process should be carried out as before.
[1] Anderson, R. M., May, R. M. & Anderson, B. Infectious
diseases of humans: dynamics and control, vol. 28 (Wiley
Online Library, 1992).
[2] Boccaletti, Stefano and Latora, Vito and Moreno, Yamir
and Chavez, Martin and Hwang, D.-U. Complex net-
works: Structure and dynamics. Physics reports 424,
175 -- 308 (2006).
[3] Rogers, E. M. Diffusion of innovations (Simon and
Schuster, 2010).
[4] Pastor-Satorras, R., Castellano, C., Van Mieghem, P. &
Vespignani, A. Epidemic processes in complex networks.
Reviews of modern physics 87, 925 (2015).
[5] Federal Energy Regulatory Commission and North
American Electric Reliability Corporation Staff. Ari-
zona - southern california outages on september 8, 2011:
causes and recommendations. Tech. Rep. (2012).
[6] Dawood, F. S. et al. Estimated global mortality associ-
ated with the first 12 months of 2009 pandemic influenza
a h1n1 virus circulation: a modelling study. The Lancet
infectious diseases 12, 687 -- 695 (2012).
[7] U.S. Government Accountability Office. Financial regula-
tory reform: financial crisis losses and potential impacts
of the dodd-frank act. Tech. Rep. (2012).
[8] Lokhov, A. Y., Lemons, N., McAndrew, T. C., Hagberg,
A. & Backhaus, S. Detection of cyber-physical faults and
intrusions from physical correlations. In ACM SIGKDD
Workshop on Outlier Definition, Detection and Descrip-
tion on Demand (ODD 4.0) (2016).
[9] Als association.
http://www.alsa.org/fight-als/
ice-bucket-challenge.html.
[10] Rutledge, P. How obama won the social media battle in
the 2012 presidential campaign. The National Psycholo-
gist (2013).
[11] Epstein, R. & Robertson, R. E. The search engine manip-
ulation effect (seme) and its possible impact on the out-
comes of elections. Proceedings of the National Academy
of Sciences 112, E4512 -- E4521 (2015).
[12] Margetts, H., John, P., Hale, S. & Yasseri, T. Political
Turbulence: How Social Media Shape Collective Action
(Princeton University Press, 2015).
[13] Domingos, P. & Richardson, M. Mining the network
value of customers. In Proceedings of the seventh ACM
SIGKDD international conference on Knowledge discov-
ery and data mining, 57 -- 66 (ACM, 2001).
[14] Martin, K. R. et al. Computational model for autophagic
vesicle dynamics in single cells. Autophagy 9, 74 -- 92
(2013).
[15] Csermely, P., Korcsm´aros, T., Kiss, H. J., London, G. &
Nussinov, R. Structure and dynamics of molecular net-
works: a novel paradigm of drug discovery: a comprehen-
sive review. Pharmacology & therapeutics 138, 333 -- 408
(2013).
[16] Jones, S. Army revives chindits as 'facebook warriors'
for smart battle. Financial Times (2015).
[17] Pastor-Satorras, R. & Vespignani, A. Immunization of
complex networks. Phys. Rev. E 65, 036104 (2002).
[18] Cohen, R., Havlin, S. & Ben-Avraham, D. Efficient im-
munization strategies for computer networks and popu-
lations. Phys. Rev. Lett. 91, 247901 (2003).
[19] Holme, P., Kim, B. J., Yoon, C. N. & Han, S. K. At-
tack vulnerability of complex networks. Phys. Rev. E 65,
056109 (2002).
[20] Holme, P. Efficient local strategies for vaccination and
network attack. EPL (Europhysics Letters) 68, 908
(2004).
[21] Chen, Y., Paul, G., Havlin, S., Liljeros, F. & Stanley,
H. E. Finding a better immunization strategy. Phys.
Rev. Lett. 101, 058701 (2008).
[22] Kitsak, M. et al. Identification of influential spreaders in
complex networks. Nature Physics 6, 888 -- 893 (2010).
[23] Borge-Holthoefer, J. & Moreno, Y. Absence of influential
spreaders in rumor dynamics. Phys. Rev. E 85, 026116
(2012).
[24] H´ebert-Dufresne, L., Allard, A., Young, J.-G. & Dub´e,
L. J. Global efficiency of local immunization on complex
networks. Scientific reports 3 (2013).
[25] Morone, F. & Makse, H. A. Influence maximization in
complex networks through optimal percolation. Nature
(2015).
[26] Mugisha, S. & Zhou, H.-J. Identifying optimal targets
of network attack by belief propagation. arXiv preprint
arXiv:1603.05781 (2016).
[27] Braunstein, A., Dall'Asta, L., Semerjian, G. & Zde-
arXiv preprint
Network dismantling.
borov´a, L.
arXiv:1603.08883 (2016).
[28] Altarelli, F., Braunstein, A., DallAsta, L., Wakeling,
J. R. & Zecchina, R. Containing epidemic outbreaks
by message-passing techniques. Phys. Rev. X 4, 021024
21
(2014).
[29] Altarelli, F., Braunstein, A., DallAsta, L. & Zecchina,
R. Optimizing spread dynamics on graphs by message
passing. Journal of Statistical Mechanics: Theory and
Experiment 2013, P09011 (2013).
[30] Guggiola, A. & Semerjian, G. Minimal contagious sets
in random regular graphs. Journal of Statistical Physics
158, 300 -- 358 (2015).
[31] Kempe, D., Kleinberg, J. & Tardos, ´E. Maximizing the
spread of influence through a social network. In Proceed-
ings of the ninth ACM SIGKDD international confer-
ence on Knowledge discovery and data mining, 137 -- 146
(ACM, 2003).
[32] Chen, W., Lakshmanan, L. V. & Castillo, C. Information
and influence propagation in social networks. Synthesis
Lectures on Data Management 5, 1 -- 177 (2013).
[33] Du, N., Song, L., Gomez-Rodriguez, M. & Zha, H. Scal-
able influence estimation in continuous-time diffusion
networks.
In Advances in Neural Information Process-
ing Systems, 3147 -- 3155 (2013).
[34] Nowzari, C., Preciado, V. M. & Pappas, G. J. Analysis
and control of epidemics: A survey of spreading processes
on complex networks. IEEE Control Systems 36, 26 -- 46
(2016).
[35] Borgs, C., Chayes, J., Ganesh, A. & Saberi, A. How to
distribute antidote to control epidemics. Random Struc-
tures & Algorithms 37, 204 -- 222 (2010).
[36] Nian, F. & Wang, X. Efficient immunization strategies
on complex networks. Journal of theoretical biology 264,
77 -- 83 (2010).
[37] Scaman, K., Kalogeratos, A. & Vayatis, N. A greedy
approach for dynamic control of diffusion processes in
networks. In Tools with Artificial Intelligence (ICTAI),
2015 IEEE 27th International Conference on, 652 -- 659
(IEEE, 2015).
[38] Drakopoulos, K., Ozdaglar, A. & Tsitsiklis, J. N. An
efficient curing policy for epidemics on graphs.
IEEE
Transactions on Network Science and Engineering 1, 67 --
75 (2014).
[39] Shapiro, M. & Delgado-Eckert, E. Finding the probabil-
ity of infection in an sir network is np-hard. Mathematical
biosciences 240, 77 -- 84 (2012).
[40] Karrer, B. & Newman, M. E. J. Message passing ap-
proach for general epidemic models. Phys. Rev. E 82,
016101 (2010).
[41] Shrestha, M. & Moore, C. Message-passing approach for
threshold models of behavior in networks. Phys. Rev. E
89, 022805 (2014).
[42] Lokhov, A. Y., M´ezard, M. & Zdeborov´a, L. Dynamic
message-passing equations for models with unidirectional
dynamics. Phys. Rev. E 91, 012811 (2015).
[43] Le Cun, Y., Touresky, D., Hinton, G. & Sejnowski, T. A
theoretical framework for back-propagation. In The Con-
nectionist Models Summer School, vol. 1, 21 -- 28 (1988).
[44] Saad, D. & Rattray, M. Globally optimal parameters
for on-line learning in multilayer neural networks. Phys.
Rev. Lett. 79, 2578 (1997).
[45] De Domenico, M., Porter, M. A. & Arenas, A. Muxviz: a
tool for multilayer analysis and visualization of networks.
Journal of Complex Networks cnu038 (2014).
[46] Krebs, V. E. Mapping networks of terrorist cells. Con-
nections 24, 43 -- 52 (2002).
[47] Pinto, P. C., Thiran, P. & Vetterli, M. Locating the
22
source of diffusion in large-scale networks. Phys. Rev.
Lett. 109, 068702 (2012).
[48] Lokhov, A. Y., M´ezard, M., Ohta, H. & Zdeborov´a, L. In-
ferring the origin of an epidemic with a dynamic message-
passing algorithm. Phys. Rev. E 90, 012801 (2014).
[49] Altarelli, F., Braunstein, A., Dall'Asta, L., Lage-
Castellanos, A. & Zecchina, R. Bayesian inference of
epidemics on networks via belief propagation. Phys. Rev.
Lett. 112, 118701 (2014).
[50] Doreian, P. & Mrvar, A. A partitioning approach to
structural balance. Social networks 18, 149 -- 168 (1996).
[51] Subelj, L. & Bajec, M. Robust network community detec-
tion using balanced propagation. The European Physical
Journal B 81, 353 -- 362 (2011).
[52] Bu, D. et al. Topological structure analysis of the
protein -- protein interaction network in budding yeast.
Nucleic acids research 31, 2443 -- 2450 (2003).
[53] Leskovec, J., Kleinberg, J. & Faloutsos, C. Graph evolu-
tion: Densification and shrinking diameters. ACM Trans-
actions on Knowledge Discovery from Data (TKDD) 1,
2 (2007).
[54] Boldi, P., Codenotti, B., Santini, M. & Vigna, S. Ubi-
Crawler: A scalable fully distributed web crawler. Soft-
ware: Practice & Experience 34, 711 -- 726 (2004).
[55] Bureau of transportation statistics. http://www.rita.
dot.gov/bts/.
[56] AJ, T., DJ, R. & SI, H. Global transport networks and
infectious disease spread. Advances in Parasitology 62,
293 -- 343 (2006).
[57] Lokhov, A. Y. & Misiakiewicz, T. Efficient reconstruction
of transmission probabilities in a spreading process from
partial observations. arXiv preprint arXiv:1509.06893
(2015).
[58] Newman, M. E. Spread of epidemic disease on networks.
Phys. Rev. E 66, 016128 (2002).
[59] Granovetter, M. Threshold models of collective behavior.
American journal of sociology 1420 -- 1443 (1978).
[60] Hildebrand, F. B. Methods of applied mathematics
prentice-hall. New Jersey. pp 36 -- 122 (1965).
|
1701.05352 | 1 | 1701 | 2017-01-19T10:05:55 | Finding low-tension communities | [
"cs.SI",
"physics.soc-ph"
] | Motivated by applications that arise in online social media and collaboration networks, there has been a lot of work on community-search and team-formation problems. In the former class of problems, the goal is to find a subgraph that satisfies a certain connectivity requirement and contains a given collection of seed nodes. In the latter class of problems, on the other hand, the goal is to find individuals who collectively have the skills required for a task and form a connected subgraph with certain properties.
In this paper, we extend both the community-search and the team-formation problems by associating each individual with a profile. The profile is a numeric score that quantifies the position of an individual with respect to a topic. We adopt a model where each individual starts with a latent profile and arrives to a conformed profile through a dynamic conformation process, which takes into account the individual's social interaction and the tendency to conform with one's social environment. In this framework, social tension arises from the differences between the conformed profiles of neighboring individuals as well as from differences between individuals' conformed and latent profiles.
Given a network of individuals, their latent profiles and this conformation process, we extend the community-search and the team-formation problems by requiring the output subgraphs to have low social tension. From the technical point of view, we study the complexity of these problems and propose algorithms for solving them effectively. Our experimental evaluation in a number of social networks reveals the efficacy and efficiency of our methods. | cs.SI | cs |
Finding low-tension communities
Esther Galbrun
Behzad Golshan
Inria Nancy -- Grand Est, France
Recruit Institute of Technology, CA, USA
[email protected]
[email protected]
Aristides Gionis
Evimaria Terzi
Aalto University, Finland
Boston University, MA, USA
[email protected]
[email protected]
Abstract
Motivated by applications that arise in online social media and collaboration networks, there has been a
lot of work on community-search and team-formation problems. In the former class of problems, the goal is to
find a subgraph that satisfies a certain connectivity requirement and contains a given collection of seed nodes.
In the latter class of problems, on the other hand, the goal is to find individuals who collectively have the
skills required for a task and form a connected subgraph with certain properties.
In this paper, we extend both the community-search and the team-formation problems by associating each
individual with a profile. The profile is a numeric score that quantifies the position of an individual with respect
to a topic. We adopt a model where each individual starts with a latent profile and arrives to a conformed
profile through a dynamic conformation process, which takes into account the individual's social interaction
and the tendency to conform with one's social environment.
In this framework, social tension arises from
the differences between the conformed profiles of neighboring individuals as well as from differences between
individuals' conformed and latent profiles.
Given a network of individuals, their latent profiles and this conformation process, we extend the
community-search and the team-formation problems by requiring the output subgraphs to have low social
tension. From the technical point of view, we study the complexity of these problems and propose algorithms
for solving them effectively. Our experimental evaluation in a number of social networks reveals the efficacy
and efficiency of our methods.
1 Introduction
A large body of work in social and collaboration networks focuses on solving variants of two classes of problems:
community-search and team-formation. The high-level goal of both classes is to discover a connected subgraph,
but they differ in the input query. In the community-search problem [7, 18, 19, 20], the input query consists of
individuals who should participate in the subgraph. In the team-formation problem [1, 2, 8, 15, 3, 11, 14, 16, 17],
on the other hand, the input query consists of a set of skills that need to be covered by the solution.
These two problem classes have applications primarily in online social media and collaboration networks.
For example, solutions to the community-search problem can be used to identify a set of individuals who are
the most appropriate group to organize a social gathering. Similarly, solutions to the team-formation problem
can be used by project managers or human-resource (HR) departments of companies and universities in order to
identify a well-functioning team of employees for a project or to make a competitive cluster hire. Such hiring and
resource-allocation decisions can prove important for the well-functioning and the success of an organization.
In all existing variants of the community-search and the team-formation problems the goal is to discover
a connected subgraph; Different variants of the problem impose different requirements on the structure of the
solution subgraph. For example, in some settings one asks to find high-density communities [19], while in others the
objective is to find small-diameter communities [18]. From the computational point of view, different requirements
lead to different problems that have different complexities and require the design of different algorithms. As usual,
the choice of the appropriate problem formulation depends on the application domain.
1
In contrast to the static requirements imposed by existing work, in this paper we incorporate the dynamics
of social interactions in the community-search problem. We do so by associating profiles to the individuals in the
network.
Regarding any subject of matter, individuals have their own opinion or preference. However, in a social
context, such as a working group or team, the opinion that is publicly held or enacted by each individual is
influenced by his peers. Diverging from the opinion of peers generates a social cost bearing on the individual.
Simultaneously, expressing an opinion that does not match one's own beliefs creates an inner conflict and an
associated internal cost. These constitute important factors impacting the operation of the community as a social
group. Therefore, in this paper, we extend the community-search and the team-formation problems to take them
into account, adding a new and realistic perspective.
We consider a social network between individuals, each one of which is associated with a profile. The profiles
of individuals model their interests, skills, preferences, opinions, and so on, with respect to different aspects or
topics. For example, the profile may represent the interest of an individual in discussing about politics, or the
working style of an individual -- e.g. whether he is a morning person or a night owl. Since profiles may cover a
number of different aspects or topics, we assume that they are represented as multi-dimensional vectors.
We further assume that the profiles of individuals change due to the social influence they receive from other
individuals in the network. We model this change through what we call conformation process, which is a dynamic
process. Motivated by existing work on models of opinion formation and social influence [5, 6, 9, 13, 10] we
assume that the conformation process is a repeated-averaging process. In our work, we generalize this process
from one-dimensional opinions to multi-dimensional profiles. The effect of this process is that the initial profiles of
individuals, which we call latent profiles, get re-enforced or altered through synthesis and aggregation of different
viewpoints of the network participants.
Given this process, the latent profiles of individuals and a social network that represents their social
interaction, social tension arises because of the differences between the conformed profiles of neighboring nodes
and between the conformed and latent profiles of the nodes themselves. In this context, our goal is to identify
communities and teams that are not only connected and qualified, but also exhibit low social tension. We refer
to these problems as the T -Comm and the T -Team problems respectively. To the best of our knowledge we are
the first to define and study these problems in the light of profile-conformation processes in a social network.
In terms of technical results, we show that both the T -Comm and the T -Team problems are NP-hard and
we design graph-theoretic algorithms for solving them. A key difficulty that we overcome while designing these
algorithms is that we do not run the conformation process for every step of these algorithms; indeed, this would
be computationally very demanding. Rather, we create effective proxies of this process that allow our algorithm
to scale. Our experiments with real-world data demonstrate the efficiency and the efficacy of our algorithms for
both problems.
Applications. Both the T -Comm and T -Team problems have numerous potential applications. For example,
when analyzing social networks or social media it is often useful to identify connected groups of users who have
similar profiles with respect to a topic or an idea (i.e. they are in agreement). Note, however, that minimizing
the social tension does not necessarily imply looking for highly homogeneous communities but, rather, favoring
communities that are able to bridge opinion gaps at low social and communication costs. Groups with low social
tension can be recommended as ideal in order to form a group to organize or to invite at a social event. Such
problems also arise in human-resource management, when searching for groups of workers who can collaborate
together in a conflict-free manner in order to successfully complete a project. Being able to identify a group of
people who are not going to experience high social tension is particularly useful when considering cluster hires in
universities or start-up companies, where the investment is high and the human factor risk needs to be minimized.
Roadmap. The rest of the paper is organized as follows. In Section 2 we give a thorough overview of the related
work and identify the connections to our own work. After describing our notation and modeling assumptions
in Section 3, we proceed to Section 4, where we define the community-search variant of our low-tension mining
problem, prove that it is NP-hard and present algorithms for solving it in practice. We discuss other problem
variants in Section 5. Our experimental results are described in Section 6 and we conclude the paper in Section 7.
A short version of this paper appeared in SDM'17. In this extended version, we discuss the team-formation
problem variant, beside the original community-search problem, and include additional experimental results.
2
2 Related Work
To the best of our knowledge, we are the first to combine the problem of identifying a group of nodes from an input
graph with an underlying dynamic conformation process of opinion formation at play over the graph. However,
while the T -Comm and T -Team problems as we define them are novel, our work is related to existing work on
graph mining and opinion dynamics. We summarize the related literature below.
2.1 Community search
Given a graph and a subset of its nodes as a seed, community-search problems ask for a set of nodes which is a
superset of the seed nodes and induces a connected subgraph in the original graph. Since this class of problems
was initially introduced [7, 20], different instances of the community-search problem appeared. Each one of them
imposes a different requirement on the graph-theoretic properties of the reported subgraph. For example, Sozio
and Gionis [19] focus on finding a subgraph that connects the chosen seed members and has maximum density,
Ruchansky et al. [18] solve the same problem with the objective to minimize the sum of pairwise shortest path
distances among the nodes participating in the subgraph. Faloutsos et al. [7] study the problem of finding a
subgraph that links two seed nodes while maximizing the quality of connection of the subgraph, for a generic
measure of quality. Tong et al. [20] later extended their work to an arbitrary number of seed nodes.
Although these problems are related to the T -Comm problem we study here, the novelty of our problem
comes from the fact that we associate nodes with profiles and that we assume a profile-conformation process that
takes place over the network. Our objective function is directly related to this process as it aims to minimize the
social tension in the reported community. As a result, the technical results we obtain for T -Comm are different
from the other community-search problems.
2.2 Team formation
Team-formation is another class of graph-mining problems where the goal is to find a set of individuals in a
network, who together possess the required skills while minimizing the communication costs between the members
of the team. Since the introduction of this problem in the domain of data mining by Lappas et al. [15], a number
of variants have been studied, from varying the communication cost function [3, 11, 14, 16, 17], to considering
the workload distribution [1], designing algorithms for online team formation [2], and maximizing the influence
of the team over the network [8].
At a high level, the T -Team problem we define is a team-formation problem. However, all existing work
on team-formation problems aims to identify teams that optimize some static measure (e.g. the density or the
diameter) of the subgraph that the team induces. However, the existence of a dynamic conformation process over
the network makes our problem definition and setting quite distinct. Our goal is to minimize the social tension,
which is much more complicated as it is caused by the difference in the profiles which arise from the interplay
between the conformation process and the network structure. Therefore, existing algorithms for team formation
cannot be applied to our problem.
2.3 Opinion dynamics
Starting in the 1970s, models have been built that try to capture the opinion-formation processes in groups and
networks [5, 6, 9, 13, 22, 10]. For example, voter models, pioneered by Clifford and Sudbury [5] and Holley and
Liggett [13] are stochastic models of opinion formation where at each step a node is selected at random and
adopts the opinion of one of its neighbors, also selected at random. In DeGroot's averaging model [6], each node
updates its opinion, by the weighted average of its own opinion and its neighbors' opinion at the previous time
step. Friedkin and Johnsen [9, 10] introduced a model where every node has an immutable inner opinion and a
changeable expressed opinion. Each node forms its expressed opinion in a repeated-averaging process involving
its own inner opinion and the expressed opinions of its neighbors. Given the popularity of this model we also
adopt it for modeling our profile-conformation process, and extend it to multiple dimensions.
The Friedkin and Johnsen model has been used in recent works by Bindel et al. [4] and by Gionis et al. [12].
Bindel et al. focus on the price of anarchy in terms of the tension achieved through local repeated averaging and
global opinion coordination. Gionis et al. aim at identifying the set of nodes whose opinions need to be changed
3
so that the overall positive opinion in the network is maximized. Although our work builds upon Friedkin and
Johnsen's ideas to model the profiles and their conformation process, none of the above-mentioned works addresses
the question of identifying a subgraph with low social tension as we do.
Extending our work to other times of opinion-dynamics models, i.e. beyond the model of Friedkin and Johnsen,
is a promising direction for future research.
3 Preliminaries
Throughout the paper we consider a social network G = (V, E) where the nodes in V correspond to individuals
and the edges in E represent the interactions between these individuals. For simplicity of exposition, we present
the case of an unweighted and undirected graph, but the problems and algorithms we discuss can naturally be
extended to weighted and directed graphs.
The set of neighbors of node i in G is denoted by NG(i). Given a subset of vertices U ⊆ V , we let E(U )
denote the set of edges of G induced by U , i.e. E(U ) = {(i, j) ∈ E, i, j ∈ U}, and G(U ) denote the corresponding
induced subgraph G(U ) = (U, E(U )).
3.1 Profiles
Evidently, each individual has their own set of preferences (e.g. style, habits, biases, and opinions). We refer to
this personal set of preferences as a profile. For now, let us assume that profiles only reflect preferences regarding
a single aspect (e.g. working style), that is, profiles consist of a single attribute. We assume that profile attribute
values are represented by a real number in the interval [0, 1]. For instance, a value between 0 and 1 may represent
an individual's preference towards a certain software tool, or his preference to work in a team or in isolation
respectively.
The key characteristic of our model is that it captures the interaction between the user profiles and their social
connections. This is done by assuming that each individual i has a latent profile and a conformed profile, denoted
by xi and fi respectively. The latent profile of an individual represents the individual's own true preference.
However, individuals may choose not to act in accordance with their latent profiles as they try to minimize peer
pressure by conforming their preferences to those of their peers. The conformed profile represents these adjusted
preferences.
For simplicity, we first describe the model for single-attribute profiles, but later on we discuss how to extend
it to multi-attribute profiles. We summarize the latent and conformed profiles of all n individuals with respect to
a single attribute using vectors x and f respectively.
3.2 Measuring tension
Due to the underlying social structures and mechanisms, the conformed profile fi of a node can differ from its
latent profile xi. In such case, the node will bear an inner tension caused by the difference between its own latent
and conformed profiles. On the other hand, the difference between the node's conformed profile and between the
conformed profiles of its neighbors will cause cross tension. Hence, the total tension on node i is:
Ti(G, x, f ) = (xi − fi)2 +
(fi − fj)2.
Then, the social tension of the network is simply the sum of the individual tensions, defined as
(fi − fj)2(cid:1),
(1)
(cid:88)
j∈NG(i)
Ti(G, x, f )
(cid:88)
(cid:88)
(cid:0)(xi − fi)2 +
(cid:88)
(xi − fi)2 +
i∈V
i∈V
(cid:88)
(cid:88)
j∈NG(i)
i∈V
(i,j)∈E
4
T (G, x, f ) =
=
T (G, x, f ) =
which can alternatively be written as the sum of the overall inner and cross tensions
2 (fi − fj)2.
3.3 Conformation process
But how do nodes arrive at their conformed profiles? Consider a repeated averaging process where at each step
each node adjusts its conformed profile by setting it to the average of its latent profile and the conformed profile
of its neighbors. Formally, denoting as fi(t) the conformed profile of node i at step t, we have:
xi +(cid:80)
j∈NG(i) fj(t)
1 + NG(i)
fi(t + 1) =
.
(2)
Computing the conformed profiles according to the repeated averaging model is equivalent to choosing fi to
minimize Ti(G, x, f ). That is, if each node aims to minimize its tension, the repeated averaging model provides
an optimal choice for the conformed profiles. In that sense, using the repeated averaging model yields a Nash
equilibrium for the tension, not a social optimum [4].
A practical consideration is that in this model the latent profiles are assumed to be known, while the conformed
profiles are the output of the conformation process. But, in practice, we have access to the conformed profiles
while the latent profiles cannot be observed. This, however, does not constitute a problem for our model. One
can swap the known and unknown variables of the system and solve for the latent profiles, given the conformed
profiles and the original network.
The model adopted here for how conformed profiles emerge is a well-studied opinion-formation and social-
influence model that has been introduced by sociologists [6, 9, 10]. In particular, the work of Friedkin et al. [10]
validates this model by conducting a set of controlled experiments in which they observe how interactions between
individuals in small groups influence their expressed opinions. The study demonstrates that the repeated-averaging
model can both predict the opinions that individuals converge to, as well as the rate of convergence. Others have
studied the mathematical properties of this model. For instance, it has been shown [4, 12] that the process
converges in polynomial time to a fixed-point solution. In fact, the final conformed profiles can be computed by
a matrix inversion [12], but actually repeating the averaging process leads to much faster computation.
3.4 Multi-attribute profiles
Our assumption so far has been that profiles reflect the preferences of individuals with respect to a single attribute.
But our notion of latent and conformed profiles can be easily extended to the case of multiple attributes, leading
to multi-attributes -- i.e. multi-dimensional -- profiles. Assume there are m aspects or topics of interest, each
associated to an attribute. The latent and conformed profiles can be simply extended from a single real number
to real-valued vectors of dimensionality m, where each entry corresponds to one of the attributes. We summarize
the latent and conformed profiles of n individuals on m attributes using n × m matrices X and F respectively.
Note that each column of these matrices, denoted by xa and fa for a = 1, . . . , m, corresponds to a single attribute.
In the multi-attribute case, the conformed profiles can be computed as before by applying Equation (2) in a
column-wise fashion. Similarly, the social tension T (G, X, F) is defined as the sum of the social tensions across
all m attributes.
4 Finding low-tension communities with seed nodes
In this section, we introduce the T -Comm problem, study its complexity and provide algorithms for solving it.
4.1 Definition of the T -Comm problem
At a high level, the T -Comm problem aims to find a connected, low-tension community that involves a chosen
subset of members. Formally, this intuitive statement is captured by the following problem definition:
Problem 1 (T -Comm) Given a network G = (V, E), latent profiles X and a set of seed nodes Q ⊆ V , find
V (cid:48) ⊆ V such that Q ⊆ V (cid:48), the graph G(cid:48) induced by V (cid:48) on G is connected and T (G(cid:48), X, F) is minimized, where F
is computed by the repeated averaging model on G(cid:48).
Note that when defining the T -Comm problem, we assume that the social tension is computed as in
Equation (1), X is the matrix containing the latent profiles of the nodes in V (cid:48) and F contains the conformed profiles
5
Figure 1: Schema of the constructed graph for the reduction from X3C. The black and white nodes have latent
profiles with values 1 and 0 respectively.
of individuals, computed using the repeated averaging model described in the previous section (see Equation (2))
over the subgraph induced by V (cid:48).
Given these assumptions, we can make the following observations with respect to the requirements imposed on
the solution of T -Comm: as the number of edges in the resulting subgraph and the differences in the conformed
profiles across these edges decrease, so does the social tension.
In particular, the complete absence of edges
results in no tension at all. However, the requirement that the output subgraph should be connected forbids
such solutions. From the application point of view, connectivity is important as it guarantees communication
among the community members. One can see that minimizing tension and guaranteeing connectivity leads to an
interesting trade-off between the density of edges and the homogeneity of the profiles of nodes in the reported
subgraph. Communities should consist of individuals who share similar profiles or individuals who have divergent
profiles but are needed to guarantee connectivity, these latter ones being preferably very sparsely connected with
the rest of the community members.
with respect to the computational complexity of the T -Comm problem, we obtain the following result.
Proposition 4.1 The T -Comm problem cannot be solved optimally in polynomial time even with a single attribute
(i.e. m = 1) unless P = NP.
Proof 1 (Sketch) We prove the hardness of T -Comm with a reduction from the problem of exact cover by 3-sets.
The exact cover by 3-sets problem, X3C for short, asks the following question. Given a universe of elements
B = {b1, . . . , bp}, where the number of elements p is a multiple of 3, and a collection S = {s1, . . . , sq} of 3-elements
subsets of B, is there a collection S(cid:48) ⊆ S such that every element in B occurs in exactly one member of S(cid:48)?
Given an instance of the X3C problem, we construct an instance of the T -Comm problem with one-attribute
profiles (i.e. m = 1) as follows. To each element bi in B we associate a node, called an "element-node", with
latent profile 0, and to each set sj in S we associate a node, called a "set-node", with latent profile 1. Each
set-node is connected to the three nodes that represent the elements it contains. In addition, we make all the q
set-nodes part of a larger clique D of o + q nodes with latent profiles equal to 1. Also, we make each element-node
bi part of a larger clique Ai containing o nodes with latent profiles 0. Finally, we assume that all the nodes in our
construction are seed nodes except for the q set-nodes. This construction is illustrated in Figure 1.
We prove that if the given instance of X3C has an exact 3-set cover, then the minimum tension subgraph
solution of T -Comm will contain the set-nodes of this exact cover.
The main idea of the proof is based on the following observation. Selecting a large (yet polynomial in p) value
for o, increases the size of all cliques in our construction (i.e. clique D and all Ai cliques). As a result, the
conformed profile of all the nodes (including the set-nodes) in D will be very close to 1, and the conformed profiles
of all nodes in the Ai cliques will be very close to 0. Thus, the only non-negligible source of tension will be the
tension across the edges that connect element-nodes to set-nodes. Each such edge would increase the tension by
almost a unit.
Note that since each bi is a seed node, it has to be connected to the o seed nodes in D. This can be achieved
only by going through a set-node. Thus, the solution to X3C has to pick a subset of set-nodes that cover all the
element-nodes to ensure connectivity. Now, if x set-nodes are included in the subgraph then the tension would be
roughly 3x. Obviously, the solution that minimizes the tension is the solution that picks the smallest number of
set-nodes. This is achieved by selecting an exact cover, if such cover exists.
6
A1b1s1AibisjAnbnsmDInput: Network G = (V, E), latent profiles X, seed nodes Q ⊆ V , path
length function len()
Output: Community nodes V (cid:48)
1: H ← complete weighted graph over nodeset Q, such that
the weight of edge (i, j) is λ(i, j) = minp∈Pij len(p)
with Pij the set of paths in G between i and j
2: K ← minimum spanning tree of H
3: V (cid:48) ← expand K by replacing edges by
4: return V (cid:48)
their corresponding shortest path in G
Figure 2: The CTree algorithm for solving T -Comm.
4.2 Algorithms for the T -Comm problem
While the objective of the T -Comm problem is to minimize the social tension in the solution graph, T (G(cid:48), X, F),
obtaining the conformed profiles through the repeated-averaging process is costly; thus, it is not feasible to
compute the social tension on a large number of candidate subgraphs. A possible alternative is to compute the
conformed profiles by applying the repeated-averaging process on the whole graph once and use these profiles
when evaluating the tension in the candidates later on. However, while designing our algorithms, we observed
that this is a poor choice. Intuitively, the presence of a node with a latent profile that departs greatly from its
neighbors' might significantly sway their conformed profiles. During the search, this node will likely be removed
from the candidate set early on, but its effect would remain.
In order to avoid such effects, but also avoid the repeated computations of social tension we use the following
for a pair of neighboring nodes i and j we assign to edge (i, j) ∈ E weight
trick in all our algorithms:
wij = xi − xj. We then use this weight as a way of quantifying the contribution of this edge in the overall
social tension. Although wij is just a proxy of the edge's contribution, the trick appears to perform well in
practice and leads to significant speedups. Once our algorithms obtain the set of nodes to report, we apply the
repeated-averaging process on the induced subgraph in order to evaluate the social tension of the solution.
We propose two approaches for finding good candidate solutions for this problem.
Spanning-tree approach. This approach connects the seed nodes by building a spanning tree between them
and is based on the 2-approximation algorithm for the Steiner tree problem [21]. It works as follows: first, it
computes the shortest path between every pair of seed nodes. Next, it constructs a complete graph over the
seed nodes such that the weight of the edge between two nodes corresponds to their shortest path distance in
the original graph. Then, it considers the minimum-spanning tree from this complete graph, e.g. obtained with
Prim's algorithm, and replaces each edge of the spanning tree with the associated original shortest path. The
resulting subgraph constitutes the output of our tree-based algorithm. A sketch of this algorithm, which we call
CTree, is shown in Figure 2. Note that this approach, searching for the best spanning tree, lacks any control over
the induced edges that will be included in the solution. In this sense, it is an optimistic strategy.
We obtain different variants of this algorithm depending on the measure used to evaluate the length of a path.
Having experimented with various options, we focus on two variants, where the length of the path is either
(i) the number of edges involved, or
(ii) the sum of weights of the edges along the path.
In other words, if pij = (i, v1, v2, . . . , vk, j) is a path between i and j, we have len(pij) = k + 1 in the first variant,
and len(pij) = wiv1 + wv1v2 + ··· + wvkj in the other. We denote these variants as CTree(e) and CTree(s)
respectively.
The main step in our algorithm is the computation of the shortest path between all pairs of seed nodes
by running the Dijkstra algorithm from each seed node in turn. The running time of our algorithm is thus
O(Q (V + E log E)).
Top-down approach. The second algorithm is a top-down approach which starts with the full graph and
iteratively removes nodes until it is no longer possible to continue without disconnecting the seed nodes. The
pseudo-code for this algorithm, called CPeel, is given in Figure 3.
7
Input: Network G = (V, E), latent profiles X, seed nodes Q ⊆ V , node
scoring function score()
Output: Community nodes V (cid:48)
1: V (cid:48) ← ∅; K ← V
2: while K (cid:54)= ∅ do
v ← arg maxi∈K score(i, V (cid:48) ∪ K)
3:
K ← K \ {v}
4:
if Q is not disconnected in G(V (cid:48) ∪ K) then
5:
6:
7:
8:
9: return V (cid:48)
K ← {i ∈ K, NG(V (cid:48)∪K)(i) (cid:54)= ∅}
V (cid:48) ← V (cid:48) ∪ {v}
else
Figure 3: The CPeel algorithm for solving T -Comm.
Again, we obtain different variants, this time by varying the score() function for choosing the next node to
remove. We selected the following three scores:
(i) The score is a number assigned randomly to each node when initializing the algorithm, which determines
the order in which the nodes are peeled. This random variant is denoted as CPeel(r).
(ii) The score is the sum of the weights of the remaining edges adjacent to the node, i.e.
(cid:88)
score(i, U ) =
wij.
(iii) The score is the largest weight among the remaining edges adjacent to the node, i.e.
j∈NG(U )(i)
score(i, U ) = max
j∈NG(U )(i)
wij.
The second and third scores are similar but the former uses a sum where the latter takes the maximum,
resulting in variants CPeel(s) and CPeel(m), respectively. Nodes with larger scores are considered first (line 3
in Figure 3). Meanwhile, in all three variants, nodes that get isolated are pruned away (line 6). Rather than
favoring good connections, this second approach removes nodes that might generate large costs, and thus follows
a pessimistic strategy.
In practice, we can find a minimum connecting tree using the strategy described previously. Then, when we
are about to remove a node, we check whether it belongs to the current tree, in which case we need to look for
an alternative tree that does not involve this node. Only if such a tree can be found can we safely remove the
node. In the worst case, we would have to recompute the spanning tree for each node, resulting in a running time
O(V (V + E log E)).
5 Problem Variants
In this part, we discuss some variants of the T -Comm problem that make different assumptions with respect to
the input, while the output is always a connected subgraph with low social tension.
5.1 Finding low-tension teams with chosen skills
In many team-formation problems, there is a universe S of skills that individuals may possess and each individual
i is associated with a set of skills Si ⊆ S. Note that the skills are different from the attributes of the profiles; skills
are Boolean features associated with individuals (i.e. an individual has the skill or not) and do not change because
of social interactions. In contrast, profiles are real-valued and the conformed profiles are subject to change due
to social pressure.
8
Definition of the T -Team problem. Given a project requiring a subset P ⊆ S of skills, the problem is to find
a subset of individuals V (cid:48) ⊆ V such that for every skill required by the project there is at least one individual in
V (cid:48) who possesses it. When individuals are organized in a network, it is also required that the subgraph induced
by V (cid:48) satisfies certain properties that capture the ease of communication within the team, e.g. small diameter,
low weight spanning tree, small density, etc. [11, 2, 15].
In our setting, we consider a version of the team-formation problem where the goal for V (cid:48) is to be such that
the required skills are covered, the graph G(cid:48) induced by V (cid:48) is connected and the social tension in G(cid:48) is minimized.
This problem can be formally defined as follows.
P ⊆(cid:83)
Problem 2 (T -Team) Given a network G = (V, E) and latent profiles X, as well as a universe of skills S,
a set of skills Si ⊆ S for every i ∈ V and a project requiring a subset of skills P ⊆ S, find V (cid:48) ⊆ V such that
i∈V (cid:48) Si, the graph G(cid:48) induced by V (cid:48) is connected and T (G(cid:48), X, F), computed by the repeated averaging model
on G(cid:48), is minimized.
Algorithms for the T -Team problem. This problem is an NP-hard problem -- as a generalization of the
Set Cover problem. However, we can adapt the algorithms we designed for T -Comm to solve this problem as
well. If we denote by Alg an algorithm for solving T -Comm, then we can use Alg to solve T -Team by applying
the following two-step procedure: First, we construct an extended graph H that contains G = (V, E) as well as
one additional node s for every skill s ∈ S. Also, every skill node s is connected to every node i such that s ∈ Si.
Alg is applied to solves the T -Comm problem on this extended graph, using the skill nodes that correspond to
skills in P as the seed nodes.
The result of this first step is a subgraph of H that contains all the skill nodes required by the project as well
as individuals that cover all these skills. One could think that reporting the individuals in this subgraph would
provide an adequate solution. However, this is not the case because removing the skill nodes from the subgraph
might disconnect the subgraph induced by the individual nodes. For this reason, we need to apply Alg a second
time, now on the original graph G and using as seed nodes the individuals participating in the solution reported
by the first step.
With this strategy, we can directly reuse the algorithms designed for the T -Comm problem to solve this
variant. The running time of such a two-step procedure will depend on the running time of the algorithm used
as a subroutine.
5.2 Finding low-tension communities with fixed size
Another variant of the T -Comm problem is one where there are no seed nodes provided as input but the restriction
is put on the size of the output community instead.
Using a construction similar to the one we used for proving Proposition 4.1, we can prove that this cardinality
variant of our problem is again NP-hard, i.e. the problem cannot be solved optimally in polynomial time unless
P = NP.
Although this cardinality version of the problem seems natural, our experiments demonstrated that it is rather
useless in practice. When the value of k is rather small, the best strategy is to pick one of the many possible
subsets of size k which are rather sparsely connected. Thus, in the absence of guidance provided in the form of
seed members or skills there are a lot of candidate solutions that are practically equivalent and reporting one of
them is not necessarily interesting.
From the algorithmic point of view, the cardinality version of the problem cannot be solved using some
adaptation of the algorithms discussed in Section 4.2. For this problem, we obtained the best performance,
i.e. lowest tension solutions, using a greedy algorithm that constructs a connected subgraph of cardinality k by
repeatedly adding a node that minimally increases the tension of the candidate.
6 Experiments
We now turn to the evaluation of our proposed algorithms for the two problem variants, T -Comm and T -Team.
9
6.1 Experimental setup
In our setting, each dataset consists of a network together with latent profiles for the nodes. Hence, we first
introduce the networks, before explaining our approach for obtaining latent profiles. Then, we present the
evaluation measures used throughout our experiments.
Networks. Of our collections of networks, two consist of subgraphs extracted from the DBLP co-authorship
database,1 where vertices represent researchers, and edges represent co-authorship relations. Specifically, we
extracted the ego-nets of radius 2 for some selected high-profile computer scientists. The resulting ego-nets form
the collection denoted as DBLP.E2. We also consider the subgraphs induced by researchers who have published in
the ICDM and KDD conferences, respectively, constituting the DBLP.C collection.
Our third collection of networks consists of subgraphs extracted from the Internet Movie Data Base2 where
vertices represent actors and edges connect actors who played together in at least one movie. Specifically,
we constructed actor networks from this database by considering some well-known directors and production
companies, such as Francis F. Coppola or the Warner Bros. Entertainment Inc., and extracting the network
induced by their movies. The resulting networks form the collection denoted as IMDB.
In our problem, we are looking for connected subgraphs. If the seed nodes in T -Comm belong to different
components, there is obviously no solution. Hence, in our experiments we consider only the largest component of
each of the networks.
The statistics of a sample of the networks from these three collections can be found in Table 2.
Profiles. Besides links, the co-authorship and the co-acting networks contain additional information which we
exploit to derive structured profiles, as follows.
In the co-authorship networks, we associate nodes, i.e. researchers, to the title keywords of papers they
authored. We then turn these keywords into profiles by considering the eigenvectors associated to the largest
eigenvalues of the incidence matrix of keywords to nodes, scaled to the unit interval. Vice-versa, we also consider
the incidence matrix of researchers to conferences, i.e. indications of which author published in which conference
and derive another set of profiles by computing the eigenvectors of that matrix. Neighboring researchers in these
networks are collaborators who have published papers together. Hence, they have keywords in common, published
in some of the same conferences, and more generally share similar research interest. Intuitively, they will therefore
be assigned similar profile values.
In the co-acting networks, we consider the genres of the movies each actor played in and turn this information
into profiles, once again by computing the eigenvectors associated to the largest eigenvalues of the obtained
incidence matrices.
The distributions of latent profiles values (xi) over nodes and of squared weights (w2
ij) over edges in the
DBLP.C ICDM network for latent profiles derived from keywords and from conferences are shown in Figures 4a
and 4b respectively.
Evaluation measures. For a solution nodeset V (cid:48), our main evaluation measure is T (G(V (cid:48)), X, F) -- T (V (cid:48))
for short -- the social tension in the subgraph induced by V (cid:48) with conformed profiles obtained by applying the
repeated averaging process over that subgraph.
Two main properties contribute to a solution subgraph having a low social tension (see Equation (1)). On one
hand, finding a subgraph with few edges results in fewer terms in the sum. On the other hand, finding a subgraph
with low tension edges results in small values in the sum. Thus, we compute two auxiliary values that provide
insight into the nature of the solutions obtained. Namely, for a solution V (cid:48) we compute the number of edges in the
solution, E(V (cid:48)), and the average of the squared edge weights in the solution, w2(V (cid:48)) = 1
(i,j)∈E(V (cid:48)) w2
ij.
Solutions obtained for different seed sets are hardly comparable. Thus, to make the evaluation possible,
we standardize the measured values before aggregating them. Specifically, we use the number of edges in the
minimum spanning tree connecting the seed nodes, eb, as a comparison basis (and lower bound) for the number
of edges in the solution subgraphs, and divide w2(V (cid:48)) by the corresponding average over the whole graph.
(cid:80)
E(V (cid:48))
Given a solution V (cid:48), we take the following evaluation measures, for which lower values are more desirable:
1http://dblp.uni-trier.de/xml/
2http://www.imdb.com
10
(a)
(b)
(c)
(d)
(e)
Figure 4: Distribution of latent profile values, xi, over nodes (top) and of squared weights, w2
(bottom) for the DBLP.C ICDM network with various latent profiles.
ij, over edges
Figure 5: Results for the T -Comm problem on the C.Papadimitriou with single-attribute (left) and ten-attribute
(right) latent profiles derived from conferences.
(i) the standardized social tension (main measure)
τ (V (cid:48)) = T (V (cid:48))/(2eb · w2(V )),
(ii) the standardized solution size (auxiliary measure)
ε(V (cid:48)) = E(V (cid:48)) /eb, and
(iii) the standardized average edge weight (auxiliary measure)
σ(V (cid:48)) = w2(V (cid:48))/w2(V ).
6.2 Community search with seed nodes
We now compare the different variants of our proposed algorithms, CTree and CPeel, for solving the T -Comm
problem (see Section 4).
11
00.51010002000#nodes00.5100.5100.5100.512−102−52−2100.511.5·104eigenv.keywords#edges2−102−52−21·104eigenv.conferences2−102−52−21·104randomuniform2−102−52−21·104randomexp.(λ=6)2−102−52−21·104randomthresh.(α=60%)CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktailτ(V0)ε(V0)σ(V0)τ(V0)ε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)CocktailD201234CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktail0246024681000.511.5202460246D3Figure 6: Results for the T -Comm problem on the IMDB F.F.Coppola with single-attribute (left) and ten-attribute
(right) latent profiles derived from movie genres.
Generating sets of seed nodes. For each dataset, i.e. each pair of network and latent profiles, we run each
algorithm with a number of different sets of seed nodes Q. Here we restrict ourselves to sets of seven and four
seed nodes, i.e. Q = 7 and Q = 4, for the co-authorship networks and the co-acting networks respectively, as
representative scenarios for the community-search problem.
As we expect the distance between the nodes in the seed set to have an impact on the behavior of the
algorithms, we want to sample seed sets across the range of possible distances and to group them based on this
criterion. Thus, we generate a thousand seed sets and look at the maximum pairwise distance within each set.
We then select at most 30 seed sets from the 10-33%, 33-66%, and 66-90% percentiles of the distance distribution.
The resulting three groups of seed sets are denoted as D1, D2 and D3, from tight seed sets to more dispersed
ones. Results in Figure 5 are presented aggregated according to these distance groups.
Single-attribute and multi-attribute profiles. For each latent profile construction scheme, i.e. whether
derived from keywords, conferences or movie genres (see Section 6.1), we can either consider the column vectors
separately, thereby obtaining several single-attribute profiles, where each node is associated to a single profile
value, or consider the entire matrix at once thereby obtaining one multi-attribute profile, where each node is
associated to a multi-attribute profile vector.
In our experiments, we take the first four columns of the matrix as four separate single-attribute profiles and
the entire matrix as one multi-attribute profile (6 and 21 attributes for the DBLP and IMDB datasets, respectively).
Results for the DBLP.E2 C.Papadimitriou for single-attribute (left) and multi-attribute (right) latent profiles
derived from conferences are shown in Figure 5. Similarly, results for the IMDB F.F.Coppola network for single-
attribute (left) and multi-attribute (right) latent profiles derived from movie genres are shown in Figure 6.
We observe that the algorithms that exploit the profiles of individuals outperform the other two variants in
(almost) all cases. Recall that neither CTree(e) nor CPeel(r) consider the profiles of individuals. All they can
do is minimize the social tension by finding a small subgraph to connect the seed nodes. Our results show that
they are indeed quite effective at minimizing the number of edges in the reported solutions, typically achieving
the lowest values of ε(V (cid:48)) (middle column in each block of Figure 5 and 6). However, CTree(s), CPeel(m), and
CPeel(s), the profile-aware variants, find solutions with lower edge weights, i.e. achieving lower values for σ(V (cid:48))
(right hand side column), at the cost of including extra edges. This gives them an advantage for minimizing social
tension, obtaining lower values for τ (V (cid:48)) (left hand side column).
This pattern clearly holds whether we consider single-attribute or multi-attribute profiles.
12
CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktailτ(V0)ε(V0)σ(V0)τ(V0)ε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)CocktailD200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)Cocktail024680123400.511.50246801234D3Comparison to finding dense communities.
In addition to our proposed algorithms, we also obtain
communities by applying the GreedyFast algorithm of Sozio and Gionis [19], denoted here as Cocktail, on
the networks with the same sets of seed individuals. The aim of this algorithm is to find a subgraph that connects
the seeds while maximizing the minimum degree among selected nodes. This algorithm considers neither profiles
nor social tension; Nevertheless, we can compute the tension of the community that consists of the nodes returned
as a solution and compare it to the communities obtained with our algorithms. Furthermore, Cocktail requires
the user to set a value for the upper bound on the size of the solution. We set this value to k = 200, as it seems
to result in reasonable runtimes while allowing the algorithm to construct a solution in most cases. The cases
where the algorithm fails to return a solution are left out from our statistics.
On the DBLP.E2 C.Papadimitriou network the solutions returned by Cocktail are comparable in size to
those of our CTree(s) algorithm (middle column in each block of Figure 5). The quality of edges selected in its
solutions is on par with CTree(e) and CPeel(r) (right hand side column), which are also oblivious to the profiles
of individuals. On the IMDB F.F.Coppola network, the solutions returned by Cocktail tend to be much larger
than any of our algorithms (middle column in each block of Figure 6). Expectedly, Cocktail appears poorly
suited for the task of finding low-tension communities.
Impact of the profiles distribution. We observed that the CTree(s) variant appears to typically achieve
the best performance, followed closely by CPeel(m). Yet, variations can be observed depending on the network
structure and on the properties of the opinions distribution.
Thus, we next investigate the impact of the distribution of profile values on the behavior of the algorithms.
In order to do so, we construct random latent profiles under different sampling distributions. More specifically,
beside the uniform distribution, we either sample from the exponential distribution with parameter λ, or we set the
profile of a fraction α of the nodes to zero, while the rest is sampled uniformly at random, obtaining a thresholded
distribution.
For this experiment, we focus on the DBLP.C ICDM network and single-attribute latent profiles.
The distributions of latent profiles values (xi) over nodes and of squared weights (w2
ij) over edges in this
network for various latent profiles are shown in Figure 4. Latent profiles were sampled following each of the
three random distributions, in addition to considering latent profiles derived from the keywords and from the
conferences respectively. The narrow blue bars show the distributions for the first four single-attribute profiles
considered separately, while the broader purple bars show the distributions for the ten-attribute profiles resulting
from the combination of the respective single-attribute profiles.
The results obtained for these different profile construction schemes, each time applying the algorithms to
the first four single-attribute profiles considered separately are shown in Figure 7.
Looking at random profiles (Figures 7c, 7d and 7e) versus eigenvector profiles (Figures 7a and 7b), the gap
between the profile-oblivious variants (i.e. CTree(e) and CPeel(r)) and the profile-aware variants increases.
Indeed while the profile-aware variants generally tend to pick edges with lower tension at the cost of involving
more edges, as discussed earlier, this tendency is more pronounced when handling eigenvector profiles as compared
to the random distributions. This shows that the profile-aware variants are clearly suited to exploit the structure
present in eigenvector profiles.
On the other hand, while variations can be observed between the different random distributions, these
differences appear to be limited when contrasted with the gap that exists between random and eigenvector
profiles. This indicates that the distribution of profile values has a limited impact compared to the presence of
structure.
Impact of the network structure. The profile-aware variants typically achieve the best performance. Yet,
variations in their behavior can be observed depending for instance on the network structure.
This is clearly evidenced by Figure 7f, showing results on the Fb.1684 network with single-attribute profiles
sampled at random from the uniform distribution. Fb.1684 is an ego-net representing friend lists from Facebook,3
and has a high density, δ = 18.07. In such high density network, favoring low tension paths as done by CTree(s)
can result in many more edges in the induced subgraph, yielding a significantly higher social tension and actually
hurting the performance.
3http://snap.stanford.edu
13
Figure 7: Results for the T -Comm problem on the DBLP.C ICDM and Fb.1684 networks with single-attribute
latent profiles.
14
CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)(a)DBLP.CICDMnetworkSingle-attributelatentprofilesderivedfromconferencesε(V0)σ(V0)τ(V0)(b)DBLP.CICDMnetworkSingle-attributelatentprofilesderivedfromkeywordsε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)D200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)024602400.511.50246024D3CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)(c)DBLP.CICDMnetworkSingle-attributelatentprofilessampledatrandomfromtheexponentialdistribution(λ=6)ε(V0)σ(V0)τ(V0)(d)DBLP.CICDMnetworkSingle-attributelatentprofilessampledatrandomfromthethresholdeddistribution(α=60%)ε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)D200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)024602400.511.50246024D3CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)(e)DBLP.CICDMnetworkSingle-attributelatentprofilessampledatrandomfromtheuniformdistributionε(V0)σ(V0)τ(V0)(f)Fb.1684networkSingle-attributelatentprofilessampledatrandomfromtheuniformdistributionε(V0)σ(V0)D1CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)D200.511.5CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)024602400.511.50246024D3Table 1: Average running times (in seconds) of the algorithms on the DBLP.C ICDM network with latent profiles
derived from conferences for solving the T -Comm problem and the T -Team problem using keywords as skills (±
standard deviation).
CTree(e)
CTree(s)
CPeel(s)
CPeel(m)
CPeel(r)
0.2 (±0.0)
0.2 (±0.0)
0.7 (±0.3)
0.9 (±0.1)
0.1 (±0.0)
0.1 (±0.0)
Solving the T -Comm problem
Single-attribute latent profiles
147 (±26.6)
107 (±24.9)
3.5 (±0.5)
Multi-attribute latent profiles
3.3 (±0.3)
164 (±28.1)
134 (±29.7)
2.8 (±1.2)
Solving the T -Team problem
Single-attribute latent profiles
337 (±236)
261 (±204)
Single-attribute latent profiles, P = 7
351 (±120)
423 (±156)
3.1 (±0.9)
2.9 (±1.1)
Multi-attribute latent profiles
127.0 (±46.3)
108.5 (±35.6)
Multi-attribute latent profiles, P = 7
116.9 (±26.9)
140.8 (±32.7)
3.3 (±0.6)
37.0 (±12.1)
38.9 (±11.2)
91.5 (±64.5)
108 (±40.9)
33.6 (±13.2)
35.5 (±11.7)
Indicative running times of the different algorithms for the T -Comm problem on the DBLP.C
Running times.
ICDM network with single-attributes and multi-attributes latent profiles are shown in Table 1 (top). We observe
that, also as expected, going from single-attribute to multi-attribute profiles hardly has any impact on the running
times of our algorithms.
Indicative running times of the algorithms on networks of varying sizes and densities, with multi-attribute
profiles are listed in Table 2. As expected, the tree-based algorithms are significantly faster than the top-down
algorithms, up to two orders of magnitude, and scale much better.
6.3 Team formation with chosen skills
Next, we turn to the T -Team problem, the problem variant where we are given a project requiring a set of skills
and asked to find a team which is connected, has low social tension and covers the chosen skills.
Generating sets of skills. For the experiments with the T -Team problem we consider the co-authorship
networks from the DBLP.C and DBLP.E2 collections. Here, we take the conferences to be the skills associated with
individuals. Specifically, each conference represents a skill which a researcher is considered to possess if he has
published at least four papers in that particular conference. A project then consists of a subset of conferences.
Thus, forming a team to fulfill the project can be thought of as finding a group of researchers that span the
sub-areas of computer science represented by these conferences.
For each network in DBLP.C and DBLP.E2, we randomly sampled 80 projects (subsets of 3 to 13 conferences
present in that network). Following the two-step procedure described in Section 5, we then used our five algorithm
variants to solve the T -Team problem for each dataset (a network and its associated keyword-based latent profiles)
and each project. Results are presented in Figure 8.
Characteristics of the reported teams. We observe the same general trend as for T -Comm (Section 6.2).
That is, profile-aware variants CPeel(s), CPeel(m), and CTree(s) outperform the other variants, although
CPeel(r) and CTree(e) report subgraphs with fewer edges. In the DBLP.C networks, however, we see an increased
variability in the behavior of the CTree(s) variant and a notable performance of CPeel(m). This latter algorithm
now appears to return solutions that have both small size and low edge weights.
Running times.
Indicative running times of the different algorithms for this problem are shown in Table 1 (bot-
tom). To allow comparison against the running times for T -Comm reported in the top half of the table, we include
15
Figure 8: Results for the T -Team problem on co-authorship networks from the DBLP.C and DBLP.E2 collections
with single-attribute latent profiles derived from keywords using conferences as skills.
times restricted to runs with projects requiring seven skills, i.e. P = 7. Note, that while this implies that the
number of seed nodes in the first run equals seven, the number of seed nodes in the second run might vary.
While the running times for the two-step procedure are expectedly larger than those of the basic algorithms,
In particular, this is because while two runs are often necessary to find a
the variance is also much greater.
connected solution, it can happen that a single run suffices but such cases cannot be easily identified at the
outset.
7 Conclusions
Problems related to community search and team formation have multiple applications in online social media and
collaboration networks. In this paper, we add a new modeling angle to these two classes of problems. The key
characteristic of our model is that each node of the social network is not only characterized by its connections and
its skills, but also by its profile. These profiles, which change dynamically through a conformation process, give
rise to social tension in the network. Given this model, we define the T -Comm and T -Team problems, where the
goal is to identify a set of connected individuals that define a low-tension subgraph. Such problems arise both
in social network and social media mining as well as in human-resource management, where the goal is to find a
set of workers who are not only connected, but also will have a potentially fluid collaboration. The contributions
of our paper include the formal definition of these problems and the design of algorithms for solving them
effectively in practice. Our experimental results with real data from social and collaboration networks highlight
the characteristic behavior of the different algorithms variants and illustrate the effect of network structure and
profile distribution on the algorithms' relative performance. Finally, our work enables future research combining
subgraph mining with dynamic processes occurring among the nodes.
Acknowledgements. Most of the work was done while Esther Galbrun and Behzad Golshan were at Boston
University. Aristides Gionis is supported by the Finnish Funding Agency for Innovation TEKES (project
"Re:Know"), the Academy of Finland (project "Nestor"), and the EU H2020 Program (project "SoBigData").
This research was funded by NSF grants: IIS 1320542, IIS 1421759 and CAREER 1253393 as well as a gift from
Microsoft.
16
CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)τ(V0)ε(V0)σ(V0)ICDMCTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)KDDCTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)E.Demaine024CTree(e)CTree(s)CPeel(m)CPeel(s)CPeel(r)05101501234C.PapadimitriouTable 2: Average running times (in seconds) of the algorithms (± standard deviation) solving the T -Comm
problem on networks of varying number of vertices (V ), edges (E) and average degree densities (δ).
δ
E
V
2.73
262
96
3.23
8 98
278
7.11
1 599
225
4.15
1 638
395
5.14
2 307
449
9.30
6 306
678
7.05
7 279
1 032
3.45
7 701
2 234
7.72
8 469
1 097
3.62
9 472
2 613
3.68
10 280
2 795
4.05
11 072
2 737
13 250
2.88
4 596
28 992 14.85
1 952
2 111
32 166 15.24
5 758 178 741 31.04
Network
IMDB Kassovitz
IMDB J.Cameron
IMDB WarnerBros 1970s
IMDB Forman
IMDB Eastwood 2000s
IMDB F.F.Coppola
IMDB WarnerBros 2000s
DBLP.E2 E.Demaine
IMDB Paramount 2000s
DBLP.E2 C.Papadimitriou
DBLP.C ICDM
DBLP.C KDD
DBLP.E2 P.Yu
IMDB Paramount
IMDB WarnerBros
IMDB WB+Paramount+Fox
References
CTree(e)
0.0 (±0.0)
0.0 (±0.0)
0.0 (±0.0)
0.0 (±0.0)
0.0 (±0.0)
0.0 (±0.0)
0.1 (±0.0)
0.1 (±0.0)
0.1 (±0.0)
0.1 (±0.0)
0.2 (±0.0)
0.2 (±0.0)
0.2 (±0.0)
0.3 (±0.0)
0.3 (±0.1)
1.4 (±0.2)
CPeel(r)
CPeel(s)
CTree(s)
(±0.0)
0.0 (±0.0)
0.0
(±0.0)
0.1 (±0.0)
0.1
(±0.1)
0.1 (±0.0)
0.1
(±0.1)
0.2 (±0.0)
0.2
(±0.2)
0.2 (±0.0)
0.4
(±0.6)
0.7 (±0.1)
1.4
(±1.1)
0.7 (±0.0)
2.4
(±6.2)
2.8 (±0.3)
19.2
(±1.2)
0.8 (±0.1)
3.2
(±9.6)
3.2 (±0.3)
31.6
38.9 (±11.2)
3.3 (±0.3)
36.0 (±13.0)
3.5 (±0.2)
68.6 (±20.5)
4.4 (±0.3)
2.6 (±0.1)
(±7.8)
17.7
(±9.1)
3.0 (±0.2)
22.8
15.4 (±1.0) 2192.3 (±346.6) 670.5 (±168.1) 281.6 (±101.6)
CPeel(m)
(±0.0)
(±0.0)
0.1
0.1
(±0.1)
(±0.1)
0.5
0.4
(±0.1)
(±0.1)
0.9
0.7
(±0.2)
(±0.2)
1.3
1.0
(±0.4)
(±0.4)
2.2
1.8
(±1.6)
(±1.2)
8.8
6.4
(±2.5)
(±2.2)
14.4
10.1
60.9 (±13.0)
75.7 (±12.3)
(±3.0)
(±2.5)
17.8
12.1
114.6 (±20.0)
91.6 (±22.0)
163.9 (±28.1) 133.9 (±29.7)
166.8 (±27.8) 136.7 (±28.1)
291.3 (±56.3) 242.3 (±43.1)
116.2 (±17.3)
49.3 (±11.1)
139.1 (±19.7)
57.2 (±13.0)
[1] A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. Power in unity: Forming teams
in large-scale community systems. In Proceedings of the 19th ACM International Conference on Information
and Knowledge Management, CIKM '10, pages 599 -- 608. ACM, 2010.
[2] A. Anagnostopoulos, L. Becchetti, C. Castillo, A. Gionis, and S. Leonardi. Online team formation in social
In Proceedings of the 21st International Conference on World Wide Web, WWW '12, pages
networks.
839 -- 848. ACM, 2012.
[3] A. Bhowmik, V. Borkar, D. Garg, and M. Pallan. Submodularity in team formation problem. In Proceedings
of the 2014 SIAM International Conference on Data Mining, SDM '14, pages 893 -- 901. SIAM, 2014.
[4] D. Bindel, J. Kleinberg, and S. Oren. How bad is forming your own opinion? In Proceedings of the 2011
IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS '11, pages 57 -- 66. IEEE, Oct
2011.
[5] P. Clifford and A. Sudbury. A Model for Spatial Conflict. Biometrika, 60(3):581 -- 588, 1973.
[6] M. H. DeGroot. Reaching a Consensus. Journal of the American Statistical Association, 69(345):118 -- 121,
1974.
[7] C. Faloutsos, K. S. McCurley, and A. Tomkins. Fast discovery of connection subgraphs. In Proceedings of the
10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '04, pages
118 -- 127. ACM, 2004.
[8] K. Feng, G. Cong, S. S. Bhowmick, and S. Ma.
In search of influential event organizers in online social
In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data,
networks.
SIGMOD '14, pages 63 -- 74. ACM, 2014.
[9] N. E. Friedkin and E. C. Johnsen. Social influence and opinions. The Journal of Mathematical Sociology,
15(3-4):193 -- 206, 1990.
[10] N. E. Friedkin and E. C. Johnsen. Social influence networks and opinion change. Advances in group processes,
16(1):1 -- 29, 1999.
[11] A. Gajewar and A. D. Sarma. Multi-skill collaborative teams based on densest subgraphs. In Proceedings of
the 2012 SIAM International Conference on Data Mining, SDM '12, pages 165 -- 176. SIAM, 2012.
17
[12] A. Gionis, E. Terzi, and P. Tsaparas. Opinion Maximization in Social Networks. In Proceedings of the 2013
SIAM International Conference on Data Mining, SDM '13, pages 387 -- 395. SIAM, 2013.
[13] R. A. Holley and T. M. Liggett. Ergodic Theorems for Weakly Interacting Infinite Systems and the Voter
Model. The Annals of Probability, 3(4):643 -- 663, 1975.
[14] M. Kargar and A. An. Discovering top-k teams of experts with/without a leader in social networks.
In Proceedings of the 20th ACM International Conference on Information and Knowledge Management,
CIKM'11, pages 985 -- 994. ACM, 2011.
[15] T. Lappas, K. Liu, and E. Terzi. Finding a team of experts in social networks. In Proceedings of the 15th
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD'09, pages 467 -- 476.
ACM, 2009.
[16] C.-T. Li and M.-K. Shan. Team formation for generalized tasks in expertise social networks. In Proceedings
of the 2010 IEEE Second International Conference on Social Computing, SocialCom '10, pages 9 -- 16. IEEE,
Aug 2010.
[17] S. S. Rangapuram, T. Buhler, and M. Hein. Towards realistic team formation in social networks based on
densest subgraphs. In Proceedings of the 22nd International Conference on World Wide Web, WWW '13,
pages 1077 -- 1088. ACM, 2013.
[18] N. Ruchansky, F. Bonchi, D. Garc´ıa-Soriano, F. Gullo, and N. Kourtellis. The minimum wiener connector
In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data,
problem.
SIGMOD'15, pages 1587 -- 1602. ACM, 2015.
[19] M. Sozio and A. Gionis. The community-search problem and how to plan a successful cocktail party. In
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
KDD'10, pages 939 -- 948. ACM, 2010.
[20] H. Tong and C. Faloutsos. Center-piece subgraphs: Problem definition and fast solutions. In Proceedings
of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '06,
pages 404 -- 413. ACM, 2006.
[21] V. Vazirani. Approximation Algorithms. Springer, 2003.
[22] E. Yildiz, A. Ozdaglar, D. Acemoglu, A. Saberi, and A. Scaglione. Binary opinion dynamics with stubborn
agents. ACM Transactions on Economics and Computation, 1(4):19:1 -- 19:30, Dec. 2013.
18
|
1906.12334 | 1 | 1906 | 2019-06-27T05:31:38 | K-Core Maximization through Edge Additions | [
"cs.SI",
"cs.DS"
] | A popular model to measure the stability of a network is k-core - the maximal induced subgraph in which every vertex has at least k neighbors. Many studies maximize the number of vertices in k-core to improve the stability of a network. In this paper, we study the edge k-core problem: Given a graph G, an integer k and a budget b, add b edges to non-adjacent vertex pairs in G such that the k-core is maximized. We prove the problem is NP-hard and APX-hard. A heuristic algorithm is proposed on general graphs with effective optimization techniques. Comprehensive experiments on 9 real-life datasets demonstrate the effectiveness and the efficiency of our proposed methods. | cs.SI | cs | K-Core Maximization through Edge Additions
Zhongxin Zhou1,2,4 , Fan Zhang1 , Xuemin Lin2,3,4 , Wenjie Zhang3 and Chen Chen2
1Guangzhou University, Guangzhou, China
2East China Normal University, Shanghai, China
3University of New South Wales, Sydney, Australia
{zzxecnu, fanzhang.cs}@gmail.com, {lxue, zhangw}@cse.unsw.edu.au, [email protected]
4Zhejiang Lab, Hangzhou, China
9
1
0
2
n
u
J
7
2
]
I
S
.
s
c
[
1
v
4
3
3
2
1
.
6
0
9
1
:
v
i
X
r
a
Abstract
A popular model to measure the stability of a net-
work is k-core - the maximal induced subgraph in
which every vertex has at least k neighbors. Many
studies maximize the number of vertices in k-core
to improve the stability of a network. In this pa-
per, we study the edge k-core problem: Given a
graph G, an integer k and a budget b, add b edges to
non-adjacent vertex pairs in G such that the k-core
is maximized. We prove the problem is NP-hard
and APX-hard. A heuristic algorithm is proposed
on general graphs with effective optimization tech-
niques. Comprehensive experiments on 9 real-life
datasets demonstrate the effectiveness and the effi-
ciency of our proposed methods.
1 Introduction
Graphs are widely used to model networks, where each ver-
tex represents a user and each edge represents a connec-
tion between two users. The cohesive subgraph model of
k-core, introduced by [Seidman, 1983], is defined as the max-
imal induced subgraph in which every vertex has at least
k neighbors (adjacent vertices) in the subgraph. The k-
core of a network corresponds to the natural equilibrium
of a user engagement model: each user incurs a cost (e.g.,
k) to remain engaged but receives a benefit proportional to
(e.g., equal to) the number of engaged neighbors. Since the
number of vertices (the size) of k-core reflects the stabil-
ity of a network, it is widely adopted in the study of net-
work engagement (stability), e.g., [Bhawalkar et al., 2015;
Malliaros and Vazirgiannis, 2013; Wu et al., 2013].
To prevent network unraveling, Bhawalkar and Kleinberg
et al. propose the anchored k-core problem which maximizes
the k-core by anchoring b vertices [Bhawalkar et al., 2015],
where the degree of an anchor is considered as infinitely large.
There are a series of following work to maximize the k-core,
e.g., [Zhang et al., 2018b; Zhang et al., 2017a; Chitnis et al.,
2013]. In order to improve network stability, another basic
graph operation is edge addition, which can also be applied
Zhongxin Zhou and Fan Zhang are the joint first authors. Fan
Zhang is the corresponding author.
Figure 1: An Example of k-Core and Anchoring, k = 3
to k-core maximization. Thus, the edge k-core problem is
proposed [Chitnis and Talmon, 2018]: Given a graph G, an
integer k and a budget b, add b edges to non-adjacent vertex
pairs in G such that the k-core is the largest.
Example 1. Figure 1 depicts a social group G with 9 users
and their connections. The willingness of a user to keep en-
gaged is influenced by the number of her friends (neighbors)
in this group. According to the k-core model, suppose k = 3,
v4, v6, and v7 firstly drop out. Their departure leads to the
leave of v5 and v8, as their degrees decrease to 1 which is
less than k. To improve network stability, we can anchor v6
and v7 based on anchored k-core model, or add an edge be-
tween v6 and v7 based on edge k-core model. Both solutions
lead to a larger k-core induced by the vertices in G except v4.
The edge k-core problem can find many applications on
real-life networks:
friend recommendation in social net-
works, connection construction in telecom networks, etc. For
instance, in a P2P network, any user benefiting from the net-
work should be connected to at least k other users, to ex-
change resources. The holder of a P2P network can use the
edge k-core model to find which connections should be added
between users so that a large number of users can successfully
use the P2P network [Chitnis and Talmon, 2018].
Challenges and Contributions.
In this paper, we propose
a concise reduction to prove that the problem is NP-hard and
APX-hard. The only existing solution is proposed for graphs
with bounded tree-width [Chitnis and Talmon, 2018]. How-
ever, this assumption usually does not hold in real-life graphs,
and their techniques cannot be extended to handle general
graphs. Due to the hardness of the problem, we propose a
heuristic algorithm with effective pruning techniques. The
experiments are conducted on 9 real networks to demonstrate
the effectiveness and the efficiency of the proposed methods.
v6v1v2v0v3v4v5v7v83-core2 Related Work
Graph processing on large data may require higher compu-
tation efficiency than traditional queries [Luo et al., 2008;
Cheema et al., 2010; Luo et al., 2011]. Cohesive subgraph
mining is a fundamental graph problem, with various mod-
els such as clique [Luce and Perry, 1949], k-core [Seidman,
1983], k-fami [Zhang et al., 2018a], etc. Among the mod-
els, k-core is the only one known to have a linear time algo-
rithm [Batagelj and Zaversnik, 2003]. The k-core has a wide
range of applications such as social contagion [Ugander et al.,
2012], influential spreader identification [Kitsak et al., 2010],
collapse prediction [Morone et al., 2019], user engagement
study [Malliaros and Vazirgiannis, 2013], etc.
There is an efficient heuristic algorithm for the anchored k-
core problem [Zhang et al., 2017a], while it cannot be simply
applied to solve the edge k-core problem. One major reason
is that the anchored k-core model does not change the topol-
ogy of the graph while the edge k-core model needs to add
new edges. Besides the k-core maximization work introduced
in Section 1, there are some studies on k-core minimiza-
tion under the view of against attack [Zhang et al., 2017b;
Zhu et al., 2018; Medya et al., 2019].
The edge addition has been studied in different topics.
[Natanzon et al., 2001] studies the hardness of edge modi-
fication problems on some classes of graphs. [Suady and Na-
jim, 2014] aims to reduce the diameter of a graph by adding
edges. [Lai et al., 2005] aims to add a small number of edges
in a graph to enlarge the bandwidth. [Kapron et al., 2011]
aims to anonymize a given vertex set by adding fewest edges.
3 Preliminaries
We consider a simple, undirected and unweighted graph G =
(V, E), where V is a set of vertices and and E is a set of
edges. We denote n = V , m = E and assume m > n. Let
S = (V (cid:48), E(cid:48)) be an induced subgraph of G, where V (cid:48) ⊆ V
and E(cid:48) ⊆ E. The notations are summarized in Table 1.
Definition 1. k-core. Given a graph G, a subgraph S is the
k-core of G, denoted by Ck(G), if (i) deg(u, S) ≥ k for every
vertice u ∈ S; (ii) S is maximal, i.e., any subgraph S(cid:48) ⊃ S
is not a k-core.
The k-core of a graph G can be obtained by recursively
removing every vertex u and its incident edges in G if
deg(u, G) < k, with a time complexity of O(m). The k-
cores of G with different inputs of k constitute a hierarchical
structure of G, i.e., Ck+1(G) ⊆ Ck(G) for every value of k.
The definition of k-shell is then derived.
Definition 2. k-shell. Given a graph G, the k-shell of G,
denoted by Hk(G), is the set of vertices in k-core but not in
(k+1)-core, i.e., Hk(G) = V (Ck(G) − Ck+1(G)).
If we add some new edges among the vertices which are
not adjacent, the k-core of the graph may contain more ver-
tices, which is named the edge k-core. The added new edges
are called anchors or anchor edges. In this paper, we say an-
chor, add, or insert an edge interchangeably, e.g., an inserted
edge is also called an anchored edge. The edges, which may
be inserted to the graph, are called candidate anchors or can-
didate edges.
Notation
G
u, v; e, (u, v)
m; n
N (u, G)
deg(u, G)
S
V (S); E(S)
G[X]
Ck(G); Hk(G)
k; b
A
GA; Ge
F(A, G)
L; Li
l(u)
d∗(u)
Definition
an unweighted and undirected graph
a vertex in G; an edge in G
the number of edges in G; the number of ver-
tices in G
the set of adjacent vertices (neighbors) of u
in G
the number of adjacent vertices of u in G
a subgraph of G
the vertex set of S; the edge set of S
induced subgraph of the vertex set X in G
the k-core of G; the k-shell of G
the degree constraint; the anchor budget
a set of anchor edges
the graph G + A; the graph G + {e}
the followers of the anchor set A in G
the onion layers of G; the i-th layer of L
layer index of u in L
number of neighbors of u in its higher layers
Table 1: Summary of Notations
anchor edges A ⊆ ((cid:0)V
Definition 3. edge k-core. Given a graph G and a set of
Ck(G + A), is the k-core of the graph G(cid:48) = (V, E ∪ A).
(cid:1) \ E), the edge k-core, denoted by
2
Due to the addition of anchor edges (A), more vertices
might be retained in Ck(G + A), in addition to the vertices
in Ck(G). Note that the vertices not incident to the anchor
edges may also be retained, according to the contagious na-
ture of k-core computation. The vertices following the anchor
edges A to engage in k-core are named the followers of A, de-
noted by F(A, G). Formally, F(A, G) is the set of vertices
in Ck(G + A) \ Ck(G). The number of the followers reflects
the importance of the corresponding anchor edges.
Problem Statement. Given a graph G, a degree constraint
k and a budget b, the edge k-core problem aims to find a set
A is maximized, i.e., F(A, G) is maximized.
(cid:1) \ E such that the number of followers of
A of b edges in(cid:0)V
2
4 Complexity
Theorem 1. Edge k-core problem is NP-hard when k ≥ 3.
Proof. We reduce the edge k-core problem from the maxi-
mum coverage (MC) problem [Karp, 1972] which is NP-hard.
The MC problem is to find at most b sets to cover the largest
number of elements, where b is a given budget. We consider
an arbitrary instance of MC with c sets T1, .., Tc and d ele-
ments {e1, .., ed} = ∪1≤i≤cTi. We suppose c > k, c > b,
and each of the resulting b sets contains at least 2 elements,
without loss of generality. Then we construct a correspond-
ing instance of the edge k-core problem on a graph G. Fig-
ure 2 shows a construction example from 3 sets and 4 ele-
ments when k = 3.
The set of vertices in G consists of three parts: M, N
and Q. The part M contains c set of vertices where each
set has d + 3 vertices, i.e., M = ∪1≤i≤cMi where Mi =
∪1≤j≤d+3ui
j. The part N contains d vertices. The part Q is
a (k+1)-clique where every two vertices of the k + 1 vertices
for each e ∈(cid:0)V
(cid:1) \ {E ∪ A ∪(cid:0)V (Ck)
Algorithm 1 NaiveEKC
Input: G: a graph, k: degree constraint, b: budget
Output: a set A of anchor edges
1: A ← ∅; Ck ← Ck(G)
2: for i from 1 to b do
3:
4:
5:
6:
7:
8: end for
9: return A
end for
e∗ ← the edge with most followers;
A ← A ∪ e∗; Ck ← Ck(G + A);
compute F(e, G + A);
(cid:1)} do
2
2
Proof. For two arbitrary collapsers sets A and B, if f is sub-
modular, it must hold that f (A) + f (B) ≥ f (A ∪ B) +
f (A ∩ B). Let Q1 be a (k+1)-clique where vertices u and
v are contained. Let Q2 be another (k+1)-clique. We cre-
ate a vertex w and connect it to the vertices in Q2 by k − 2
edges. If A = (u, w) and B = (v, w), f (A) + f (B) = 0 <
f (A ∪ B) + f (A ∩ B) = 1.
5 Solution
Due to the NP-hardness and inapproximability of the prob-
lem, we resort to a greedy heuristic which iteratively finds
the best anchor, i.e., the edge with the largest number of fol-
lowers. The framework of the greedy algorithm is shown in
Algorithm 1. At Line 4, we compute the followers for each
candidate anchor edge in the complement graph of G, ex-
cept the anchored edges in A and the edges between the k-
core vertices. Note that adding an edge between two (non-
adjacent) k-core vertices cannot enlarge the k-core, because
all the non-k-core vertices will still be deleted in k-core com-
putation. After the computation for every candidate anchor
edge, the best anchor is chosen at Line 6, and the k-core is
updated by inserting the anchor edge. The time complexity of
Algorithm 1 is O(b× n2× m). As we do not explicitly record
the candidate edges, the space complexity of Algorithm 1 is
O(m).
5.1 Optimizations on Each Iteration
In this section, we introduce optimization techniques for the
first iteration of the greedy algorithm, i.e., the edge k-core
problem with b = 1. They can be immediately applied to
other iterations by replace the k-core of G by the edge k-core
of G + A.
Basic Candidate Pruning
The following theorem locates the scope of valid candidate
anchors where each edge has at least one follower.
Theorem 4. Given a graph G, if a candidate edge e = (u, v)
has at least one follower, we have that u ∈ Ck−1(G) and
v ∈ Ck−1(G), where at least one of u and v is in Hk−1(G).
Proof. Suppose u /∈ Ck−1(G). We have e ∈ Ck(Ge); other-
wise, we have Ck(Ge) = Ck(G), i.e., there is no follower of
e. If we remove e from Ck(Ge), then deg(u, Ck(Ge) \ {e})
and deg(v, Ck(Ge)\{e}) are at least k − 1, because (u, v) ∈
Figure 2: Complexity Reduction, k = 3
are adjacent. For every i and j, if ei ∈ Tj in the MC in-
stance, we add an edge between vi and uj
i . In Figure 2, these
edges are marked in bold. For every Mi in M, we connect
j+1 by an edge for every j ∈ [1, d + 2], and we also
j and ui
ui
connect ui
1 and ui
d+3. For every Mi, we add edges between
every vertex in Mi and the vertices in Q so that every vertex
d+3} has a degree of k and every vertex in
in Mi \ {ui
d+1, ui
d+3} has a degree of k − 1. We add k − 1 edges
{ui
between vi and the vertices in Q for every i ∈ [1, d]. The
construction of G is completed.
d+1, ui
d+1 and ui
The k-core computation will delete all the vertices in M
and N. Thus, the k-core of G is Q. To enlarge the k-core, the
solution (A) is to add edges between ui
d+3, which is
most cost-effective. Another solution is to add edges between
Mi and Mj where i (cid:54)= j may also enlarge the k-core, while
this solution can always be replaced by solution (A) with at
most the same number of followers. Adding an edge to a
vertex in N is not worthwhile, since we suppose each of the
resulting b sets contains at least 2 elements. Thus, the edge
k-core problem always chooses b of the Mi in G which cor-
responds to b sets in the MC problem. If there is a polynomial
time solution for the edge k-core problem, the MC problem
will be solved in polynomial time.
Theorem 2. For k ≥ 3 and any > 0, the edge k-core
problem cannot be approximated in polynomial time within a
ratio of (1 − 1/e + ), unless P = N P .
Proof. We reduce from the MC problem using a reduction
similar to that in the proof of Theorem 1. For any > 0,
the MC problem cannot be approximated in polynomial time
within a ratio of (1 − 1/e + ), unless P = N P [Feige,
1998]. Let p be an arbitrarily large constant. There are two
differences in the construction of G: (i) Q is a p-clique; and
(ii) every vi is attached by a loop of p vertices where each
vertex is connected to Q by k − 2 edges except vi. Let γ >
1−1/e, if there is a solution with γ-approximation on optimal
follower number for the edge k-core problem, there will be a
λ-approximate solution on optimal element number for MC,
where λ = γ + (γ−1)×b(d+3)
and f is the number of followers
of edge k-core problem. Thus, the theorem is proved. The
edge k-core problem is APX-hard.
Theorem 3. Let f (A) = F(A). We have that f is not
submodular for k ≥ 2.
p×f
𝑇1:{𝑒1,𝑒3}𝑇2:{𝑒1,𝑒2,𝑒3}𝑇3:{𝑒3,𝑒4}𝑒1𝑒1𝑒1𝑒2𝑒1𝑒4𝑒1𝑒3𝑣1𝑀c=3𝑑=4𝑣2𝑣3(𝑘+1)-clique:𝑣4𝑢11𝑢21𝑢31𝑢41𝑢61𝑢71𝑢51𝑢12𝑢22𝑢32𝑢42𝑢62𝑢72𝑢52𝑢13𝑢23𝑢33𝑢43𝑢63𝑢73𝑢53𝑁𝑄Ck(Ge) and their degrees decrease by 1. Thus, Ck(Ge) \
{e} ⊆ Ck−1(G) which contradicts with u /∈ Ck−1(G). Now
we have proved that u ∈ Ck−1(G) and v ∈ Ck−1(G). Sup-
pose that {u, v} ∈ Ck(G) and Ck(Ge)\Ck(G) = F (cid:54)= ∅, we
have that Ck(Ge) \ {e} belongs to Ck(G), which contradicts
with F /∈ Ck(G).
Example 2. In Figure 3, when k = 3, the 3-core C3(G)
is induced by {v0, v1, v5, v6}, and the 2-shell H2(G) =
{v2, v3, v7, v8}. According to Theorem 4, we only need to
consider every new edge (u, v) or (v, u) with u ∈ H2(G)
and v ∈ V (C2(G)) = V (C3(G)) ∪ H2(G), as candidates.
Onion Layer based Candidate Pruning
Given the (k-1)-core of G, the computation of k-core on G
recursively deletes some vertices in the (k-1)-core. The ver-
tices are deleted in batch as their degrees are less than k
at a same time, like peeling an onion [Zhang et al., 2017c;
Zhang et al., 2017a]. The first layer of the onion, denoted
by L1, consists of the vertices in (k-1)-core with degree
less than k, i.e., L1 = {u deg(u, Ck−1(G)) < k}. The
deletion of the first layer vertices may decrease the degrees
of other vertices, and produces the second layer. Recur-
sively, we have that Li = {u deg(u, Gi) < k} where
Gi = Ck−1(G) − G[∪1≤j<iLj].
Let l(u) denote the layer index of u, i.e., u ∈ Ll(u). If
l(u) < l(v), we say u is at a lower layer of v, or v is at a
higher layer of u. We use L to denote the union of layers, i.e.,
L = ∪1≤i≤sLi where s = max({l(u) u ∈ Hk−1(G)}).
Let d∗(u) denote the number of adjacent neighbors of u in
higher layers and k-core, i.e., d∗(u) = deg(u, G(cid:48)) where
G(cid:48) = Ck−1(G) − G[{∪1≤i≤l(u)Li} \ u].
Benefit from L, we propose an effective pruning technique.
Theorem 5. Given a graph G, if a candidate edge e = (u, v)
has at least one follower, we have that (i) d∗(u) = k−1 when
l(u) < l(v), (ii) d∗(v) = k − 1 when l(v) < l(u), and (iii)
d∗(u) = d∗(v) = k − 1 when l(u) = l(v);
Proof. Let O be the vertex deletion order of computing the
k-core on the (k-1)-core. We have d∗(u) ≤ k − 1 and
d∗(v) ≤ k − 1, since u and v are deleted at their layers in O,
respectively. When l(u) < l(v), we suppose d∗(u) < k − 1.
The anchoring of (u, v) increases the degrees of u and v by 1,
if we use the same order O to compute the k-core again, then
d∗(u) ≤ k − 1 < k, i.e., every vertex will be deleted at the
same position of the order O, including u and v. It contradicts
with e = (u, v) has at least one follower. Thus, case (i) and
(ii) are proved. When l(u) = l(v), we suppose d∗(u) < k−1
without loss of generality.
If we use the same order O to
compute the k-core again with the anchored edge e, u will
be deleted at the same position since d∗(u) < k. So v can't
survive after the next batch of deletions since d∗(v) < k. Fi-
nally, every vertex will be deleted.
Example 3. In Figure 3, when k = 3, layer 1 contains v3
and v8, and layer 2 contains v2 and v7. By theorem 5, (v2, v7)
is not a promising candidate edge because d∗(v7) = 1, but
(v3, v8) is a proper candidate edge.
Figure 3: Candidate Seletion, k = 3
Note that if l(u) ≤ l(v), in the k-core computation with
anchor e, the survive of u may preserve some vertices before
visiting v. Thus, in Theorem 5, there is no degree requirement
for v to ensure that e = (u, v) has at least one follower.
Onion Layer based Follower Computation
A naive follower computation is to directly apply the k-core
computation on the graph with the existence of an anchor.
An improved idea is to use the core maintenance algorithms,
which update the k-core for every k with the addition of an
edge [Zhang et al., 2017c]. For the edge k-core algorithm,
we only need to update the k-core of a given k with an an-
chor edge. Thus, we adopt and refine the follower computa-
tion in the vertex-anchored k-core algorithm (OLAK) which
is shown to be more efficient than core maintenance for k-
core update with a fixed k [Zhang et al., 2017a].
In OLAK, anchoring a vertex means the degree of the ver-
tex is infinitely large. There is an observation that a vertex u
is the follower of the anchor vertex x if there is a path x (cid:32) u
based on neighboring relations, and l(y) < l(z) for every
two consecutive vertices y and z along the path. This in-
dicates that we do not need to consider the vertices without
such paths in the follower computation. Different from an-
chored k-core problem, edge k-core problem requires us to
add a new edge, where the vertex degree is increased by ex-
actly 1, and we have to consider two vertices rather than one.
In our algorithm, given an anchor edge (u, v) with l(u) <
l(v), we generate candidate followers layer-by-layer through
activating the neighbors at higher layers, starting from the
layer of u. Here u is the first activated vertex and only the
activated vertices can activate their neighbors at higher lay-
ers. In this activation procedure, each activated vertex is as-
signed an upper bound of its degree in the edge k-core. The
degree upper bound of a vertex u is generated by counting its
neighbors in higher layers and the activated neighbors of u at
other layers. Once the degree upper bound of a vertex is less
than k, it will be deleted immediately and the upper bounds
of its neighbours will be decreased by 1. The follower com-
putation is complete when the layer-by-layer activation is fin-
ished. Note that the two vertices incident to the anchor edge
may also be deleted in this procedure. Once one of them is
deleted, there is no follower and the computation is returned.
Follower based Candidate Pruning
We can further prune some candidate edges by known results,
when we retrieve the followers of some candidate edges.
Theorem 6. Given a candidate anchor edge e1 = (u1, v1)
and its follower set F(e1), we have F(e) ⊆ F(e1) for every
candidate edge e ∈ {(u, v) u ∈ F(e1) and v ∈ F(e1) ∪
Ck(G) and u (cid:54)= v}.
v0v1v2v3v7v6v5v8v4v9L1L23-core2-shellAlgorithm 2 EKC
Input: G: a graph, k: degree constraint, b: budget
Output: A set A of anchor edges
1: A ← ∅;
2: for i from 1 to b do
3: N ← {(u, v) u ∈ Hk−1(G + A), v ∈ Ck−1(G +
A)} \ E(Ck−1(G + A)) (Theorem 4);
compute L and filter N based on Theorem 5;
for each e ∈ N do
F(e) ← FindFollower(e,L) (Section 5.1);
update N based on Theorem 6;
end for
e∗ ← the edge with most followers; A ← A ∪ e∗;
update N (Section 5.2);
4:
5:
6:
7:
8:
9:
10:
11: end for
12: return A
Proof. Let e = (u, v). If F(e) is not empty, then Ck(Ge)
contains Ck(G), u, v and F(e). Because Ck(Ge1) contains
u and v, i.e., more vertices may be added to Ck(Ge) af-
ter anchoring e1. So, V (Ck(Ge)) ⊆ V (Ck(Ge1)) and thus
F(e) ⊆ F(e1).
Example 4. In Figure 3, when k = 3, if we get that v2 and v7
are the followers of edge (v3, v8). According to Theorem 6,
the followers of (v2, v7) are also the followers of (v3, v8), thus
(v2, v7) is not a promising candidate in current iteration.
5.2 Reusing Intermediate Results across Iterations
When one iteration of the greedy algorithm is completed, we
get the best anchor edge A and the number of followers for
every candidate edge in this iteration. These results can be
reused since some connected components in the induced sub-
graph of (k-1)-shell may keep the same topology after an-
choring an edge. For each connected component S where
none of the vertices are incident to the anchor A, we can
record the largest number of followers of one candidate an-
chor in S, for the later iterations. For the connected compo-
nent(s) S where there is a vertex incident to the anchor A, it
is hard to reuse the results because the addition of edges may
largely change the vertex deletion order and the layer struc-
ture in k-core computation.
5.3 EKC Algorithm
We present the EKC algorithm in Algorithm 2, which op-
timizes the greedy algorithm by adopting all the proposed
techniques. At Line 3, the candidate edge set is restricted
to N according to Theorem 4. In Line 4, we compute the
onion layers of G and then exclude the candidates based on
Theorem 5. The follower computation of a candidate edge
is conducted by exploring L layer-by-layer, as introduced in
Section 5.1. The set N is further filtered by Theorem 6 once
a follower computation is completed. After each iteration, we
get the anchor edge with the most followers. The algorithm
terminates after b iterations.
The resulting set of b anchors is same to that in Algo-
rithm 2. The correctness is guaranteed by the correctness of
randomly chooses b anchor edges (each with at
least one follower) from N1 = {(u, v) u ∈
Hk−1(G), v ∈ Ck−1(G)} \ E(Ck−1(G))
chooses b anchors from N1 with largest degrees in
L
chooses b anchors from N1 at highest onion layers
in L
the anchored k-core algorithm in [Zhang et al.,
2017a]
identifies the optimal solution by exhaustively
searching all possible combinations of b anchors,
with all the proposed techniques
computes a k-core on G for each candidate to find
best anchor in each iteration (Algorithm 1)
Degree
Layer
AKC
Exact
Naive
Algorithm Description
Rand
Baseline Naive + filtering candidates with Theorem 4
BL+O1
BL+O2
BL+OF
Baseline + filtering candidates with Theorem 5
BL+O1 + filtering candidates with Theorem 6
BL+O2 + L based follower computation (Sec-
tion 5.1)
BL+OF + intermediate result reuse (Section 5.2)
Table 2: Summary of Algorithms
EKC
Dataset
Facebook
Enron
Brightkite
Gowalla
DBLP
Twitter
Stanford
YouTube
Flickr
Vertices
4,039
36,692
58,228
196,591
317,080
81,306
281,903
1,134,890
513,969
Edges
88,234
183,831
214,078
950,327
1,049,866
1,768,149
2,312,497
2,987,624
3,190,452
davg
43.69
10.02
7.35
9.67
6.62
33.02
14.14
5.27
12.41
kmax
115
43
52
51
113
96
71
51
309
Table 3: Statistics of Datasets
optimization techniques. The worst-case time complexity and
space complexity are same to Algorithm 1.
6 Evaluation
Algorithms. As far as we know, there is no existing al-
gorithm for the edge k-core problem on general graphs. In
the experiment, we implement and evaluate 11 algorithms as
shown in Table 2, where the bottom 6 algorithms produce the
same result, because they use the same greedy heuristic and
candidate visiting order.
Datasets. Flickr is from http://networkrepository.com/,
and the others are from https://snap.stanford.edu/data/. Ta-
ble 3 shows the statistics of the datasets.
Settings. All programs are implemented in C++. All exper-
iments are performed on Intel Xeon 2.20GHz CPU and Linux
System. We vary the parameters k and b.
6.1 Effectiveness
Figure 4 reports the number of followers w.r.t. b anchors.
For random approaches, we report the average number of fol-
lowers for 100 independent tests. In Figure 4, Degree and
Layer failed to get any followers in more than half of the
datasets, because a large degree vertex or a vertex in higher
Figure 4: Effectiveness of the Greedy Heuristic, k=20, b=5
Figure 7: Running time on Different Datasets
(a) Gowalla, b=3
(b) Brightkite, k=3
Figure 5: Exact vs EKC
(a) Gowalla, b=20
(b) Brightkite, b=5
Figure 8: Candidate Pruning
onion layer does not necessarily have a follower. A totally
random algorithm cannot get any followers in most settings.
Thus, in Rand, we only choose the edges from the set where
each edge has at least one follower. We observe that the ma-
jority of the candidate edges does not have any followers,
while our greedy heuristic always finds effective anchors in
the experiments. In Figure 4, we notice that EKC preserves
more than 100 followers in Flickr with only 5 anchors.
We also compare the performance of EKC with the opti-
mal solution from Exact. Due to extremely high cost, we
run Exact on an induced subgraph by 50 random vertices.
The results are from 100 independent settings. The values
of k and b are small due to the small-scale of data. Figure 5
shows that the margins between EKC and Exact are not un-
acceptable, considering the non-submodular property and the
significantly better efficiency of EKC.
Figure 6 shows that EKC produces similar and almost
larger numbers of followers than AKC where the meaning of
b is different: the former for edges and the latter for vertices.
Although the anchoring of one vertex means the preserving
of many edges, EKC can produce similar followers with one
anchor edge. It shows that the edge k-core can enlarge the
k-core with less graph manipulations.
6.2 Efficiency
Figure 7 reports the performance of three algorithms on all
the datasets with k = 20 and b = 5. The datasets are or-
dered by the number of edges. We find the runtime among
different datasets is largely influenced by the characteristics
of datasets and the onion layer structures in k-core compu-
tation. Baseline cannot finish computation on 4 datasets
within one week. BL+OF significantly improve the perfor-
mance by applying a series of techniques. EKC performs even
better given all the optimizations.
In Figure 8, we report the number of candidate edges of dif-
ferent algorithms by incrementally adding techniques, where
the details of each algorithms is given in Table 3. We can see
the improvement brought by each proposed technique.
Figure 9 studies the impact of k and r. Figure 9(a) shows
that the runtime decreases with a larger input of k. This is
because the number of candidate edges become fewer with
a larger k. Figure 9(b) reports the runtime with an increas-
ing b, which is proportional to the value of b. The margin
between BL+OF and EKC becomes smaller with a larger k,
because the number of connected components becomes less
when k increases. It is reported that EKC largely outperforms
the other algorithms under all the settings.
7 Conclusion
In this paper, we investigate the problem of edge k-core,
which aims to add a set b of edges in a network such that
the size of the resulting k-core is maximized. We prove the
problem is NP-hard and APX-hard. An efficient algorithm,
named EKC, is proposed with novel optimizations. Extensive
experiments on 9 real-life datasets are conducted to demon-
strate our model is effective and our algorithm is efficient.
Acknowledgments
Xuemin Lin is supported by 2019DH0ZX01, 2018YFB10035
04, NSFC61232006, ARC DP180103096 and DP170101628.
Wenjie Zhang is supported by ARC DP180103096.
(a) Gowalla, k=20
(b) Brightkite, b=5
(a) Brightkite, b=5
(b) Brightkite, k=20
Figure 6: Anchor k-core vs Edge k-core
Figure 9: Runtime with Different k and b
050100150200FacebookEnronBrightkiteGowallaDBLPTwitterStanfordYoutubeFlickrAvg. #FollowersLayerDegreeRandEKC024681234148.89s1815.7s16398s0.02s0.02s0.03sAvg. #FollowerskExactEKC0246812340.01s6.25s2204s531435s0.01s0.02s0.03s0.03sAvg. #FollowersbExactEKC0501001502002503001015202530#FollowersbAKCEKC0204060801001201015202530#FollowerskAKCEKC0100102104INFFacebookEnronBrightkiteGowallaDBLPTwitterStanfordYoutubeFlickrTime Cost (sec)BaselineBL+OFEKCNaiveBaselineBL+O1BL+O2EKC10310510710910111015202530#Candidate Edgesk10210410610810101015202530#Candidate EdgeskBaselineBL+O1BL+O2EKC10-310-11011031051015202530Time Cost (sec)k10010110210310451015202530Time Cost (sec)b[Morone et al., 2019] Flaviano Morone, Gino Del Ferraro,
and Hern´an A Makse. The k-core as a predictor of struc-
tural collapse in mutualistic ecosystems. Nature Physics,
15(1):95, 2019.
[Natanzon et al., 2001] Assaf Natanzon, Ron Shamir, and
Roded Sharan. Complexity classification of some edge
modification problems. Discrete Applied Mathematics,
113(1):109 -- 128, 2001.
[Seidman, 1983] Stephen B Seidman. Network structure and
minimum degree. Social networks, 5(3):269 -- 287, 1983.
[Suady and Najim, 2014] Suaad AA Suady and Alaa A Na-
jim. On edge-addition problem. Journal of College of
Education for Pure Science, 4(1):26 -- 36, 2014.
[Ugander et al., 2012] Johan Ugander, Lars Backstrom,
Cameron Marlow, and Jon Kleinberg. Structural diversity
in social contagion. PNAS, 109(16):5962 -- 5966, 2012.
[Wu et al., 2013] Shaomei Wu, Atish Das Sarma, Alex Fab-
rikant, Silvio Lattanzi, and Andrew Tomkins. Arrival and
departure dynamics in social networks. In WSDM, pages
233 -- 242, 2013.
[Zhang et al., 2017a] Fan Zhang, Wenjie Zhang, Ying
Zhang, Lu Qin, and Xuemin Lin. OLAK: an efficient al-
gorithm to prevent unraveling in social networks. PVLDB,
10(6):649 -- 660, 2017.
[Zhang et al., 2017b] Fan Zhang, Ying Zhang, Lu Qin, Wen-
jie Zhang, and Xuemin Lin. Finding critical users for so-
cial network engagement: The collapsed k-core problem.
In AAAI, pages 245 -- 251, 2017.
[Zhang et al., 2017c] Yikai Zhang, Jeffrey Xu Yu, Ying
Zhang, and Lu Qin. A fast order-based approach for core
maintenance. In ICDE, pages 337 -- 348, 2017.
[Zhang et al., 2018a] Fan Zhang, Long Yuan, Ying Zhang,
Lu Qin, Xuemin Lin, and Alexander Zhou. Discovering
strong communities with user engagement and tie strength.
In DASFAA, pages 425 -- 441, 2018.
[Zhang et al., 2018b] Fan Zhang, Ying Zhang, Lu Qin, Wen-
jie Zhang, and Xuemin Lin. Efficiently reinforcing social
networks over user engagement and tie strength. In ICDE,
pages 557 -- 568, 2018.
[Zhu et al., 2018] Weijie Zhu, Chen Chen, Xiaoyang Wang,
and Xuemin Lin. K-core minimization: An edge manipu-
lation approach. In CIKM, pages 1667 -- 1670, 2018.
References
[Batagelj and Zaversnik, 2003] Vladimir Batagelj and Mat-
jaz Zaversnik. An o(m) algorithm for cores decomposition
of networks. CoRR, cs.DS/0310049, 2003.
[Bhawalkar et al., 2015] Kshipra Bhawalkar, Jon M. Klein-
berg, Kevin Lewi, Tim Roughgarden, and Aneesh Sharma.
Preventing unraveling in social networks: The anchored k-
core problem. SIAM J. Discrete Math., 29(3):1452 -- 1475,
2015.
[Cheema et al., 2010] Muhammad Aamir Cheema, Ljiljana
Brankovic, Xuemin Lin, Wenjie Zhang, and Wei Wang.
Multi-guarded safe zone: An effective technique to mon-
itor moving circular range queries. In ICDE, pages 189 --
200, 2010.
[Chitnis and Talmon, 2018] Rajesh Chitnis and Nimrod Tal-
mon. Can we create large k-cores by adding few edges?
In CSR, pages 78 -- 89, 2018.
[Chitnis et al., 2013] Rajesh Hemant Chitnis, Fedor V.
Fomin, and Petr A. Golovach. Preventing unraveling in
social networks gets harder. In AAAI, 2013.
[Feige, 1998] Uriel Feige. A threshold of ln n for approxi-
mating set cover. J. ACM, 45(4):634 -- 652, 1998.
[Kapron et al., 2011] Bruce M. Kapron, Gautam Srivastava,
and S. Venkatesh. Social network anonymization via edge
addition. In ASONAM, pages 155 -- 162, 2011.
[Karp, 1972] Richard M. Karp. Reducibility among combi-
natorial problems. In Complexity of Computer Computa-
tions, pages 85 -- 103, 1972.
[Kitsak et al., 2010] Maksim Kitsak, Lazaros K Gallos,
Shlomo Havlin, Fredrik Liljeros, Lev Muchnik, H Eu-
gene Stanley, and Hern´an A Makse. Identification of in-
fluential spreaders in complex networks. Nature physics,
6(11):888 -- 893, 2010.
[Lai et al., 2005] Yung-Ling Lai, Chang-Sin Tian, and Ting-
Chun Ko. Edge addition number of cartesian product of
paths and cycles. Electronic Notes in Discrete Mathemat-
ics, 22:439 -- 444, 2005.
[Luce and Perry, 1949] R Duncan Luce and Albert D Perry.
A method of matrix analysis of group structure. Psy-
chometrika, 14(2):95 -- 116, 1949.
[Luo et al., 2008] Yi Luo, Wei Wang, and Xuemin Lin.
SPARK: A keyword search engine on relational databases.
In ICDE, pages 1552 -- 1555, 2008.
[Luo et al., 2011] Yi Luo, Wei Wang, Xuemin Lin, Xiaofang
Zhou, Jianmin Wang, and Keqiu Li. SPARK2: top-k key-
word query in relational databases. IEEE Trans. Knowl.
Data Eng., 23(12):1763 -- 1780, 2011.
[Malliaros and Vazirgiannis, 2013] Fragkiskos D. Malliaros
and Michalis Vazirgiannis. To stay or not to stay: modeling
engagement dynamics in social graphs. In CIKM, pages
469 -- 478, 2013.
[Medya et al., 2019] Sourav Medya, Tiyani Ma, Arlei Silva,
and Ambuj K. Singh. K-core minimization: A game theo-
retic approach. CoRR, abs/1901.02166, 2019.
|
1212.0087 | 1 | 1212 | 2012-12-01T09:16:35 | A scalable mining of frequent quadratic concepts in d-folksonomies | [
"cs.SI"
] | Folksonomy mining is grasping the interest of web 2.0 community since it represents the core data of social resource sharing systems. However, a scrutiny of the related works interested in mining folksonomies unveils that the time stamp dimension has not been considered. For example, the wealthy number of works dedicated to mining tri-concepts from folksonomies did not take into account time dimension. In this paper, we will consider a folksonomy commonly composed of triples <users, tags, resources> and we shall consider the time as a new dimension. We motivate our approach by highlighting the battery of potential applications. Then, we present the foundations for mining quadri-concepts, provide a formal definition of the problem and introduce a new efficient algorithm, called QUADRICONS for its solution to allow for mining folksonomies in time, i.e., d-folksonomies. We also introduce a new closure operator that splits the induced search space into equivalence classes whose smallest elements are the quadri-minimal generators. Carried out experiments on large-scale real-world datasets highlight good performances of our algorithm. | cs.SI | cs | A scalable mining of frequent quadratic concepts in d-folksonomies
Mohamed Nader Jelassi and Sadok Ben Yahia and Engelbert Mephu Nguifo
2
1
0
2
c
e
D
1
]
I
S
.
s
c
[
1
v
7
8
0
0
.
2
1
2
1
:
v
i
X
r
a
Abstract-Folksonomy mining is grasping the interest of web
2.0 community since it represents the core data of social
resource sharing systems. However, a scrutiny of the related
works interested in mining folksonomies unveils that the time
stamp dimension has not been considered. For example, the
wealthy number of works dedicated to mining tri-concepts
from folksonomies did not take into account time dimension. In
this paper, we will consider a folksonomy commonly composed
of triples <users, tags, resources> and we shall consider
the time as a new dimension. We motivate our approach by
highlighting the battery of potential applications. Then, we
present the foundations for mining quadri-concepts, provide a
formal definition of the problem and introduce a new efficient
algorithm, called QUADRICONS for its solution to allow for
mining folksonomies in time,
i.e., d-folksonomies. We also
introduce a new closure operator that splits the induced search
space into equivalence classes whose smallest elements are the
quadri-minimal generators. Carried out experiments on large-
scale real-world datasets highlight good performances of our
algorithm.
Keywords-Quadratic Context; Formal Concept Analysis;
Quadratic Concepts; Folksonomies; Algorithm; Social Net-
works
I. INTRODUCTION
Folksonomy (from folk and taxonomy) is a neologism
for a practice of collaborative categorization using freely
chosen keywords [1]. Folksonomies (also called social tag-
ging mechanisms) have been implemented in a number of
online knowledge sharing environments since the idea was
first adopted by the social bookmarking site DEL.ICIO.US
in 2004. The idea of a folksonomy is to allow the users
to describe a set of shared objects with a set of keywords,
i.e., tags, of their own choice. The new data of folksonomy
systems provides a rich resource for data analysis, infor-
mation retrieval, and knowledge discovery applications. The
rise of folksonomies, due to the success of the social resource
sharing systems (e.g., FLICKR, BIBSONOMY, YOUTUBE,
etc.) also called Web 2.0, has attracted interest of researchers
to deal with the Folksonomy mining area. However, due to
the huge size of folksonomies, many works focus on the
extraction of lossless concise representations of interesting
patterns, i.e., triadic concepts [2] [3] [4].
Recently, in [5], the new TRICONS algorithm outperforms
its competitors thanks to a clever sweep of the search space.
Nevertheless, a scrutiny of these related work unveils that
the time stamp dimension has not been considered yet.
Time is considered one of the most important factors in
detecting emerging subjects. Agrawal and Srikant show in
[6] the importance of sequential patterns which may be
useful to discover rules integrating the notion of temporality
and sequence of events. In our case, such rules shall be of
the form : users which shared the movie "Alcatraz" using
the tag prison will shared it later with the tag escape.
With this paper, we initiate the confluence of threee
lines of research, Formal Concept Analysis, Folksonomy
mining and Mining Sequential Patterns. Formal Concept
Analysis (FCA) [7] has been extended since fifteen years ago
to deal with three-dimensional data [8]. However, Triadic
Concept Analysis (TCA) has not garnered much attention
for researchers until the coming of folksonomies as they
represent the core data structure of social networks. Thus,
we give a formal definition of the problem of mining all fre-
quent quadri-concepts (the four-dimensional and sequential
version of mining all frequents tri-concepts) and introduce
our algorithm QUADRICONS for its solution, which is an
extension of the TRICONS algorithm to the quadratic case.
We also introduce a new closure operator that splits the in-
duced search space into equivalence classes whose smallest
elements are the quadri-minimal generators (QGs); QGs are
helpful for a clever sweep of the search space [5] [9].
The remainder of the paper is organized as follows. In
the next section, we motivate our conceptual and temporal
clustering approach for solving the problem of mining all
frequent quadri-concepts of a given dataset. We thoroughly
study the related work in Section III. In Section IV, we pro-
vide a formal definition of the problem of mining all frequent
quadri-concepts. We introduce a new closure operator for the
quadratic context as well as the QUADRICONS algorithm
dedicated to the extraction of all frequent quadri-concepts,
in Section V. In Section VI, carried out experiments about
performances of our algorithm in terms of execution time,
consumed memory and compacity of the quadri-concepts.
Finally, we conclude the paper with a summary and we
sketch some avenues for future works in Section VII.
II. MOTIVATION : CONCEPTUAL AND TEMPORAL
CLUSTERING OF FOLKSONOMIES
The immediate success of social networks, i.e., social
resource sharing systems is due to the fact that no specific
skills are needed for participating [2]. Each individual user
is able to share a web page1, a personal photo2, an artist he
likes3 or a movie he watched4 without much effort.
1http://del.icio.us
2http://flickr.com
3http://last.fm
4http://movielens.org
The core data structure of such systems is a folksonomy.
It consists of three sets U, T , R of users assigning tags to
resources as well as a ternary relation Y between them. To
allow conceptual and temporal clustering from folksonomies,
an additional dimension, i.e., D, is needed : time. Indeed,
the special feature of folksonomies under study is their
unceasing evolution [10]. Such systems follow trends and
evolve according to the new user's taggings [11]. The
increasing use of these systems shows that folksonomy-based
works are then able to offer a better solution in the domain of
Web Information Retrieval (WIR) [12] by considering time
when dealing with a query or during the user's taggings,
i.e., by suggesting the appropriate trendy tags. Thus, a user
which tagged a film or a website with a given tag at a specific
date may assign a whole new tag at a different period under
completely different circumstances. For example, a user that
associate the website whitehouse.gov with the tags Bush and
Iraq in 2004 might assign it the tags Obama and crisis
nowadays. A more real and sadly true example leads users
today associating Islam with the tag terrorism instead of
Quran; besides, one may see the incessant evolution of the
tag Binladen in social networks since September 2001 [13].
Within the new introduced dimension, i.e., time, our goal
is to detect hidden sequential conceptualizations in folk-
sonomies. An exemple of such a concept is that users which
tagged "Harry Potter" will tag "The Prisoner of Azkaban"
and then tag "The Order of the Phoenix", probably with the
same tags.
Our algorithm solves the problem of frequent closed
patterns mining for this kind of data. It will return a set
of (frequent) quadruples, where each quadruple (U , T , R,
D) consists of a set U of users, a set T of tags, a set R
of resources and a set D of dates. These quadruples, called
(frequent) quadri-concepts, have the property that each user
in U has tagged each resource in R with all tags from
T at different dates from D, and that none of these sets
can be extended without shrinking one of the other three
dimensions. Hence, they represent the four-dimensional and
sequential extension of tri-concepts. Moreover, we can add
minimum support constraints on each of the four dimensions
in order to focus on the largest concepts of the folksonomy,
i.e., by setting higher values of minimum supports.
In the remainder, we will scrutinize the state-of-the-art
propositions aiming to deal with the folksonomy mining area.
III. RELATED WORK
In this section, we discuss the different works that deal
with folksonomy mining. Due to their triadic form, many
researchers [2] [3] [4] focus on folksonomies in order to
extract triadic concepts which are maximal sets of users,
tags and resources. Tri-concepts are the first step to a
various of applications : ontology building [1], association
rule derivation [14], recommendation systems [15] to cite
but a few. Other papers focus on analysing the structure
of folksonomies [16] or structure the tripartite network of
folksonomies [10]. Recent works analyse the folksonomy's
evolution through time in order to discover the emergent
subjects and follow trends [13] [17] [18].
Since we are going to mine quadri-concepts from d-
folksonomies, which mimic the structure of quadratic con-
texts, we look for works that deal with the four-dimensional
data. In [19], inspired by work of Wille [8] extending Formal
Concept Analysis to three dimensions, the author created
a framework for analyzing n-dimensional formal concepts.
He generalized the triadic concept analysis to n dimensions
for arbitrary n, giving rise to Polyadic Concept Analysis.
The n-adic contexts give rise, in a way analogous to the
triadic case, to n-adic formal concepts. In [19], the author
gives examples of quadratic concepts and their associated
quadri-lattice. Despite robust theoretical study, no algorithm
has been proposed by Voutsadakis for an efficient extraction
of such n-adic concepts. Recently, Cerf et al. proposed the
DATA-PEELER algorithm [4] in order to extract all closed
concepts from n-ary relations. DATA-PEELER enumerates
all the n-adic formal concepts in a depth first manner using
a binary tree enumeration strategy. When setting n to 4,
DATA-PEELER is able to extract quadri-concepts.
In the following, we give a formal definition of the
problem of mining all frequent quadri-concepts as well as
the main notions used through the paper.
IV. THE PROBLEM OF MINING ALL FREQUENT
QUADRI-CONCEPTS
In this section, we formalize the problem of mining all
frequents quadri-concepts. We start with an adaptation of the
notion of folksonomy [2] to the quadratic context.
Definition 1: (D-FOLKSONOMY) A d-folksonomy is a set
of tuples Fd = (U, T , R, D, Y) where U, T , R and D are
finite sets which elements are called users, tags, resources
and dates. Y ⊆ U × T × R × D represents a quaternary
relation where each y ⊆ Y can be represented by a quadruple
: y = {(u, t, r, d) u ∈ U, t ∈ T , r ∈ R, d ∈ D} which
means that the user u has annotated the resource r using the
tag t at the date d.
Example 1: Table I depicts an example of a d-folksonomy
Fd with U = {u1, u2, u3, u4}, T = {t1, t2, t3}, R = {r1, r2}
and D = {d1, d2}. Each cross within the quaternary relation
indicates a tagging operation by a user from U, a tag from
T and a resource from R at a date from D, i.e., a user has
tagged a particular resource with a particular tag at a date
d. For example, the user u1 has tagged the resource r1 with
the tags t1, t2 and t3 at the date d1.
The following definition introduces a (frequent) quadri-
set.
Definition 2: (A (FREQUENT) QUADRI-SET) Let Fd =
(U, T , R, D, Y) be a d-folksonomy. A quadri-set of Fd
is a quadruple (A, B, C, E) with A ⊆ U, B ⊆ T , C ⊆ R
and E ⊆ D such as A × B × C × E ⊆ Y.
d1
d2
U/T
u1
u2
u3
u4
u1
u2
u3
u4
Fd R
D
r1
t2
r2
t2
t1
t3
t1
t3
× × × × × ×
× ×
× ×
× ×
× ×
× × × × × ×
× ×
× ×
×
×
×
×
Table I
A d-folksonomy.
×
×
D-Folksonomies have four dimensions which are com-
pletely symmetric. Thus, we can define minimum support
thresholds on each dimension. Hence, the problem of mining
frequent quadri-sets is then the following:
Problem 1: (Mining all frequent quadri-sets) Let Fd =
(U, T , R, D, Y) be a d-folksonomy and let minsuppu,
minsuppt, minsuppr and minsuppd be (absolute) user-
defined minimum thresholds. The task of mining all frequent
quadri-sets consists in determining all quadri-sets (A, B, C,
E) of Fd with A ≥ minsuppu, B ≥ minsuppt, C
≥ minsuppr and E ≥ minsuppd.
Our thresholds are antimonotonic constraints : If (A1, B1,
C1, E1) with A1 being maximal for A1 × B1 × C1 × E1
⊆ Y is not u-frequent5 then all (A2, B2, C2, E2) with B1
⊆ B2, C1 ⊆ C2 and E1 ⊆ E2 are not u-frequent either. The
same holds symmetrically for the other three dimensions. In
[8], the authors demonstrate that above the two-dimensional
case, the direct symmetry between monotonicity and anti-
monotonicity breaks. Thus, they introduced a lemma which
results from the triadic Galois connection [20] induced by
a triadic context. In the following, we adapt that lemma to
our quadratic case.
Lemma 1: (See also [19], Proposition 2) Let (A1, B1,
C1, E1) and (A2, B2, C2, E2) be quadri-sets with Ai being
maximal for Ai × Bi × Ci × Ei ⊆ Y, for i = 1,2. If B1
⊆ B2, C1 ⊆ C2 and E1 ⊆ E2 then A2 ⊆ A1. The same
holds symmetrically for the other three dimensions. In the
sequel, the inclusion (A1, B1, C1, E1) ⊆ (A2, B2, C2, E2)
holds if and only if B1 ⊆ B2, C1 ⊆ C2, E1 ⊆ E2 and A2
⊆ A1.
Example 2: Let Fd be the d-folksonomy of Table I and
let S1 = {{u3, u4}, t3, {r1, r2}, {d1, d2}} and S2 = {{u1,
u3, u4}, {t2, t3}, {r1, r2}, d1} be two quadri-sets of Fd.
Then, we have S1 ⊆ S2 since {u3, u4} ⊆ {u1, u3, u4}, t3
⊆ {t2, t3}, {r1, r2} ⊆ {r1, r2} and d1 ⊆ {d1, d2}.
As the set of all frequent quadri-sets is highly redundant,
we consider a specific condensed representation,
i.e., a
subset which contains the same information : the set of all
frequent quadri-concepts. The latter's definition is given as
follows :
5with regard to the dimension U.
Definition 3: ((FREQUENT) QUADRATIC CONCEPT) A
quadratic concept (or a quadri-concept for short) of a d-
folksonomy Fd = (U, T , R, D, Y) is a quadruple (U , T , R,
D) with U ⊆ U, T ⊆ T , R ⊆ R and D ⊆ D with U ×
T × R × D ⊆ Y such that the quadruple (U , T , R, D) is
maximal, i.e., none of these sets can be extended without
shrinking one of the other three dimensions. A quadri-
concept is said to be frequent whenever it is a frequent
quadri-set.
Problem 2: (Mining all frequent quadri-concepts) Let
Fd = (U, T , R, D, Y) be a d-folksonomy and let minsuppu,
minsuppt, minsuppr and minsuppd be user-defined min-
imum thresholds. The task of mining all frequent quadri-
concepts consists in determing all quadri-concepts (U , T ,
R, D) of Fd with U ≥ minsuppu, T ≥ minsuppt,
R ≥ minsuppr and D ≥ minsuppd. The set of all
frequent quadri-concepts of Fd is equal to QC = {qc qc =
(U , T , R, D) is a frequent quadri-concept}.
Remark 1: It is important to note that the extracted repre-
sentation of quadri-concepts is information lossless. Hence,
after solving Problem 2, we can easily solve the Problem
1 by enumerating all quadri-sets (A, B, C, E) such as it
exists a frequent quadri-concept (U , T , R, D) such as A ⊆
U , B ⊆ T , C ⊆ R, E ⊆ D and A ≥ minsuppu, B
≥ minsuppt, C ≥ minsuppr and E ≥ minsuppd.
In the following, we introduce the QUADRICONS al-
gorithm for mining all frequent quadri-Concepts before
discussing its performances versus the DATA-PEELER al-
gorithm for the quadratic case in the section after.
V. THE QUADRICONS ALGORITHM FOR MINING ALL
FREQUENT QUADRI-CONCEPTS
In this section, we introduce new notions that would be
of use throughout the QUADRICONS algorithm. Hence, we
introduce a new closure operator for a d-folksonomy which
splits the search space into equivalence classes as well as an
extension of the notion of minimal generator [5]. Then, we
provide an illustrative example of our algorithm.
A. Main notions of QUADRICONS
Before introducing our closure operator
for a d-
folksonomy/quadratic context, we define a general definition
of a closure operator for a n-adic context.
Definition 4: (CLOSURE OPERATOR OF A n-ADIC CON-
TEXT) Let S = (S1, S2, . . ., Sn) be a n-set, with S1 being
maximal for S1 × . . . × Sn ⊆ Y, of a n-adic context
Kn with n dimensions, i.e., Kn = (D1, D2, . . ., Dn, Y).
A mapping h is defined as follows :
h(S) = h(S1, S2, . . ., Sn) = (C1, C2, . . ., Cn) such as :
C1 = S1
∧ C2 = {C i
3 ∈ S3, . . ., ∀ ci
n) ∈ Y ∀ ci
2 ∈ D2 (ci
3, . . ., ci
n ∈ Sn}
1, C i
2, ci
1 ∈ C1,
∀ ci
...
∧ Cn = {C i
C1, . . . ∀ ci
n ∈ Dn (ci
n−1 ∈ Cn−1}
1, ci
2, . . ., ci
n−1, C i
n) ∈ Y ∀ ci
1 ∈
Proposition 1: h is a closure operator.
Proof: To prove that h is a closure operator, we have
to prove that this closure operator fulfils the three properties
of extensivity, idempotency and isotony [21].
(1) Extensivity : Let S = (S1, S2, . . ., Sn) be a n-set
. . ., Cn) such that : C1 =
of Kn ⇒ h(S) = (C1, C2,
n) ∈ Y ∀ ci
2, ci
S1, C2 = {C i
2 ∈ D2 (ci
n ∈ Sn} ⊇ S2 since C1 =
∈ C1, ∀ ci
2, . . ., ci
n) ∈
S1 , . . ., Cn = {C i
1 ∈ C1, ∀ ci
Y ∀ ci
n−1 ∈ Cn−1} ⊇ Sn
since C1 = S1, C2 ⊇ S2, . . ., Cn−1 ⊇ Sn−1. Then, C1 =
S1 and Si ⊆ Ci for i = 2, . . . n ⇒ S ⊆ h(S) (cf., Lemma 1)
n ∈ Dn (ci
1, ci
2 ∈ C2, . . . ∀ ci
3 ∈ S3, . . ., ∀ ci
3, . . ., ci
n−1, C i
1, C i
1
1, C i′
1, C′
2 , ci
2, . . ., C′
3, . . ., ci
n) such that : C′
n) ∈ Y ∀ ci
(2) Idempotency : Let S = (S1, S2, . . ., Sn) be a n-set
of Kn ⇒ h(S) = (C1, C2, . . ., Cn) ⇒ h(C1, C2, . . ., Cn)
2 = {C i′
= (C′
2 ∈ D2
3 ∈ S3, . . ., ∀ ci
(ci
n
1 , ci′
n ∈ Dn (ci′
∈ Sn} = C2 since C1 = S1, . . ., C′
2 ,
. . ., ci′
2, . . . ∀ ci′
n−1 ∈
C′
n−1
i = Ci for i = 1, . . . n ⇒ h(h(S)) = h(S)
= Cn−1. Then, C′
1 ∈ C′
n−1} = Cn since we have C′
1 = C1, C′
1 ∈ C1, ∀ ci
n = {C i′
2 ∈ C′
1, ∀ ci′
1 = C1, C′
2 = C2, . . ., C′
n ) ∈ Y ∀ ci′
n−1, C i′
n) be two n-sets of Kn with S ⊆ S′, i.e., S′
(3) Isotony : Let S = (S1, S2, . . ., Sn) and S′ = (S′
1, S′
2,
1 ⊆ S1
i for i = 2, . . . n (cf., Lemma 1). We have h(S)
n) such that
. . ., S′
and Si ⊆ S′
= (C1, C2, . . ., Cn) and h(S′) = (C′
:
2, . . ., C′
1, C′
1 ⊆ S1 ⇒ C′
2, ci
1 and S′
3, . . ., ci
1, C i
n ∈ Sn} and C′
n) ∈ Y ∀ ci
1 ∈ C1, ∀ ci
2 since Si ⊆ S′
• C1 = S1, C′
• C2 = {C i
1 = S′
3, . . ., ci
2 ∈ D2 (ci
3 ∈ S3, . . ., ∀ ci
2 , ci
∀ ci
C i′
∈ Sn} ⇒ C2 ⊆ C′
C′
...
1 ⊆ C1. (cf., Lemma 1)
1 ⊆ C1
2 = {C i′
n) ∈ Y ∀ ci
1 ∈ C1,
1,
2 ∈ D2 (ci
3 ∈ S3, . . ., ∀ ci
n
i for i = 3, . . . n and
• Cn = {C i
n ∈ Dn (ci
1, ci
2 ∈ C2, . . . ∀ ci
2 , . . ., ci′
n−1 ∈ C′
2, . . ., Cn−1 ⊆ C′
C1, ∀ ci
∈ Dn (ci′
∈ C′
C1, C2 ⊆ C′
1 , ci′
2, . . . ∀ ci′
n−1, C i
2, . . ., ci
n−1 ∈ Cn−1} and C′
n) ∈ Y ∀ ci
n−1, C i′
n ) ∈ Y ∀ ci′
n−1} ⇒ Cn ⊆ C′
1 ∈ C′
n since C′
n−1. (cf., Lemma 1)
1 ∈
n = {C i′
1, ∀ ci′
2
1 ⊆
n
Then, C′
1 ⊆ C1 and Ci ⊆ C′
i for i = 2, . . . n ⇒ h(S) ⊆
h(S′).
According to (1), (2) and (3), h is a closure operator.
For n = 4, we instantiate the closure operator of a
quadratic context, i.e., a d-folksonomy as follows :
Definition 5: (CLOSURE OPERATOR OF A d-folksonomy)
Let S = (A, B, C, E) be a quadri-set of Fd with A being
maximal for A × B × C × E ⊆ Y. The closure operator
h of a d-folksonomy Fd is defined as follows:
h(S) = h(A, B, C, E) = (U , T , R, D) U = A
∧ T = {ti ∈ T (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ri ∈
C, ∀ di ∈ E}
∧ R = {ri ∈ R (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈
T , ∀ di ∈ E}
∧ D = {di ∈ D (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈
T , ∀ ri ∈ R}
Remark 2: Roughly speaking, h(S) computes the largest
quadri-set in the d-folksonomy Fd which contains maximal
sets of tags, resources and dates shared by a group of
users. The application of the closure operator h on a quadri-
set gives rise to a quadri-concept qc = (U , T , R, D). In
the remainder of the paper, the U , R, T and D parts are
respectively called Extent, Intent, Modus and Variable.
Like the dyadic and triadic case, the closure operator splits
the search space into equivalence classes, that we introduce
in the following :
Definition 6: (EQUIVALENCE CLASS) Let S1 = (A1, B1,
C1, E1), S2 = (A2, B2, C2, E2) be two quadri-sets of Fd and
qc be a frequent quadri-concept. S1 and S2 belong to the
same equivalence class represented by the quadri-concept
qc, i.e., S1 ≡qc S2 iff h(S1) = h(S2) = qc.
Figure 1. Example of an equivalence class extracted from the d-folksonomy
depicted by Table I
Minimal Generators (MGs) have been shown to play an
important role in many theoretical and practical problem
settings involving closure systems. Such minimal generators
can offer a complementary and simpler way to understand
the concept, because they may contain far fewer attributes
than closed concepts. Indeed, MGs represent the smallest
elements within an equivalence class. Complementary to
closures, minimal generators provide a way to characterize
formal concepts [9]. In the following, we introduce an
extension of the definition of a MG to the d-folksonomy.
Definition 7: (QUADRI-MINIMAL GENERATOR) Let g =
(A, B, C, E) be a quadri-set of Fd such as A ⊆ U, B ⊆
T , C ⊆ R and E ⊆ D and qc ∈ QC. The quadruple g is a
quadri-minimal generator (quadri-generator for short) of qc
iff h(g) = qc and ∄ g1 = (A1, B1, C1, E1) such as :
1) A = A1,
2) (B1 ⊆ B ∧ C1 ⊆ C ∧ E1 ⊂ E) ∨ (B1 ⊆ B ∧ C1
⊂ C ∧ E1 ⊆ E), and
3) h(g) = h(g1) = qc.
Example 3: Let us consider the d-folksonomy Fd shown
in Table I. Figure 1 shows an example of an equivalence
class. For example, we have h(g1={{u1, u2, u3}, t3, r1, d1})
= {{u1, u2, u3}, {t2, t3, t4}, r1, {d1, d2}} = qc such as g1
is a quadri-generator. Thus, qc is the quadri-concept of this
equivalence class which is the largest unsubsumed quadri-set
and it has two quadri-generators. However, g3 = {{u1, u2,
u3}, {t3, t4}, r1, d1} is not a quadri-generator of qc since
it exists g1 such as g1.extent=g3.extent, g1.intent = g3.intent
∧ g1.modus ⊂ g3.modus ∧ g1.variable = g3.variable.
Based on those new introduced notions, we propose in the
following our new QUADRICONS algorithm for a scalable
mining of frequent quadri-concepts from a d-folksonomy.
B. The QUADRICONS Algorithm
In the following, we introduce a test-and-generate algo-
rithm, called QUADRICONS, for mining frequent quadri-
concepts from a d-folksonomy. Since quadri-generators are
minimal keys of an equivalence class,
their detection is
largely eased. QUADRICONS operates in four steps as
follows : the FINDMINIMALGENERATORS procedure as a
first step for the extraction of quadri-generators. Then, the
CLOSURECOMPUTE procedure is invoked for the three next
steps in order to compute respectively the modus, intent
and variable parts of quadri-concepts. The pseudo code
of the QUADRICONS algorithm is sketched by Algorithm
1. QUADRICONS takes as input a d-folksonomy Fd = (U,
T , R, D, Y) as well as four user-defined thresholds (one
for each dimension) : minsuppu, minsuppt, minsuppr
and minsuppd. The output of the QUADRICONS algorithm
is the set of all frequent quadri-concepts that fulfil these
thresholds. QUADRICONS works as follows : it starts by
invoking the FINDMINIMALGENERATORS procedure (Step
1), which pseudo-code is given by Algorithm 2, in order to
extract the quadri-generators stored in the set MG (Line 3).
For such extraction, FINDMINIMALGENERATORS computes
for each triple (t, r, d) the set Us representing the maximal
set of users sharing both tag t and resource r at the date d
(Algorithm 2, Line 3). If Us is frequent w.r.t minsuppu
(Line 4), a quadri-generator is then created (if it does not
already exist) with the appropriate fields (Line 5). Algorithm
2 invokes the ADDQUADRI function which adds the quadri-
generator g to the set MG (Line 7).
Hereafter, QUADRICONS invokes the CLOSURECOM-
PUTE procedure (Step 2) for each quadri-generator of MG
(Lines 5-7), which pseudo-code is given by Algorithm 3 : the
aim is to compute the modus part of each quadri-concept.
At this step, the two first cases of Algorithm 3 (Lines 3
and 6) have to be considered w.r.t the extent of each quadri-
generator. The CLOSURECOMPUTE procedure returns the
set QS formed by quadri-sets. The indicator flag (equal
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
1
2
3
4
5
6
7
8
9
10
11
12
ALGORITHM 1 : QUADRICONS
Data :
1) Fd (U, T , R, D, Y) : A d-folksonomy.
2) minsuppu, minsuppt, minsuppr, minsuppd :
User-defined thresholds.
Results : QC : {Frequent quadri-concepts}.
Begin
/*Step 1 : The extraction of quadri-generators*/
FINDMINIMALGENERATORS(Fd, MG,
minsuppu);
/*Step 2 : The computation of the modus part*/
Foreach quadri-gen g ∈ MG do
CLOSURECOMPUTE(MG, minsuppu,
minsuppt, minsuppr, g, QS, 1);
End
PRUNEINFREQUENTSETS(QS,minsuppt);
/*Step 3 : The computation of the intent part*/
Foreach quadri-set s ∈ QS do
CLOSURECOMPUTE( QS, minsuppu,
minsuppt, minsuppr, s, QS, 2);
End
PRUNEINFREQUENTSETS(QS,minsuppr);
/*Step 4 : The computation of the variable part*/
Foreach quadri-set s ∈ QS do
CLOSURECOMPUTE( QS, minsuppu,
minsuppt, minsuppr, s, QC, 3);
End
PRUNEINFREQUENTSETS(QC,minsuppd);
End
return QC ;
ALGORITHM 2 : FINDMINIMALGENERATORS
Data :
1) MG : The set of frequent quadri-generators.
2) Fd (U, T , R, D, Y) : A d-folksonomy.
3) minsuppu : User-defined threshold of user's support.
Results : MG : {The set of frequent
quadri-generators}.
Begin
Foreach triple (t, r, d) of Fd do
Us= {ui ∈ U (ui, t, r, d) ∈ Y} ;
If Us ≥ minsuppu then
g.extent = Us; g.intent = r; g.modus = t;
g.variable = d
If g 6∈ MG then
ADDQUADRI(MG, g)
End
End
End
End
return MG ;
ALGORITHM 3 : CLOSURECOMPUTE
Data :
1) SIN : The input set.
2) minu, mint, minr : User-defined thresholds.
3) q : A quadri-generator/quadri-set.
4) SOU T : The output set.
5) i : an indicator.
Results : SOU T : The output set.
Begin
Foreach quadri-set q′ ∈ SIN do
If i=1 and q.intent = q′.intent and q.extent
⊆ q′.extent then
s.intent = q.intent;s.extent =
q.extent;s.variable = q.variable;s.modus
= q.modus ∪ q′.modus;
ADDQUADRI(SOU T , s);
End
Else if i=1 and q.intent = q′.intent and q
and q′ incomparable then
g.extent = q.extent ∩ q′.extent; g.modus
= q.modus ∪ q′.modus; g.intent =
q.intent; g.variable = q.variable;
If g u-frequent then ADDQUADRI(MG, g);
End
Else if i=2 and q.extent ⊆ q′.extent and
q.modus ⊆ q′.modus and q.intent 6=
q′.intent then
qs.extent = q.extent; qs.modus =
q.modus; qs.variable = q.variable;
qs.intent = q.intent ∪ q′.intent;
ADDQUADRI(SOU T , qs);
End
Else if i=2 and q and q′ incomparable then
s.extent = q.extent ∩ q′.extent; s.modus
= q.modus ∩ q′.modus; s.variable =
q.variable; s.intent = q.intent ∪
q′.intent;
If s is u-frequent and t-frequent then
ADDQUADRI(SOU T , s);
End
Else if i=3 and q.extent ⊆ q′.extent and
q.modus ⊆ q′.modus and q.intent ⊆
q′.intent and q.variable 6= q′.variable then
qc.extent = q.extent; qc.modus =
q.modus; qc.intent = q.intent;
qc.variable = q.variable ∪ q′.variable;
ADDQUADRI(SOU T , qc);
End
Else if i=3 and q and q′ incomparable then
s.extent = q.extent ∩ q′.extent; s.modus
= q.modus ∩ q′.modus; s.intent =
q.intent ∩ q′.intent; s.variable =
q.variable ∪ q′.variable;
If s is u-frequent, t-frequent and r-frequent
then ADDQUADRI(SOU T , s);
End
End
End
return SOU T ;
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
to 1 here) marked by QUADRICONS shows if the quadri-
set considered by the CLOSURECOMPUTE procedure is a
quadri-generator. In the third step, QUADRICONS invokes
a second time the CLOSURECOMPUTE procedure for each
quadri-set of QS (Lines 9-11), in order to compute the
intent part. CLOSURECOMPUTE focuses on quadri-sets of
QS having different intent parts (Algorithm 3, Line 10). The
fourth and final step of QUADRICONS invokes a last time
the CLOSURECOMPUTE procedure with an indicator equal
to 3. This will allow to focus on quadri-sets having different
variable parts (Algorithm 3, Line 18) before generating
quadri-concepts. QUADRICONS comes to an end after this
step and returns the set of the frequent quadri-concepts
which fulfils the four thresholds minsuppu, minsuppt,
minsuppr and minsuppd. The QUADRICONS algorithm
invokes the PRUNEINFREQUENTSETS function (Lines 8,
13 and 18) in order to prune infrequent quadri-sets/concepts,
i.e., whose the modus/intent/variable cardinality does not
fulfil the aforementioned thresholds.
C. Structural properties of QUADRICONS
Proposition 2: The QUADRICONS algorithm is correct
and complete. It retrieves accurately all the frequent quadri-
concepts.
Proof: The FINDMINIMALGENERATORS procedure al-
lows to extract all quadri-generators from the d-folksonomy
Fd since all the context's triples are enumerated in order
to group maximal users w.r.t each triple (t,r,d) (Algo-
rithm 2, Lines 2-10). This allows to extract accurately
all the quadri-generators. From quadri-generators already
extracted, QUADRICONS calls the CLOSURECOMPUTE pro-
cedure three times in order to compute, respectively, the
modus, intent and variable parts of each quadri-generator.
At each call, i.e., i = 1, 2, 3, for each couple of candidates
q and q′, two cases have to be considered :
1) (Algorithm 3, lines 3, 10, 18) q and q′ are comparable.
Hence a quadri-set (quadri-concept when i = 3) is
created from the union of different parts of both
candidates.
2) (Algorithm 3, lines 6, 14, 22) q and q′ are incompara-
ble. Hence, a new quadri-set (quadri-generator when
i = 1) is created matching the different parts of q and
q′.
Thus, all cases of comparison between candidates are
enumerated. Finally, the PRUNEINFREQUENTSETS proce-
dure prune infrequent quadri-concepts w.r.t minimum thresh-
olds (Algorithm 1,
lines 8, 13 and 18). We conclude
that QUADRICONS faithfully extracts all frequent quadri-
concepts. So, it is correct.
Proposition 3: The QUADRICONS algorithm terminates.
Proof: The number of quadri-generators generated by
QUADRICONS is finite. Indeed, the number of QGs can-
didate generated from a context (U, T , R, D) is at most
T × R × D. Since the set MG of quadri-generators is
finite, the three loops of Algorithm 1 running this set are
thus finite. Moreover, the total number of quadri-concepts
generated by QUADRICONS is equal to 2T +R+D There-
fore, the algorithm QUADRICONS terminates.
Theoretical Complexity issues: As in the triadic case [2],
the number of (frequent) quadri-concepts may grow expo-
nentially in the worst case. Hence, the theoretical complexity
of our algorithm is around O(2n) with n = T + R + D.
Nevertheless, and as it will be shown in the section dedicated
to experimental results, from a practical point of view,
the actual performances are far from being exponential
and QUADRICONS flags out the desired scalability feature.
Therefore we focus on empirical evaluations on large-scale
real-world datasets.
D. Illustrative example
Consider the d-folksonomy depicted by Table I, with
minsuppu = 2, minsuppt = 2, minsuppr = 1 and
minsuppd = 1. Figure 2 sketches the execution trace of
QUADRICONS above this context. As described above,
QUADRICONS operates in four steps :
1) (Step 1) The first step of QUADRICONS involves
the extraction of quadri-generators (QGs) from the
context (Algorithm 1, Line 3). QGs are maximal sets
of users following a triple of tag, resource and date.
Thus, eleven QGs (among twelve) fulfill the minimum
threshold minsuppu (cf., Figure 2, Step 1).
2) (Step 2) Next, QUADRICONS invokes the CLOSURE-
COMPUTE procedure a first
time on the quadri-
generators allowing the computation of the modus part
(the set of tags) of such candidates (Algorithm 1, Lines
5-8). For example, since the extent part (the set of
users) of {{u1, u2, u4}, t1, r1, d1} is included into
that of {{u1, u2, u3, u4}, t2, r1, d1}, the modus part of
the first QG will be equal to {t1, t2}. In addition, new
QGs can be created from intersection of the first ones
(Algorithm 3, Lines 6-9) : it is the case of the two QGs
(a) and (b) (cf., Figure 2, Step 2). Finally, candidates
that not fulfill the minimum threshold minsuppt are
pruned (cf., the three last ones).
3) (Step 3) Then, QUADRICONS proceeds to the com-
putation of the intent part (the set of resources) of
each candidate within a second call to the CLOSURE-
COMPUTE procedure (Algorithm 1, Lines 10-13). For
example, the candidate {{u1, u2, u4}, {t1, t2}, r1, d1}
has an extent, modus and variable included or equal
into those of the candidate {{u1, u2, u4}, {t1, t2},
r2, d1}. Then, its intent will be equal to {r1, r2}. At
this step, four candidates fulfill the minimum threshold
minsuppr (cf., Figure 2, Step 3). By merging compa-
rable candidates, this step allow reducing at the same
time their number.
4) (Step 4) Via a last call to the CLOSURECOMPUTE
procedure, QUADRICONS computes the variable part
(the set of dates) of each candidate while pruning
infrequent ones (Algorithm 1, Lines 15-18). For ex-
ample, since the candidate {{u1, u2}, {t1, t2}, r1, d2}
has an extent, modus and intent included into those of
{{u1, u2, u4}, {t1, t2}, {r1, r2}, d1}6, its variable
will be equal to {d1, d2} (cf., Figure 2, Step 4).
After the Step 4, QUADRICONS terminates. The four
frequent quadri-concepts given as output are :
1) {{u1, u2, u4}, {t1, t2}, {r1, r2}, d1}
2) {{u1, u3, u4}, {t2, t3}, {r1, r2}, d1}
3) {{u1, u4}, {t1, t2, t3}, {r1, r2}, d1}
4) {{u1, u2}, {t1, t2}, r1, {d1, d2}}
Figure 2.
depicted by Table I
Execution trace of QUADRICONS above the d-folksonomy
VI. EVALUATION AND DISCUSSION
In this section, we show through extensive carried out
experiments, the assessment of the QUADRICONS perfor-
mances vs. the state-of-the-art DATA-PEELER algorithm in
6Concretely, it means that the users u1 and u2 who shared the resource
r1 with the tags t1 and t2 at the date d2 also shared it at the date d1.
terms of execution time7. We also put the focus on the dif-
ferences between the consumed memory of both algorithms.
Finally, we compare the number of frequent quadri-concepts
versus the number of frequent quadri-sets in order to assess
the compacity of the extracted representation. We have ap-
plied our experiments on two real-world datasets described
in the following. Both datasets [22] are freely downloadable8
and statistics about these snapshots are summarized into
Table II.
• MOVIELENS (http://movielens.org) is a movie recom-
mendation website. Users are asked to annotate movies
they like and dislike. Quadruples are sets of users
sharing movies using tags at different dates.
• LAST.FM (http://last.fm) is a music website, founded in
2002. It has claimed 30 million active users in March
2009. Quadruples are sets of users annotating artists
through tags at different dates.
Type
# Quadruples
# Users
# Tags
# Resources
# Dates (timestamps)
Periods
Dataset 1
(MOVIELENS)
Dense
95580
4010
15227
11272 (movies)
81601
12/01/2005 -
20/12/2008
Dataset 2
(LAST.FM)
Sparse
186479
1892
9749
12523 (artists)
3549
10/01/2007 -
07/08/2011
CHARACTERISTICS OF THE CONSIDERED SNAPSHOTS.
Table II
Datasets
MOVIE
LENS
LAST.FM
Dates
03/12/05
16/07/06
21/02/08
07/05/10
02/06/11
Users
krycek
maria
Tags
kids
fantasy
darkness
magic
csmdavis
franny
rossanna
pop
concert
dance
Resources
Harry Potter
The Prisoner
of Azkaban
The Order of
the Phoenix
Britney Spears
Madonna
EXAMPLES OF FREQUENT QUADRI-CONCEPTS OF MOVIELENS AND
Table III
LAST.FM.
A. Examples of quadri-concepts
Table III shows two examples of frequent quadri-concepts
extracted from the MOVIELENS and LAST.FM datasets. The
first one depicts that the users krycek and maria used the
tags kids, fantasy, darkness and magic to annotate the movie
Harry Potter and its sequels successively in 03/12/2005, in
7All implemented algorithms are in C++ (compiled with GCC 4.1.2)
and we used an Intel Core i7 CPU system with 4 GB RAM. Tests were
carried out on the Linux operating system UBUNTU 10.10.1.
8http://movielens.org
16/07/2006 and then in 21/02/2008. Such concept may be
exploited further for recommending tags for that movie or
analyze the evolution of tags associated to "Harry Potter".
The second quadri-concept shows that the users csmdavis,
franny and rossanna shared the tags pop, concert and dance
to describe the artists Britney Spears and Madonna in
07/05/10 and then in 02/06/11. We can use such quadri-
concept to recommend the users franny and rossanna to the
first one, i.e., csmdavis as they share the same interest for
both artists using the same tags. It will be also useful to
study the evolution of the artist's fans and the vocabulary
they used to annotate them through time.
In the following, in order to assess the performances of
QUADRICONS vs. DATA-PEELER while extracting quadri-
concepts, we ran both algorithms on both datasets and we
vary the values of minimum thresholds as depicted by Tables
IV and V.
B. Execution Time
Tables IV and V show the different runtimes of the
QUADRICONS algorithm vs. those of DATA-PEELER for the
different values of quadruples, which grows from 20000
to 95580 for the MOVIELENS dataset and from 40000 to
186479 for the LAST.FM dataset, and for different values of
minimum thresholds. We can observe that for both datasets
and for all values of the number of quadruples, DATA-
PEELER algorithm is far away from QUADRICONS in terms
of execution time. QUADRICONS ran until 332 times faster
than DATA-PEELER on LAST.FM and until 124 times on
MOVIELENS. Indeed, the poor performance flagged out by
DATA-PEELER, is explained by the strategy adopted by this
later which starts by storing the entire dataset into a binary
tree structure, which should facilitate its run and then the
extraction of quadri-concepts. However, such structure is
absolutely not adequate to support a so highly sized data,
which is the case of the real-world large-scale datasets
considered in our evaluation. Contrariwise, The main thrust
of the QUADRICONS algorithm stands in the localisation of
the quadri-generators (QGs), that stand at the "antipodes"
of the closures within their respective equivalence classes.
Then, in an effort to improve the existing work, our strategy
to locate these QGs have the advantage of making the
extraction of quadri-concepts faster than its competitor. This
is even more significant in the case of our real-world datasets
where the number of data reaches thousands.
C. Consumed Memory
Tables IV and V show the memory consumed by both
algorithms on both datasets for the different values of
quadruples. We observe that QUADRICONS consumes mem-
ory far below its competitor : less than 40000 KB and
20000 KB on both datasets versus millions of KB for
DATA PEELER. Such difference is explained by the fact
that QUADRICONS, unlike DATA PEELER, does not store
in memory before proceeding the extraction
the dataset
of quadri-concepts. Furthermore, QUADRICONS generates
fewer candidates thanks to the clever detection of quadri-
generators that reduce the search space significantly. For
example, to extract the 167 quadri-concepts from LAST.FM
when minsuppu = 3, minsuppt = 2, minsuppr = 1
and minsuppd = 1, QUADRICONS requires only 1754 KB
in memory while detecting the 939 quadri-generators of
the dataset. However, despite the few number of extracted
quadri-concepts, DATA PEELER requires 788021 KB in
memory to store the entire dataset before generating candi-
dates. Hence, detecting quadri-generators before extracting
quadri-concepts allows QUADRICONS consuming until 54
and 115 times less memory than DATA PEELER on respec-
tively MOVIELENS and LAST.FM datasets.
Y
25000
50000
70000
95580
25000
50000
70000
95580
25000
50000
70000
95580
25000
50000
70000
95580
542
1361
1760
2087
Consumed
Memory
(kilobytes)
DATA
QUADRI
PEELER
CONS
(sec)
(sec)
minsuppu = 3, minsuppt = 2,
minsuppr = 1, minsuppd = 1
0. 86
43.10
2. 05
110.72
3. 08
198.33
4. 61
288.00
minsuppu = 2, minsuppt = 2,
minsuppr = 2, minsuppd = 1
0. 36
39.98
0. 97
107.71
1 .96
227.65
3. 79
472.87
minsuppu = 2, minsuppt = 2,
minsuppr = 1, minsuppd = 1
5.76
421.44
15.92
1269.70
29.22
2037.73
48.92
3478.98
minsuppu = 2, minsuppt = 1,
minsuppr = 1, minsuppd = 1
97. 56
1022.12
188. 61
1987.06
263. 63
2876.02
528. 58
5965.94
2491
5246
9845
16556
10982
14671
19548
38762
198
431
567
1182
Consumed
Memory
(kilobytes)
209843
378907
509541
654761
399672
508943
667006
842551
769822
976200
1153401
1446242
1272988
1561992
1751258
2098452
PERFORMANCES OF QUADRICONS vs. DATA-PEELER ABOVE THE
MOVIELENS DATASET.
Table IV
D. Compacity of Quadri-Concepts
Figure 3 shows the number of frequent quadri-concepts
versus the number of frequent quadri-sets on both MOVIE-
LENS and LAST.FM datasets for the different values of
quadruples. We observe that for both datasets, the number of
frequent quadri-sets increase massively when the number of
quadruples grows. Indeed, frequent quadri-concepts become
more large, i.e., containing more users, tags, resources and
Y
40000
80000
120000
150000
186479
40000
80000
120000
150000
186479
40000
80000
120000
150000
186479
40000
80000
120000
150000
186479
QUADRI
CONS
(sec)
177
421
782
1025
1672
114
342
656
1241
1754
Consumed
Memory
(kilobytes)
DATA
PEELER
(sec)
minsuppu = 3, minsuppt = 2,
minsuppr = 1, minsuppd = 1
0. 05
7.13
0. 10
28.12
0. 22
61.60
0. 45
119.45
0. 77
255.71
minsuppu = 2, minsuppt = 2,
minsuppr = 2, minsuppd = 1
0. 39
32.29
0. 53
57.06
1. 60
182.40
3. 39
354.71
5. 87
496.55
minsuppu = 2, minsuppt = 2,
minsuppr = 1, minsuppd = 1
0. 84
51.88
2. 94
201.58
8. 71
487.92
17. 81
1049.34
29. 78
1949.14
minsuppu = 2, minsuppt = 1,
minsuppr = 1, minsuppd = 1
2. 91
89.77
6. 87
221.93
21. 87
724.47
46. 52
1524.76
88. 16
3118.85
1876
3891
6789
11342
14562
6724
11562
14345
15623
18976
Consumed
Memory
(kilobytes)
309453
445431
550932
678542
788021
456323
590012
698672
826862
932871
498672
780762
1198451
1343572
1552789
1008273
1336451
1542006
1772919
2188452
PERFORMANCES OF QUADRICONS vs. DATA-PEELER ABOVE THE
LAST.FM DATASET.
Table V
dates. Thus, such concepts cause the steep increase of
frequent quadri-sets. For both datasets, the frequent quadri-
concepts represent until 3. 68 % and 28. 99 % of the number
of frequent quadri-sets. Hence, computing frequent quadri-
sets is a harder task than computing frequent quadri-concepts
while providing the same information.
VII. CONCLUSION AND PERSPECTIVES
In this paper, we considered the quadratic context formally
described by a d-folksonomy with the introduction of a new
dimension : time stamp. Indeed, we extend the notion of
closure operator and tri-generator to the four-dimensional
case and we thoroughly studied their theoretical properties.
Then, we proposed the QUADRICONS algorithm in order
to extract frequent quadri-concepts from d-folksonomies.
Several experiments show that QUADRICONS provides an
efficient method for mining quadri-concepts in large scale
conceptual structures. It is important to highlight that mining
quadri-concepts stands at
the crossroads of the avenues
for future work : (i) analyse evolution of users, tags and
[8] F. Lehmann and R. Wille, "A triadic approach to formal
Santa Cruz,
concept analysis," in Proc. of the 3rd ICCS.
California, USA: Springer-Verlag, 1995, pp. 32–43.
[9] G. Dong, C. Jiang, J. Pei, J. Li, and L. Wong, "Mining
succinct systems of minimal generators of formal concepts,"
in Proc. of
Berlin,
the 10th ICDSA, ser. DASFAA'05.
Heidelberg: Springer-Verlag, 2005, pp. 175–187.
[10] C. Cattuto, C. Schmitz, A. Baldassarri, A. Servedio, V. Loreto,
A. Hotho, M. Grahl, and G. Stumme, "Network properties of
folksonomies," In Proc. of AICSI on NANSE, Amsterdam, The
Netherlands., pp. 245–262, 2007.
[11] A. Hotho, R. Jaschke, C. Schmitz, and G. Stumme, "Folkrank
: A ranking algorithm for folksonomies," in Proc. of FGIR,
Hildesheim, Germany, 2006, pp. 111–114.
[12] B. Krause, A. Hotho, and G. Stumme, "A comparison of
social bookmarking with traditional search," in Proc. of the
30th ECIR, vol. 4956. Springer, 2008, pp. 101–113.
[13] E. Amitay, D. Carmel, M. Herscovici, R. Lempel, and A. Sof-
fer, "Trend detection through temporal link analysis," J. Am.
Soc. Inf. Sci. Technol., vol. 55, no. 14, pp. 1270–1281, 2004.
Schmitz,
A.
Stumme, Data
[14] C.
G.
2002,
http://www.springerlink.com/index/gmv832553g0x3673.pdf
and
no.
Available:
Science
and Classification,
pp.
261–270,
2006.
[Online].
Hotho,
R.
Jschke,
[15] S. Siersdorfer and S. Sizov, "Social recommender systems for
web 2.0 folksonomies," in Proc. of the 20th ACM conference
on HT, New York, NY, USA, 2009, pp. 261–270.
[16] S. Golder and B. A. Huberman, "The structure of collabo-
rative tagging systems," Journal of Information Science, pp.
198–208, 2006.
[17] A. Hotho, R. Jaschke., C. Schmitz, and G. Stumme, "Trend
detection in folksonomies," in Proc. of the 1st SAMT, ser.
LNCS, vol. 4306. Athens, Greece: Springer, 2006, pp. 56–
70.
[18] M. Dubinko, R. Kumar, J. Magnani, J. Novak, P. Raghavan,
and A. Tomkins, "Visualizing tags over time," ACM Trans.
Web, vol. 1, no. 2, pp. 193–202, 2007.
[19] G. Voutsadakis, "Polyadic concept analysis," Order, vol. 19,
no. 3, pp. 295–304, 2002.
Figure 3. Number of frequent quadri-concepts vs. number of frequent
quadri-sets on both datasets. (Top) LAST.FM (Bottom) MOVIELENS
resources through time, (ii) define the quadratic form of
association rules according to quadri-concepts.
REFERENCES
[1] P. Mika, "Ontologies are us: A unified model of social
networks and semantics," Web Semantics., vol. 5, no. 1, pp.
5–15, 2007.
[2] R. Jaschke, A. Hotho, C. Schmitz, B. Ganter, and G. Stumme,
"Discovering shared conceptualizations in folksonomies,"
Web Semantics., vol. 6, pp. 38–53, 2008.
[3] L. Ji, K.-L. Tan, and A. K. H. Tung, "Mining frequent closed
cubes in 3d datasets," in Proc. of VLDB 2006, Seoul, Korea,
2006, pp. 811–822.
[4] L. Cerf, J. Besson, C. Robardet, and J.-F. Boulicaut, "Closed
patterns meet n-ary relations," ACM TKDD, vol. 3, pp. 3:1–
3:36, March 2009.
[20] K. Biedermann, "Triadic galois connections," in General
algebra and applications in discrete mathematics, 1997, pp.
23–33.
[5] C. Trabelsi, N. Jelassi, and S. Ben Yahia, "Scalable mining
of frequent tri-concepts," in Proc. of The 15th PAKDD, 2012,
pp. 231–242.
[21] A. Couch and M. Chiarini, "A theory of closure operators," in
Proc. of the 2nd AIMS. Berlin, Heidelberg: Springer-Verlag,
2008, pp. 162–174.
[6] R. Agrawal and R. Srikant, "Mining sequential patterns," in
Proc. of the ICDE, ser. ICDE '95. Washington, DC, USA:
IEEE Computer Society, 1995, pp. 3–14.
[22] I. Cantador, P. Brusilovsky, and T. Kuflik, "2nd workshop
on information heterogeneity and fusion in recommender
systems," in Proc. of the 5th ACM RecSys, NY, USA, 2011.
[7] B. Ganter and R. Wille, Formal Concept Analysis. Springer,
Heidelberg, 1999.
A scalable mining of frequent quadratic concepts in d-folksonomies
Submitted for Blind Review
2
1
0
2
c
e
D
1
]
I
S
.
s
c
[
1
v
7
8
0
0
.
2
1
2
1
:
v
i
X
r
a
Abstract-Folksonomy mining is grasping the interest of
web 2.0 community of as far user as freely tag resources.
However, a scrutiny of the related work unveils that the time
stamp dimension has not been considered. For example, the
wealthy number of works dedicated to mining tri-concepts from
folksonomies did not take into account time dimension. In this
paper, we will consider a folksonomy commonly composed of
triples <users, tags, resources> and we shall consider the time
as a new dimension. We motivate our approach by highlighting
the battery of potential applications and we introduce a new
algorithm, called QUADRICONS, as an extension of TRICONS
dedicated to the triadic contexts. QUADRICONS aims at getting
out quadratic concepts, i.e., quadri-concepts from quadratic
contexts. We also introduce a new closure operator that
splits the induced search space into equivalence classes whose
smallest elements are the quadri-minimal generators. Carried
out experiments on large-scale real-world snapshots of social
networks highlight very interesting results about analyzing
trend detection in folksonomies starting from quadri-concepts.
Keywords-Quadratic Context; Formal Concept Analysis;
Quadratic Concepts; Folksonomies; algorithm
I. INTRODUCTION
-FCA extended depuis 95 au Triadic Concept Analysis :
not much attention -¿ coming of folksonomies
-Folksonomy (definition informelle, rise of folk) / web 2.0
[1] Folksonomy (from folk and taxonomy) is a neologism
for a practice of collaborative categorization using freely
chosen keywords. Folksonomies (also called social tagging
mechanisms) have been implemented in a number of online
knowledge sharing environments since the idea was first
adopted by social book- marking site del.icio.us in 2004.
The idea of a folksonomy is to allow the users to describe
a set of shared objects with a set of keywords of their own
choice.
-folksonomy mining -¿ triconcepts : repre.condense des
folk tricons les surpasse
-timestamp forgot:importance du temps en 1 frase
Time is considered one of the most important factors in
detecting emerging subjects. -in this paper, confluence of
both lines of research : FCA (cas 4-aire:QCA) + mining
sequential patterns, donner exemple de harry potter
The remainder of the paper is organized as follows.
Section 2 recalls the key notions used throughout this paper.
We thoroughly study the related work in Section 3. In
Section 4, we introduce a new closure operator for the
quadratic context as well as the QUADRICONS algorithm
dedicated to the extraction of frequent quadri-concepts. In
Section 5, carried out experiments about performances of
our algorithm and analyzing trend detections. Finally, we
conclude the paper with a summary and we sketch some
avenues for future works in Section 6.
II. MOTIVATION : CONCEPTUAL AND TEMPORAL
CLUSTERING OF FOLKSONOMIES
The immediate success of social networks, i.e., social
resource sharing systems is due to the fact that no specific
skills are needed for participating. Each individual user is
able to share a web page1, a personal photo2, an artist he
like3 or a movie he watched4 without much effort.
The core data structure of such systems is a folkson-
omy. It consists of three sets U, T, R of users assigning
tags to resources as well as a ternary relation Y between
them. To allow conceptual and temporal clustering from
folksonomies, an additional dimension is needed : time.
Within this new dimension, our goal is to detect hidden
sequential conceptualizations in folksonomies. An exemple
of such a concept is that users which tagged "Harry Potter"
will tag "The Prisoner of Azkaban" and then tag "The Order
of the Phoenix", probably with the same tags.
Our algorithm solves the problem of frequent closed
patterns mining for this kind of data. It will return a set
of (frequent) quadruples, where each quadruple (U, T, R,
D) consists of a set U of users, a set T of tags, a set
R of resources and a set D of dates. These quadruples,
called (frequent) quadri-concepts, have the property that
each user in U has tagged each resource in R with all
tags from T at the different dates from D, and that none
of these sets can be extended without shrinking one of
the other three dimensions. Hence, they represent the four-
dimensional extension of tri-concepts. Moreover, we can add
minimum support constraints on each of the four dimensions
in order to focus on the largest concepts of the folksonomy,
i.e., by setting higher values of minimum supports.
III. THE PROBLEM OF MINING ALL FREQUENT
QUADRI-CONCEPTS
In this section, we formalize the problem of mining all
frequents quadri-concepts. We start with an adaptation of the
notion of folksonomy to the quadratic context.
Definition 1: (D-FOLKSONOMY) A d-folksonomy is a set
of tuples Fd = (U, T , R, D, Y) where U, T , R and D are
1http://del.icio.us
2http://flickr.com
3http://last.fm
4http://movielens.org
finite sets which elements are called users, tags, resources
and dates. Y ⊆ U × T × R × D represents a quaternary
relation which each y ⊆ Y can be represented by a quadruple
: y = {(u, t, r, d) u ∈ U, t ∈ T , r ∈ R, d ∈ D} which
means that the user u has annoted the resource r using the
tag t at the date d.
Example 1: Table I depicts an example of a d-folksonomy
Fd with U = {u1, u2, u3, u4}, T = {t1, t2, t3}, R = {r1, r2}
and D = {d1, d2}. Each cross within the quaternary relation
indicates a tagging operation by a user from U, a tag from
T and a resource from R at a date from D, i.e., a user has
tagged a particular resource with a particular tag at a date
d. For example, the user u1 has tagged the resource r1 with
the tags t1, t2 and t3 at the date d1.
Fd R
D
d1
d2
U/T
u1
u2
u3
u4
u1
u2
u3
u4
r1
t2
t3
t1
r2
t2
t1
t3
× × × × × ×
× ×
× ×
× ×
× ×
× × × × × ×
× ×
× ×
×
×
×
×
Table I
A d-folksonomy.
×
×
The following definition introduces a (frequent) quadri-
set.
Definition 2: (A (FREQUENT) QUADRI-SET) Let Fd =
(U, T , R, D, Y) be a d-folksonomy. A quadri-set of Fd
is a quadruple (A, B, C, E) with A ⊆ U, B ⊆ T , C ⊆ R
and E ⊆ D such as A × B × C × E ⊆ Y.
D-Folksonomies have four dimensions which are com-
pletely symmetric. Thus, we can define minimum support
thresholds on each dimension. Hence, the problem of mining
frequent quadri-sets is then the following:
Problem 1: (Mining all frequent quadri-sets) Let Fd =
(U, T , R, D, Y) be a d-folksonomy and let minsuppu,
minsuppt, minsuppr and minsuppd be user-defined mini-
mum thresholds. The task of mining all frequent quadri-sets
consists in determing all quadri-sets (A, B, C, E) of Fd with
A ≥ minsuppu, B ≥ minsuppt, C ≥ minsuppr
and E ≥ minsuppd.
Our thresholds are antimonotonic constraints : If (A1, B1,
C1, E1) with A1 being maximal for A1 × B1 × C1 × E1
⊆ Y is not u-frequent5 then all (A2, B2, C2, E2) with B1 ⊆
B2 and C1 ⊆ C2 are not u-frequent either. The same holds
symmetrically for the other two dimensions. In [2], the au-
thors demonstrate that above the two-dimensional case, the
direct symmetry between monotonicity and antimonotonicity
breaks. Thus, they introduced a lemma which results from
5with regard to the users dimension.
the triadic Galois connection [?] induced by a triadic context.
In the following, we adapt that lemma to our quadratic case.
Lemma 1: Let (A1, B1, C1, E1) and (A2, B2, C2, E2)
be quadri-sets with Ai being maximal for Ai × Bi × Ci ×
Ei ⊆ Y, for i = 1, 2. If B1 ⊆ B2, C1 ⊆ C2 and E1 ⊆ E2
then A2 ⊆ A1. The same holds symmetrically for the other
three directions. In the sequel, the inclusion (A1, B1, C1,
E1) ⊆ (A2, B2, C2, E2) holds if and only if B1 ⊆ B2, C1
⊆ C2, E1 ⊆ E2 and A2 ⊆ A1 .
Example 2: Let Fd be the d-folksonomy of Table I and
let S1 = {{u3, u4}, t3, {r1, r2}, {d1, d2}} and S2 = {{u1,
u3, u4}, {t2, t3}, {r1, r2}, d1} be two quadri-sets of Fd.
We have S1 ⊆ S2 since {u3, u4} ⊆ {u1, u3, u4}, t3 ⊆ {t2,
t3}, {r1, r2} ⊆ {r1, r2} and d1 ⊆ {d1, d2}.
As the set of all frequent quadri-sets is highly redundant,
we consider a specific condensed representation,
i.e., a
subset which contains the same information : the set of all
frequent quadri-concepts. The latter's definition is given as
follows :
Definition 3: ((FREQUENT) QUADRATIC CONCEPT) A
quadratic concept (or a quadri-concept for short) of a d-
folksonomy Fd = (U, T , R, D, Y) is a quadruple (U , T ,
R, D) with U ⊆ U, T ⊆ T , R ⊆ R and D ⊆ D with U ×
T × R × D ⊆ Y such that the quadruple (U , T , R, D) is
maximal, i.e., none of these sets can be extended without
shrinking one of the other three dimensions. A quadri-
concept is said to be frequent whenever it is a frequent
quadri-set.
Problem 2: (Mining all frequent quadri-concepts) Let
Fd = (U, T , R, D, Y) be a d-folksonomy and let minsuppu,
minsuppt, minsuppr and minsuppd be user-defined min-
imum thresholds. The task of mining all frequent quadri-
concepts consists in determing all quadri-concepts (U , T ,
R, D) of Fd with U ≥ minsuppu, T ≥ minsuppt,
R ≥ minsuppr and D ≥ minsuppd. The set of all
frequent quadri-concepts of Fd is equal to QC = {QC QC
= (U , T , R, D) is a frequent quadri-concept}.
Remark 1: It is important to note that the extracted repre-
sentation of quadri-concepts is information lossless. Hence,
after solving Problem 2, we can easily solve the Problem
1 by enumerating all quadri-sets (A, B, C, E) such as it
exists a frequent quadri-concept (U , T , R, D) such as A ⊆
U , B ⊆ T , C ⊆ R, E ⊆ D and A ≥ minsuppu, B
≥ minsuppt, C ≥ minsuppr and E ≥ minsuppd.
In the remainder, we will scrutinize the state-of-the-art
propositions aiming to mine quadratic concepts from d-
folksonomies.
IV. RELATED WORK
-voutsadakis
-datapeeler
sans critiques!!!(laisser pr comparaison)
In [3], Voutsadakis generalized the constructs and results
of Wille [2] to the n-adic contexts. The author gives a
definition of an n-adic concept as well as that of a complete
n-lattice of a n-adic context. Moreover, it was shown that the
n-adic concepts of an n-adic context K form a complete n-
lattice with respect to component-wise defined quasi-orders.
To illustrate those new definitions, Voutsadakis gives an
example of quadratic concepts and their associated com-
plete Boolean 4-lattice. Despite robust theoretical study, no
algorithm has been proposed by Voutsadakis for an efficient
extraction of quadratic concepts. In addition, despite that of
a n-adic concept, no basic notion of data mining (minimal
generator, equivalence class, etc.) was adapted to the n-adic
context. Finally, no potential applications were proposed in
order to illustrate the usefulness of such concepts. Recently,
Cerf et al. proposed the DATA-PEELER algorithm [4] which
is able to extract all closed concepts from n-ary relations.
It enumerates all the n-dimensional closed patterns in a
depth first manner using a binary tree enumeration strategy.
When n = 4, the DATA-PEELER algorithm is able to extract
quadratic concepts. However, DATA-PEELER is hampered by
the large number of elements that may contain any of the
dimensions and its strategy becomes ineffective and leads to
a complex computation of n-adic concepts. In the following,
we review some approaches dealing with trend detection in
folksonomies which illustrates the usefulness of the quadratic
concepts and the consideration of the time dimension in
folksonomies.
V. THE QUADRICONS ALGORITHM FOR MINING ALL
FREQUENT QUADRI-CONCEPTS
A. Main Notions of QUADRICONS
Before introducing our closure operator
for a d-
folksonomy, we define a closure operator of a n-adic context.
In [5], Voutsadakis define n-closure operators for a n-adic
context. Each i-closure operator aims to compute the closed
part related to the dimension i for a given n-set (1 ≤ i ≤
n). In what follows, we introduce a new closure operator
h which is able to compute the closure of a given n-set.
Contrariwise to [5], we use a single closure operator that
computes a single time all closed parts of the resulting n-
adic concept.
Definition 4: (CLOSURE OPERATOR OF A n-ADIC CON-
TEXT) Let S = (S1, S2, . . ., Sn) be a n-set, with S1 being
maximal for S1 × . . . × Sn ⊆ Y, of a n-adic context
Kn with n dimensions, i.e., Kn = (D1, D2, . . ., Dn, Y).
A mapping h is defined as follows :
h(S) = h(S1, S2, . . ., Sn) = (C1, C2, . . ., Cn) such as :
C1 = S1
∧ C2 = {C i
3 ∈ S3, . . ., ∀ ci
n) ∈ Y ∀ ci
2 ∈ D2 (ci
3, . . ., ci
n ∈ Sn}
1 ∈ C1,
1, C i
2, ci
∀ ci
...
∧ Cn = {C i
C1, . . . ∀ ci
n ∈ Dn (ci
n−1 ∈ Cn−1}
1, ci
2, . . ., ci
n−1, C i
n) ∈ Y ∀ ci
1 ∈
Proposition 1: h is a closure operator.
Proof: To prove that h is a closure operator, we have to
prove that this closure operator fulfills the three properties
of extensivity, idempotency and isotony [6].
2 ∈ D2 (ci
3 ∈ S3, . . ., ∀ ci
(1) Extensivity : Let S = (S1, S2, . . ., Sn) be a n-set
of Kn ⇒ h(S) = (C1, C2, . . ., Cn) such that : C1 = S1,
C2 = {C i
1, C i
1 ∈ C1,
n ∈ Sn} ⊇ S2 since C1 ⊇ S1 since
∀ ci
n−1, C i
n)
1, ci
C1 = S1 , . . ., Cn = {C i
∈ Y ∀ ci
n−1 ∈ Cn−1} ⊇ Sn
since C1 = S1, C2 ⊇ S2, . . ., Cn−1 ⊇ Sn−1. Then, C1 =
S1 and Si ⊆ Ci for i = 2, . . . n ⇒ S ⊆ h(S) (cf., Lemma 1)
n ∈ Dn (ci
2 ∈ C2, . . . ∀ ci
n) ∈ Y ∀ ci
1 ∈ C1, ∀ ci
3, . . ., ci
2, . . ., ci
2, ci
1, C i′
1, C′
2 , ci
2, . . ., C′
3, . . ., ci
n) such that : C′
n) ∈ Y ∀ ci
(2) Idempotency : Let S = (S1, S2, . . ., Sn) be a n-set
of Kn ⇒ h(S) = (C1, C2, . . ., Cn) ⇒ h(C1, C2, . . ., Cn)
2 = {C i′
= (C′
2 ∈ D2
3 ∈ S3, . . ., ∀ ci
(ci
n
1 , ci′
n ∈ Dn (ci′
∈ Sn} = C2 since C1 = S1, . . ., C′
2 ,
. . ., ci′
2, . . . ∀ ci′
n−1 ∈
C′
n−1
i = Ci for i = 1, . . . n ⇒ h(h(S)) = h(S)
= Cn−1. Then, C′
1 ∈ C′
n−1} = Cn since we have C′
1 = C1, C′
1 ∈ C1, ∀ ci
n = {C i′
2 ∈ C′
1, ∀ ci′
1 = C1, C′
2 = C2, . . ., C′
n ) ∈ Y ∀ ci′
n−1, C i′
n) be two n-sets of Kn with S ⊆ S′, i.e., S′
(3) Isotony : Let S = (S1, S2, . . ., Sn) and S′ = (S′
2,
1, S′
1 ⊆ S1
i for i = 2, . . . n (cf., Lemma 1). We have h(S)
n) such that
. . ., S′
and Si ⊆ S′
= (C1, C2, . . ., Cn) and h(S′) = (C′
:
2, . . ., C′
1, C′
1 ⊆ S1 ⇒ C′
2, ci
1 and S′
3, . . ., ci
1, C i
n ∈ Sn} and C′
n) ∈ Y ∀ ci
1 ∈ C1, ∀ ci
2 since Si ⊆ S′
• C1 = S1, C′
• C2 = {C i
1 = S′
3, . . ., ci
2 ∈ D2 (ci
3 ∈ S3, . . ., ∀ ci
2 , ci
∀ ci
C i′
∈ Sn} ⇒ C2 ⊆ C′
C′
...
1 ⊆ C1. (cf., Lemma 1)
1 ⊆ C1
2 = {C i′
n) ∈ Y ∀ ci
1 ∈ C1,
2 ∈ D2 (ci
1,
3 ∈ S3, . . ., ∀ ci
n
i for i = 3, . . . n and
• Cn = {C i
1, ci
n ∈ Dn (ci
2 ∈ C2, . . . ∀ ci
2 , . . ., ci′
n−1 ∈ C′
2, . . ., Cn−1 ⊆ C′
C1, ∀ ci
∈ Dn (ci′
∈ C′
C1, C2 ⊆ C′
1 , ci′
2, . . . ∀ ci′
n−1, C i
2, . . ., ci
n−1 ∈ Cn−1} and C′
n) ∈ Y ∀ ci
n ) ∈ Y ∀ ci′
n−1, C i′
n−1} ⇒ Cn ⊆ C′
1 ∈ C′
n since C′
n−1. (cf., Lemma 1)
1 ∈
n = {C i′
1, ∀ ci′
2
1 ⊆
n
Then, C′
1 ⊆ C1 and Ci ⊆ C′
i for i = 2, . . . n ⇒ h(S) ⊆
h(S′).
According to (1), (2) and (3), h is a closure operator.
For n=4, we instanciate the closure operator of a quadratic
context, i.e., a d-folksonomy as follows :
OPERATOR
Definition 5: (CLOSURE
D-
FOLKSONOMY) Let S = (A, B, C, E) be a quadri-set of
Fd with A being maximal for A × B × C × E ⊆ Y.
The closure operator h of a d-folksonomy Fd is defined as
follows:
OF
A
h(S) = h(A, B, C, E) = (U , T , R, D) U = A
∧ T = {ti ∈ T (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ri ∈
C, ∀ di ∈ E}
∧ R = {ri ∈ R (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈
T , ∀ di ∈ E}
∧ D = {di ∈ D (ui, ti, ri, di) ∈ Y ∀ ui ∈ U , ∀ ti ∈
T , ∀ ri ∈ R}
Remark 2: Roughly speaking, h(S) computes the largest
quadri-set in the d-folksonomy Fd which contains maximal
sets of tags, resources and dates shared by a group of users.
The application of the closure operator h on a quadri-set
gives rise to a quadri-concept QC = (U , T , R, D). In the
remainder of the paper, the U , R, T and D parts are respec-
tively called Extent, Intent, Modus and Variable.
Like the dyadic and triadic case, the closure operator splits
the search space into equivalence classes, that we introduce
in the following :
Definition 6: (EQUIVALENCE CLASS) Let S1 = (A1, B1,
C1, E1), S2 = (A2, B2, C2, E2) be two quadri-sets of Fd and
QC be a frequent quadri-concept. S1 and S2 belong to the
same equivalence class represented by the quadri-concept
QC, i.e., S1 ≡QC S2 iff h(S1) = h(S2) = QC.
Figure 1. Example of an equivalence class extracted from the d-folksonomy
depicted by Table I
Minimal Generators (MGs) have been shown to play an
important role in many theoretical and practical problem
settings involving closure systems. Such minimal generators
can offer a complementary and simpler way to understand
the concept, because they may contain far fewer attributes
than closed concepts. Indeed, MGs represent the smallest
elements within an equivalence class. Complementary to
closures, minimal generators provide a way to characterize
formal concepts [7]. In the following, we introduce an
extension of the definition of a MG to the d-folksonomy.
Definition 7: (QUADRI-MINIMAL GENERATOR) Let g =
(A, B, C, E) be a quadri-set of Fd such as A ⊆ U, B ⊆
T , C ⊆ R and E ⊆ D and QC ∈ QC. The quadruple g is
a quadri-minimal generator (quadri-generator for short) of
QC iff h(g) = QC and ∄ g1 = (A1, B1, C1, E1) such as :
1) A = A1,
2) (B1 ⊆ B ∧ C1 ⊆ C ∧ E1 ⊂ E) ∨ (B1 ⊆ B ∧ C1
⊂ C ∧ E1 ⊆ E), and
3) h(g) = h(g1) = QC.
Example 3: Let us consider the d-folksonomy Fd shown
in Table I. Figure 1 shows an example of an equiva-
lence class. For example, we have h(g1={{u1, u2, u3},
t3, r1, d1}) = {{u1, u2, u3}, {t2, t3, t4}, r1, {d1, d2}}
= QC such as g1 is a quadri-generator. Thus, QC is
the quadri-concept of this equivalence class. The largest
unsubsumed quadri-set QC has two quadri-generators g1
and g2. However, g3 = {{u1, u2, u3}, {t3, t4}, r1, d1}
is not a quadri-generator of QC since it exists g1 such
as g1.extent=g3.extent, g1.intent = g3.intent ∧ g1.modus ⊂
g3.modus ∧ g1.variable = g3.variable.
Based on those new introduced notions, we propose in the
following our new QUADRICONS algorithm for a scalable
mining of frequent quadri-concepts from a d-folksonomy.
B. The QUADRICONS Algorithm
In the following, we introduce a test-and-generate algo-
rithm, called QUADRICONS, for mining frequent quadri-
concepts from a d-folksonomy. Since quadri-generators are
minimal keys of an equivalence class,
their detection is
largely eased. QUADRICONS operates in four steps as
follows : the FINDMINIMALGENERATORS procedure as a
first step for the extraction of quadri-generators. Then, the
ClosureCompute procedure is invoked for the three next
steps in order to compute respectively the modus, intent
and variable parts of quadri-concepts. The pseudo code
of the QUADRICONS algorithm is sketched by Algorithm
1. QUADRICONS takes as input a d-folksonomy Fd = (U,
T , R, D, Y) as well as four user-defined thresholds (one
for each dimension) : minsuppu, minsuppt, minsuppr
and minsuppd. The output of the QUADRICONS algorithm
is the set of all frequent quadri-concepts that fulfill these
thresholds. QUADRICONS works as follows : it starts by
invoking the FINDMINIMALGENERATORS procedure (Step
1), which pseudo-code is given by Algorithm 2, in order to
extract the quadri-generators stored in the set MG (Line 3).
For such extraction, FINDMINIMALGENERATORS computes
for each triple (t, r, d) the set Us representing the maximal
set of users sharing both tag t and resource r at the date d
(Algorithm 2, Line 3). If Us is frequent w.r.t minsuppu
(Line 4), a quadri-generator is then created (if it does not
already exist) with the appropriate fields (Line 5). Algorithm
2 invokes the ADDQUADRI function which adds the quadri-
generator g to the set MG (Line 7).
Hereafter, QUADRICONS invokes the ClosureCompute
procedure (Step 2) for each quadri-generator of MG (Lines
5-7), which pseudo-code is given by Algorithm 3 : the
aim is to compute the modus part of each quadri-concept.
At this point, the two first cases of Algorithm 3 (Lines 3
and 6) have to be considered w.r.t the extent of each
quadri-generator. The ClosureCompute procedure returns
the set QS formed by quadri-sets. The indicator flag (equal
ALGORITHM 3 : ClosureCompute
Data :
1) SIN : The set of frequent quadri-generators/quadri-sets.
2) minu, mint, minr : User-defined thresholds of extent, modus and intent support.
3) q : A quadri-generator/quadri-set. SOU T : {The set of frequent quadri-sets/quadri-concepts}.
4) i : an indicator.
Results : SOU T : {The set of frequent quadri-sets/quadri-concepts}.
Begin
Foreach quadri-set q′ ∈ SIN do
If i=1 and q.intent = q′.intent and q.extent ⊆ q′.extent then
s.intent = q.intent;s.extent = q.extent;s.variable = q.variable;s.modus = q.modus ∪ q′.modus;
ADDQUADRI(SOU T , s);
End
Else if i=1 and q.intent = q′.intent and q and q′ incomparable then
g.extent = q.extent ∩ q′.extent; g.modus = q.modus ∪ q′.modus; g.intent = q.intent; g.variable =
q.variable;
If g.extent ≥ minu then ADDQUADRI(MG, g);
End
Else if i=2 and q.extent ⊆ q′.extent and q.modus ⊆ q′.modus and q.intent 6= q′.intent then
QC.extent = q.extent; QC.modus = q.modus; QC.variable = q.variable; QC.intent = q.intent ∪
q′.intent;
ADDQUADRI(SOU T , QC);
End
Else if i=2 and q and q′ incomparable then
s.extent = q.extent ∩ q′.extent; s.modus = q.modus ∩ q′.modus; s.variable = q.variable; s.intent =
q.intent ∪ q′.intent;
If s.extent ≥ minu and s.modus ≥ mint then ADDQUADRI(SOU T , s);
End
Else if i=3 and q.extent ⊆ q′.extent and q.modus ⊆ q′.modus and q.intent ⊆ q′.intent and q.variable 6=
q′.variable then
QC.extent = q.extent; QC.modus = q.modus; QC.intent = q.intent; QC.variable = q.variable ∪
q′.variable;
ADDQUADRI(SOU T , QC);
End
Else if i=3 and q and q′ incomparable then
s.extent = q.extent ∩ q′.extent; s.modus = q.modus ∩ q′.modus; s.intent = q.intent ∩ q′.intent;
s.variable = q.variable ∪ q′.variable;
If s.extent ≥ minu and s.modus ≥ mint and s.intent ≥ minr then ADDQUADRI(SOU T , s);
End
end
End
return SOU T ;
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
ALGORITHM 1 : QUADRICONS
Data :
1) Fd (U, T , R, D, Y) : A d-folksonomy.
2) minsuppu, minsuppt, minsuppr, minsuppd :
User-defined thresholds.
Results : QC : {Frequent quadri-concepts}.
Begin
/*Step 1 : The extraction of quadri-generators*/
FINDMINIMALGENERATORS(Fd, MG,
minsuppu);
/*Step 2 : The computation of the modus part*/
Foreach quadri-gen g ∈ MG do
ClosureCompute(MG, minsuppu,
minsuppt, minsuppr, g, QS, 1);
end
PRUNEINFREQUENTSETS(QS,minsuppt);
/*Step 3 : The computation of the intent part*/
Foreach quadri-set s ∈ QS do
ClosureCompute( QS, minsuppu, minsuppt,
minsuppr, s, QC, 2);
end
PRUNEINFREQUENTSETS(QC,minsuppr);
/*Step 4 : The computation of the variable part*/
Foreach quadri-set s ∈ QS do
ClosureCompute( QS, minsuppu, minsuppt,
minsuppr, s, QC, 3);
end
PRUNEINFREQUENTSETS(T C,minsuppd);
End
return QC ;
ALGORITHM 2 : FINDMINIMALGENERATORS
Data :
1) MG : The set of frequent quadri-generators.
2) Fd (U, T , R, D, Y) : A d-folksonomy.
3) minsuppu : User-defined threshold of user's support.
Results : MG : {The set of frequent
quadri-generators}.
Begin
Foreach triple (t,r,d) of Fd do
Us= {ui ∈ U (ui, t, r, d) ∈ Y} ;
If Us ≥ minsuppu then
g.extent = Us; g.intent = r; g.modus = t;
g.variable = d
If g 6∈ MG then
ADDQUADRI(MG, g)
End
End
end
End
return MG ;
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
1
2
3
4
5
6
7
8
9
10
11
12
to 1 here) marked by QUADRICONS shows if the quadri-
set considered by the ClosureCompute procedure is a
quadri-generator. In the third step, QUADRICONS invokes
a second time the ClosureCompute procedure for each
quadri-set of QS (Lines 9-11), in order to compute the
intent part. ClosureCompute focuses on quadri-sets of
QS having different intent parts (Algorithm 3, Line
9). The fourth and final step of QUADRICONS invokes
a last time the ClosureCompute procedure with an in-
dicator equal to 3. This will allow to focus on quadri-
sets having different variable parts before generating
quadri-concepts. QUADRICONS comes to an end after this
step and returns the set of the frequent quadri-concepts
which fulfills the four thresholds minsuppu, minsuppt,
minsuppr and minsuppd. The QUADRICONS algorithm
invokes the PRUNEINFREQUENTSETS function (Lines 8,
13 and 18) in order to prune infrequent quadri-sets/concepts,
i.e., whose the modus/intent/variable cardinality does not
fulfill the aforementioned thresholds.
C. Structural properties of QUADRICONS
Proposition 2: The QUADRICONS algorithm is correct
and complete.It retrieves accurately all the frequent quadri-
concepts.
Proof:
Proposition 3: The QUADRICONS algorithm terminates.
Proof:
Theoretical Complexity issues:
D. Illustrative example
Consider the d-folksonomy depicted by Table I, with
minsuppu = 2, minsuppt = 2, minsuppr = 1 and
minsuppd = 1. Figure 2 sketches the execution trace of
QUADRICONS above this context. As described above,
QUADRICONS operates in four steps :
Step 1 The first step of QUADRICONS involves the extrac-
tion of quadri-generators (QGs) from the context.
QGs are maximal sets of users following a triple
of tag, resource and date. Thus, the eleven QGs
that fulfill the minimum threshold minsuppu are
described by Figure 2 (Step 1).
Step 2 Next, QUADRICONS invokes the CLOSURECOM-
PUTE procedure a first
time on the quadri-
generators allowing the computation of the modus
part of such candidates. For example, since the
extent part of {{u1, u2, u4}, t1, r1, d1} is included
into that of {{u1, u2, u3, u4}, t2, r1, d1}, the
modus part of the first QG will be equal to {t1,
t2}. Moreover, new QGs can be created from the
intersection of the first ones (see Algorithm 3, Line
xx) : it is the case of the two QGs (a) and (b) (cf.,
Figure 2, 2). Finally, candidates that not fulfill the
minimum threshold minsuppt are pruned (cf., the
three last ones).
Step 3 Then, QUADRICONS proceeds at the computation
of the intent part of each candidate within a
second call to the CLOSURECOMPUTE procedure.
For example, the candidate {{u1, u2, u4}, {t1, t2},
r1, d1} has an extent, modus and variable included
or equal into those of the candidate {{u1, u2, u4},
{t1, t2}, r2, d1}. Then, its intent will be equal
to {r1, r2}. At this step, four candidates fulfill the
minimum thresholds over the intent part (Figure
2,Step 3). By merging comparable candidates, this
step allow reducing at the same time their number.
Step 4 Via a last call to the CLOSURECOMPUTE proce-
dure, QUADRICONS computes the variable part
of each candidate while pruning infrequent ones.
Since the candidate {{u1, u2}, {t1, t2}, r1, d2} has
an extent, modus and intent included into those of
{{u1, u2, u4}, {t1, t2}, {r1, r2}, d1}6, its variable
will be equal to {d1, d2}.
After the Step 4, QUADRICONS terminates. The four
frequent quadri-concepts given as output are :
1) {{u1, u2, u4}, {t1, t2}, {r1, r2}, d1}
2) {{u1, u3, u4}, {t2, t3}, {r1, r2}, d1}
3) {{u1, u4}, {t1, t2, t3}, {r1, r2}, d1}
4) {{u1, u2}, {t1, t2}, r1, {d1, d2}}
VI. EVALUATION AND DISCUSSION
In this section, we show through extensive carried out
experiments, the assessment of the QUADRICONS perfor-
mances vs. DATA-PEELER. We also put the focus on the
differences between the consumed memory of both al-
gorithms. Moreover, we compare the number of frequent
quadri-concepts versus the number of frequent quadri-sets in
order to assess the compacity of the extracted representation.
We have applied our experiments on two real-world datasets
described in the following. Statistics about these snapshots
are summarized into Table II.
MOVIELENSMOVIELENS (http://movielens.org) is a movie rec-
ommendation website. Users are asked to note
movies they like and dislike. The MOVIELENS
dataset used for our experiments is freely down-
loadable [8].
LAST.FMLast.fm (http://last.fm) is a music website, founded
in 2002. It has claimed 30 million active users in
March 2009. The LAST.FM dataset used for our
experiments is freely downloadable [8].
Table III shows two examples of frequent quadri-concepts
extracted from the MOVIELENS and LAST.FM datasets. The
6Concretely, it means that the users u1 and u2 which shared the resource
r1 with the tags t1 and t2 at the date d2 also shared it at the date d1.
# Type
# Quadruples
# Users
# Tags
# Resources
# Dates (timestamps)
Dataset 1
(MOVIELENS)
Dense
95580
4010
15227
11272 (movies)
81601
Dataset 2
(LAST.FM)
Sparse
186479
1892
9749
12523 (artists)
3549
CHARACTERISTICS OF THE CONSIDERED SNAPSHOTS.
Table II
Datasets
MOVIELENS
Dates
03/12/2005
16/07/2006
21/02/2008
Users
Tags
krycek
maria
kids
fantasy
darkness
magic
Resources
Harry Potter
The Prisoner
of Azkaban
The Order of
the Phoenix
LAST.FM
07/05/2010
02/06/2011
csmdavis
franny
rossanna
pop
concert
dance
Britney Spears
Madonna
EXAMPLES OF FREQUENT QUADRI-CONCEPTS OF MOVIELENS AND
Table III
LAST.FM.
first one depicts that the users krycek and maria used the
tags kids, fantasy, darkness and magic to annote the movie
Harry Potter and its sequels successively in 03/12/2005, in
16/07/2006 and then in 21/02/2008. Such concept may be
exploited further for recommanding tags for that movie or
analyze the evolution of tags associated to "Harry Potter".
The second quadri-concept shows that the users csmdavis,
franny and rossanna shared the tags pop, concert and
dance to describe the artists Britney Spears and Madonna
at two different dates. We can use such quadri-concept to
recommand the users franny and rossanna to the first one,
i.e., csmdavis as they share the same interest for both artists
using the same tags.
A. Execution Time
B. Consumed Memory
C. Compacity of Quadri-Concepts
VII. CONCLUSION AND PERSPECTIVES
-ccl
-persp
REFERENCES
[1] P. Mika, "Ontologies are us: A unified model of social net-
works and semantics," Web Semantics., vol. 5, no. 1, pp. 5–15,
2007.
Figure 2. Example of an equivalence class extracted from the d-folksonomy depicted by Table I
[7] G. Dong, C. Jiang, J. Pei, J. Li, and L. Wong, "Mining succinct
systems of minimal generators of formal concepts," in Proc.
of the 10th ICDSA, ser. DASFAA'05.
Berlin, Heidelberg:
Springer-Verlag, 2005, pp. 175–187.
[8] I. Cantador, P. Brusilovsky, and T. Kuflik, "2nd workshop
on information heterogeneity and fusion in recommender sys-
tems," in Proc. of the 5th ACM RecSys, NY, USA, 2011.
[2] F. Lehmann and R. Wille, "A triadic approach to formal
Santa Cruz,
concept analysis," in Proc. of the 3rd ICCS.
California, USA: Springer-Verlag, 1995, pp. 32–43.
[3] G. Voutsadakis, "Polyadic concept analysis," Order, vol. 19,
no. 3, pp. 295–304, 2002.
[4] L. Cerf, J. Besson, C. Robardet, and J.-F. Boulicaut, "Closed
patterns meet n-ary relations," ACM TKDD, vol. 3, pp. 3:1–
3:36, March 2009.
[5] G. Voutsadakis, "n-closure systems and n-closure operators,"
Algebra Universalis, vol. 55, no. 2, pp. 369–386, 2006.
[6] A. Couch and M. Chiarini, "A theory of closure operators," in
Proc. of the 2nd AIMS. Berlin, Heidelberg: Springer-Verlag,
2008, pp. 162–174.
# Quadruples
# Quadruples
Minimum QUADRICONS
Thresholds QUADRICONS
DATA
PEELER
Minimum QUADRICONS
Thresholds QUADRICONS
DATA
PEELER
Minimum QUADRICONS
Thresholds QUADRICONS
DATA
PEELER
PERFORMANCES OF QUADRICONS vs. DATA-PEELER ABOVE THE MOVIELENS AND LAST.FM DATASETS.
Table IV
|
1511.01964 | 1 | 1511 | 2015-11-06T01:05:23 | Network comparison using directed graphlets | [
"cs.SI",
"physics.soc-ph",
"q-bio.MN"
] | With recent advances in high-throughput cell biology the amount of cellular biological data has grown drastically. Such data is often modeled as graphs (also called networks) and studying them can lead to new insights into molecule-level organization. A possible way to understand their structure is by analysing the smaller components that constitute them, namely network motifs and graphlets. Graphlets are particularly well suited to compare networks and to assess their level of similarity but are almost always used as small undirected graphs of up to five nodes, thus limiting their applicability in directed networks. However, a large set of interesting biological networks such as metabolic, cell signaling or transcriptional regulatory networks are intrinsically directional, and using metrics that ignore edge direction may gravely hinder information extraction. The applicability of graphlets is extended to directed networks by considering the edge direction of the graphlets. We tested our approach on a set of directed biological networks and verified that they were correctly grouped by type using directed graphlets. However, enumerating all graphlets in a large network is a computationally demanding task. Our implementation addresses this concern by using a state-of-the-art data structure, the g-trie, which is able to greatly reduce the necessary computation. We compared our tool, gtrieScanner, to other state-of-the art methods and verified that it is the fastest general tool for graphlet counting. | cs.SI | cs |
thus
advances
Abstract—With
high-
throughput cell biology the amount of cellular
biological data has grown drastically. Such data
is often modeled as graphs (also called networks)
and studying them can lead to new insights into
molecule-level organization. A possible way to
understand their structure is by analysing the
smaller components that constitute them, namely
network motifs
are
particularly well suited to compare networks and
to assess their level of similarity but are almost
always used as small undirected graphs of up
to five nodes,
limiting their applicability
in directed networks. However, a large set of
interesting biological networks such as metabolic,
cell signaling or transcriptional regulatory networks
are intrinsically directional, and using metrics
that
ignore edge direction may gravely hinder
information extraction.
and graphlets. Graphlets
The applicability of graphlets is extended to di-
rected networks by considering the edge direction
of the graphlets. We tested our approach on a set
of directed biological networks and verified that
they were correctly grouped by type using directed
graphlets. However, enumerating all graphlets in a
large network is a computationally demanding task.
Our implementation addresses this concern by using
a state-of-the-art data structure, the g-trie, which is
able to greatly reduce the necessary computation. We
compared our tool, gtrieScanner, to other state-
of-the art methods and verified that it is the fastest
general tool for graphlet counting.
Network comparison using directed
graphlets
David Apar´ıcio, Pedro Ribeiro, Fernando Silva
CRACS & INESC-TEC LA,
R. Campo Alegre, 1021/1055, 4169-007 Porto, Portugal
Faculdade de Ciencias, Universidade do Porto
Email: {daparicio, pribeiro, fds}@dcc.fc.up.pt
recent
in
proteins or genes, and the physical, chemical or
functional interactions between them modeled as
edges.
Inspecting the graph’s topological features can
yield valuable information about the network. If
a network has topological features that are not ex-
pected to occur in neither purely random nor purely
regular graphs it is considered to be a complex
network, and most real-world networks are found
to be complex. Singular characteristics commonly
associated with complex networks include having
a small-world structure [2] or a degree distribution
that follows a power-law (scale-free networks) [3].
Brain networks, for instance, have been identified
as small-world networks [4], meaning that each
node (representing a neuron) is only a few con-
nections away from every other node. Furthermore,
the distance of the average path length in the brain
has been negatively correlated with a person’s IQ
[5], which seems to indicate the importance of a
small-world organization to networks’ efficiency.
Other statistics such as the number of connected
components and the clustering coefficient are also
frequently used to characterize a network.
Another approach to uncover the underlying
structure of complex networks is to decompose
them into their smaller components or subgraphs.
Network motifs in particular are small overrepre-
sented subgraphs described by [6] as the build-
ing blocks of large complex networks. Studies
such as the one by [7] support
this view for
biological networks and network motifs have been
used to analyze a wide range of cellular biolog-
ical networks such as protein-protein interaction
networks [8], transcriptional regulatory networks
[9], metabolism networks [10] or cell signaling
networks [11].
It is often useful to compare networks against
each other, particularly because if a given net-
work’s properties are known it allows for knowl-
edge transfer based on the similarity or difference
I. INTRODUCTION
The advent of high-throughput cell biology tech-
nologies such as DNA microarrays [1] has in-
creased the amount of data pertaining to molec-
ular interactions exponentially. While this recent
flood of information has greatly contributed to
a more accurate understanding of molecule-level
organization, it has also created the need to find
ways to filter and model this data so that it is
rendered intelligible to the practitioner. In the field
of computational biology different types of cellular
networks are modeled as graphs with nodes rep-
resenting specific biological components such as
between two networks. One way to perform this
comparison is to evaluate the similarity between
the subgraphs that each network contains. Network
motif fingerprints [12] and graphlet-based metrics
[13] are possible choices for this task. Both ap-
proaches compute the frequency of a set of small
non-isomorphic subgraphs but, in addition to that,
graphlets also evaluate the contribution of each
individual node from the network, producing a
graphlet degree distribution that can be seen as
an extension of the node degree concept. Further-
more, enumerating graphlets is computationally
less expensive than calculating network motifs
since the subgraphs are only enumerated in the
original network, as opposed to also having to
compute their occurrences in a large set of random
networks in order to assess motif significance [14].
Graphlet-based metrics have been used to analyze
networks from various biological areas such as
protein-protein interaction [15], disease genes [16],
age-related genes [17] or brain networks [18] due
to the great amount of topological information that
they provide [19].
Graphlet usage is often restricted to analyzing
only the set of 30 undirected graphs of up to five
nodes originally presented by [13] due to com-
putational limitations. However, a substantial gain
in topological information might be attained by
examining larger graphlets. For instance, two net-
works may be almost indistinguishable by compar-
ing their respective size k graphlets but certain dis-
similarities become evident when contrasting their
size k + 1 graphlets. Additionally, in directed net-
works, edge direction should be taken into account
since it can potentially reveal information about the
network’s structure that undirected graphlets are
not able to capture. In this work we propose a novel
extension of the graphlet methodology to directed
networks and show how this may retrieve relevant
information from biological networks. Despite the
fact that graphlets are a general model, to the best
of the authors’ knowledge the only extensions to
the original concept are relative to ordered [20] and
dynamic graphs [21].
There are many cellular biological networks
that are intrinsically directed such as metabolic,
cell signaling and gene transcriptional regulation
networks. Methods and metrics that
ignore the
edge direction of these networks might be los-
ing important information. [22] proposed a new
measure (ρ) to calculate the link reciprocity of
a network that can be used to assess if its edge
direction is important or not. Their measure is an
absolute quantity ranging from −1 (no reciprocity)
to 1 (completely reciprocal). Networks with a ρ-
value of ≈ −1 are purely directional networks
meaning that edge direction is an intrinsic aspect
of these networks and removing it makes them
meaningless. On the other hand, networks with
ρ ≈ 1 can be safely transformed into topologi-
cally equivalent undirected networks without los-
ing much information since their edges are always
reciprocally connected. Garlaschelli and Loffredo
calculated that celular and food web networks rank
closer to the middle of the scale (ρ ≈ 0) meaning
that edge direction in these networks is significant.
Additionally, some specific small directed graphs,
such as feed-forward loops, have been shown to
play a fundamental role in the organization of
distinct networks [23].
Network motifs have been extensively used to
study directed biological networks such as neural,
transcriptional and signal networks [24]. Graphlets
on the other hand are mostly restricted to undi-
rected networks since they consist of a set of undi-
rected graphs. [25] examined numerous directed
biological networks using both directed motifs and
undirected graphlets. Such a study could possibly
benefit if a tool for enumerating directed graphlets
was available.
In this article we present an efficient general-
purpose tool to enumerate and compare both di-
rected and undirected graphlet degree distributions
for again both directed and undirected networks.
Previous approaches either restricted the applica-
tion of graphlets to undirected networks or had
to ignore edge direction in directed networks, in
practice reducing them to undirected networks.
To achieve this objective we extend both i) the
original concept of graphlets to directed graphlets
and ii) upgrade a tree data-structure specialized in
efficiently storing graphs, the g-trie, to a graphlet-
trie. Our tool, gtrieScanner, can thus be used
to enumerate directed and undirected graphlets as
well as network motifs.
II. MATERIALS AND METHODS
A. Graph and graphlet terminology
A network or graph G is comprised of a set
V (G) of vertices or nodes and a set E(G) of
edges or connections. Nodes represent entities
and edges correspond to the relationships between
them. Edges are represented as pairs of vertices
of the form (a, b), where a, b ∈ V (G). In directed
graphs, edges (i, j) are ordered pairs (translated to
”i goes to j”) whereas in undirected graphs there
is no order since the nodes are always reciprocally
connected.
A subgraph Gk of G is a graph of size k where
V (Gk) ⊆ V (G) and E(Gk) ⊆ E(G). A subgraph
is induced if ∀u, v ∈ V (Gk) : (u, v) ∈ E(Gk)
iff (u, v) ∈ E(G). A match or occurrence of Gk
happens when G has a set of nodes that induce
Gk. Two matches are considered distinct if they
have at least one different vertex. The f requency
of Gk in G is the number of occurrences of Gk in
G.
Two graphs are said to be isomorphic if it is
possible to obtain one from the other by changing
the node labels without affecting their topology.
All occurrences of a set G of non-isomorphic sub-
graphs must be enumerated in the original network
before graphlet or network motif metrics can be
calculated. We call this task the general subgraph
census problem and state it in Definition 2.1.
Definition 2.1 (Subgraph Census Problem):
Given a set G of non-isomorphic subgraphs and a
graph G, determine the frequency of all induced
occurrences of the subgraphs Gs ∈ G in G. Two
occurrences are considered different if they have
at least one node or edge that they do not share.
Other nodes and edges can overlap.
Graphlets were originally defined as the set of
30 non-isomorphic undirected graphs with at most
5 nodes [13]. They are structurally equivalent to
network motifs [6] but also include information
about the position or orbit that nodes occupy in
the graphlet. The set of all orbits of G is refereed
to as O. Another difference lies in the fact that
network motifs require a null model to verify if
the subgraph is overrepresented. Usually the null
model is an artificial random network that main-
tains the original network’s node degree sequence.
On the other hand, graphlets do not require a null
model and use the information of all subgraphs to
perform a full-scale network comparison.
To compute the graphlet degree distribution one
has to count ∀u ∈ V (G) how many times u
appears in some orbit j ∈ O and repeat this process
for the total m orbits, resulting in a graphlet degree
vector GDV (u) with m positions. A matrix F rG
of n × m is obtained by joining the GDV s of all
n nodes where each row of F rG is GDV (v), v ∈
V (G) and each position f ru,j is the number of
times that node u appears in orbit j. This task is
more formally defined in Definition 2.2.
f r0,0
f r1,0
...
f rn,0
F rG =
f r0,1
f r1,1
...
f rn,1
···
···
...
···
f r0,m
f r1,m
...
f rn,m
Fig. 1: GDV (v) obtained by enumerating v’s undirected
graphlet orbits of sizes 2 and 3.
Both directed and undirected graphlets are con-
sidered in this work; dGk and dOk denote the
set of all directed graphlets and directed orbits of
size s ∈ {2, ..., k}, respectively, while uGk and
uOk are used for the undirected counterparts. An
illustration of how the GDV of a vertex v is
computed for uO3 is presented in Figure 1.
Definition 2.2 (Orbit Frequency Computation):
Given a set Gs of non-isomorphic subgraphs of
size s ∈ {2, ..., k} and a graph G, determine the
number of times f ri,j that each node i ∈ V (G)
appears in all the orbits j ∈ Os. Two occurrences
are considered different if they have at least one
node or edge that they do not share. Other nodes
and edges can overlap.
F rG is transformed into a graphlet degree dis-
G(k) denotes how many
tribution GDDG where d j
nodes appear k times in orbit j.
GDDG =
d 0
d 0
G(2)
G(1)
d 1
d 1
G(2)
G(1)
...
...
d m
G (1) d m
G (2)
G(+∞)
d 0
G(+∞)
d 1
...
···
···
...
··· d m
G (+∞)
Two networks G and H can then be compared
by computing the differences between their respec-
tive GDD matrices after their distributions are
normalized - represented below as nj
G(k). In our
experiments the arithmetic mean GDD-agreement
(GDA) introduced by [13] is used, defined as
follows.
GDA(G, H)j = 1− 1√
2
G(k) − nj
[nj
H (k)]2
(cid:33) 1
2
(1)
(2)
(cid:32) +∞(cid:88)
m(cid:88)
k=1
j=0
1
m
GDA(G, H) =
GDA(G, H)j
uGk
Ok
1
4
15
73
480
4,786
77,275
k
2
3
4
5
6
7
8
9
Gk
1
3
9
30
142
965
12,082
273,162
1,540,421
882,011,563
1,793,355,966,869
2,188,288
13,027,955,038,433,121
Gk
2
15
214
9,578
dGk
Ok
3 (1.5 × Gk)
33 (2.3 × Gk)
730 (3.5 × Gk)
45,637 (4.8 × Gk)
9,121,657 (5.9 × Gk)
≈ 7 × Gk
≈ 8 × Gk
≈ 9 × Gk
TABLE I: Number of undirected and directed graphlets, as well as their respective orbits, depending on the size of the graphlets.
For each case, all graphlets of sizes 2..k are counted. It is impractical to enumerate all possible orbits for dGk when k is larger
than 6 due to the size of G.
We modified the metric to only consider orbits
that appear in at least one of the networks; the orig-
inal metric is henceforth refereed to as GDA(cid:48) and
our own as GDA. Modifying the metric was nec-
essary since non-appearing orbits would contribute
to unreasonably high GDA(cid:48)s when enumerating
a large number of orbits or when small networks
were used. This happens because the GDA(cid:48) of two
networks is increased even if the orbit frequency is
zero in both networks. This is not very problematic
when a small number of orbits is enumerated, such
as the original 73 undirected ones; however, as can
be seen from Table I, bigger undirected graphlets
and directed graphlets may require thousands or
millions of orbits to be enumerated. For these cases
it is likely that many of the possible orbits do
not appear in either network, which may result
in higher GDA(cid:48)s than expected. Tests performed
on small food webs produced an average GDA(cid:48)
of ≈ 0.5 when enumerating dG4 that increased
to ≈ 0.85 for dG5. This does not
translate to
those foodwebs being much more similar when
looking at their larger graphlets but rather that
there are many orbits that do not appear in either
network. Figure 2 illustrates this concept. Since
both directed and undirected GDAs can be calcu-
lated, uGDAk and dGDAk represent the GDAs
when comparing undirected and directed graphlets,
respectively, of size k.
B. Networks
There are numerous kinds of intra-cellular net-
works, such as metabolic,
transcriptional regu-
latory and cell signaling networks, where edge
directyion is intrinsically related to its function.
Metabolic networks represent
the set of bio-
chemical reactions occurring within a cell
that
allow the organism to grow, reproduce, respond to
the environment, and other biological functions es-
sential for the organism’s survival. These reactions
are catalyzed by enzymes that act upon substrates.
Therefore, in metabolic networks a node can be
an enzyme or a substrate and the connections are
directed edges going from enzymes to substrates.
Transcriptional regulatory networks model the
process by which the information in the genes
is transcribed into proteins or RNA, also called
gene expression. In these networks nodes are either
transcription factors or proteins that are connected
by directed edges representing how the transcrip-
tion factors influence the gene by stimulating or
repressing its expression.
A cellular signaling network is comprised of a
sequence of biochemical reactions between cells of
the same organism. A great number of tasks such
as the development, repair and immunity of cells
depend on the proper functioning of cell signaling
networks. Nodes in these networks are proteins and
edges exist between activator and receptor proteins
that communicate through signals from the first to
the latter.
Fig. 2: Comparison of different GDA metrics. The original
metric GDA(cid:48) was found to produce unreasonably high values
for small networks (in the example) or when many graphlets
are enumerated. This makes the metric inappropriate to compare
directed graphlets since the number of orbits is very high. In
our modified GDA metric only orbits appearing in either G,
H or both are considered, discarding non-present orbits.
Fig. 5: Common topology of three small graphs. G-Tries
use common structures between the graphs of Gs to heavily
constrain the search space.
Fig. 3: A graphlet-trie containing all 2, 3, 4 and 5-node undirected graphlets G0, ..., G29 as they were presented in [13]. In a
g-trie the common topologies between graph(let)s of different sizes become evident.
Fig. 4: A graphlet-trie containing the 39 non-bidirectional directed graphlets of sizes 2, 3 and 4. The orbit numbers are generated
automatically. While it is guaranteed that the g-trie only has non-isomorphic graphs on the leafs (bottom-level nodes), isomorphic
graphs may appear in some of the top nodes (represented in grey). In these cases only one of the graphs is considered for orbit
counting while the others are only used to efficiently traverse the search space, using symmetry breaking conditions to guarantee
that each occurrence is only counted once.
C. The G-Trie Data-structure
A g-trie [26] is a tree-like data-structure created
initially to calculate network motifs but
it can
be efficiently used to solve the general subgraph
census problem. [27] presented a g-trie algorithm
that was one or two orders of magnitude faster
than previous approaches and g-tries are still state-
of-the-art for network motif discovery efficiency-
wise.
The efficiency of the g-trie data-structure is
mostly due to two main algorithmic ideas. First,
the search space is heavily constrained by iden-
tifying common subtopologies between the set of
subgraphs Gs before enumerating them. Figure 5
illustrates this base concept by showing three
small graphs that share a common subtopology.
In practice this means that instead of searching
each subgraph, GS1, GS2 and GS3, individually,
a g-trie starts by looking for occurrences of a
smaller common subgraph GS0 and then perform
the necessary expansions for each larger subgraph.
Secondly, symmetry breaking conditions are au-
tomatically generated to eliminate automorphisms,
thus avoiding redundancies and guaranteeing that
each occurrence is found only once. For instance,
without these conditions an n-clique (n nodes fully
connected to each other) would be found n! times
(once for each possible permutation of the n nodes)
since all these permutations would be a match to a
g-trie path from the root to the node representing
that n-clique.
A g-trie receives as input the list of graphs that
the user wants to enumerate, which can be all
undirected graphlets with up to five nodes, a set of
directed graphs, specific interesting patterns (such
as cliques or stars), or any other desired graphs.
However, due to the nature of the g-trie which
relies on common subtopologies between graphs
to construct an efficient search tree, g-tries are
better suited for tasks where one wants to count the
occurrences of many small graphs inside a large
network. G-Tries can be fully constructed before
the enumeration and stored in a file or built on-
the-fly to avoid having to store all possible graphs.
Graphlet-tries are an extension of g-tries that
also consider the nodes’ orbit. The broader term
g-trie is used whenever a concept applies to both g-
tries and graphlet-tries. A graphlet-trie containing
all the original 30 graphlets is shown in Figure 3.
The original orbit numbers are kept only for conve-
nience since orbits are generated automatically in
our implementation. An additional g-trie contain-
ing all non-bidirectional dG4 is shown in Figure 4
(the bidirectional graphlets were removed for space
G
SIG_NCI SIG_NH SIG_SH SIG_SM MET_CE MET_BS MET_DR MET_TY TR_EC
V (G) 15,533
E(G) 23,682
Source
[28]
1,634
4,665
[29]
529
1,223
477
1,056
[30]
2,217
5,427
[31]
453
2,025
2,280
5,588
[3]
2,361
5,822
99
212
[23]
TR_YST
688
1,078
[6]
TABLE II: Set of ten directed biological networks of different types used for experimental evaluation.
Fig. 6: Heatmap and dendogram of the dGDA4 between the tested networks. Cell signaling networks (SIG) and metabolic
networks (MET) are clearly grouped together using directed graphlets information.
concerns).
Additionally, g-tries have already been extended
to also support weighted [32] and colored [33]
networks. The reader is refereed to [26] for more
specific details on how a g-trie is created and used
for subgraph enumeration.
III. RESULTS AND DISCUSSION
The experiments presented in this section can be
divided into two categories: i) directed biological
network comparison and ii) performance evalua-
tion. The first illustrates how directed graphlets
can be used to group a set of directed biological
networks into different types according to their
biological function, while the latter analyses the
performance of our tool by comparing its execution
time with state-of-the-art approaches on several
biological networks.
Information relative to the networks used for
testing purposes is summarized in Table II; the
network set contains networks of different organ-
isms and of three distinct
types: cell signaling
(prefix SIG), metabolic (MET) and transcriptional
regulatory networks (TR). Their sizes vary from a
few hundred nodes/edges to tens of thousand of
nodes/edges.
A. Directed Biological Network Comparison
Different types of biological networks such as
metabolic, cell signaling and transcriptional regu-
latory networks pertain to distinct biological func-
tions. The computational networks used in these
experiments are evidently a translation of real
biological networks, thus potentially making the
process of finding their similarities harder since
their real structure may not be fully represented.
Nevertheless, it is usually assumed that network
structural similarity of computational networks
may also indicate functional similarity [34]. In
that case, networks belonging to the same type
are expected to be more similar topologically than
networks of different types.
In order to verify if that is the case for these spe-
cific networks we compare their directed graphlets
so as to assess their topological similarity. This
is done for each pair of networks (G, H) from
Table II by first enumerating all graphlet orbits
and then comparing their GDDs by computing
the dGDAk(G, H). These tests were performed
for uGk and dGk with k ∈ {3, 4, 5} but for space
concerns only results for dG4 are presented. Fur-
thermore, results from all experiments were found
to be consistent with the results using dG4 for
these particular networks but in general, different
sets of (directed) graphlets can provide divergent
information.
The matrix obtained after
computing the
dGDA4(G, H) for each pair of networks is dis-
played in Figure 6 along with the corresponding
SIG_SMSIG_SHSIG_NCISIG_NHMET_CETR_ECTR_YSTMET_TYMET_DRMET_BSMET_BSMET_DRMET_TYTR_YSTTR_ECMET_CESIG_NHSIG_NCISIG_SHSIG_SM0.5180.5040.5660.5290.5980.5740.5120.8610.85110.5060.4930.5680.5280.5830.560.5010.87610.8510.5110.4960.5740.5320.5910.5670.50710.8760.8610.5420.5150.5220.5210.5820.59410.5070.5010.5120.540.5150.5230.5250.77110.5940.5670.560.5740.530.5110.5130.52710.7710.5820.5910.5830.5980.5480.5560.58710.5270.5250.5210.5320.5280.5290.5610.57110.5870.5130.5230.5220.5740.5680.5660.78310.5710.5560.5110.5150.5150.4960.4930.50410.7830.5610.5480.530.540.5420.5110.5060.518No
explicit
dendogram and heatmap. It can be observed that
networks of the same type are correctly grouped
by their GDA. This is an indicator that directed
graphlets can detect
topological similarities be-
tween directed biological networks of the same
type and can likewise find structural differences
between networks of different types.
comparison with
undirected
graphlets is presented here since we do not claim
that they are not capable of correctly grouping
these specific networks
respective
classes. However,
to find cases in
which undirected graphlets will not be able to
distinguish networks that are clearly distinct when
taking edge direction is taken into account (see
Figure 7).
into their
is trivial
it
Fig. 7: Two networks seen as identical using undirected
graphlets that are different
if edge direction is considered.
When enumerating uG3 the uGDA3 is equal to 1.00. On the
other hand, if one uses dG3, the dGDA3 is 0.57, substantially
reducing their GDA. Directed graphlets are more appropriate
to assess the level of similarity between directed networks since
they capture more information about the networks’ topologies.
B. Performance Evaluation
1) Experimental Setting: Our experimental re-
sults were gathered on a 8-core machine consist-
ing of two 4-core Intel Xeon Processor E5620
processors at 2.4GHz with a total of 12GB of
memory. Code for gtrieScanner was devel-
oped in C++11 and compiled using gcc 4.8.2.
The other tools used for comparison were also
developed in C++ and are available as open-source.
The execution times of each tool are relative only
to the graphlet enumeration phase, not taking into
account the time taken to load the graph into mem-
ory and perform other initialization and finalization
tasks.
2) Performance Comparison: The most used
and well-known tool for graphlet discovery is
GraphCrunch [35]. Until recently it performed
a full enumeration of all graphlets of up to size 5
in order to calculate their orbit frequency. Another
tool, ORCA [36], was shown to perform one or
two orders of magnitude faster that the original
GraphCrunch and has recently been integrated
into it. Henceforth, when GraphCrunch is ref-
erenced we are alluding to its version before
adopting ORCA to perform the enumeration. ORCA
achieves its performance by observing that, given
a limited set of graphs of size k, it is possible
to build a system of equations to calculate their
frequencies by using the frequencies of the size
k − 1 graphs and the frequency of a single graph
of size k. This greatly reduces execution time
since the size k graphlet enumeration is much
more computationally expensive than the size k−1
enumeration followed by solving the system of
equations. While this approach brings substantial
gains in terms of speed,
is quite limited in
scope because a new set of equations needs to
be manually derived in order to find the k + 1
graphlets, k+2, and so on. These two tools also do
not support edge direction, being only applicable
for undirected graphlets.
it
in concept
Network motifs are similar
to
graphlets and numerous tools for network motif
discovery exist. Since tools for network motif
discovery do not have to the calculate orbit fre-
quencies specific to each node they perform less
computational work than graphlet tools. Two well-
known methods are Kavosh [37] and FANMOD
[38], the latter being an implementation of the ESU
algorithm; in our work a more efficient implemen-
tation of ESU [39] is used.
Because i) GraphCrunch, ii) ORCA, and iii)
ESU and Kavosh methodologies are not compa-
rable, three distinct versions of gtrieScanner
were used:
i) a version that enumerates all
graphlets and orbits, ii) a version that enumerates
size k − 1 graphlets and orbits and then computes
a set of equations to calculate the frequencies of
the size k graphlets and iii) a version that only
enumerates the graphlets/network motifs and not
the orbits, to be used respectively. The version
that only enumerates motifs/graphlets was devel-
oped previous to this work and is available at
http://www.dcc.fc.up.pt/gtries/.
Results showing the average (mean) speedup
obtained in all 10 networks for different sets of
graphlets (G) are presented in Table III. Neither
GraphCrunch nor ORCA are able to enumerate
undirected graphlets with more than 5 nodes or
directed graphlets. Our tool performs faster when
compared to those two systems and, in addition
to that, it can enumerate undirected graphlets of
more than 5 nodes as well as directed graphlets.
When compared to other tools for network motif
discovery our tool is almost two orders of magni-
tude faster on average for undirected graphs and
about 20 times faster for directed graphs. The
speedups are lower for directed graphs because
the search space is harder to constrain due to
G
uG5
uG6
dG4
dG5
G
30
142
214
9,578
(a)
O
73
480
730
45,637
GraphCrunch
6.59 ± 2.60
n/a
n/a
n/a
(b)
ORCA
2.08 ± 1.15
n/a
n/a
n/a
(c)
Kavosh
87.66 ± 35.11
87.28 ± 40.43
19.17 ± 6.42
31.33 ± 13.37
ESU
73.00 ± 30.81
70.91 ± 31.98
17.33 ± 5.99
28.60 ± 11.79
(d)
TABLE III: Performance comparison between gtrieScanner and other algorithms. (a) shows a description of the set of
subgraphs being enumerated, as well as the total number of graphlets (G) and orbits (O). For a fair comparison we developed
different versions of gtrieScanner that perform similar but distinct tasks. The speedups between our methods and other
algorithms are shown in (b), (c) and (d). In (b) the graphlet frequencies are obtained by enumerating all size k graphlets. On the
other hand, the variation in (c) only enumerates the graphlets of up to size k− 1 and then solves a set of equations to compute the
frequencies of size k graphlets. GraphCrunch and ORCA are only able to calculate undirected graphlets of up to size 5, so we
can not compare their execution times with our own for uG6, dG4 or dG5. Finally, in (d) we compare our approach to algorithms
for network motif discovery, discarding orbit frequency computation.
It
is
the
speedups
noticeable
a higher number of graphlets and less common
subtopologies between them.
that
of
gtrieScanner are much higher when compared
to network motif tools than to graphlet tools. This
happens because tools for network motifs are
general, meaning that they can be used for any
subgraph/motif size, while tools to find graphlets
are built
to enumerate undirected graphlets of
up to 5 nodes only. This allows them to have
specialized optimizations that motif tools can not
match.
From these experiments we can conclude that
gtrieScanner can both perform faster than
state-of-the-art graphlet tools and also provide a
more general approach which supports any di-
rected or undirected motif/graphlet size, as long
as the full set of graphlets fits into memory.
IV. CONCLUSIONS
Recent advances in high-throughput cell biology
caused huge amounts of cellular biological data to
be continuously produced. Studying the large com-
putational networks resulting from this information
can lead to new insight into cellular organization.
Due to the size of these networks it is necessary
to resort to studying their smaller components such
as Graphlets or like network motifs.
Graphlets in particular have been extensively
applied to protein-protein interactions and other
kinds of undirected networks but their applicability
in directed biological networks, such as cell signal-
ing, transcriptional regulatory and metabolic net-
works, is limited since they do not consider edge
direction. In this paper we highlight the importance
of adapting graphlets to take into account edge
direction by showing that networks of different
types can be accurately grouped using directed
graphlets.
We present an efficient tool, gtrieScanner,
that is able to compute directed and undirected
graphlets of arbitrary size, as well as network
motifs, as long as they fit into memory. Our tool
also allows for the user to customize the set of
graphs that he/she wants to query in the network,
further demonstrating the flexibility of our tool. We
assess our tool’s performance on a set of directed
biological networks and compare it to other tools
for graphlet and network motif discovery. We ob-
serve that it is the fastest available tool for either
task while also being a very general approach.
Therefore, we believe that we have broadened the
applicability of graphlets by extending them to
directed graphlets and by providing a efficient tool
for that task.
Acknowledgements
This work is partially funded by FCT (Por-
tuguese Foundation for Science and Technol-
ogy) within project UID/EEA/50014/2013. David
Apar´ıcio is supported by a FCT/MAP-i PhD re-
search grant (PD/BD/105801/2014).
REFERENCES
[1] M. Schena, D. Shalon, R. W. Davis, and P. O. Brown,
“Quantitative monitoring of gene expression patterns with
a complementary dna microarray,” Science, vol. 270, no.
5235, pp. 467–470, 1995.
[2] A. Wagner and D. A. Fell, “The small world inside large
metabolic networks,” Proceedings of the Royal Society of
London. Series B: Biological Sciences, vol. 268, no. 1478,
pp. 1803–1810, 2001.
[3] H. Jeong, B. Tombor, R. Albert, Z. N. Oltvai, and A.-
L. Barab´asi, “The large-scale organization of metabolic
networks,” Nature, vol. 407, no. 6804, pp. 651–654, 2000.
[4] O. Sporns, D. R. Chialvo, M. Kaiser, and C. C. Hilge-
tag, “Organization, development and function of complex
brain networks,” Trends in cognitive sciences, vol. 8,
no. 9, pp. 418–425, 2004.
[5] M. P. van den Heuvel, C. J. Stam, R. S. Kahn, and
H. E. H. Pol, “Efficiency of functional brain networks and
intellectual performance,” The Journal of neuroscience,
vol. 29, no. 23, pp. 7619–7624, 2009.
[25] C. Y. Park, D. C. Hess, C. Huttenhower, and O. G. Troyan-
skaya, “Simultaneous genome-wide inference of physical,
genetic, regulatory, and functional pathway components,”
PLoS computational biology, vol. 6, no. 11, p. e1001009,
2010.
[26] P. Ribeiro and F. Silva, “G-Tries: A data structure for stor-
ing and finding subgraphs,” Data Mining and Knowledge
Discovery, vol. 28, no. 2, pp. 337–377, 2014.
[27] P. Ribeiro and F. Silva, “G-tries: an efficient data structure
for discovering network motifs,” in Proceedings of the
2010 ACM Symposium on Applied Computing. ACM,
2010, pp. 1559–1566.
[28] C. F. Schaefer, K. Anthony, S. Krupa, J. Buchoff, M. Day,
T. Hannay, and K. H. Buetow, “Pid: the pathway interac-
tion database,” Nucleic acids research, vol. 37, no. suppl
1, pp. D674–D679, 2009.
[29] Q. Cui, Y. Ma, M. Jaramillo, H. Bari, A. Awan, S. Yang,
S. Zhang, L. Liu, M. Lu, M. O’Connor-McCourt et al.,
“A map of human cancer signaling,” Molecular systems
biology, vol. 3, no. 1, p. 152, 2007.
[30] A. Ma’ayan, S. L. Jenkins, R. L. Webb, S. I. Berger, S. P.
Purushothaman, N. S. Abul-Husn, J. M. Posner, T. Flores,
and R. Iyengar, “Snavi: Desktop application for analysis
and visualization of large-scale signaling networks,” BMC
systems biology, vol. 3, no. 1, p. 10, 2009.
[31] J. Duch and A. Arenas, “Community detection in complex
networks using extremal optimization,” Physical review E,
vol. 72, no. 2, p. 027104, 2005.
[32] S. Choobdar, P. Ribeiro, and F. Silva, “Motif min-
ing in weighted networks,” in Data Mining Workshops
(ICDMW), 2012 IEEE 12th International Conference on.
IEEE, 2012, pp. 210–217.
[33] P. Ribeiro and F. Silva, “Discovering Colored Network
Springer, 2014, pp.
Motifs,” in Complex Networks V.
107–118.
[34] C. J. Honey, J.-P. Thivierge, and O. Sporns, “Can struc-
ture predict function in the human brain?” Neuroimage,
vol. 52, no. 3, pp. 766–776, 2010.
[35] T. Milenkovi´c, J. Lai, and N. Przulj, “Graphcrunch: a tool
for large network analyses,” BMC bioinformatics, vol. 9,
no. 1, p. 70, 2008.
[36] T. Hocevar and J. Demsar, “A combinatorial approach
to graphlet counting,” Bioinformatics, vol. 30, no. 4, pp.
559–565, 2014.
[37] Z. R. Kashani, H. Ahrabian, E. Elahi, A. Nowzari-Dalini,
E. S. Ansari, S. Asadi, S. Mohammadi, F. Schreiber, and
A. Masoudi-Nejad, “Kavosh: a new algorithm for finding
network motifs,” BMC bioinformatics, vol. 10, no. 1, p.
318, 2009.
[38] S. Wernicke and F. Rasche, “Fanmod: a tool for fast
network motif detection,” Bioinformatics, vol. 22, no. 9,
pp. 1152–1153, 2006.
[39] P. Ribeiro, “Efficient and scalable algorithms for network
motifs discovery,” Ph.D. dissertation, Faculty of Science
of the University of Porto, June 2011.
[7] R. J. Prill, P. A. Iglesias, and A. Levchenko, “Dynamic
properties of network motifs contribute to biological net-
work organization,” PLoS biology, vol. 3, no. 11, p. e343,
2005.
[8] I. Albert and R. Albert, “Conserved network motifs al-
low protein–protein interaction prediction,” Bioinformat-
ics, vol. 20, no. 18, pp. 3346–3352, 2004.
[9] S. S. Shen-Orr, R. Milo, S. Mangan, and U. Alon,
“Network motifs in the transcriptional regulation network
of Escherichia coli,” Nature genetics, vol. 31, no. 1, pp.
64–68, 2002.
[6] R. Milo, S. Shen-Orr, S.
Itzkovitz, N. Kashtan,
D. Chklovskii, and U. Alon, “Network motifs: simple
building blocks of complex networks.” Science (New York,
N.Y.), vol. 298, no. 5594, pp. 824–827, 2002.
[10] E. R. Shellman, C. F. Burant, and S. Schnell, “Network
motifs provide signatures that characterize metabolism,”
Molecular BioSystems, vol. 9, no. 3, pp. 352–360, 2013.
[11] W. Li, L. Chen, X. Li, X. Jia, C. Feng, L. Zhang, W. He,
J. Lv, Y. He, W. Li, and Others, “Cancer-related marketing
centrality motifs acting as pivot units in the human signal-
ing network and mediating cross-talk between biological
pathways,” Molecular BioSystems, vol. 9, no. 12, pp.
3026–3035, 2013.
[12] R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. Shen-Orr,
I. Ayzenshtat, M. Sheffer, and U. Alon, “Superfamilies of
evolved and designed networks.” Science, vol. 303, no.
5663, pp. 1538–1542, March 2004.
[13] N. Przulj, “Biological network comparison using graphlet
degree distribution,” Bioinformatics, vol. 23, pp. 177–183,
2007.
[14] P. Ribeiro, F. Silva, and M. Kaiser, “Strategies for Net-
work Motifs Discovery,” in 5th IEEE International Con-
ference on e-Science (e-Science 2009), Oxford, UK. IEEE
Press, December 2009, pp. 80–87.
[15] O. Kuchaiev and N. Przulj, “Learning the structure of
protein-protein interaction networks.” in Pacific Sympo-
sium on Biocomputing, vol. 14, 2009, pp. 39–50.
[16] K. Sun, J. P. Gonc¸alves, C. Larminie, and Others, “Pre-
dicting disease associations via biological network analy-
sis,” BMC bioinformatics, vol. 15, no. 1, p. 304, 2014.
[17] B. Yoo, H. Chen, F. E. Faisal, and T. Milenkovi´c, “Im-
proving identification of key players in aging via network
de-noising,” in Proceedings of the 5th ACM Conference
on Bioinformatics, Computational Biology, and Health
Informatics. ACM, 2014, pp. 164–173.
[18] O. Kuchaiev, P. T. Wang, Z. Nenadic, and N. Przulj,
“Structure of brain functional networks,” in Engineering
in Medicine and Biology Society, 2009. EMBC 2009.
Annual International Conference of the IEEE.
IEEE,
2009, pp. 4166–4170.
[19] O. N. Yaveroglu, T. Milenkovi´c, and N. Przulj, “Proper
evaluation of alignment-free network comparison meth-
ods,” Bioinformatics, p. btv170, 2015.
[20] N. Malod-Dognin and N. Prulj, “GR-Align: Fast and
flexible alignment of protein 3D structures using graphlet
degree similarity,” Bioinformatics, vol. 30, no. 9, pp.
1259–1265, 2014.
[21] Y. Hulovatyy, H. Chen, and T. Milenkovic, “Exploring the
structure and function of temporal networks with dynamic
graphlets,” arXiv preprint arXiv:1412.3885, 2014.
[22] D. Garlaschelli and M. I. Loffredo, “Patterns of link
reciprocity in directed networks,” Physical Review Letters,
vol. 93, no. 26 I, pp. 1–4, 2004.
[23] S. Mangan and U. Alon, “Structure and function of the
feed-forward loop network motif,” Proceedings of
the
National Academy of Sciences, vol. 100, no. 21, pp.
11 980–11 985, 2003.
[24] P. Wang, J. Lu, and X. Yu, “Identification of important
nodes in directed biological networks: A network motif
approach,” PloS one, vol. 9, no. 8, p. e106132, 2014.
|
1202.3473 | 1 | 1202 | 2012-02-15T23:38:06 | Are we there yet? When to stop a Markov chain while generating random graphs | [
"cs.SI",
"physics.data-an",
"physics.soc-ph"
] | Markov chains are a convenient means of generating realizations of networks, since they require little more than a procedure for rewiring edges. If a rewiring procedure exists for generating new graphs with specified statistical properties, then a Markov chain sampler can generate an ensemble of graphs with prescribed characteristics. However, successive graphs in a Markov chain cannot be used when one desires independent draws from the distribution of graphs; the realizations are correlated. Consequently, one runs a Markov chain for N iterations before accepting the realization as an independent sample. In this work, we devise two methods for calculating N. They are both based on the binary "time-series" denoting the occurrence/non-occurrence of edge (u, v) between vertices u and v in the Markov chain of graphs generated by the sampler. They differ in their underlying assumptions. We test them on the generation of graphs with a prescribed joint degree distribution. We find the N proportional |E|, where |E| is the number of edges in the graph. The two methods are compared by sampling on real, sparse graphs with 10^3 - 10^4 vertices. | cs.SI | cs |
Are we there yet? When to stop a Markov chain
while generating random graphs(cid:63)
Jaideep Ray, Ali Pinar, and C. Seshadhri
Sandia National Laboratories, Livermore, CA 94550
{jairay,apinar,scomand}@sandia.gov
Abstract. Markov chains are a convenient means of generating real-
izations of networks, since they require little more than a procedure for
rewiring edges. If a rewiring procedure exists for generating new graphs
with specified statistical properties, then a Markov chain sampler can
generate an ensemble of graphs with prescribed characteristics. However,
successive graphs in a Markov chain cannot be used when one desires in-
dependent draws from the distribution of graphs; the realizations are
correlated. Consequently, one runs a Markov chain for N iterations be-
fore accepting the realization as an independent sample. In this work, we
devise two methods for calculating N . They are both based on the binary
"time-series" denoting the occurrence/non-occurrence of edge (u, v) be-
tween vertices u and v in the Markov chain of graphs generated by the
sampler. They differ in their underlying assumptions. We test them on
the generation of graphs with a prescribed joint degree distribution. We
find the N ∝ E, where E is the number of edges in the graph. The two
methods are compared by sampling on real, sparse graphs with 103− 104
vertices.
Keywords: graph generation, Markov chain Monte Carlo, independent
samples
1
Introduction
Markov chain Monte Carlo (MCMC) methods are a common means of generat-
ing realizations of graphs which share similar characteristics since they require
nothing more than a procedure that can generate a new graph by "rewiring"
the edges of an existing graph. Much of their use to date has been in gener-
ating graphs with a prescribed degree distribution [1,2,3,4]. Other efforts have
(cid:63) This work was funded by the Applied Mathematics Program at the U.S. Depart-
ment of Energy and performed at Sandia National Laboratories, a multiprogram
laboratory operated by Sandia Corporation, a wholly owned subsidiary of Lockheed
Martin Corporation, for the United States Department of Energy's National Nuclear
Security Administration under contract DE-AC04-94AL85000.
Submitted to the 9th Workshop on Algorithms and Models for the Web Graph,
WAW-2012, June 22-23, 2012, Dalhousie University, Halifax, Nova Scotia, Canada.
SAND2012-1169C
2
used MCMC to generate graphs with a prescribed joint degree distribution [5].
MCMC methods require a graph to start the chain; thereafter, the "rewiring"
procedure generates new, realizations which preserve certain graph character-
istics. The specific characteristic(s) that are preserved depend entirely on the
"rewiring" procedure.
MCMC methods for generating graphs has two drawbacks. Initialization bias
arises from the fact that the starting graph may not even lie in the population
of graphs that we seek to sample, or may be an outlier in that population. The
second issue, autocorrelation in equilibrium, arises from the fact that successive
samples drawn by the MCMC sampler are correlated and an empirical distribu-
tion constructed from them would result in the statistical error (variance) to be
2τintlarger than the distribution constructed using independent samples. Here
τint, the integrated autocorrelation time, is a measure of how slowly correlation
in graphical metrics, calculated from an MCMC series, decays; see Sections 2
and 3 in Sokal's lecture notes [6].
Sokal's method [6] for deciding the "sufficiency" of samples obtained from
MCMC revolve around autocorrelation. The method is general, and was adapted
for use with graphs in [5]. Consider an edge (u, v) between labeled vertices u
and v in the ensemble of graphs generated by the MCMC chain. Denoting its
occurrence/non-occurrence in the chain of graphs by 1/0 gives us a binary time-
series {Zt}, t = 1 . . . T , with an empirical mean µ. The auto-correlation, with lag
l, is given by C(l) = ({Zt} − µ)({Zt+l} − µ), t = 1 . . . T − l and the normalized
version of it, ρ(l) = C(l)/C(0) can be used to gauge whether the autocorrelation
in the time-series is observed to be decreasing. In [5], the authors used this metric,
applied to all edges in the graphs that were sampled, to ensure that their MCMC
chain was mixed. One can also set, loosely speaking (for details, consult [6]), a
minimum threshold ρmin, identify the corresponding lag lmin, and retain every
lth
min entry in the MCMC chain to serve as independent samples. However, this
method has two practical drawbacks. First the autocorrelation analysis has to
be performed for all the edges (potentially, V 2 in number) that might appear
in the MCMC chain, which quickly becomes prohibitively expensive for large
graphs. Secondly, it requires a user input, ρmin, which may have an arbitrary
effect on graphical properties of the ensemble. These shortcomings motivate our
work.
In this paper, we propose two different methods for generating independent
graphs using an MCMC method. The first, which we call Method A or "multiple
short runs", determines the number of iterations N an MCMC method has to be
run to "forget" the initial graph and minimize the initialization bias. The second
approach, Method B or "one long run", requires K MCMC iterations. This long
run is thinned by a factor k (i.e., every kth MCMC iteration is preserved) to gen-
erate K/k independent samples. Both methods are intended to be approximate,
but simple to evaluate, so that they can be employed in practice to gauge the
"sufficiency" of MCMC iterations. The two methods for extracting independent
graphs are tested on an MCMC chain with the setup described in [5]. We explore
3
the practical impact of approximations in our methods. We restrict ourselves to
undirected graphs with labeled nodes.
In the next section (Sec. 2) we describe the procedure used to "rewire" a
graph to create a new graph realization with the same joint degree distribution.
In Sec. 3 we describe the two methods for generating independent samples. In
Sec. 4, we test the methods on real sparse graphs. We conclude in Sec. 5.
2 A Markov chain algorithm for sampling graphs with a
given joint degree distribution
Consider an undirected graph G = (V, E), where V = n and E = m. The
degree distribution of the graph is given by the vector f , where f (d) is the
number of vertices of degree d. The joint degree distribution list the number of
edges incident between vertices of specified degrees. Formally, the n × n matrix
J denotes the joint degree distribution, where the entry J(i, j) is the number of
edges between vertices of degree i and degree j. Stanton and Pinar [5] studied
the problem of generating and random sampling a graph with a given joint
degree distribution. They proposed a greedy algorithm to construct an instance
of a graph with a specified (feasible) degree distribution, as well as a Markov
chain algorithm to generate random samples of graphs with the same degree
distribution.
For the purposes of this paper, we will only focus on the Markov chain algo-
rithm. The rewiring operation that moves us between the nodes of the Markov
chain is depicted in Fig. 1. At the first step, one picks an edge (u1, v) at ran-
dom and thereafter, one of the end vertices, e.g., u1. We wish to break (u1, v)
and connect u1 and v to others without violating the prescribed joint degree
distribution. We, therefore, search for another edge (u2, w) where du2 = du1 or
dw = du1, where dp denotes the degree of node p. WLOG, let du2 = du1. Swap-
ping the edges i.e. creating edges (u1, w) and (u2, v) while destroying (u1, v)
and (u2, w) leaves the joint degree distribution unchanged while changing the
connectivity pattern of the graph. If the resulting graph is simple, the graph is
retained by the MCMC chain.
The procedure results in inter-edge correlation. A particular edge is chosen for
swapping, on average, once every E Markov chain iterations. In [5], this proce-
dure was used to generate graphs (of moderate sizes, with V ≤ 23, 000), using an
MCMC sampler. Autocorrelation analysis showed that the Markov chain mixes
and the autocorrelation decays with edge-dependent rates. Empirically it was
observed that an edge (u, v) de-correlated slowly if J(du, dv)/(f duf dv) ≈ 0.5.
Empirically, it was observed that the autocorrelations of the edges decreased
very sharply.
3 Methods for calculating independence
The algorithm in Sec. 2 has two variants - one where the resulting graph may
not be simple, and another where the graph was always simple (A graph is
4
Fig. 1. The swapping operation for the Markov chain algorithm.
simple if it does not have self-loops or parallel edges). For the first variant,
earlier work [1] implies that this chain has a polynomial mixing time. The second
variant is not even known to have any bounds on the mixing time. As discussed
in Sec. 1, one would like to provide a length to run the MCMC that, although not
guaranteeing complete mixing, at least gives some confidence that the sampled
graph is fairly "random." To that end, we will we will approximate the behavior
of a single edge by a Markov chain. We stress that we do not give a proof, but
only a mathematical argument justifying this. Below we present two methods
for generating independent graph samples.
3.1 Method A - "multiple short runs"
We refer to this method as Method A or the "multiple short runs" method.
We generate M graph samples by running M independent Markov chain for N
iterations before accepting the resulting graph. All the chains are run from the
same initial graph; however, the state in the random number generator in each
of the M MCMC chains are distinct.
Consider a fixed pair of labeled vertices {u, v}. We will approximate the
occurrence of an edge between (u, v) as a two state Markov chain. Note that this
is an approximation, since these transitions depend on the remaining graph if
J is to be preserved. Nonetheless, these dependencies appear to be weak. The
first coordinate of the matrix is state 0 (no edge) and the second coordinate is
1, indicating the existence of an edge. The transition matrix T for this chain is
(cid:18) 1 − αi,j αi,j
(cid:19)
Ti,j =
βi,j
1 − βi,j
,
(1)
where i = du and j = dv are the degrees of vertices u and v. αi,j and βi,j are
positive fractions and (αi,j + βi,j) ≤ 1. The eigenvalues of the transition matrix
are 1 and 1 − (αi,j + βi,j). Below, we construct a model for αi,j and βi,j.
Suppose the state is currently 0. The state will become 1 if the edge (u, v) is
swapped in. Let the two edges chosen by the algorithm be e and e(cid:48), in that order.
5
The edge (u, v) is swapped in if e contains u and e(cid:48) contains v (or vice versa).
Furthermore, the endpoint u must be chosen, and the other end of e(cid:48) must have
degree du. The probability that e contains u and u is chosen as an endpoint
is exactly du/2m. The probability we choose the edge e(cid:48) that is incident to v
depends on the number of neighbors of v whose degree is du. Clearly, this depends
on the graph structure (leading in a non-Markov probability of this transition).
We heuristically guess this number based on the joint degree distribution. The
number of edges from degree du to degree dv vertices is J(du, dv). Of these, the
average number of edges incident to a fixed vertex of degree dv is J(du, dv)/fv.
We shall approximate the number of edges incident to v with the other endpoint
of degree du by this quantity. The total probability is
du
2m
× J(du, dv)
mf (dv)
=
duJ(du, dv)
2m2f (dv)
The edge (u, v) is also swapped in when the reverse happens (so we choose v as
an endpoint, and an edge incident to u with the other endpoint of degree dv).
The total transition probability from 0 to 1 is approximated by
(cid:18) du
(cid:19)
αi,j =
duJ(du, dv)
2m2f (dv)
+
dvJ(du, dv)
2m2f (du)
=
J(du, dv)
2m2
f (dv)
+
dv
f (du)
(2)
We now address the transition from 1 to 0. Suppose (u, v) is currently an edge.
If the first edge e is chosen to be (u, v), then (u, v) will definitely be swapped
out. The probability of this is 1/m. If the random endpoint chosen has degree
du (and is not u), then we might choose e(cid:48) to be (u, v). The total probability of
this is
(f (du) − 1)du
2m
× 1
m
=
(f (du) − 1)du
2m2
The roles of u and v can also be reversed, so the total transition probability from
1 to 0 is
f (du)du + f (dv)dv − du − dv
and so
2m2
βi,j =
1
m
+
f (du)du + f (dv)dv − du − dv
2m2
(3)
We proceed to determining the number of iterations N to run the Markov
chain. We start the Markov chain M with an initial distribution v (which
is either (0, 1) or (1, 0)). M, which is represented by Ti,j (Eq. 1), is run for
N = ln(1/)/(α + β) iterations, > 0. We have dropped the subscripts i and j,
since it is implied that this model is being derived for an edge (u, v) with vertices
of degrees i and j. After N steps, we realize a 2-state distribution p = (p0, p1),
which is different from the stationary distribution be u = (u0, u1).
Denote the unit 2-norm eigenvectors of T, corresponding to the eigenvalues 1
and 1−(α+β), as e1 and e2. The initial state can be expressed as v = c1e1+c2e2.
After N applications of the transition matrix we get
p = TN v = c1TN e1 + c2TN e2 = c1e1 + c2 (1 − (α + β))N e2.
6
Since (1−{α+β}) < 1, the second term decays with N and c1e1 is the stationary
distribution. We can bound the decaying term as
(cid:107)(1 − (α + β))N c2e2(cid:107)2 = (1 − (α + β))ln(1/)/(α+β)c2(cid:107)e2(cid:107)2 ≤ exp(− ln(1/)) =
Hence, (cid:107)p − u(cid:107)2 ≤ , and so each pi − ui is at most . Further, from Eq. 2 and
3, we see that α + β ≥ 1/m (to leading order) and consequently
(cid:18) 1
(cid:19)
.
(4)
N =
ln(1/)
α + β
≤ m ln(1/) = E ln
3.2 Method B - "one long run"
We propose a second method, which we refer to as Method B or "one long run",
for generating independent graphs. The procedure involves running a Markov
chain for a large number of steps K and thinning it by a factor k i.e., preserving
every kth instance of the chain. Comparing with the development in Sec. 3.1, we
expect k ∼ N .
Similar to Method A (Sec. 3.1), this method too begins with the binary
time-series of edge occurrence {Zt}. As observed in [5], the autocorrelation in
{Zt} decays for all edges. Consequently it is possible to successively thin the
chain {Zt} (i.e., retain every kth element to obtain {Z k
t }, the k−thinned chain)
and compare the likelihoods that the chains were generated by (1) independent
sampling or (2) by a first-order Markov process. When sufficiently thinned, the
independent sampling model is expected to fit the data better. Using this as
the stopping criterion removes an ambiguity (user-specified tolerances). We will
employ a method based on comparison of log-likelihoods of model fit. We de-
rive these expressions below. While this technique has been applied in other
domains [7,8], but this paper is the first application of this technique to graphs.
t }. We count the number, xij, of the (i, j), i, j ∈ (0, 1)
transitions in it. xij are used to populate X, a 2× 2 contingency table. Dividing
t }. Let (cid:99)pij and (cid:99)xij =
each entry by the length of thinned chain K/k− 1 provides us with the empirical
(K/k − 1)(cid:99)pij be the predictions of the probabilities and expected values of the
probabilities pij of observing an (i, j) transition in {Z k
Consider the chain {Z k
table entries provided by a model. In such a case, the goodness-of-fit of the model
is provided by a likelihood ratio statistic (called the G2-statistic; Chapter 4.2
in [9]) and a Bayesian Information Criterion (BIC) score
xij log
,
BIC = G2 + n log
− 1,
(5)
i=1(cid:88)
i=1(cid:88)
i=0
i=0
G2 = −2
(cid:19)
(cid:18)(cid:99)xij
xij
(cid:19)
(cid:18) K
k
where n is the number of parameters in the model used to fit the table data.
Typically log-linear models are used for the purpose (Chapter 2.2.3 in [9]); the
log-linear models for table entries generated by independent sampling and a
first-order Markov process are
1,(i) + u(I)
2,(j) and log(p(M )
ij ) = u(I) + u(I)
) = u(M ) + u(M )
1,(i) + u(M )
2,(j) + u(M )
log(p(I)
ij
12,(ij),
(6)
where superscripts I, M indicate an independent and Markov process respec-
tively. The maximum likelihood estimates (MLE) of the model parameters (u(W )
b,(c))
are available in closed form (Chapter 3.1.1 in [9]). They lead to the model pre-
dictions below
(cid:99)xI
ij =
(xi+)(x+j)
x++
and (cid:100)xM
ij = xij,
7
(7)
where xi+ and x+j are the sums of the table entries in row i and column j
respectively. x++ is the sum of all entries (i.e., K/k−1, the number of transitions
observed in {Z k
t }, or the total number of data points). We compare the fits of
the two models thus:
i=1(cid:88)
i=1(cid:88)
i=0
i=0
xij log
(cid:100)x(I)
ij
xij
− log
(cid:18) K
k
(cid:19)
− 1
. (8)
∆BIC = BIC (I) − BIC (M ) = −2
Above, we have substituted (cid:100)x(M )
ij = xij and the fact that the log-linear model
for a Markov process has one more parameter than the independent sampler
model. Large BIC values indicate a bad fit. A negative ∆BIC indicates that an
independent model fits better than a Markov model.
The procedure for identifying a suitable thinning factor k then reduces to
t } till ∆BIC in Eq. 8 becomes negative. We search
progressively thinning {Z k
for k in powers of 2. The value of k so obtained varies between edges and con-
servatively, we take the largest k, k∗. However, this may be too conservative, i.e,
k∗ (cid:29) N , if a few edges are seen to display a slow autocorrelation decay. If we
are interested in certain global metrics for graph e.g., maximum eigenvalue etc,
a few correlated edges are unlikely to have any substantial effect. Thus, one may
be able to thin with a k ∼ N (cid:28) k∗. We will test this empirically in Sec. 4.
4 Tests with real graphs
In this section we first explore the impact of (as defined in Sec. 3.1) on the
ensemble of graphs generated by a Markov chain, and choose a for further use.
Thereafter we compare the graphs generated by the Methods A and B (Sec. 3.1
and Sec. 3.2) and gauge the impact of choosing a thinning factor k < k∗. All
tests are done with four real networks - the neural network of C. Elegans [10]
(referred to as "C. Elegans"), the power grid of the Western states of US [10]
(called "Power"), co-authorship graph of network science researchers [11] (re-
ferred to as "Netscience") and a 75,000 vertex graph of the social network at
Epinions.com [12] ("Epinions"). Their details are in Table 1. The first three were
obtained from [13] while the fourth was downloaded from [14]. All the graphs
were converted to undirected graphs by symmetrizing the edges.
We start the Markov chain using the real networks listed in Table 1. When
comparing ensembles of graphs, we will use the (distributions of) global cluster-
ing coefficient, number of triangles in the graphs, the graph diameter and the
maximum eigenvalue as metrics.
8
Table 1. Characteristics of the graphs used in this paper. (V ,E) are the numbers
of vertices and edges in the graph, N are the number of Markov chain steps used for
generating graphs in Sec. 3.1 and k is its equivalent obtained by the method in Sec. 3.2.
K/k∗ are the number of graph samples, obtained by thinning a long run, that were
used to generate distributions in the figures.
Graph name
(V ,E)
C. Elegans
Netscience
Power
Epinions
(297, 4296)
(1461, 5484)
(4941, 13188)
(75879, 405740)
N/E
10
10
10
30
k∗/E
13
49
13
720
K/k∗
3582
737
1214
various
In Fig. 2 we investigate the impact of in Method A ("many short runs").
We generate 1000 samples by running the Markov chain for 1E, 5E, 10E and
15E Markov chain iterations, corresponding to = 0.37, 6.7 × 10−3, 4.5 × 10−5
and 3.06× 10−7. In Fig. 2, we plot the distributions for the first three graphs (in
Table 1) and find that for all three, < 5.0 × 10−3 lead to distributions which
are very close. We will proceed with = 4.5× 10−5 i.e., when we use Method A,
we will mix the Markov chain 10E times before extracting a sample.
In Table 1 we see that Method B ("one long run") method often prescribes a
thinning factor that is larger than the one obtained using Method A ("multiple
short runs"). This large number is often due to the lack of autocorrelation decay
in a few edges. We investigate whether such a lack has a significant impact on
the graphical metrics that we have chosen. In Fig. 3 we plot distributions of the
same metrics for the three graphs. The thinning factors are in Table 1. We see
that the distributions are close, i.e., the existence of a few edges whose time-
series are still correlated do not impact the metrics of choice. We have repeated
these tests with other metrics and the same result holds true.
We now address a large graph (Epinions). Since potentially V 2 distinct
edges might be realized during a Markov chain, it is infeasible to calculate a
thinning factor for all the edges. Consequently, we perform the thinning analysis
for only 0.1E (40,574) edges, chosen randomly from all the distinct edges that
are realized by the Markov chain. In Fig. 4 we plot the distribution of k obtained
from the 40,574 sampled edges. We see that most of the k lie between 10E and
100E; edges with thinning factors outside that range are about two orders of
magnitude less abundant. It is quite conceivable that there are edges (which
were not captured by the sample) that would prescribe an even higher thinning
factor. In order to check whether these edges have a significant impact on the
distribution of graph metrics, we check their convergence as a function of the
thinning factor.
We generate separate ensembles of graphs. The reference ensemble is gener-
ated using Method A, with N = 30E. As seen in Table 1, certain edges will
9
Fig. 2. Plots of the distributions of the global clustering coefficient, the number of
triangles in the graphs, the graph diameter and the max eigenvalue of the graph Lapla-
cian for "Netscience" (left) and "Power" (right), evaluated after 1E, 5E, 10E and
15E iterations of the Markov chain (green, blue, black and red lines respectively).
The corresponding values of are in the legend. We see that the distributions converge
at < 1.0−5.
still be correlated (N = 720E would make them independent). We then use
Method B to generate graph ensembles with thinning factors k/E < 720 which
are also multiples of N . In Fig. 4 (right), the diameter distribution obtained with
Method A is compared to that obtained with Method B. While the distributions
are very similar, they do display some small differences. This is surprising since
N = 30E indicates a minuscule . In addition, distributions obtained with
k = 5N, 9N, and 13N show some differences between themselves, indicating
that the edges that have not become independent have a small, but measurable
impact on the graph diameter. Further, the distributions using smaller values of
k are marginally wider (have a larger variance), indicating that they were con-
structed using samples which were not completely independent. However, the
differences are minute, and for practical purposes the graph ensemble generated
using Method A with N = 30E is identical to the one generated using Method
B, per our chosen metrics. Consequently, despite its approximations, the results
0.120.140.160.180.20200400Global clustering coefficientDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−780090010001100120000.05Number of trianglesDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−702040608000.10.2DiameterDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−716.51717.501020Max. EigenvalueDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−70.0050.010.0150.0205001000Global clustering coefficientDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−702040608010000.10.2Number of trianglesDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−710203040506000.10.2DiameterDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−74.555.560510Max. EigenvalueDensity ε = 0.37ε = 6.7e−3ε = 4.5e−5ε = 3.1e−710
Fig. 3. Comparison of the distributions of the global clustering coefficient, the number
of triangles in the graphs, the graph diameter and the max eigenvalue of the graph
Laplacian for "C. Elegans" (left), "Netscience" (middle) and "Power" (right), evalu-
ated using Methods A ("many short runs") and B ("one long run"). We see that the
distributions are very similar. The kernel density estimation used to generate the dis-
tributions sometimes causes nonsensical artifacts e.g., a small, but negative clustering
coefficient. For Method A, the Markov chain was run for 10E iterations. Thinning
factors for Method B are in Table 1.
in Sec. 3.1 furnish a workable estimate of N , if one uses < 10−5. Further, k∗
is generally too conservative if our aim is to obtain "converged" distributions of
certain graph metrics. This arises from a few edges that de-correlate slowly, but
have little effect on global graphical metrics due to their rarity.
5 Conclusions
We have developed a method that allows one to generate a set of independent
realizations of graphs with a prescribed joint degree distribution. The graphs are
generated using an MCMC approach, employing the algorithm described in [5]
as the "rewiring" mechanism. The graphs so generated are tightly correlated;
our two methods address the question of how one can decorrelate the chain.
0.090.10.110.120100200300Global clustering coefficientDensity Method AMethod B170018001900200000.0050.010.015Number of trianglesDensity Method AMethod B246800.51DiameterFraction Method AMethod B23.323.423.523.623.7051015Max. eigenvalueDensity Method AMethod B0.130.140.150.160.170100200Global clustering coefficientDensity Method AMethod B700800900100000.010.020.03Number of trianglesDensity Method AMethod B020406000.10.2DiameterFraction Method AMethod B16.616.716.816.91701020Max. eigenvalueDensity Method AMethod B0123x 10−305001000Global clustering coefficientDensity Method AMethod B−100102000.10.2Number of trianglesDensity Method AMethod B102030405000.10.2DiameterFraction Method AMethod B4.555.50510Max. eigenvalueDensity Method AMethod B11
Fig. 4. Left: The normalized thinning factor k/E for the Epinions graph, as calcu-
lated for the 40,574 sampled edges. We see that the most thinning factors are lie in
(10E, 100E). Right: Plot of the graph diameter and distribution generated using
Method A (with N = 30E) and Method B (with k equal to various multiples of N ).
We see that the distributions are very similar.
The first method, variously called Method A or "multiple short chains",
involves running the Markov chain for N steps before extracting a graph real-
ization; the Markov chain is run repeatedly to generate samples. We developed
a model (and a closed-form expression) to estimate N that allows the Markov
chain to converge to its stationary distribution before a graph realization is ex-
tracted from it. This model assumes that edges are independent. In reality, their
behavior is correlated, which leads us to incur small errors.
The second method, variously called Method B or "one long chain", is a
data driven method. It uses the time-series of the occurence/non-occurence of
edges in an MCMC run. It does not assume a constant joint degree distribution.
It progressively thins the time-series (by retaining every kth element) and fits a
first-order Markov and an independent sampling model to the data. The thinning
process stops when the independent model has a higher likelihood (strictly, a
lower BIC score) than the Markov process. Since this method is data-driven and
does not require any user-defined tolerances, we use it to validate Method A.
The method is not new, but does not seem to have been used in the generation
of independent graphs.
Comparing the two methods, we find that for practical purposes, the ensem-
bles generated using Method A are statistically similar to those obtained with
Method B, as gauged by a set of graph metrics. Even at tight tolerance values,
a small number of edges in the graphs generated by Method A remain corre-
lated, and the metrics' distributions are slightly wider. This problem is very
small (nearly unmeasureable) in small graphs, but becomes measureable, but
still small, for large graphs.
While this work enables the generation of independent graphs, including
large ones, it poses a number of questions for further investigation. For example,
0100200300400500600700800100101102103104105Normalized thinning factor k/EFrequency5101520253000.020.040.060.080.10.120.140.160.180.2DiameterDensity Method A; N = 30EMethod B; k = 5NMethod B; k = 9NMethod B; k = 13N12
being able to estimate or bound the difference in the distributions generated by
Methods A and B would be helpful. Further, an intelligent way of identifying
hard-to-decorrelate edges would reduce the computational burden of checking
for the stopping criterion using Method B; currently, we simply use a random
set of edges. Finally, it would be interesting if Method A could be extended to
the generation of independent graphs when some graph property, other than the
joint degree distribution, is held constant. This is currently being studied.
References
1. Kannan, R., Tetali, P., Vempala, S.: Simple Markov-chain algorithms for generating
bipartite graphs and tournaments. Random Struct. Algorithms 14(4) (1999) 293 --
308
2. Jerrum, M., Sinclair, A.: Fast uniform generation of regular graphs. Theor. Com-
put. Sci. 73(1) (1990) 91 -- 100
3. Jerrum, M., Sinclair, A., Vigoda, E.: A polynomial-time approximation algorithm
for the permanent of a matrix with nonnegative entries. J. ACM 51(4) (2004)
671 -- 697
4. Gkantsidis, C., Mihail, M., Zegura, E.W.: The Markov chain simulation method
for generating connected power law random graphs. ALENEX (2003) 16 -- 25
5. Stanton, I., Pinar, A.: Constructing and sampling graphs with a prescribed joint
degree distribution using markov chains. ACM Journal of Experimental Algorith-
mics to appear.
6. Sokal, A.: Monte Carlo methods in statistical mechanics: Foundations and new
algorithms (1996)
7. Raftery, A., Lewis, S.M.: Implementing MCMC. In Gilks, W.R., Richardson, S.,
Spiegelhalter, D.J., eds.: Markov Chain Monte Carlo in Practice. Chapman and
Hall (1996) 115 -- 130
8. Raftery, A.E., Lewis, S.M.: How many iterations in the Gibbs sampler?
In
Bernardo, J.M., Berger, J.O., Dawid, A.P., Smith, A.F.M., eds.: Bayesian Statis-
tics. Volume 4., Oxford University Press (1992) 765 -- 766
9. Bishop, Y.M., Fienberg, S.E., Holland, P.W.: Discrete multivariate analysis: The-
ory and practice. Springer-Verlag, New York, NY (2007)
10. Watts, D.J., Strogatz, S.H.: Collective dynamics of 'small-world' networks. Nature
393 (1998) 440 -- 442
11. Newman, M.E.J.: Finding community structure in networks using the eigenvectors
of matrices, 036104. Phys. Rev. E 74 (2006)
12. Richardson, M., Agrawal, R., Domingos, P.: Trust management for the seman-
tic Web.
In Fensel, D., Sycara, K., Mylopoulos, J., eds.: The Semantic Web -
ISWC 2003. Volume 2870 of Lecture Notes in Computer Science. Springer Berlin
/ Heidelberg (2003) 351 -- 368 10.1007/978-3-540-39718-2 23.
13. Newman, M.E.J.: Prof. M. E. J. Newman's collection of graphs at University of
Michigan http://www-personal.umich.edu/ mejn/netdata/.
14. Stanford Network Analysis Platform Collection of Graphs:
The Epin-
ions social network from the Stanford Network Analysis Platform collection
http://snap.stanford.edu/data/soc-Epinions1.html.
|
1606.05209 | 1 | 1606 | 2016-06-16T14:45:51 | Cost Effective Campaigning in Social Networks | [
"cs.SI",
"physics.soc-ph"
] | Campaigners are increasingly using online social networking platforms for promoting products, ideas and information. A popular method of promoting a product or even an idea is incentivizing individuals to evangelize the idea vigorously by providing them with referral rewards in the form of discounts, cash backs, or social recognition. Due to budget constraints on scarce resources such as money and manpower, it may not be possible to provide incentives for the entire population, and hence incentives need to be allocated judiciously to appropriate individuals for ensuring the highest possible outreach size. We aim to do the same by formulating and solving an optimization problem using percolation theory. In particular, we compute the set of individuals that are provided incentives for minimizing the expected cost while ensuring a given outreach size. We also solve the problem of computing the set of individuals to be incentivized for maximizing the outreach size for given cost budget. The optimization problem turns out to be non trivial; it involves quantities that need to be computed by numerically solving a fixed point equation. Our primary contribution is, that for a fairly general cost structure, we show that the optimization problems can be solved by solving a simple linear program. We believe that our approach of using percolation theory to formulate an optimization problem is the first of its kind. | cs.SI | cs |
Cost Effective Campaigning in Social Networks
Bhushan Kotnis∗and Joy Kuri†
September 12, 2018
Abstract
Campaigners are increasingly using online social networking platforms
for promoting products, ideas and information. A popular method of pro-
moting a product or even an idea is incentivizing individuals to evangelize
the idea vigorously by providing them with referral rewards in the form of
discounts, cash backs, or social recognition. Due to budget constraints on
scarce resources such as money and manpower, it may not be possible to
provide incentives for the entire population, and hence incentives need to
be allocated judiciously to appropriate individuals for ensuring the high-
est possible outreach size. We aim to do the same by formulating and
solving an optimization problem using percolation theory. In particular,
we compute the set of individuals that are provided incentives for mini-
mizing the expected cost while ensuring a given outreach size. We also
solve the problem of computing the set of individuals to be incentivized
for maximizing the outreach size for given cost budget. The optimization
problem turns out to be non trivial; it involves quantities that need to
be computed by numerically solving a fixed point equation. Our primary
contribution is, that for a fairly general cost structure, we show that the
optimization problems can be solved by solving a simple linear program.
We believe that our approach of using percolation theory to formulate an
optimization problem is the first of its kind.
1
Introduction
Online social networking platforms are being increasingly used by campaigners,
activists and marketing managers for promoting ideas, brands and products. In
particular, the ability to recommend news articles [1], videos, and even products
[2] by friends and acquaintances through online social networking platforms is
being increasingly recognized by marketing gurus as well as political campaign-
ers and activists. Influencing the spread of content through social media enables
campaigners to mold the opinions of a large group of individuals. In most cases,
campaigners and advertisers aim to spread their message to as many individ-
uals as possible while respecting budget constraints. This calls for a judicious
∗Indian Institute of Science, [email protected]
†Indian Institute of Science
1
allocation of limited resources, like money and manpower, for ensuring highest
possible outreach, i.e., the proportion of individuals who receive the message.
Individuals share information with other individuals in their social network
using Twitter tweets, Facebook posts or simply face to face meetings. These
individuals may in turn pass the same to their friends and so on, leading to
an information epidemic. However, individuals may also become bored or dis-
illusioned with the message over time and decide to stop spreading it. Past
research suggests that such social effects may lead to opinion polarization in so-
cial systems [3]. This can be exploited by a campaigner who desires to influence
such spreading or opinion formation by incentivizing individuals to evangelize
more vigorously by providing them with referral rewards in the form of dis-
counts, cash back or other attractive offers. Due to budget constraints, it may
not be feasible to incentivize all, or even a majority of the population. Indi-
viduals have varying amount of influence over others, e.g., ordinary individuals
may have social connections extending to only close family and friends, while
others may have a large number of social connections which can enable them to
influence large groups [4]. Thus, it would seem that incentivizing highly influ-
ential individuals would be the obvious strategy. However, recruiting influential
people can be very costly, which may result in the campaigner running out of
funds after recruiting just a handful of celebrities, which in turn may result in
suboptimal outreach size.
A resource constrained campaigner, for a given cost budget, may want to
maximize the proportion of informed individuals, while other campaigners who
care more about campaign outreach than resource costs, may desire to minimize
costs for achieving a given number of informed individuals. We address both
the resource allocation challenges by formulating and solving two optimization
problems with the help of bond percolation theory.
A similar problem of preventing epidemics through vaccinations has received
a lot of attention [5 -- 9]. However, in these problems the cost of vaccination is
uniform for all individuals, and hence it is sufficient to calculate the minimum
number of vaccinations. Information diffusion can also be maximized by select-
ing an optimal set of seeds, i.e., individuals best suited to start an epidemic
[10 -- 12]. This is different from our strategy which involves incentivizing individ-
uals to spread the message. It is possible to address the problem posed here
using optimal control theory, which involves computing the optimal resource
allocation in real time for ensuring maximum possible outreach size by a give
deadline [13 -- 17]. However, the optimal control solution is not only difficult to
compute, but also very hard to implement as it requires a centralized real time
controller. Furthermore, recent work, [13 -- 17], on optimal campaigning in social
networks does not address the problem of minimizing the cost while gurantering
an outreach size. Our formulation allows us to solve both the problems.
Our model assumes two types of individuals viz.
the 'ordinary' and the
'selected', and they are connected to one another through a social network. Be-
fore the campaign starts, the selected individuals are incentivized to spread the
message more vigorously than the ordinary. We use the Susceptible Infected
Recovered (SIR) model for modeling the information epidemic. For a given set
2
of selected individuals, we first calculate the size of the information outbreak us-
ing network percolation theory, and then find the set of selected nodes which, 1.
minimizes the cost for achieving a given proportion of informed individuals, and
2. maximize the fraction of informed individual for a given cost budget. We be-
lieve that our approach of using percolation theory to formulate an optimization
problem is the first of its kind.
The detailed model description can be found in Sec. 2, percolation analysis
in Sec. 3, the problem formulation in Sec. 4, numerical results in Sec. 5, and
finally conclusions are discussed in Sec. 6.
2 Model
We divide the total population of N individuals in two types: the ordinary
(type 1) and the selected (type 2). Before the campaign starts selected individ-
uals are provided incentives to spread the information more vigorously. These
individuals are connected with one another through a social network, which
is represented by an undirected graph (network). Nodes represent individuals
while a link embodies the communication pathways between individuals.
Let P (k) be the degree distribution of the social network. For analytical
tractability, we assume that the network is uncorrelated [18]. We generate an
uncorrelated network using the configuration model [19]. A sequence of N inte-
gers, called the degree sequence, is obtained by sampling the degree distribution.
Thus each node is associated with an integer which is assumed to be the num-
ber of half edges or stubs associated with the node. Assuming that the total
number of stubs is even, each stub is chosen at random and joined with another
randomly selected stub. The process continues until all stubs are exhausted.
Self loops and multiple edges are possible, but the number of such self loops
and multiple edges goes to zero as N → ∞ with high probability. We assume
that N is large but finite. Let φ(k) be the proportion of individuals with k
degrees that are provided incentives for vigorously spreading the message, i.e.,
proportion of nodes with degree k that are type 2 nodes. The goal is to find the
optimum φ(k) for maximizing the epidemic size (or minimizing the cost). The
actual individuals can be identified by sampling from a population of individuals
with degree k with probability φ(k).
We assume that the information campaign starts with a randomly chosen
individual, who may pass the information to her neighbors, who in turn may
pass the same to their neighbors and so on. However, as the initial enthusi-
asm wanes, individuals may start loosing interest in spreading the information
message. This is similar to the diffusion of infectious diseases in a population
of susceptible individuals. Since, we account for individuals loosing interest in
spreading the message, we use a continuous time SIR process to model the in-
formation diffusion. The entire population can be divided into three classes,
those who haven't heard the message (susceptible class), those who have heard
it and are actively spreading it (infected class) and those who have heard the
message but have stopped spreading it (recovered class).
3
Let β1 be the rate of information spread for an ordinary node (Type 1), while
β2 for a selected node (Type 2). In other words, the probability that a type
i individual 'infects' her susceptible neighbors in small time dt is βidt + o(dt).
Note that this is independent of the type of the susceptible node. Let µi be
the rate at which type i infected individuals move to the recovered state. The
larger the µi the lesser the time an individual spends in spreading the message.
Since type 2 individuals are incentivized to spread information more vigorously,
β2 > β1 and µ2 < µ1. Let Ti be the probability that a type i infected node
infects its susceptible neighbors (any type) before it recovers (i ∈ {0, 1}). It
can be easily shown that Ti = βi
, see [20]. Therefore, T2 > T1. Ti can be
interpreted as the probability that a link connecting type i infected node to any
susceptible node is occupied. We refer to such links as type i links and Ti the
occupation probability for link of type i. This mapping allows us to apply bond
percolation theory for obtaining the size of the information epidemic [21].
βi+µi
3 Analysis
We first aim to calculate the proportion of individuals who have received the
message, or in other words, the proportion of recovered individuals at t → ∞.
Let P (k(cid:48) k) be the probability of encountering a node of degree k(cid:48) by traversing
a randomly chosen link from a node of degree k. In other words, P (k(cid:48) k) is
the probability that a node with degree k has a neighbor with degree k(cid:48). For a
network generated by configuration model, P (k(cid:48) k) = k(cid:48)P (k(cid:48))
[21], where (cid:104)ki(cid:105)
(cid:104)k(cid:105)
is the ith moment of P (k).
Let q be the probability of encountering a type 2 node by traversing a ran-
domly chosen link from a node of degree k. Therefore, q =
P r(Neighboring
node is type 2 neighboring node has degree k(cid:48)) · P r(Neighboring node has
degree k(cid:48) original node has degree k).
k(cid:48)=1
∞(cid:80)
∞(cid:88)
k=1
q =
1
(cid:104)k(cid:105)
∞(cid:80)
kφ(k)P (k)
The probability that a randomly chosen node has k1 type 1 and k2 type 2
neighbors = P (k1, k2) =
P r(k1, k2 node has degree k)P (k).
k:k=k1+k2
For a large N , the event that a given node has degree k, can be approximated
to be independent of the event that another node, having a common neighbor
with the given node, has degree k(cid:48). This is true since the degree sequence is
generated by independent samples from the distribution, and for a large N the
effect of sampling without replacement is negligible. The probability that a
node is selected (type 2), is a function of its degree, hence the event that a node
is type 1 (or 2) is independent of the event that any other node is type 1 (or 2).
4
Generating function Distribution
G(u1, u2)
F (u1, u2)
G(u1, u2)
F (u1, u2)
Hi(u1, u2)
P (k1, k2)
Q(k1, k2)
P (k1, k2)
Q(k1, k2)
Proportion of type 1 and type 2 nodes,
who have received the message, in a component
reached from a type i link.
No. of type 1 and type 2 nodes
who have received the message, in a component
reached from a node i.
No. of type 1 and type 2 nodes
who have received the message, in a component
reached from a randomly chosen node.
Ji(u1, u2)
J(u1, u2)
Table 1: List of probability generating functions.
This allows us to write:
P (k1, k2) =
(cid:18)k1 + k2
k2
(cid:19)
qk2 (1 − q)k1P (k1 + k2)
Let Q(k) be the excess degree distribution, i.e., the degree distribution of a node
arrived at by following a randomly chosen link without counting that link. For
the configuration model Q(k) = (k + 1)P (k + 1)/ < k >. Let Q(k1, k2) be the
excess degree distribution for connections to type 1 and type 2 nodes.
(cid:18)k1 + k2
(cid:19)
k2
Q(k1, k2) =
qk2 (1 − q)k1Q(k1 + k2)
Let P (k1, k2) and Q(k1, k2) be the distribution and the excess distribution of
the number of type 1 and type 2 neighbors that have received the information
message. In other words the distribution and the excess distribution of type i
occupied links.
∞(cid:88)
∞(cid:88)
∞(cid:88)
∞(cid:88)
k1=k1
k2=k2
P (k1, k2)
Q(k1, k2)
k1=k1
k2=k2
i=1
(cid:32)
(cid:32)
2(cid:89)
2(cid:89)
i=1
(cid:33)
(cid:33)
ki
ki
ki
ki
ki
i (1 − Ti)ki−ki
T
ki
i (1 − Ti)ki−ki
T
P (k1, k2) =
Q(k1, k2) =
The probability generating functions for the distributions used in the analysis
above are listed in Table 1. For example G(u1, u2) is given by :
G(u1, u2) =
uk1
1 uk2
2 P (k1, k2)
∞(cid:88)
k1,k2=0
5
Figure 1: (Color Online) Illustration of components. The red boxes represent
the components reached by type 1 link while green boxes represent components
reached by a type 2 link. A type 2 node is represented by a green circle while
a red circle represents a type 1 node.
Now, G(u1, u2) is given by
∞(cid:88)
∞(cid:88)
k1,k2
=
k1
u
1 u
k2
2
(cid:88)
(cid:88)
P (k1, k2)
k1=k1
k2=k2
(cid:18)ki
ki
2(cid:89)
i=1
(cid:19)
ki
i (1 − Ti)ki−ki
T
(1 + (u1 − 1)T1)k1 (1 + (u2 − 1)T2)k2P (k1, k2)
k1,k2
= G (1 + (u1 − 1)T1, 1 + (u2 − 1)T2)
Similarly, F (u1, u2) = F (1 + (u1 − 1)T1, 1 + (u2 − 1)T2)
A component is a small cluster of nodes that have received the information
message. By small we mean that the cluster is finite and does not scale with the
network size. However, at the phase transition, the average size of the cluster
diverges (as N → ∞). An information epidemic outbreak is possible only when
the average size of the cluster diverges. In this regime the component is termed
as a giant connected component (GCC) and it grows with the network size. Let
Hi(u1, u2) be the generating function of the distribution of the number of type
1 and type 2 nodes in a component arrived at from a type i link. Let Ji(u1, u2)
and J(u1, u2) be the generating functions of the distribution of the number of
type 1 and type 2 nodes in a component arrived at from node i and a randomly
chosen node, respectively.
Let random variable Yi be the number of type 1 and 2 nodes, that have
received the message, in a component arrived at from a type i link. The proba-
bility of encountering closed loops in finite cluster is O(N−1) [20] which can be
neglected for large N . The tree like structure of the cluster allows us to write
the size of the component encountered by traversing the link, as the sum of the
size of components encountered after traversing the links emanating from the
node at the end of the initial link. This is illustrated in Fig. 1. Hence, Yi can
6
be written as:
Yi = 1 + K1Y1 + K2Y2
where random variable Ki is the number of type i neighbors of the end node
of type i link that have received the message; the arrival link is not counted
(excess degree). Since, the size of the components along different links are
mutually independent (absence of loops) we can write the above equation in
terms of probability generating functions.
Hi(u1, u2) = ui H1(u1, u2) K1 H2(u1, u2) K2
= ui
H k1
1 (u1, u2) H k2
2 (u1, u2) Q(k1, k2)
k1,k2
= ui F ( H1(u1, u2), H2(u1, u2))
∞(cid:88)
∞(cid:88)
Which can also be written as
(cid:16)
Hi(u1, u2) = uiF
1 + ( H1(u1, u2) − 1)T1, 1 + ( H2(u1, u2) − 1)T2
(cid:17)
(1)
Similarly, J(u1, u2) can be expressed as :
Ji(u1, u2) = ui
H k1
1 (u1, u2) H k2
2 (u1, u2) P (k1, k2)
k1,k2
= ui G( H1(u1, u2), H2(u1, u2))
J(u1, u2) = (1 − p) J1(u1, u2) + p J2(u1, u2)
where p is the probability of choosing a type 2 node, p =
∞(cid:80)
P (k)φ(k). The
following theorem describes the phase transition conditions required for an out-
break and the size of the such an outbreak. The proof can be found in A.
k=1
Theorem 1. The condition required for a small cluster to become a giant con-
nected component is given by: ν ≥ 1, where
∞(cid:88)
∞(cid:88)
ν = T1
k1Q(k1, k2) + T2
k2Q(k1, k2)
k1,k2
k1,k2
and the proportion of nodes in the giant connected component (size of GCC) is
given by 1 − ψ,
ψ =
(1 + (u∗ − 1)T1)k1(1 + (u∗ − 1)T2)k2 P (k1, k2)
∞(cid:88)
k1,k2
7
where u∗ is the solution of the fixed point equation
∞(cid:88)
u =
(1 + (u − 1)T1)k1 (1 + (u − 1)T2)k2 Q(k1, k2)
k1,k2
The size of the information epidemic outbreak can now be used for formu-
lating the optimization problem.
4 Problem Formulation
Providing incentives in the form of referral rewards for low degree nodes, or
sponsorship offers for celebrities (high degree nodes) is costly. Since, the cost is
a function of the degree let c(k) be the cost of providing incentivizing a node with
c(k)P r(node is selected node
degree k. The average cost, ¯c(φ), is given by
∞(cid:80)
has degree k)P (k) =
c(k)φ(k)P (k). The proportion of type 2 individuals is
k=1
∞(cid:80)
∞(cid:80)
given by
k=1
φ(k)P (k).
k=1
We formulate two optimization problems, viz., one which minimizes cost
while enforcing a lower bound on the epidemic size, and the other which max-
imizes the epidemic size for a given cost budget. For both the problems, the
evaluation of the size of the epidemic requires one to numerically solve a fixed
point equation. Thus, there is no straightforward method to solve the opti-
mization problem such as the Karush Kuhn Tucker (KKT) conditions, because
evaluating the objective function requires one to solve a fixed point equation.
We show that this problem can be reduced to a linear program, which can then
be solved easily using any off the shelf LP solver.
4.1 Cost minimization problem
Providing guarantees on the minimum number of individuals who will be in-
formed about the campaign is appropriate for campaigns with large funding,
such as election campaigns where message penetration is more important than
the cost. The guarantee on epidemic size is written as a constraint to the op-
timization problem. The cost ¯c(φ) is minimized subject to 1 − ψ ≥ γ where
γ ∈ [0, 1] and φ is the control variable.
If γ = 0, the constraint becomes
ν ≤ 1, as γ = 0 implies ψ = 1 which is the same as ν ≤ 1. A finite amount of
money, may put a constraint on the number of type 2 individuals. The propor-
k=1 φ(k)P (k). This translates in to the
tion of type 2 individuals is given by(cid:80)∞
constraint : (cid:80)∞
k=1 φ(k)P (k) ≤ B, where budget B ∈ [0, 1].
The following theorem which is our principle contribution allows us to solve
a possible non convex problem by solving a linear program. The key insight is
that the probability of outbreak is monotonically decreasing in q, which then
allows one to write the optimization problem as a linear program. The intuition
8
behind this claim is that since q is the probability of finding a type 2 node on
a randomly chosen link, increase in q is equivalent to the increase in number of
type 2 individuals resulting in a higher epidemic size.
Theorem 2. If T2 > T1, then ψ ∈ (0, 1), is strictly decreasing with respect to q,
dq < 0 for all q ∈ [0, 1]. For the ψ = 0 case (ν ≥ 1), ν is strictly increasing
i.e, dψ
with respect to q, i.e, dν
dq > 0, ∀ q ∈ [0, 1], where q = 1(cid:104)k(cid:105)
kφ(k)P (k).
∞(cid:80)
k=1
Proof. The proof follows from Lemmas 4 and 5 detailed in Appendix B.
Since, dψ
dq < 0, the epidemic size constraint can be written as 1(cid:104)k(cid:105)
q∗, where ψ(q) q=q∗ = 1 − γ. The optimization problem can now be written as
follows:
k=1
∞(cid:80)
kφ(k)P (k) ≥
c(k)φ(k)P (k)
∞(cid:88)
k=1
minimize
φ
subject to:
∞(cid:88)
1
(cid:104)k(cid:105)
∞(cid:88)
k=1
φ(k)P (k) ≤ B
kφ(k)P (k) ≥ q∗
(2)
k=1
0 ≤ φ ≤ 1
The above problem is a linear program which can be solved by any off-the-shelf
LP solver.
The optimization problem described above may not be feasible for all values
of T1 and for all possible degree distributions. Assume, B = 1, the problem
becomes infeasible if 1 − ψ ≤ γ when T2 is at the maximum possible value, i.e.,
all individuals are incentivized and yet 1 − ψ ≤ γ.
4.2 Epidemic Size Maximization Problem
We now look at the problem of maximizing the information epidemic size (out-
reach) in a resource constrained scenario. More, specifically we study a scenario
where the cost budget is finite. Thus the outbreak size 1 − ψ must be maxi-
mized subject to a cost constraint. Since dψ
dq < 0, maximizing q is equivalent
to maximizing 1 − ψ. Thus the problem is equivalent to the following linear
9
program.
maximize
φ
∞(cid:88)
k=1
kφ(k)P (k)
subject to:
∞(cid:88)
∞(cid:88)
k=1
c(k)φ(k)P (k) ≤ C
φ(k)P (k) ≤ B
(3)
k=1
0 ≤ φ ≤ 1
The linear program can now be solved using any standard linear programing
solver. Note that constants T1, T2 do not play any role in problem (3), while
they do play a role in problem (2) because q∗ is a function of T1 and T2.
5 Numerical Results
As an illustration, we study the solution of the optimization problem for a linear
cost, i.e., c(k) = k. The higher the degree, the higher the cost. Note that even
if cost is non linear in k, the optimization problem remains a linear program.
In the real world, the cost may be different, but whatever the cost function, the
solution can be obtained by simply solving a linear program.
model technique with power law degree distribution (P (k) ∝ k−α), α = 2.5.
We used an uncorrelated random graph generated using the configuration
5.1 Cost Minimization Problem
We solved the cost minimization linear program using the 'linprog' MATLAB
solver; q∗ was computed numerically using the bisection method. In Fig. 2a,
we plot the solution φ for different values of T1. The solution shows that only
about 50% of high degree nodes need to be incetivized for T1 values ranging from
0.3 to 0.43. As T1 decreases from 0.47 to 0.3 , the proportion of high degree
nodes that are incentivized remain fairly constant (50%), while the proportion
of incentivized low degree nodes increase.
In Fig. 2b, we plot the optimal
proportion of individuals that need to be incentivized for achieving the given
outreach size.
5.2 Epidemic Size Maximization Problem
The solution, φ, is very similar to the one in problem (2), and hence we do
not show it here. In Fig. 3a, we plot the size of the epidemic for varying cost
budget C. As expected, the epidemic size increases with C because higher the
budget, the higher the proportion of incentivized individuals. However, at some
10
(a)
(b)
Figure 2: (Color Online) (a) Solution φ, for different values of T1; (b) Optimal
proportion of type 2 nodes required to meet outreach constraint. Parameters:
T2 = 0.6, B = 0.7, γ = 0.2.
(a)
(b)
Figure 3: (Color Online) (a) Size of the information epidemic for varying cost
budget (C). (b) Optimal proportion of type 2 nodes required to meet outreach
constraint as a function of cost budget (C). Parameters: T2 = 0.6, B = 0.7.
11
0510152000.10.20.30.40.50.60.7Degree (k)φ(k) T1 = 0.3T1 = 0.4T1 = 0.43T1 = 0.470.30.40.50.60.700.10.20.30.40.50.6T1Proportion of type 2 individuals.012345600.050.10.150.20.250.30.35Epidemic Size (1 − ψ)Cost Budget (C) units T1 = 0.1T1 = 0.25T1 = 0.4012345600.10.20.30.40.50.60.70.8Cost Budget (C) unitsProportion of type 2 individuals.point epidemic size saturates, this is because all nodes have been incentivized
and therefore nothing more can be done to increase the outreach size. This is
verified by Fig. 3b, the fraction of type 2 nodes hit 1, when C = 3.
6 Conclusion and Future Work
To summarize, we studied the problem of maximizing information spreading in
a social networks. More specifically, we considered a scenario where individuals
are incentivized to vigorously spread the campaign message to their neighbors,
and we proposed a mechanism to identify the individuals who should be ince-
tivized. Using bond percolation theory we calculated the size of the information
epidemic outbreak and the conditions for the occurrence of such outbreaks. We
then formulated an optimization problem for minimizing the expected cost of in-
centivizing individuals while providing guarantees on the information epidemic
size. Although the optimization problem could not be addressed using standard
analytical tools, Theorem 2 enabled us to compute the global optimum by solv-
ing a linear program. We believe that our approach of using percolation theory
to formulate an optimization problem is the first of its kind.
For the sake of analytical tractability we assumed an uncorrelated network,
however in reality real world social networks have positive degree-degree cor-
relations [22]. Such networks with positive degree associativity percolate more
easily compared to uncorrelated networks [23, 24]. Therefore, for the problem
of minimizing cost the given campaign size could be achieved with a slightly
lesser cost, while in the second problem, the theoretical optimal size would be
a lower bound and the actual campaign size would be slightly larger than the
theoretical. Apart from positive degree associativity, social networks are also
found to contain community structures [22]. The presence of communities may
slow down information spreading leading to a reduction in the campaign size.
This may happen as most links point inside the community rather than out-
side it, thus localizing the information spread [25]. However, if the network
contains high degree nodes that bridge different communities, then incetivizing
such nodes may substantially increase the campaign size. A similar finding was
reported in [26], where authors investigated usefulness of targeted vaccinations
on nodes that bridge communities.
Although SIR models are widely used to model epidemics, they have some
limitations. They fail to capture the fact that individuals may stop spreading
when they perceive that most of their neighbors already known the information.
This is captured by the Maki-Thompson model [27] which forces the recovery
rate to be an increasing function of the number of informed individuals she
contacts. Thus the recovery rate for an infected node is a function of her degree.
An SIR process has a fixed recovery rate and hence the current results would
approximately hold for an Maki Thompson process on Erdos-Renyi networks,
where every node on average has the same degree. However, our results for SIR
may not generalize for the Maki Thompson spread model on scale free networks.
High degree nodes may have a higher chance of being connected to informed
12
individuals which may lead them to stop spreading to other uninformed nodes.
An interesting extension to this problem, which was suggested by the anony-
mous referee, is to compute a targeted incentivization strategy for two interact-
ing campaigns. For example, the campaigner may want to maximize campaign
A given that campaign B, which has either run its course or is simultaneously
running along with A, either reinforces or hinders campaign A. This is an
important problem since such interacting campaigns are often observed during
parliamentary or presidential elections. Although the current results may not
shed much light on such questions, we believe that they lay the foundation for
investigating such problems which we hope to address in the future.
A Proof of Theorem 3.1
Proof. Let (cid:104)s1(cid:105) and (cid:104)s2(cid:105) be the average number of type 1 and type 2 nodes in
the component. The expected number of nodes in the component, < s >, is
given by:
(cid:104)s(cid:105) = (cid:104)s1(cid:105) + (cid:104)s2(cid:105)
=
∂
∂u1
J(u1, u2)
+
∂
∂u2
J(u1, u2)
(cid:12)(cid:12)(cid:12)(cid:12)u=1
(cid:12)(cid:12)(cid:12)(cid:12)u=1
After differentiating and simplifying, (cid:104)s1(cid:105) can be written as:
where (cid:104)ki(cid:105) =
∞(cid:80)
k1,k2
(cid:104)s1(cid:105) = (1 − p) + (cid:104)k1(cid:105) H
(cid:48)
1(1, 1) + (cid:104)k2(cid:105) H
(cid:48)
2(1, 1)
ki P (k1, k2) and
H
(cid:48)
i (1, 1) =
∂
∂u1
Hi(u1, u2)
(cid:12)(cid:12)(cid:12)(cid:12)u=1
H
(cid:48)
i (1, 1) can be obtained by differentiating equation (1).
(cid:48)
2(1, 1)
H
H
(cid:48)
1(1, 1) = 1 + T1
(cid:48)
¯k1 H
2(1, 1) = T1
¯k1 H
(cid:48)
1(1, 1) + T2
(cid:48)
1(1, 1) + T2
¯k2 H
¯k2 H
(cid:48)
2(1, 1)
∞(cid:80)
where ¯ki =
kiQ(k1, k2). Solving the two simultaneous equations we ob-
k1,k2
(cid:48)
1(1, 1) =
1−T2 ¯k2
tain H
1−T1 ¯k1−T2 ¯k2
expression for (cid:104)s1(cid:105) we get.
and H
(cid:48)
2(1, 1) =
T1 ¯k1
1−T1 ¯k1−T2 ¯k2
. Substituting in the
(cid:104)s1(cid:105) = (1 − p) +
(cid:104)k1(cid:105)(1 − T2
1 − T1
¯k2) + (cid:104)k2(cid:105)T1
¯k1 − T2
¯k2
¯k1
13
One can similarly show that:
(cid:104)s2(cid:105) = p +
Therefore,
(cid:104)k1(cid:105)T2
¯k2 + (cid:104)k2(cid:105)(1 − T1
1 − T1
¯k2
¯k1 − T2
¯k1)
(cid:104)s(cid:105) = 1 +
(cid:104)k1(cid:105) + (cid:104)k2(cid:105)
¯k1 − T2
1 − T1
¯k2
¯k1 + T2
¯k2 ≥ 1, (cid:104)s(cid:105) is no longer finite, it morphs into a giant con-
Thus, when T1
nected component, or in other words there is an information epidemic outbreak.
Assume that a giant connected component of exists (ν ≥ 1). For any given
node let zi be the probability that one of its type i links does not lead to the
giant connected component. The probability that a randomly chosen node is
not a part of the GCC is given by
∞(cid:88)
k1,k2
ψ =
zk1
1 zk2
2 P (k1, k2)
Now, zi can be written as P r(link is not occupied ) + P r(link is occupied and
the neighbor is not connected to the GCC). By occupied we mean that the node
at the end of the link is a believer. Mathematically this can be written as:
z1 = 1 − T1 + T1
z2 = 1 − T2 + T2
1 zk2
zk1
2 Q(k1, k2)
zk1
1 zk2
2 Q(k1, k2)
∞(cid:88)
∞(cid:88)
k1,k2
k1,k2
Simplifying we obtain, (z1 − 1)/T1 = (z2 − 1)/T2. Let u := (z1 − 1)/T1 + 1.
Hence, zi = 1 + (u − 1)Ti. Note that zi is bounded from below by 1 − Ti and
bounded from above by 1, and hence 0 ≤ u ≤ 1. Substituting this in above
equations we obtain the desired result:
ψ =
(1 + (u − 1)T1)k1 (1 + (u − 1)T2)k2 P (k1, k2)
where u must satisfy
u =
(1 + (u − 1)T1)k1 (1 + (u − 1)T2)k2 Q(k1, k2)
∞(cid:88)
k1,k2
∞(cid:88)
k1,k2
14
B Lemmas required for Theorem 4.1
Lemma 3 is used in the proof of Lemma 4 and 5.
Lemma 3. For all a, b ∈ [0, 1] and k1 + k2 ≤ n, n ∈ Z+ and any arbitrary
f : Z → R the following is true:
(cid:18)k1 + k2
(cid:18)k1 + k2
k2
(cid:19)
(cid:19)
k2
(cid:19)
(cid:18)k1 + k2
(cid:18)k1 + k2
k2
(cid:19)
k2
f (k1 + k2)k2
ak2−1bk1
f (k1 + k2)k1
ak2bk1−1 = 0
f (k1 + k2)k1
ak2 bk1−1
f (k1 + k2)k2
ak1 bk2−1
k1=0
k2=0
n−k1(cid:88)
n−k1(cid:88)
n(cid:88)
− n(cid:88)
n−k1(cid:88)
n(cid:88)
n−k1(cid:88)
n(cid:88)
k2=0
k1=0
k1=0
k2=0
=
k1=0
k2=0
n−k1(cid:88)
n(cid:88)
n−k1(cid:88)
n(cid:88)
k2=0
k1=0
=
k1=0
k2=0
Proof. We can switch the indices in the second term, i.e.,
Hence,
LHS =
(cid:18)k1 + k2
(cid:19)(cid:18)
k2
(cid:19)
ak2−1bk1 − ak1bk2−1
f (k1 + k2)k2
g(k1, k2)
(4)
We now count the number of terms in the above equation and show that they are
even. An expression indexed by a specific k1 and k2 denotes a term, e.g, g(1, 1)
i = (n+1)(n+2)
is a term. The total number of terms in the summation =
n+1(cid:80)
.
Out of those, n + 1 terms are 0 due to the k2 multiplier (k2 = 0 for k1 = 0 to n).
Additionally, when k2 = k1 + 1 equation (4) is zero. The total number of terms
when k2 = k1 + 1 is given by(cid:4) n+1
(cid:5).
i=1
2
Since, these terms are zero, subtracting out these terms from the total num-
2
ber of terms results in
(n + 1)(n + 2)
2
− (n + 1) −
(cid:22) n + 1
(cid:23)
2
=
=
n2
for n even
2
(n − 1)(n + 1)
2
for n odd
15
Thus, the remaining terms are even for both n odd and even. This allows
us to pair the terms. Consider one such pairing: the term with indices k1, k2
are paired with a term with indices k1, k2 where k2 = k1 + 1 and k1 = k2 − 1.
If we sum these two terms we obtain
g(k1, k2) + g(k1, k2)
= f (k1 + k2)ak2−1bk1
+ f (k1 + k2)ak1 bk2−1
= 0
(cid:19)
(cid:18) k2(k1 + k2)!
(cid:18) (k1 + 1)(k1 + k2)!
k1!k2!
(k2 − 1)!(k1 + 1)!
− k2(k1 + k2)!
k1!k2!
− (k1 + 1)(k1 + k2)!
(k2 − 1)!(k1 + 1)!
(cid:19)
Thus, the summation of the remaining terms is zero, which completes the
proof.
Lemma 4. If T2 > T1 then ν is strictly increasing with respect to q, i.e, dν
0, ∀ q ∈ [0, 1].
Proof.
dq >
a1 + a2 =
(k1 + k2)Q(k1 + k2)
Since N is large but finite, Q(k1 + k2) = 0 for k1 + k2 > kmax, where kmax is
the maximum degree. From Lemma 3, a1 + a2 = 0. Now we prove that a2 > 0.
Let k1 + k2 = m.
kmax(cid:88)
m=1
(cid:20) 1
m(cid:88)
q
k2=0
(cid:18)m
(cid:19)
k2
k2
2
a2 =
Q(m)
m(cid:88)
k1=0
qk2rm−k2 − 1
r
16
(cid:18)m
(cid:19)
k1
(cid:21)
k1(m − k1)
qm−k1 rk1
dν
dq
=T1
k1Q(k1 + k2)
+ T2
k2Q(k1 + k2)
where r = 1 − q. Let,
a1 =
a2 =
k1Q(k1 + k2)
k2Q(k1 + k2)
Adding a1 and a2 we get
∞(cid:88)
∞(cid:88)
k1,k2
k1,k2
∞(cid:88)
∞(cid:88)
k1,k2
k1,k2
∞(cid:88)
k1,k2
(cid:18)k1 + k2
(cid:18)k1 + k2
k2
(cid:18)k1 + k2
(cid:18)k1 + k2
k2
k2
k2
(cid:19)(cid:0)k2qk2−1rk1 − k1qk2 rk1−1(cid:1)
(cid:19)(cid:0)k2qk2−1rk1 − k1qk2rk1−1(cid:1)
(cid:19)(cid:0)k2qk2−1rk1 − k1qk2 rk1−1(cid:1)
(cid:19)(cid:0)k2qk2−1rk1 − k1qk2 rk1−1(cid:1)
(cid:18)k1 + k2
(cid:19)(cid:0)k2qk2−1rk1 − k1qk2rk1−1(cid:1)
k2
The summations are the second moments of a binomial random variable. E(cid:2)X 2(cid:3) =
V ar [X] + E [X]2, E[X] = mq, V ar[X] = mqr.
Q(m)
(mqr + m2q2) − 1
r
(m2r − mqr − m2r2)
q
(cid:21)
kmax(cid:88)
kmax(cid:88)
m=1
a2 =
=
(cid:20) 1
Q(m)m
m=1
> 0
Since T2 > T1, T1a1 + T2a2 > 0, which completes the proof.
dq < 0, ∀ q ∈ [0, 1].
Lemma 5. For ψ ∈ (0, 1), if T2 > T1 then ψ is strictly decreasing with respect
to q, i.e, dψ
Proof. Let, ψ = g(u∗, q) where u∗ is the solution of the fixed point equation
u = f (u, q).
g(u∗, q) =
f (u, q) =
∞(cid:88)
∞(cid:88)
k1,k2
k1,k2
(cid:18)k1 + k2
(cid:18)k1 + k2
k2
(cid:19)
(cid:19)
k2
qk2(1 − q)k1
qk2(1 − q)k1
αk1βk2 P (k1 + k2)
αk1βk2 Q(k1 + k2)
where α = 1+(u∗−1)T1 and β = 1+(u∗−1)T2. We first show that the solution
to the fixed point equation is strictly decreasing with q .
Let us consider the behavior of the R.H.S of the fixed point equation, f (u, q),
w.r.t. q. Now
∂f (u, q)
∂q
=
αk1 βk2Q(k1 + k2)
(cid:19)(cid:0)k2qk2−1rk1 − k1qk2rk1−1(cid:1)
Q(k1 + k2)
k2(βq)k2−1(αr)k1
Q(k1 + k2)
k1(βq)k2(αr)k1−1
Q(k1 + k2)
k2(βq)k2−1(αr)k1
Q(k1 + k2)
k1(βq)k2(αr)k1−1
k2
k2
(cid:18)k1 + k2
(cid:18)k1 + k2
(cid:19)
(cid:19)
(cid:18)k1 + k2
(cid:18)k1 + k2
(cid:19)
(cid:18)k1 + k2
(cid:19)
k2
k2
k2
17
∞(cid:88)
k1,k2
= β
− α
k1,k2
∞(cid:88)
∞(cid:88)
∞(cid:88)
∞(cid:88)
k1,k2
k1,k2
−
k1,k2
= 0
From Lemma 3,
Now α > β because T2 > T1, which implies ∂f (u,q)
∂q < 0.
We use the Implicit Function Theorem for computing the sign of ∂u∗
∂q . Let
h(u, q) = f (u, q) − u. According to the Implicit Function Theorem when
h(u, q) = 0
du
dq
= − ∂
∂q h(u, q)
∂
∂u h(u, q)
∂q = ∂f (u,q)
Claim:
∂f (u,q)
We now show that the derivative exists and is greater than zero. The numerator
∂h(u,q)
∂q < 0. The denominator is given by ∂h(u,q)
∂u = ∂f (u,q)
∂u − 1
∂u > 0 and ∂2f (u,q)
Assume the contrary, i.e., ∂f (u,q)
∂u ≥ 1.
It can be easily shown that ∂f (u,q)
∂u < 1 when h(u, q) = 0. We prove this by contradiction.
∂u2 > 0 for all u, q ∈ [0, 1].
Thus f is a convex function in u for any fixed q. Also f (0, q) > 0 for all q ∈ [0, 1].
Now h(u, q) = 0 implies that u = f (u, q), or in other words the curve
f (u, q) intersects the line passing through the origin with slope 1. Since we
assumed ∂f (u,q)
at the intersection, and since f (u, q) is monotone increasing in u, the curve
f (u, q) will never again intersect the line passing through the origin with slope
1. Therefore the equation u = f (u, q) has a unique fixed point. However, this
is a contradiction since u = 1 is always a fixed point and since ψ > 0 there is
another fixed point less than 1. Hence, ∂f (u,q)
∂f (u,q)
∂u ≥ 1, i.e., the derivative of f (u, q) is greater than equal to 1
∂u ≥ 1 is impossible, and therefore
∂u < 1.
Thus, the derivative exists and is less than 0 as ∂h(u,q)
∂u h(u, q) < 0.
Since we assumed h(u, q) = 0, the derivative du
dq is the derivative of the fixed
point w.r.t q, i.e., it can be represented as du∗
dq , where u∗ is the fixed point The
function g(u∗, q) has the same structure as the function f (u, q), and hence using
the same procedure it can be shown that ∂g(u,q)
∂q < 0. The total derivative dψ
is given by:
∂q < 0 and ∂
dq
dψ
dq
=
∂g
∂q
+
∂g
∂u
du∗
dq
Since all the terms on the right hand side of the above equation are negative (g
is a non decreasing function of u), dψ
dq < 0.
References
[1] J. Leskovec, L. Backstrom, J. Kleinberg, Meme-tracking and the dynamics
of the news cycle, in: Proceedings of the 15th ACM SIGKDD international
conference on Knowledge discovery and data mining, ACM, pp. 497 -- 506.
[2] J. Leskovec, A. Singh, J. Kleinberg, Patterns of influence in a recommen-
in: Advances in Knowledge Discovery and Data Mining,
dation network,
Springer, 2006, pp. 380 -- 389.
18
[3] S. Sinha, S. Raghavendra, Market polarization in presence of individual
choice volatility,
in: C. Bruun (Ed.), Advances in Artificial Economics,
volume 584 of Lecture Notes in Economics and Mathematical Systems,
Springer Berlin Heidelberg, 2006, pp. 177 -- 190.
[4] J. Goldenberg, S. Han, D. R. Lehmann, J. W. Hong, The role of hubs in
the adoption process, Journal of Marketing 73 (2009) 1 -- 13.
[5] R. Cohen, S. Havlin, D. Ben-Avraham, Efficient immunization strategies
for computer networks and populations, Physical review letters 91 (2003)
247901.
[6] L. B. Shaw, I. B. Schwartz, Enhanced vaccine control of epidemics in
adaptive networks, Physical Review E 81 (2010) 046120.
[7] Z. Ruan, M. Tang, Z. Liu, Epidemic spreading with information-driven
vaccination, Phys. Rev. E 86 (2012) 036117.
[8] M. Starnini, A. Machens, C. Cattuto, A. Barrat, R. Pastor-Satorras, Immu-
nization strategies for epidemic processes in time-varying contact networks,
Journal of theoretical biology 337 (2013) 89 -- 100.
[9] X.-L. Peng, X.-J. Xu, X. Fu, T. Zhou, Vaccination intervention on epidemic
dynamics in networks, Phys. Rev. E 87 (2013) 022813.
[10] D. Kempe, J. Kleinberg, E. Tardos, Maximizing the spread of influence
through a social network,
in: Proceedings of the ninth ACM SIGKDD
international conference on Knowledge discovery and data mining, ACM,
pp. 137 -- 146.
[11] W. Chen, Y. Wang, S. Yang, Efficient influence maximization in social net-
works, in: Proceedings of the 15th ACM SIGKDD international conference
on Knowledge discovery and data mining, ACM, pp. 199 -- 208.
[12] W. Chen, C. Wang, Y. Wang, Scalable influence maximization for prevalent
viral marketing in large-scale social networks, in: Proceedings of the 16th
ACM SIGKDD international conference on Knowledge discovery and data
mining, ACM, pp. 1029 -- 1038.
[13] A. Karnik, P. Dayama, Optimal control of information epidemics,
in:
Communication Systems and Networks (COMSNETS), 2012 Fourth Inter-
national Conference on, IEEE, pp. 1 -- 7.
[14] P. Dayama, A. Karnik, Y. Narahari, Optimal incentive timing strategies for
product marketing on social networks, in: Proceedings of the 11th Interna-
tional Conference on Autonomous Agents and Multiagent Systems-Volume
2, International Foundation for Autonomous Agents and Multiagent Sys-
tems, pp. 703 -- 710.
19
[15] K. Kandhway, J. Kuri, Optimal control of information epidemics mod-
eled as maki thompson rumors, Communications in Nonlinear Science and
Numerical Simulation 19 (2014) 4135 -- 4147.
[16] K. Kandhway, J. Kuri, How to run a campaign: Optimal control of sis
and sir information epidemics, Applied Mathematics and Computation
231 (2014) 79 -- 92.
[17] K. Kandhway, J. Kuri, Campaigning in heterogeneous social networks: Op-
timal control of si information epidemics, Networking, IEEE/ACM Trans-
actions on PP (2014) 1 -- 1.
[18] A. Barrat, M. Barthelemy, A. Vespignani, Dynamical processes on complex
networks, Cambridge University Press, 2008.
[19] M. Molloy, B. Reed, A critical point for random graphs with a given degree
sequence, Random Structures & Algorithms 6 (1995) 161 -- 180.
[20] M. E. Newman, Spread of epidemic disease on networks, Physical review
E 66 (2002) 016128.
[21] M. Newman, Networks: An Introduction, Oxford University Press, 2010.
[22] M. E. J. Newman, J. Park, Why social networks are different from other
types of networks, Phys. Rev. E 68 (2003) 036122.
[23] M. E. J. Newman, Assortative mixing in networks, Phys. Rev. Lett. 89
(2002) 208701.
[24] J. D. Noh, Percolation transition in networks with degree-degree correla-
tion, Phys. Rev. E 76 (2007) 026116.
[25] X. Wu, Z. Liu, How community structure influences epidemic spread in
social networks, Physica A: Statistical Mechanics and its Applications 387
(2008) 623 -- 630.
[26] M. Salathe, J. H. Jones, Dynamics and control of diseases in networks with
community structure, PLoS Comput Biol 6 (2010) e1000736.
[27] M. Nekovee, Y. Moreno, G. Bianconi, M. Marsili, Theory of rumour spread-
ing in complex social networks, Physica A: Statistical Mechanics and its
Applications 374 (2007) 457 -- 470.
20
|
1711.11122 | 1 | 1711 | 2017-10-30T03:46:08 | "TenisRank": A new ranking of tennis players based on PageRank | [
"cs.SI"
] | In the light of the need to achieve a ranking which is understood by all tennis supporters, the ATP ranking is exposed to constant complaints from players and at the same time exposes new players to be benefited with a good tournament to be able to start progressing in their careers. Moreover, the ATP ranking is not powerful enough to predict with certainty who will be the winner of a match if we are based solely on the positions. In order to combat these problems, the idea of creating a new ranking that can indicate what are the real chances of victory of a player before the start of a new tournament arises. Based on the PageRank method, generated by Larry Page and Sergey Brin, we created a new ranking that specifically uses the characteristics of the tournament to generate data. Based on a history of 40,000 matches, we intend to evaluate how the new method is performed as compared to other existing rankings in order to analyze if we really achieved an improved and real reflection. Once we have obtained the ranking, we intend to evaluate, taking a sample game, the ranking of the players that dispute it and the characteristics of such game to be able to indicate the precise probability for the player with better ranking to win the game. | cs.SI | cs | UNIVERSITY OF BUENOS AIRES
SCHOOL OF EXACT AND NATURAL SCIENCES
DEPARTMENT OF COMPUTING
"TenisRank": A new ranking of tennis
players based on PageRank
Thesis presented to qualify for the title of
Bachelor of Computer Science
Alex Aronson
Director: Bachelor Ernesto Mislej
Co-Director: Dr. Flavia Bonomo
Buenos Aires, 2015
"TENISRANK": A NEW RANKING OF TENNIS PLAYERS BASED ON PAGERANK
In the light of the need to achieve a ranking which is understood by all tennis supporters,
the ATP ranking is exposed to constant complaints from players and at the same time
exposes new players to be benefited with a good tournament to be able to start progressing
in their careers. Moreover, the ATP ranking is not powerful enough to predict with certainty
who will be the winner of a match if we are based solely on the positions.
In order to combat these problems, the idea of creating a new ranking that can
indicate what are the real chances of victory of a player before the start of a new tournament
arises. Based on the PageRank method, generated by Larry Page and Sergey Brin, we created
a new ranking that specifically uses the characteristics of the tournament to generate data.
Based on a history of 40,000 matches, we intend to evaluate how the new method
is performed as compared to other existing rankings in order to analyze if we really achieved
an improved and real reflection.
Once we have obtained the ranking, we intend to evaluate, taking a sample game,
the ranking of the players that dispute it and the characteristics of such game to be able to
indicate the precise probability for the player with better ranking to win the game.
Keywords: Sports Ranking, Tennis Ranking, PageRank, Ranking Methods
i
ACKNOWLEDGMENTS
To Ernesto for having guided me, for his patience, his good predisposition and
encouragement at each stage of this whole process.
To Flavia for the trust and for having helped me to find an idea that allows me to
bring my two passions together: Sports and computing.
To my parents for each advice provided since primary school to this moment. For
always worrying about my career evolution and insisting for me not to give up. For
supporting me in each one of my decisions. I was given everything I needed to get here in
the best way and I am infinitely grateful.
To Melu for accompanying me throughout my career unconditionally. For
understanding my craziness attacks, my nerves before exams and helping me overcome
them. For never letting me fall.
To my sisters for their every day support.
To my grandparents for always being around and happier for this moment than
me.
To my friends for the thousand-cancelled hanging-outs, for the words of
encouragement at all times.
To my fellow students for having helped me make the University a pleasant place.
To my co-workers for helping me reach the goal without putting obstacles in the
way.
To Marcelo Albamonte for helping me visualize the number of things that can be
done in sports based on what I learned at the University.
To Jorge for being my support in rough times and for accompanying me in good
times.
To my University teachers, for all they thought me during these years.
Ii
To my zeide Ernesto and my uncle
Héctor. To my family and to Melu.
General index
1.. RANKINGS IN GENERAL
. . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.1. Introduction to the Rankings
. . . . . . . . . . . . . . . . . . . . . . . . . . .
1.2. Sports Rankings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
1.3. Predictive Rankings v. Qualifying Rankings. . . . . . . . . . . . . . . .
2.. ATP RANKING . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.1. Background
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2. ATP Ranking System. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.3. Critics to the ATP Ranking. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.4. ATP as a predictive model. . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.. PAGERANK . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2. PageRank History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3. Definition and Algorithm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.4. PageRank Uses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.5. PageRank as a tennis ranking . . . . . . . . . . . . . . . . . . . . . . . .
3.6. PageRank v. ATP Ranking. . . . . . . . . . . . . . . . . . . . . . . . . . .
4.. PARAMETRIC PAGERANK
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.1. Motivation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2. Data Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.3. Model
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.3.1.
4.3.2.
4.3.3.
4.3.4.
Age . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Aging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Type of tournament and instance reached . . . . . . . . . . . . . . . . . .
Surface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
iv
1
1
1
2
3
3
6
6
6
9
9
11
14
14
14
15
16
16
19
20
22
25
30
30
30
32
33
34
36
39
43
43
44
44
45
48
4.3.5.
4.3.6.
Parameter combination . . . . . . . . . . . . . . . . . . . . . . .
Results of itemized parameters . . . . . . . . . . . . . . . . .
5.. ESTIMATION OF THE PROBABILITY OF VICTORY
. . . . . . . . . . . . .
5.1. What is the probability of victory?
. . . . . . . . . . . . . . . . . . . . . .
5.2. How do we calculate it? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3. Comparative of P(Victory)
. . . . . . . . . . . . . . . . . . . . . . . . .
5.3.1.
Specification based on specified parameters . . . . . . . . . . .
5.4. Evaluation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.. Future work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.. Conclusions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Appendix
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.1. Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7.2. Implementation of the new PageRank model . . . . . . . . . . . . . . . .
7.2.1.
7.2.2.
7.2.3.
Parametric PageRank . . . . . . . . . . . . . . . . . . . . . . . . . .
Best parameters calculation . . . . . . . . . . . . . . . . . . . . .
Probability of victory and AUROC . . . . . . . . . . . . . . . . . . .
1. RANKINGS IN GENERAL
1.1.
Introduction to the Rankings
In our merit-based society, the concept of ranking is radical. In general, society
consumes the best product, search engines show the most relevant document and people
follow the statistics of their favorite team.
The massive consumption of rankings in various contexts made it necessary to
develop many algorithms to achieve more efficient and reliable rankings.
As defined, a ranking is a classification from highest to lowest to set valuation
criteria. In general, a ranking is materialized as a list that will set a relation between a set of
elements joined in such list due to one feature in common.
Rankings are generally used in several areas to set some levels or determine them.
This can appear in the musical environment as well as in the world of finance and business,
for example, where we usually encounter different rankings of either most successful
companies or best-selling products in the span of a month; richest men in the world, and the
like.
Regarding fashion and beauty, these industries have rankings as well, which are
prepared by specialized magazines in subjects such as, for example, best and worst dressed
people.
Finally, and the focus of our study, this also happens in sports, where it is possible
to meet with countless rankings such as the ranking of top scorers in soccer, best tennis
players or the FIFA ranking that indicates which soccer teams are the best, among others.
1.2.
Sports Rankings
Sports rankings are designed for several purposes. Some of them are commercial,
for example, to ensure the presence of teams or players in some tournaments.
Perhaps equally important, both news media and economically interested
observers in the game use rankings as a way of receiving advice and assessing who are the
best players or teams today.
Moreover, players often mention as one of their biggest motivations the position
in the ranking in which they and their team are qualified.
It can be argued that no ranking system accurately reflects
1. RANKINGS EN GENERAL
2
the performance of each player, but it is rather a simplistic method to determine who is
playing in the best way at any given time of the season.
Sports rankings also have a social function. In order to capture the largest number
of people for them to consume professional tournaments, there may appear rankings that
are simple to understand, so that all spectators can be attracted to the different matches of
the tournaments.
However, in times when it is possible to have so much statistical information
thanks to digital means which reflect data that were previously impossible to calculate
easily, an opportunity appears to generate more accurate rankings to indicate who are the
best players, but difficult for society to understand.
Another important use of the rankings is their predictive nature, where it can be
determined who will be the winner of a match by looking at the positioning of the pertinent
players. Many betting houses take these factors to place payment value for each play.
1.3.
Predictive Rankings v. Qualifying Rankings
In general, most ranking systems fail in one of two categories, either they are
predictive, or they are qualifying.
The objective of the qualifying rankings is to indicate teams based on their
participation in a certain competition throughout the season. Rankings allow to choose a
champion or to use a reference team to indicate a set of teams that has ranked for its position
in the ranking to participate in a particular tournament. The goal of a predictive ranking,
however, is to provide the best prediction about the outcome of a match in which two
players or teams will face each other.
An objective qualifying ranking should take as determining factors who was the
winner or the score difference between players, or a combination of both. The use of a well-
defined criterion allows teams or players to know exactly the consequences of winning,
drawing, or losing a game. This is generally used in leaderboards for sports where each team
or player receives a position, the lowest being the best ranked.
On the other hand, for the creation of predictive rankings as accurately as possible,
it is allowed to include any useful additional information, such as: goals in favor of a team,
matches won, scorers in the case of soccer or special features of certain tournaments and
the backgrounds of each team at those tournaments or versus those rivals, among other
aspects.
2. ATP RANKING
2.1.
Background
It is a universal goal of the players: to become the World's No. 1. Children dream
of doing it, the effort is put into it. However, this is still one of the most elusive achievements
in sports. In the 40 years of life of tennis rankings, only 25 players have reached the top of
the (now) Emirates ATP Ranking, and only 16 finished the season as No. 1.
As stated in [1], since the beginning of the tennis Open Era in 1968, rankings were
largely a subjective calculation generated by national associations, different circuits and
specialized journalists who created their own lists.
Some players were on a roster of tennis players who could help sell tickets for the
event, placing them as a priority over others on the tournament acceptance list. This
caused great concern in those who did not have a big name and were at the verge of being
excluded from events.
In August 1972, it became apparent that the newly created Association of Tennis
Professionals would be necessary to establish a single classification system, without
personal judgements or biases. This would determine the form of entrance to the
tournaments and would mark an objective sample on the performance of the players.
Twelve months after the creation of the ATP, Ilie Nastase became the first No. 1.
The tournaments were initially divided into categories –A, B, C, etc.–, which
allowed the event organizers to select the players according to their ATP classification and
determine the seeds.
The results of the tournaments were sent to the ATP where they were processed,
then, the ranking was generated in huge perforated sheets and once a month they published
the new ranking of players.
In the following years, after 11 publications in 1973, the ATP Ranking began to be
published more frequently –1974 (11), '75 (13), '76 (23), '77 (34), 78 (40)– until 1979,
when it was published once a week, 43 in the season.
The international ATP Rankings of August 23, 1973 was an average system, points
earned over a period of 52 weeks were accumulated and then divided by the total number
of tournaments played (with a minimum divisor of 12). The tournaments awarded points
according to the prizes (minimum 25 thousand Dollars), the size of the table and its
difficulty. The merit-based system was supported by the players.
Following several changes to the points counting system, in the year 2000 and in
order to encourage greater participation in Grand Slams and in the series of nine most
important tournaments,
3
2. ATP RANKING
4
of the ATP (now known as the ATP World Tour Masters 1000), the qualifying or
classification system began counting 18 events for most players. The 13 results of the Grand
Slams and ATP World Tour Masters 1000 tournaments would count, as well as the top five
performances of one player in the events of the International Series (now ATP World Tour
250 and 500).
2.2.
ATP Ranking System
The Emirates ATP Rankings are the unbiased historical method based on merits to
determine acceptance and seedling in all tournaments for singles and doubles.
As explained in [2, 3], the period that the Emirates ATP Rankings take is the last 52
weeks, however they do not take all the tournaments in which a player participates during
that period. The ATP Ranking is based on the total points scored by one player in the four
(4) Grand Slams, eight (8) of the nine (9) ATP Masters 1000, and their best six (6) results
from the rest of the ATP tournaments in which he participated. For non-Top 30 players who
do not directly qualify for the ATP Masters 1000 and Grand Slam tournaments, if they do
not play one of them, a seventh tournament is taken into account for the rest of the
tournaments played during the year. At the end of the season, the London-based ATP World
Tour Final is played, where the top seven (7) players are automatically ranked as well as the
winner of one of the Grand Slam tournaments (if he is already qualified, the eighth player as
per the ATP Ranking also qualifies).
Scoring system per round achieved in each tournament type.
2.3. Critics to the ATP Ranking
According to [4], there are many critics of players to the scoring system of the ATP
Ranking, many of them made by the most important players like Rafael Nadal.
The current ATP Ranking holds measurements over 52 weeks, which can make the
ranking somewhat inconsistent week by week. For example, in the hypothetical case where
a player wins an ATP Masters 1000, he would accumulate those 1000 points for 51 weeks
from the end, but if he does not repeat the title, 53 weeks after
5
2. ATP RANKING
receiving the trophy, he will no longer have those 1000 points. The potential oscillation
between two positions in the ranking with such close dates does not really reflect the true
ranking of the players.
On the other hand, all tournaments of the same level add the same amount of
points, regardless of the players who participate in it. When counting only 6 of the
tournaments not considered "big", a player can participate in as many tournaments as he
can, aimed at increasing his score and obtaining the possibility of being pre-qualified in "big"
tournaments and obtaining a more favorable classification.
Finally, the current ranking system penalizes those who get an unfortunate draw
in big tournaments. If a player always has to play against a Top 10 in the first round, his
chances of moving up his ranking are small.
2.4.
ATP as a predictive model
If we look at the ATP Ranking not only as a qualifying ranking but also as a
predictive ranking, we could try to predict who may be the winner before each match based
on the players' rank.
Considering the player with the lowest number in the ranking as the player with
the best present at that time, we evaluated in games from 2005 to 2013 how this predictive
model worked.
Therefore, we obtain:
ATP
YEAR
2005
2006
2007
2008
2009
2010
2011
2012
2013
66.430%
66.494%
65.455%
66.990%
68.072%
66.641%
67.758%
67.908%
65.892%
TOTAL AVG. 66.849%
Efficiency of the ATP Ranking as a predictive system
We can argue that the ATP Ranking matches in approximately 2/3 of the matches
as established. It can also be interpreted that in about 2/3 of the cases the best positioned
player is the winner of the match.
The way it is being evaluated is by counting the number of matches where the best
placed player won, i.e. a HIT, over the total number of games played during the period under
evaluation.
3. PAGERANK
3.1.
Introduction
PageRank is an algorithm used by Google Search to rank websites in order to
valuate and differentiate them according to their importance.
PageRank measures the "authority" of a page on several specific topics. The more
authority, the more chances this website will have to appear in the top positions of related
searches.
It is measured by knowing the number of links that point to that page, along with
the authority of the page that links it and the way it does it.
Each link counts as a vote or a recommendation. And the recommendation is as
important as the one who recommends it and how he does it. That is to say, that if the adviser
has greater weight, his recommendation will be of greater importance as compared to the
recommendation of another site.
3.2.
PageRank History
Faced with the immense growth of the Internet and the large number of
heterogeneous pages on the web, search engines were forced to improve their rankings to
provide inexperienced users with the best answers.
In their beginnings, search engines functioned as websites crawlers in which the
terms found on the pages were listed. When a word was searched in the search engine, it
was searched in the term listings and pages where they appeared. The sorting method was
based on the number of times a word was mentioned, which could lead to spam cases where
everyone on their site regardless of topic repeated the most searched words to be able to
bring traffic to their website.
Analyzing this and considering that although the number of sites had increased,
they were still hypertexts that provided additional information, a ranking called PageRank
was created as a method to compute each existing page as a node of a great graph that
formed the web. Each node had a degree of importance that corresponded to whether it was
an important page. This was determined based on how many links reached each node.
The algorithm was patented by Google founders Larry Page and Sergey Brin when
they were doctoral students at Stanford University in 1999 [6, 8]. Page was a PhD student
of Terry Winograd, who seems to have encouraged him to work on PageRank, and Brin was
a Ph.D. student of Jeffrey D. Ullman, the
6
3. PAGERANK
7
famous author of the compiler book with Aho, although he soon joined Page to work on
"more interesting" topics than his director offered.
This algorithm was used to power a new search engine called BackRub, which later
became known as Google.
The Internet is today what it is thanks to the great effort they had to order the
information in a relevant way in an environment in which the big portals had sold the results
of the searches to the highest bidder.
Out of the 24 million web pages that its first version managed to index, the Internet
has grown today to surpass, according to estimates, the 4,000 million different addresses.
Since the algorithm has to find not only the first-order links that a page receives, but also
those of higher orders, the real problem is not found in the original idea of how to measure
relevance on the Internet, but in how to index the highest percentage of existing Internet
sites and to evaluate the links that enter and leave each site.
3.3. Definition and Algorithm
Based on the concept of centrality of a graph, in which a value is given to a node
based on its location, it is possible to determine which node is the most influential of the
graph in its adjacency matrix. A node with a high value indicates that such node is connected
to other nodes with considerable value as well; the higher the value of the node, the more
to the center its location.
Using these concepts comes the creation of PageRank which, precisely, is a function
that gives a value to each node corresponding to a web page.
The web is considered as a directed graph connected by the hyperlinks of the pages
that are pointed, i.e., each edge represents a link between the outgoing node to the incoming
node. Any random site is taken as a starting point to click on the different links, navigating
this way from page to page.
The PageRank value of a page corresponds to the frequency with which any
browser visits a page. The more time a user spends on a page, the more important the
PageRank on that page.
Due to the current size of the web, Google search engine uses an approximate
iterative value of PageRank. This means that each page is assigned an initial PageRank value,
and then the PageRank of all pages is calculated with cyclic calculations based on the
formula of the PageRank algorithm.
On a more formal note, as stated in [18], the general value of the PageRank of any
page can be represented as:
Where u is a website, Fu is the set of pages pointed by u and Bu is the set of pages
pointing at u. Nu = Fu is the number of links of u and c the factor used for normalization.
3. PAGERANK
8
We started by defining a simple R ranking as a simplified version of PageRank:
The most popular pages are those that receive more edges from other pages or
nodes of the graph. An important feature of the PageRank algorithm is that it assigns weights
to the edges. These are taken into account as the main tool for the final calculation of the
ranking.
In the algorithm of PageRank each site counts as a link, however the weights of the
edges accumulate as the nodes of the graph are connected.
The weight of the page is calculated by adding the weights of the links it receives,
while the weight of the edges has the value of the division of the weight of the page for each
link to which it refers.
This causes the most important pages to have a greater influence on the value of
the PageRank than the less popular pages.
Calculation of PageRank with weight in the edges
Once the weight of each edge is calculated, an adjacency matrix is generated to
calculate the positions that each page will take in the ranking.
3.4.
PageRank Uses
The PageRank algorithm is very useful as a popularity indicator. Given any directed
graph, it is able to indicate which node is the most important and thus be able to build a
ranking on each of them.
3. PAGERANK
9
As stated in [7], the PageRank algorithm is not only used as one of the main factors
for Google site positioning. Considering its rankings ability, it is also used by large
companies to build particular rankings, regardless of search engines.
For example:
Twitter tweets ranking: It is done by relating the mentions from one user to another,
thus forming a graph where the nodes are the users and each mention indicates an
edge directed from one user to the other.
Recommendation systems: It can be used in recommendation systems based on
products consumed by a user. For example, Netflix can recommend movies based on
cases of similar users.
Social networking friends suggestion: Considering that each user feeds and is fed
from other users, a PageRank system can be generated to suggest new friends based
on those already connected.
3.5.
PageRank as a tennis ranking
Based on [9, 12, 13], there are different alternatives to the ATP Ranking in which
the main objective is to get to a better reflection of who the best players are today, and in
which position each one is located.
One of the algorithms that can be taken as a model to generate a new ranking is
PageRank.
Based on the paper On the (Page)Ranking of Professional Tennis Players, written by
Dingle, Knottenbelt and Spanias [11], a new tennis ranking is generated, where each node
is a player and a directed edge of connection is traced between nodes given the result of a
match. When one player wins another, an edge of weight 1 (one) is added from the losing
node to the winning node.
Once all the games have been evaluated, the PageRank algorithm is applied on that
graph and thus a ranking is obtained based exclusively on the history of the results of the
matches, unlike the ATP Ranking where the tournament instance is evaluated.
We generate a graph based on the results of the matches of a tournament.
3. PAGERANK
10
From this graph, the PageRank manages to generate a ranking for the participating
players.
Position
Player
1
2
3
4
5
6
7
8
9
10
Djokovic N.
Nadal R.
Federer, R.
Murray A.
Ferrer D.
Del Potro J. M.
Rodick A.
Tsonga J. W.
Soderling R.
Berdych T.
Finally, this method, unlike the ATP Ranking, also allows us to build a ranking with
players from different times.
Graph generated by the results of ATP matches taken from [10]
3. PAGERANK
11
3.6.
PageRank v. ATP Ranking
Comparing the ATP Rankings versus the ranking generated through a PageRank
algorithm we can observe that they can have many variations between the positioning
assigned to some players by one system and by the other.
Comparative ranking ATP vs. PAGERANK extracted from the paper by Dingle, Knottenbelt
and Spanias. [11]
3. PAGERANK
12
Comparison ATP Ranking vs. PAGERANK prior to US OPEN 2013
In the case of the chart we can see that when starting the US OPEN 2013 (Grand
Slam Tournament) they have variations except in the first two places in the ranking.
For this tournament, once finished, the ATP rankings hit the results by 70.25%
while the rankings put up by PageRank had a greater efficiency when achieving a positive
72.72% of the results.
Finally, we evaluated year-on-year performance of the PageRank in comparison to
the ATP Ranking.
3. PAGERANK
13
Comparison ATP Ranking vs. PAGERANK
As it can be seen, this new ranking system achieves greater precision if we evaluate
it as a qualifying ranking.
That is to say, taking the results between the players as a reference and connecting
them to be able to generate a ranking is much more effective at the time of predicting the
result than evaluating only the instance of the tournament to which they arrive as does the
ATP Ranking.
4.1. Motivation
4. PARAMETRIC PAGERANK
Given the good results that were obtained using the PageRank method above the
ATP Ranking, we came up with the idea of looking for a better alternative that would
improve both existing methods. This new method had to be able to counter the criticism of
the players to the ranking used today and at the same time be more efficient and able to
reflect the true position of tennis players in a ranking, as compared to the methods already
evaluated.
As we have seen, the difference of the ATP Ranking in comparison with the
PageRank ranking is that the first evaluates the players according to the instance they
reached in the tournaments played, while the other evaluates the match-by-match results
they have had in the last period.
That is why we ask ourselves: Is it correct to evaluate only the instance of the
tournament to which the players get? Is it correct to evaluate only 52 weeks back to know the
present of a player? Do all matches won by a player over another have the same value? Is the
context in which each victory is developed not relevant?
Given these questions that the idea of combining both models arises. Considering
PageRank as a more effective model than the current ATP Ranking, we use it as a base
scheme to design a new ranking. In this new system, not only will the results between
players be taken into account, but also other important attributes, such as the instance of
the tournament in which the encounter took place (as in the ATP Ranking), the surface in
which each match was played and the age of each one of those encounters.
We will look for the parameter that best represents each of these attributes and a
weight will be assigned corresponding to each edge of the graph. Then the different
parameters will be combined to achieve a ranking generated by the evaluation of all the
abovementioned factors.
4.2.
Data Set
As retrieved from www.tennis-data.co.uk, there is a set of data from each of the 923
tournaments played between 2000 and 2013.
By analyzing each of these tournaments, results can be taken from almost 40,000
matches with a detail of the type of surface of each game (hard, clay, grass), the date of each
match, the importance of the tournament (ATP250, ATP500, MASTERS1000, Grand Slam,
Master Cup).
14
4. PARAMETRIC PAGERANK
15
The result of match set to set is also indicated, the original ATP Ranking of each
player at the time of the game, and the amount of bets paid for the victory of each player.
All of this data was cured, tournament names, players and tournament type were
unified and rolled into 3 tables of a MySql database for better reading. The tables are
standardized by Players, Tournaments and Matches. (More info in the Appendix).
On
the other hand,
information was captured on
the ATP website
(www.atpworldtour.com) in which the top 100 ATP Rankings are processed since 1973.
4.3. Model
Similar to [11], a directed graph will be generated for each tournament
corresponding to its matches.
Each edge will be strictly linked to the result of the match, and, by scrolling the list
of matches, there will appear a number of assigned years, prior to the tournament to be
evaluated, which in turn are added to a directed multigraph, from which we will finally
calculate the PageRank.
Our proposal consists, unlike the aforementioned PageRank, of including a value
as a weight of each edge, where each match will have a different value in our multigraph.
For such purpose, we will take into account 3 attributes that will help to calculate
the corresponding weight for that match:
Aging: It considers how old is the game under evaluation with respect to the
tournament from which the ranking will be taken.
Surface: It evaluates the difference of surface in the match under evaluation with
respect to the tournament from which the ranking will be taken.
Type of tournament and instance reached: It evaluates the type of tournament and the
instance of that tournament in which the game was played just like ATP does.
As a development from this model, we will first analyze aging in years and
tournaments that we will look back to be able then to evaluate each parameter individually
and find the best value to generate a combination of them. In this way we will create a
parametric PageRank more effective than the ATP ranking and the existing PageRank.
Finally, the weight of each bow will be indicated under the following formula [where PESO
is weight, Arco is edge, Envejecimiento is aging, Superficie is surface and Instancia is
instance]:
WEIGHTEdge = WEIGHTAging ∗ WEIGHTSurface ∗ WEIGHTInstance
4. PARAMETRIC PAGERANK
16
4.3.1.
Age
Is it correct to take only 52 weeks as a reference to generate the ranking?
As it was already mentioned, the ATP Ranking is generated based on the sum of
points obtained in the tournaments that took place in the last 52 weeks.
In order to study if this was correct or if better results could be obtained if we
looked at older matches, we evaluated different age parameters to know how many years
backwards it is advisable to consider in order to obtain better results.
For this, each calculation of the different parameters that will be taken into account
in the weight of the edge will be evaluated taking into account multiple years of age and
choosing the one with better efficiency.
4.3.2.
Aging
Is it correct to evaluate all matches in the history with the same weight?
Unlike the ATP Ranking or the PageRank generated in the previous chapter, we
will be evaluating many years back to be able to achieve a ranking more effective than the
previous ones.
However, we believe it is not correct to weigh equally matches that were played long ago
compared to more recent matches. That is why we will take the aging factor as one of our
parameters. For such purpose, we will evaluate how a ranking will be calculated to give less
weight to matches which are more distant in time and give a higher weight to those which
have been played lately.
Exponential Decay
To represent the aging factor in the best way, we find in the Exponential Decay
process a way of expressing the weight, in which the older matches had less weight than the
new ones.
The Exponential Decay formula is represented as follows:
Where N(t) is the weight to be assigned to the match represented in time t, which
indicates the time difference between the tournament for which the ranking is being
generated compared to the tournament under evaluation.
The Exponential Decay model is characterized by its rapid decrease, thus achieving
very low values for those older matches.
4. PARAMETRIC PAGERANK
17
By modifying the corresponding λ the drop speed can be adjusted.
Considering this, we evaluate the best value of λ and evaluate it with the new
ranking system generated.
For this we will take as age of the tournaments 3 and 5 years, that is to say, the
graph will be composed by nodes and edges corresponding to matches as old as these.
Comparison of the ATP Ranking and generated PageRank, as compared to the new model
taking 3 years of age.
4. PARAMETRIC PAGERANK
18
Comparison of the ATP Ranking and generated PageRank, as compared to the new model
taking 5 years of age.
As it can be seen, if we set an age of 3 years with a value of λ in the Exponential
Decay of -5, we obtain an improvement as a predictive ranking of 1.3% with respect to the
ATP Ranking and of 0.8% with respect to the PageRank in which all its edges have equal
weights.
4.3.3. Type of tournament and instance reached
Is it the same to win a match of a first round than a final? And to play an ATP 250
than a Grand Slam?
As we all know, tennis is a sport of high individual rivalry. Each match is loaded
with pressure and the state of mind is different according to the importance of the match.
That is why we consider it is not correct to assign the same weight to matches of different
tournaments and matches in different rounds.
In the same way ATP does, we will try to generate the weight of the graph's edge
according to the round of the tournament in which the match evaluated is taking place in
order to generate the PageRank.
For that we will use a formula that has a quantity of points assigned similar to the
one delivered by the ATP. The formula is:
Where the value of the round reached in that tournament is the numeric value that
represents the number of round reached depending on the type of tournament.
We will look then for the λ between 1 and 2 that behaves better as a predictive
ranking and at the same time comes close to the ATP ranking.
4. PARAMETRIC PAGERANK
19
Evaluation of the corresponding λ to score the round of the tournament reached.
It can be observed how the λ in 1.3 it is barely above than what the existent
PageRank manages to predict although it has a much less variance. By comparison we did
achieved a difference of at least 1 point in respect of the ATP ranking.
4.3.4.
Surface
How much is the influence in the matches history to play in the same surfaces opposite
to different surfaces?
There are three types of surfaces in the ATP circuit: Hard, Clay, Grass. Each one of
those surfaces has different characteristics.
In clay, for example, the ball has a much slower speed and it is easier to slide
through the court. In cement, the ball goes at a higher speed and with more pronounced
bounces, while in grass, besides having a great speed, the ball does not usually gain height.
Given these characteristics, there are players that know how to better develop
their game in some surfaces, while in others they do not achieve a good performance. And
because of this characteristic, it came up the idea of differentiating the weight of an edge
that represents each match of the history, based on the surface of that game regarding the
surface of the tournament we are trying to predict.
We generated a matrix in which the edges corresponding to matches played in
the same surface than the tournament to be predicted the highest value that is 1 (one) is
assigned as weight, while the edges corresponding to matches played in a surface different
than the one of the tournament to be predicted are assigned a weight that we will
calculate.
4. PARAMETRIC PAGERANK
20
Evaluation of surfaces under different parameter values in different surfaces
As it can be observed, by evaluating the rest of the surfaces with a parameter of 0.5
an efficiency of 1.7% greater with respect to the ATP ranking while we surpassed the static
PageRank for almost 1%.
Knowing these results, we evaluated the results differentiating the surface. It is
worth to note that most of the matches of the season take place in the hard court, followed
by clay, while only a few of the weeks of the season are played in grass.
We can observe that even though each surface behaves better before a different
parameter, in each one of them with the best choice our model behaves better than the ATP
ranking in any of the surfaces.
Evaluation of clay surfaces under different parameter values in different surfaces
4. PARAMETRIC PAGERANK
21
Evaluation of hard surfaces under different parameter values in different surfaces
Evaluation of grass surfaces under different parameter values in different surfaces
4.3.5.
Parameter combination
With the certainty that our model behaves better than the previously mentioned,
we look for the best combination of parameters in order to obtain a more efficient result
than when we observe the attributes in particular.
For that we will combine the parameters and we will use the multiplication of them
like weight of the edge within the formed directed multigraph from which the PageRank will
be calculated.
4. PARAMETRIC PAGERANK
22
As a first intuition we tried the combination of the best parameters that we got
particularly. Meaning that we took a 5-year aging with an Exponential Decay of -5 as λ, we
will use 1.3, and as surface 0.5 to calculate the tournament round reached.
As a result of this combination we have:
Evaluation with the best parameter calculated individually
In spite of obtaining a better result, we chose to look in every parameter the best
combination possible to obtain an even better result.
For that we put together an algorithm that will make a greedy search in which
within a vector three of the four values will be fixated that we are repeating and the other
we will repeat it until we find the best result, then we will go changing the vector fixing
different values. We will do this until after several runs, we will manage to obtain the best
result, meaning that after trying with all the parameters again, none of them were modified,
for which our vector is a local optimum for the problem.
We evaluated the best parameters by generating a testing set composed of the
matches of 90 tournaments, 10 by year, and as a result, the combination:
Age: 4 years
Aging: -5 as value of Exponential Decay
Surface: 0.3 as value for different surfaces
Tournament and round: 1.7 as value of λ to assign a score to the played round of the
tournament
Combining these values we obtained:
4. PARAMETRIC PAGERANK
23
Evaluation with the best parameter calculated after obtaining the best results evaluated
with the algorithm
As it can be seen, an approximation to 70% of hits in the evaluated tournaments,
achieving 3 points of improvement with respect of the hits of the ATP in its weekly ranking
and 2.2 with respect to the existent PageRank model.
Boxplot of predictive rankings compared, ATP, PageRank and Parametric PageRank
In the boxplot type graph we can notice that regarding the median of the
Parametric Pagerank is above of the rest of the rankings studied. It can be noticed that the
minimum result obtained with the suggested model, reaches the mean of the Pagerank
existent and surpasses the ATP ranking.
4. PARAMETRIC PAGERANK
24
It can also be observed that the suggested model as the table shows, has around
70% of hits, counting with results that even surpass this calculation.
By using the statistic test ANOVA (Analysis of Variance) we could confirm that
there is not a considerable difference in the effectiveness shown comparing the ATP with
the existent Pagerank (p = 0.14). Meanwhile we see a great difference between the results
obtained by the ATP ranking and the Parametric Pagerank (p = 0.000024) and also an
important difference regarding the existent Pagerank
(p = 0.00079)
4.3.6.
Results of itemized parameters
Before the finding that the presented model achieved a predicting character better
than the rest of the existent models, we started to investigate if it behaved in a similar way
in different laid out existent situations in the tennis tournaments and matches frame.
That is why we itemized the matches based on the surface, ranking of players and
type of tournament in order to find in which frames our model had better predictions and
in which had worse.
Surface: In these cases we trained with all the surfaces but only tested on one particular
surface
Comparison by hard court
Comparison by clay
4. PARAMETRIC PAGERANK
25
Comparison by grass
As it can be observed, our model achieves better results in every surface, achieving a
greater possibility of prediction in those matches played in grass where it comes
closer to the general average of the model and achieving 2% more than in the ATP
ranking.
It can be also observed that both on hard court and in clay, our model is the one with
the most hits even though the difference with other models is smaller.
Ranking: In these cases we will evaluate the matches between similar ranking players
and that only belong to that delimited ranking group.
Comparison matches between top ten
Comparison matches of the ranking 11 to 50
4. PARAMETRIC PAGERANK
26
Comparison matches of the ranking 50 and on
In this comparison we can observe that in the three cases our model surpasses the
ATP ranking while it has an amount of hits similar with respect to the original
Pagerank model.
In case of the matches between top ten players we achieved a difference greater than
3 points with respect of the ATP ranking. Which indicates that for matches between
the great players, where the difference is much lower since the players involved are
from the world top ten, our model accomplishes, as in the original Pagerank, to behave
in a manner similar than what it does the ATP ranking.
For the rest of the cases, the model created achieves an improvement for two of the
existent models, even though the difference is not substantial, our created ranking
manages to achieve with a greater certainty who will be the winner of a match or a
tournament if players in those positions play.
Type of tournament: In this case we will evaluate the results according to the
importance of the tournament that is being played. It is worth to note that the most
important tournaments have a greater number of participants and a greater number
of matches to be analyzed.
Comparison tournaments ATP 250
4. PARAMETRIC PAGERANK
27
Comparison tournaments ATP 500
Comparison tournaments Masters 1000
Comparison tournaments Grand Slam
Comparison tournaments Masters Cup
As it can be observed, it is important to highlight that in the five types of tournament
analyzed, our model accomplishes a better prediction than the rest of the analyzed
models.
4. PARAMETRIC PAGERANK
28
Excellent results can be observed of hits in the Grand Slam and Masters Cup
tournaments, reaching almost 74% within the first ones and achieving a 72,6% in the
second ones. However, it is not in these tournaments where a greater difference is
achieved in terms of the existent rankings.
In the ATP 500 and Masters 1000 tournaments a difference is achieved with respect
of the ATP of approximately 2.5%, what makes our model much more reliable.
5. ESTIMATION OF THE PROBABILITY OF VICTORY
5.1.
What is the probability of victory?
As we have seen, we created a model capable of predicting the results of a given
tournament with more effectiveness than what does today the ATP ranking, and the existent
Pagerank model.
Before this scenario, the idea comes up of not only to be able to predict the result
of a match based on the ranking, but also to determine with which odds the result of the
player that is ranked better will be victorious in front of one ranked worse.
It is here where the odds of victory come up, that determines, given r1 and r2 (the
rankings of the players that will play) and considering its difference, how firm are the odds
that the better ranked triumphs.
5.2.
How do we calculate it?
In order to find this chance of victory, we will first determine the efficiency that we
had in our ranking if we grouped by the ranking difference. Meaning that for every game,
we analyze not only the result, but also considering the ranking difference delivered by our
model, how it behaved for that delta.
Evaluation of efficiency of victories based on ranking difference provided by our model
30
5. ESTIMATION OF THE PROBABILITY OF VICTORY
30
By analyzing the graphic obtained, we want to find the function that comes closer
in the best possible way to every point of the graphic, for that we will use the regression
model that will allow us to reach the objective in the best way.
Based on the paper [15] in which a similar scheme is used for soccer teams and
considering that our graphic is similar to an exponential curve, we will look for the
exponential that covers all the indicated points.
We will first define a model function that we consider more appropriate in base to
the obtained. For that we will use a logistic that is characterized for representing the growth
of organs from a small initial state, during which the growth is proportional to the size until
the last stage where the size is similar to an asymptote.
Considering that our graphic starts in the initial point where the ranking difference
between the players is minimal and then starts to grow up to the point where as the ranking
difference grows the number of hits is considered permanent we can indicate that it has a
behavior similar to an asymptote. That is why we can use the logistic function suggested in
our case.
The function is of the type:
Then we must take the following steps:
1. Estimate the parameters of the regression model. This process is called adjustment of
the model to the data.
2. Test how good is the adjusted model. The result of this test may indicate if the model
is reasonable or if the original adjustment must be modified.
By taking these steps, we can determine through the regression model that a =
45,321. In base of this parameter we get
5. ESTIMATION OF THE PROBABILITY OF VICTORY
31
Evaluation of efficiency of victories based on ranking difference and regression curve
We can indicate that being this a reasonable curve we may continue to evaluate
how it behaves based in our model.
5.3.
Comparative of P(Victory)
Already knowing the function that represents our probability of victory, and
reaffirming that the curve obtained manages a coherent form in front of the scored points,
we focus on comparing how optimistic is our chance of victory in front of the probability of
victory that may be obtained of the curve based in the ATP ranking or in the existent
Pagerank model.
For that, we calculated for the top 100 of the players of each model which is the
probability of victory of each difference.
5. ESTIMATION OF THE PROBABILITY OF VICTORY
32
Comparison of victory probability of the existent models
It can be observed that the suggested model achieves a more optimistic character
regarding the victory probability than the existent PageRank and much more even than the
ATP ranking.
As the graphic shows, from the 20 positions of difference of ranking our suggested
model already starts to differentiate itself from the ATP ranking, achieving a victory
probability greater than 60% for that with a better ranking.
5.3.1.
Specification based on specified parameters
As we have seen, in the general framework our generated ranking achieves a
probability of victory more optimistic than the rest of the rankings. We can then look for the
probability taking into consideration the attributed that were evaluated at the moment of
generating the ranking.
Based on this a decision tree can be made, which edges can answer to the
questions: In which surface it was played? What kind of tournament is the one being
evaluated?.
By using the same comparison used in the generalized probability, we get to the
pages of the combination Surface - Type of tournament, where our suggested ranking
achieves to be more optimistic than the rest of the rankings.
Putting as an example some of the graphics of the pages obtained, it can be
observed that unlike the generalized ranking, the optimism and the probability of victory of
the different rankings manage to be more or less pronounced depending on the parameters
with which they are calculated.
Then, given a match in which we know the positioning of each player in every one
of the evaluated rankings, we can determine the odds that the players have of winning in
that match by knowing also the type of tournament and the surface of that particular match.
5. ESTIMATION OF THE PROBABILITY OF VICTORY
33
With that in mind, taking into account the numbers seen, if the ranking of the
suggested model is taken as a reference, with a lesser difference of the ranking we can obtain
a more important bet in which we can determine who will be the winner of the match, since
it has proven to be more optimistic than the two other rankings seen.
5.4.
Evaluation
Since we obtained the victory probabilities and since our model is more optimistic
than the existent models, we focused on evaluating the performance on each one of them.
For that we used the method of AUROC (Area under ROC).
As it is indicated in [16, 17] the analysis of ROC curves is a statistic method to
determine the diagnostic accuracy of the tests performed, being used with three specific
purposes:
To determine the cut-off point of a continue scale in which the highest sensitivity and
specificity is reached.
To evaluate the discriminative capacity of the diagnose test, meaning, its capacity of
differentiating with which odds a player will win a match with a given ranking
difference.
To compare the discriminative capacity of the diagnostic tests that express results in
continuous scales.
5. ESTIMATION OF THE PROBABILITY OF VICTORY
34
The area under the ROC curve is an excellent performance global indicator of a
diagnostic test since it makes possible to express it in a simple number.
Evaluating P(victory) for the 3 models we get:
AUROC comparison
As it can be observed, our model is the one with best performance, however, unlike
the efficiency shown in the previous chapter, the difference with the ATP ranking is smaller,
while the difference with the Pagerank is considerable.
If we calculate the AUROC making each game to go in their corresponding edge in
the decision tree, we found an improvement, even though it is not too big.
AUROC comparison
The usage of the P(victory) allow us to widen the usage spectrum of our ranking.
In this way it is possible to fix a satisfaction threshold according to our expectations of usage.
In the "Future Work" we will expand this aspect.
6. FUTURE WORK
As we have seen, the rankings surround us in each of our everyday activities. With
this work we have accomplished to introduce a new raking system in a sport environment
like tennis, however, the fact that we created a new system and took the chance also to try
to predict tennis results opens the door to many works to be made in the future.
Application of other known rankings to the tennis environment.
As it can be read in the book Who's the #1 [5], through history several ranking
generating models had been developed [14], they are used today to classify teams in
several sports. These methods, such as the Massey, the Keener, the Elo, among others,
are mostly used to generate NFL or chess statistics, but not for tennis. And even
though in our model different techniques were used that included their methods,
since PageRank already has them, we believe that these methods can be applied
purely to achieve different tennis rankings in order to discover which ranking best
classifies the players today.
Application of our parametric PageRank method in different sports.
The generated method proved to behave better than the ATP ranking with which
tennis players are classified nowadays. With these favorable results, a door opens to
apply this ranking system in other sports where the results are zero sum and allow us
to generate a PageRank in which the edges can be directed with different weights
evaluating the characteristics of the played match.
That is why the ranking can be applied in any racket sport and also in particular
leagues, such as NFL or NBA.
Regarding sports such as soccer, it can be applied as long as it is used for a national
league, not international. The way in which this ranking is created, does not allow to
know in these sports which one will be the best team in the world, since the matches
between interleague teams are very few to contemplate that result.
Application of our parametric PageRank method in different environments.
Outside of the sport environment, it can also be applied in different environments
such as fashion or culinary, or in any other field in which tournaments or contests are
held throughout the year in which the participants can be ranked.
For example, in the culinary contests that take place, a graph is generated exactly like
if it was a tennis tournament, and then throughout the year the tournaments are
gathered in order to indicate who is the best chef, applying the weight of the topic of
the contest
36
36
6. Future work
held in the edges. The same application can be made with designers or even with
videogame players.
Tool for help in bets.
With the results obtained, a great question comes up, can the generated ranking be
used to gamble?
Even though at first sight it appears that the numbers obtained are good and even
with the P(victory) we can indicate in a given match which are the odds of a player or
the other winning, this thesis opens the door to a more concrete analysis on the
subject.
We believe that the creation of a gambling assistant that can indicate which bets are
the most reliable to make and which ones will deliver more money. Having the
probability of victory in each game, we can indicate the minimum value of probability
for which is advisable to make a bet.
We can also try to indicate in the long term, the winners of the tournaments so that
we can get a greater winning in a bet in case we win it.
Other functions of this tool may be the simulation of how much money we can get by
putting an initial amount and always betting to the winner that our ranking indicates
based on the classification. We can make this by using our database since we have the
bet values in the match history.
Season planification for players.
Using the victory probability and the generated model, we can work on the planning
of the season of a player, finding what tournaments are best to play and arrive better
prepared, prioritizing the ones that will potentially provide an improvement on the
ranking.
The same can be done by match, even by going to play knowing what the concrete
chances of victory are.
Seizing also the fact that our ranking can be easily differentiated by surface, type of
tournament, and round, the strengths and weaknesses of the players can be known
and see how they behave in a match with these attributes, which allows the trainers
to customize the training routine in order to grow in those aspects and achieve
substantial improvements in the performance of their players.
37
6. Future work
Streaks
A factor that can be added to the model we use to generate the ranking is the
consideration of players' streaks. It happens in all seasons that there are moments of
the year where the players that start a series of victories o defeats in a row that will
make them either to escalate or to fall considerably in the ranking. This is something
that does not behave well in the long run since many times they are isolated moments
in the players' careers and do not reflect their level truly.
Therefore, if the strikes are evaluated when generating the ranking, the matches in
which these players were either victorious or defeated due to a strike can be given a
different weight that allow our model not to be confused and to deliver a ranking that
truly reflects in the classifying level, who is the best player for that moment, in a way
that the results of the matches reflect the given classification.
38
7. CONCLUSIONS
Facing the idea of achieving a social ranking understood by all the tennis followers,
the ATP ranking is exposed to constant complains of players and at the same time exposes
new players to be benefitted with a good tournament in order to begin to progress in their
careers.
At the same time, analyzing the results obtained, it can be observed that the ATP
ranking is not capable enough to manage to predict with certainty who will be the winner
of a match in case we based only in the positions.
With the objective of overcoming these obstacles, the idea comes up to create a
new ranking that indicates which are the real victory odds of a player in the beginning of a
new tournament. We tried to generate a new ranking that stands out because of the usage
of the tournament characteristics for its generation.
At the beginning we implemented a ranking that uses Google's ordering algorithm,
called PageRank, in order to achieve a player's ordering of positions in which the matches
played by the players facing each other are more important than the round of a tournament
reached by a player.
This type of ranking also, by the characteristic of the algorithm used, allows us to
give more points to those players that won against the best players of the tournament and
the circuit.
However, when comparing the prediction capability, it was only a little better than
the current one, but not sufficient as to affirm that it is a best predictor.
It was then that we came up with the idea of implementing a ranking similar to the
last one but where not only we will look at the result of the matches but we could also
evaluate other attributes that these showed. Being one of those that took into account the
ATP ranking. We thus created the Parametric Pagerank model, where we made a
combination of the rankings already existent and also, we looked at other factors to evaluate
it.
This new model behaves like the PageRank algorithm, but we add to each edge a
different weight, based on the surface, round of the tournament, type of tournament, and
age of the matches history evaluated.
As it can be observed, we have obtained great improvements in comparison with
the existent models. Our model predicts the results of the matches and tournaments with
respect to the ATP with roughly a 3% of improvement.
Our model also achieved a better capacity to predict any itemization we had made,
by either matches between similar ranked players, type of tournament, or type of surface.
7. Conclusions
Once the improvement in the algorithm used was achieved, we delivered more
information regarding the possibility of predicting a result. That is why we integrated the
probability of victory to our analysis. This probability indicates, given a match and
evaluating the ranking difference between the players that intervene in it, with which
percentage our model may predict that the best ranked player will win.
For that, and based on a model of logistic regression, we have compared how our
model behaved with respect to other existent models. This comparison proved our model
more optimistic than the rest. We needed, then, a certainty calculation to see our optimism
did not indicate something that was not accurate. By using the AUROC measure we could
observe that our model, besides being optimistic, has a high certainty margin.
Given all these results, we can affirm that, throughout this work, we have created
a new robust tennis ranking, capable to predict with a high percentage the result of the
matches, considering a greater detail, as the ranking difference, to be able to say with what
certainty we are going to sense who will be the winner of the encounter.
39
40
Bibliography
[1] James B. The ranking that change tennis. From http://www.atpworldtour. com/news
[2] ATP World Tour Emirates
ATP
Rankings
FAQ.
From
http://www.
com/news
[3] ATP
World Tour About the
ATP
Challenger
From
http://www.
atpworldtour.com/en/corporate/history
[4] Bryant H. How to fix tennis' big problems 2013. From http://espn.go.com/ com/tennis
[5] LLangville, Amy N., and Carl D. Meyer. Who is #1?: the science of rating and ranking.
Princeton University Press, 2012.
[6] Brin, Sergey, and Lawrence Page. Reprint of: The anatomy of a large-scale hypertextual
web search engine. Computer networks 56.18 (2012): 3825-3833.
[7] Ashish G. Applications of PageRank to Recommendation Systems. From http:
//web.stanford.edu/class/msande233/handouts/lecture8.pdf
[8] Page L., Brin S., Motwani R. and Winograd T The PageRank Citation Ranking: Bringing
Order to the Web 7th International World Wide Web Conference, Brisbane, Australia,
1998.
[9] Irons, David J., Stephen Buckley, and Tim Paulden. Developing an improved tennis
ranking system. Journal of Quantitative Analysis in Sports 10.2 (2014): 109-118.
[10] Radicchi, Filippo, and Matjaz Perc. Who is the best player ever? A complex network
analysis of the history of professional tennis. PloS one 6.2 (2011): e17249.
[11] Dingle, Nicholas, William Knottenbelt, and Demetris Spanias. On the (page) ranking of
professional tennis players. Computer Performance Engineering. Springer Berlin
Heidelberg, 2013. 237-247.
[12] Spanias, A. Demetris, and B. William Knottenbelt. Tennis Player Ranking using
Quantitative Models. Manuscript
[13] Blackburn, McKinley L. Ranking the performance of tennis players: an application to
womens professional tennis. Journal of Quantitative Analysis in Sports 9.4 (2013): 367-
378.
[14] Barrow, Daniel, et al. Ranking rankings: an empirical comparison of the predictive power
of sports ranking methods. Journal of Quantitative Analysis in Sports 9.2 (2013): 187-
202.
[15] Dormagen, David. Development of a Simulator for the FIFA World Cup 2014.
Bachelorarbeit FU Berlin 13 (2014). Manuscript
Bibliography
[16] Anagnostopoulos C., Hand D.J., Adams N.M Measuring classification performance: the
hmeasure package Department of Mathematics, South Kensington Campus, Imperial
College London 2012
[17] Fawcett, Tom. ROC graphs: Notes and practical considerations for researchers. Machine
learning 31 (2004): 1-38.
[18] Leskovec, Jure, Anand Rajaraman, and Jeffrey David Ullman. Mining of massive datasets.
Princeton University Press, 2014.
41
42
7. APPENDIX
7.1.
Database
As we mentioned in the section we spoke about the data set, we have files that
contained information of about 40,000 matches.
Once these files where obtained, the task of interpreting the data of the .csv files
was not easy. The files had different formats, for some years we had more information and
for others we did not have all the required information.
Firstly, we needed to standardize the names of the players, since there were
matches where the player was Juan Martin Del Potro and others where the name of the
player was J.M Del Potro.
For that we built a script that took care of evaluating players who had one game
and evaluate if there was a player with a similar name, or they were players with just one
ATP match in those 10 years being evaluated.
The same condition occurred with the types of tournaments and its names, since
throughout all of these years the tournaments changed their names. For example, the ATP
250 and ATP 500 both were called International Series. All of this information was added in
order to have a reliable data set.
Other of the complications found is that the order of the information provided for
every year was different. In some files we had the result in a column while in a different year
the information was in other column, that it is why every file was reordered to, by using a
script, interpret in a simple way each one of the files.
Once the standardization of all the data was made we divided the information into
3 tables.
In order to do that, by going through each file and obtaining a match per line, we
generated three tables that contained all the necessary information.
Players: Player ID - Name of the player
Tournaments: Tournament ID - Name - Year - Week - Surface - Number of sets - Type
of tournament - Place - Ceiling
Matches: Player ID - Winner ID - Loser ID - Ranking ATP Winner - Ranking ATP Loser -
WSet1 - LSet1 - WSet2 - LSet2 - WSet3 - LSet3 - WSet4 LSet4 - WSet5 - LSet5 - Winner
Sets - Loser Sets - Full Match - Bet Payment Winner - Bet Payment Loser
Appendix
43
It was important to evaluate each player to check it was not already on our
database and to be able to associate each player of the tournaments to our base. At the same
time, we had the exact date of the match in the gathered data, so the script that inserted the
tournaments calculated, given a specific date, to what week and year it corresponded.
An extra complication that we had to sort out was that not all the games had with
the ATP ranking information, so we generated a script that crawled the official site of the
ATP (www.atpworldtour.com) to obtain the corresponding ranking for the players of those
matches.
7.2.
Implementation of the new PageRank model
7.2.1.
Parametric Pagerank
In order to calculate the parametric PageRank, we have developed the
corresponding scrips in Python that will allow us to calculate the PageRank given a specific
set of tournaments.
The calculation process was as it follows:
Graph generation by match
To generate a ranking for a particular tournament, our script looks at every
tournament with a maximum of a certain age. For each one of these tournaments, we
look at every match played and traced an edge directed from the loser to the winner.
For each edge previously traced, the weight that will be given to that match will be
calculated. To do that, as it was explained, it is calculated how much that match sums
in terms of age, surface, type, and tournament round, compared to the original
tournament for which the ranking will be generated.
Once the tournament is evaluated, each edge is added to a directed multigraph.
Obtaining of a PageRank per tournament and ranking generation
Once the multigraph is obtained with all the games evaluated for the tournament,
through the library, the pagerank spicy method is used that will give us a score for
each vertex of the multigraph. This score is the one that, according to its results, a
player will receive in the given raking.
When those scores are achieved, each player is linked to a name and the data is
ordered in a descending manner using the score. With such order we get an
arrangement where the first element is the number one player of the ranking and so
we generate a general ranking.
Evaluation of results based on the obtained ranking
By knowing how the PageRank is generated, we evaluate how this calculation behaves
in each tournament in every year. And that is why that by going through each
tournament, the ranking is generated and in each match it is evaluated if the ranking
Appendix
44
indicated correctly that the winner of the match had a better positioning in the
ranking than the loser. In case it is correct, we consider it a Hit; in case it is not, we
consider it a Miss. It should be taken into consideration that we only evaluate the
matches that resulted to be complete. Once the hit and miss of the entire year are
obtained, we evaluated how our parametric PageRank model behaved for that year.
The implementation for the PageRank calculation allows us, by using parameters, to indicate
which attributes are intended to be evaluated for a run. That allow us to differentiate by
surface, age, type of tournament, round, among other runs made to improve our model. For
those new players in the ranking, it is assigned manually in our PageRank a very high
ranking, since it has no history that reflects in the multigraph that is used to calculate the
PageRank.
7.2.2.
Best parameters calculation
To find the best combination of parameters to be used to calculate the value of
every edge we used the following algorithm
Algorithm 1 Algorithm browser of new parameters.
yearDone ← true
surfaceDone ← true
tournamentDone ← true
exponentialDone ← true
exponential ← [5,10]
surfaces ← [00,1.,1]
tournaments ← [11,1.,2]
years ← [1.,6]
0
maxResult
bestExponentialDecay ← 0
bestTournamentWeight ← 0
bestY
0
bestSurfaceWeight ← 0
earBefore ←
←
while yearDone and surfaceDone and tournamentDone and exponentialDone do
for y in years do
(result,year) ← max(processYear(y))
end for
if result == maxResult then
yearDone ← false
end if
if result > maxResult
bestYearBefore ←
maxResult ← result
end if
then
year
Appendix
45
for e in exponential do
(result,exponential) ← max(processExponential(e))
end for
if result == maxResult then
yearDone ← false
end if
if result > maxResult then
bestExponentialDecay ← exponential
maxResult ← result
end if
for s in surface do
(result,surface) ← max(processSurface(s))
end for
if result == maxResult then
surfaceDone ← false
end if
if result > maxResult then
bestSurfaceWeight ← surface
maxResult ← result
end if
for t in tournaments do
(result,tournament) ← max(processTournament(t))
end for
if result == maxResult then
tournamentDone ← false
end if
if result > maxResult then
bestTournamentWeight ← tournament
maxResult ← result
end if
end while
Algorithm 2 Algorithm browser for best year.
Procedure processYear (y)
bestYearBefore ← y
result ← evaluateTournamentWithBetterParameters()
return result
end procedure
Algorithm 3 Algorithm browser for best exponential.
procedure processExponential(e)
Appendix
46
bestExponentialDecay ← e
result ← evaluateTournamentWithBetterParameters()
return result
end procedure
Algorithm 4 Algorithm browser of the best parameter for surface.
procedure processSurface(s)
bestSurfaceWeight ← s
result ← evaluateTournamentWithBetterParameters()
return result
end procedure
Algorithm 5 Algorithm browser of the best λ for tournament.
procedure processTournament(t)
bestTournamentWeight ← t
result ← evaluateTournamentWithBetterParameters()
return result
end procedure
Where evaluateTournamentWithBetterParameters is the function that calculates
the efficiency of the Pagerank with the parameters in the flags as the best parameters of that
run.
7.2.3.
Probability of victory and AUROC
For the calculation of victory and the posterior AUROC analysis, we have generated
a table in the database that contains as information: winner ranking, loser ranking, and
match number. In order to complete this table, we have evaluated each game stored and
saved the ranking that delivered our model as a result for each player.
Calculation of victory probability
Evaluating each record in the generated table, we calculated the ranking difference
for each game and also we crossed the information with the rest of the tables in order
to know the surface and type of tournament being played. Then we group the ranking
difference and calculated the prediction efficiency of our ranking for that difference.
Appendix
47
That gives us place to generate two vectors. On one hand the xdata vector, where we
have all the ranking differences, and on the other hand the ydata vector, that would
have the efficiency of our ranking for those differences.
It is here where we try to minimize the error and generate the curve that manages to
draw each of those points closer as we indicated in the "Victory probability" section.
For that we calculated the curve that brings the function closer using the curve fit
method of the sklearn library. Once the best parameter for our function of the
regression model used is obtained, we are able to evaluate given a difference of the
ranking, how optimistic our model is when predicting the result.
Considering that the search could be parametrized, since we had the information of
those matches such as surface and type of tournament, we started to generate the
same for each possible combination.
That allowed us to generate a decision tree where with the characteristics of a match
given, besides the ranking difference, we could provide a greater certainty of the
results of the match.
AUROC calculation
For the calculation of the area under the ROC curve we re ran each game again, and
we set the tuples where the first element represented if the match was a hit or a miss
and the second element was the P(victory) of that game.
In the same way the result was replicated in the opposite way; this allow us to
generate a type S graphic necessary to calculate the ROC curve correctly and thus
obtaining the area under the curve.
For the ROC curve calculation, we generated two arrays: yTrue, that had the first
elements of each tuple, and the yScore, that had the second element. Then, with the
roc curve function, we generated the ROC curve that allow us to indicate the False
Positive Rate and the True Negative Rate.
In order to obtain the AUROC we used the roc auc score method, that with given the
generated arrays, already delivered the result of the area.
|
1306.5268 | 1 | 1306 | 2013-06-21T22:31:47 | Static and Dynamic Aspects of Scientific Collaboration Networks | [
"cs.SI",
"cs.DL",
"physics.soc-ph"
] | Collaboration networks arise when we map the connections between scientists which are formed through joint publications. These networks thus display the social structure of academia, and also allow conclusions about the structure of scientific knowledge. Using the computer science publication database DBLP, we compile relations between authors and publications as graphs and proceed with examining and quantifying collaborative relations with graph-based methods. We review standard properties of the network and rank authors and publications by centrality. Additionally, we detect communities with modularity-based clustering and compare the resulting clusters to a ground-truth based on conferences and thus topical similarity. In a second part, we are the first to combine DBLP network data with data from the Dagstuhl Seminars: We investigate whether seminars of this kind, as social and academic events designed to connect researchers, leave a visible track in the structure of the collaboration network. Our results suggest that such single events are not influential enough to change the network structure significantly. However, the network structure seems to influence a participant's decision to accept or decline an invitation. | cs.SI | cs | Static and Dynamic Aspects of
Scientific Collaboration Networks
Christian Staudt
Andrea Schumm
Henning Meyerhenke
Robert Gorke
Dorothea Wagner
[email protected]
[email protected]
[email protected]
[email protected]
[email protected]
Institute of Theoretical Informatics, Karlsruhe Institute of Technology (KIT), Am Fasanengarten 5, 76131 Karlsruhe, Germany
3
1
0
2
n
u
J
1
2
]
I
S
.
s
c
[
1
v
8
6
2
5
.
6
0
3
1
:
v
i
X
r
a
Abstract—Collaboration networks arise when we map the
connections between scientists which are formed through joint
publications. These networks thus display the social structure of
academia, and also allow conclusions about the structure of scien-
tific knowledge. Using the computer science publication database
DBLP, we compile relations between authors and publications as
graphs and proceed with examining and quantifying collabora-
tive relations with graph-based methods. We review standard
properties of the network and rank authors and publications by
centrality. Additionally, we detect communities with modularity-
based clustering and compare the resulting clusters to a ground-
truth based on conferences and thus topical similarity. In a
second part, we are the first to combine DBLP network data
with data from the Dagstuhl Seminars: We investigate whether
seminars of this kind, as social and academic events designed
to connect researchers, leave a visible track in the structure of
the collaboration network. Our results suggest that such single
events are not influential enough to change the network structure
significantly. However, the network structure seems to influence
a participant’s decision to accept or decline an invitation.
I. INTRODUCTION
In scientometrics, the quantitative study of science, network
analysis has become a prominent tool. Coauthorship networks
have attracted interest both as social networks and as knowl-
edge networks: They display the social structure of academia,
while their bibliographic aspect allows conclusions about the
structure of scientific knowledge. Accordingly, networks of
this kind are the objects of ongoing research: Newman ([1],
[2], [3], [4]), for example, studies properties of coauthorship
networks in the realm of physics (Los Alamos e-Print Archive,
SPIRES), mathematics (Mathematical Reviews), biomedical
research (Medline) and computer science (NCSTRL), sum-
marizing many statistical properties of coauthorship networks.
Aspects like connectedness, distance, degree distribution, cen-
trality and community structure are recurring themes in such
studies. Where we follow up on these topics, we cite relevant
related work in the respective sections of this paper.
Based on the extensive publication database DBLP [5], we
model relations between authors and publications as graphs,
mapping almost the entire field of computer science. This
allows us to examine and quantify the collaborative relations
between researchers using graph-based methods. We compile
a graph in which edges link coauthors, as well as a bipartite
author-paper graph. In the first part, we review standard
properties of the network, rank authors and publications by
centrality, and detect communities with modularity-based clus-
tering. In the second part, we combine the network with
seminar data provided by the Schloss Dagstuhl [6] conference
center: The Dagstuhl Seminars assemble researchers with the
goal of fostering (collaborative) work in cutting-edge areas of
computer science. We examine whether such events leave a
track in the structure of the collaboration network. For this
purpose, we apply appropriate measures to a time-resolved
version of the authorship graph.
We are the first to perform a joint analysis of the Dagstuhl
and DBLP datasets, which allows us to study the impact of
social/academic events on the time-evolution of the network
structure. Our results suggest that a participant’s decision to
accept or decline an invitation can be predicted from the net-
work data to some extent. While our analysis of the DBLP data
mostly confirms properties of similar networks, the distribution
of the number of coauthors differs from data reported in [4].
We also describe an approach to finding central researchers
based on eigenvector centrality in the bipartite authorship
graph, a combination that to our knowledge has not been
used before. Additionally, we apply modularity clustering and
compare the detected communities to a ground-truth defined
by conferences, from which we infer distinct areas of research.
II. PRELIMINARIES
A. Collaboration Network Model
As of 2011, DBLP covers about 1.5 million publications
by 0.8 million authors. The earliest work dates from 1936,
and we include all works up to 2009 in our analysis. We
describe briefly how a coauthorship network is extracted from
the publication database and represented as different types of
graphs. The database associates publications and authors and
thus provides two main relations, authorship and coauthorship,
formalized as follows:
Def. 1. Given the sets of authors A and publications P, the
authorship relation is defined as
∀{a, p} ∈ A × P :
a (cid:94) p ⇐⇒ a is author of p
The coauthorship relation between two authors from A is
defined as
∀{a, b} ∈ A × A : a (cid:95) b ⇐⇒ ∃p ∈ P : a (cid:94) p ∧ b (cid:94) p
From these, two graph representations of the network fol-
low: A bipartite authorship graph (or author-paper graph)
GPA, in which each publication is connected by edges to its
authors; and a coauthorship graph GA, in which two authors
are connected by an edge if they are coauthors of a joint
publication.
Def. 2. The authorship graph is a mapping from the sets of
publications P and authors A to the node sets VP and VA,
resulting in a bipartite graph GPA = (VA, VP, E), where
{va, vp} ∈ E ⇐⇒ a (cid:94) p
Def. 3. The coauthorship graph is a mapping from the set of
authors A to the node set VA, resulting in the graph GA =
(VA, E), where
{va, vb} ∈ E ⇐⇒ a (cid:95) b
While GA is sufficient when focusing only on the social
network of coauthors, GPA preserves the publications as
the cause of relations, as well as single-author publications.
Table I shows the size of the graphs constructed from the full
publication data set.
graph
GPA
GA
n
2 296 586
852 250
m
3 775 881
2 785 037
TABLE I
SIZE OF RESULTING GRAPHS
In order to determine whether events have effects detectable
in terms of the network (Section IV), we also track groups
of authors over the course of time, using a sequence of
graphs in which each graph represents a current snapshot
of the authorship relations. This time-resolved version of
GPA enables us to study the dynamics of the network: Let
t(p) denote the publication date of publication p. Then the
publications from a time segment [y, z], z > y, are
P[y,z] := {p ∈ P : y ≤ t(p) ≤ z}
The respective authors of these publications are
A[y,z] := {a ∈ A : ∃p ∈ P[y,z] : a (cid:94) p}
The graph sequence is constructed on the basis of a sliding
time segment, with parameters width w and increment s:
Def. 4. The time-resolved authorship graph is a sequence of
graphs Gw,s
PA where each graph in the sequence is constructed
from the publications in P[y,y+w] and the authors up to
A[y,y+w] using a sliding time segment with width w and
increment s.
Author nodes are aggregated over time, while publications
are deleted for each step in the sequence. A time segment and
increment of 1 year was chosen for the study in Section IV,
the finest time resolution possible with DBLP data.
III. NETWORK PROPERTIES AND COMMUNITY
STRUCTURE
A. General Network Properties
We briefly review some general properties of the collabo-
ration network:
a) Connectedness: GA features a giant connected com-
ponent containing about 80% of all authors. (Giant compo-
nents connecting up to 90% of all authors have previously been
detected across scientific fields [3]). Aside from the 6% of the
authors without collaborations, about 14 % of author nodes
are distributed over a multitude of small components with few
publications. We conclude that, in general, authors who have
worked on several publications and were part of more than
one collaborative team join the large connected component.
In terms of average distances between researchers (6.58 for
a sample), we confirm the previously reported small world
property for the field of computer science [4] and DBLP in
particular [7].
Fig. 1. Histogram of core numbers in GA (x-axis: core number, logarithmic
y-axis: frequency)
b) k-Core Structure: A k-core is a maximal subgraph
in which each node is adjacent to at least k other nodes. k-
cores refine the concept of connected components (which form
the 1-core); k-core decomposition reveals nested, successively
more cohesive layers of the graph. We assign each node
a core number, the highest k for which there is a k-core
containing the node. Figure 1 shows a histogram of the
resulting core numbers in GA with two logarithmic axes.
The rather uniform sequence indicates uniform density and
cohesiveness of the graph, showing that the network does not
have strongly cohesive groups of authors embedded in shells
of weakly connected authors [8]. A more extensive k-core
analysis of a DBLP-based coauthorship network is presented
in [9].
c) Degree Distribution: Node degree in GA corresponds
to the number of coauthors of each author. The degree dis-
tribution is highly skewed. It indicates a scale-free network,
in which the frequency P (k) of nodes with degree k follows
a power law, i.e. P (k) ∼ k−γ, with coefficient γ = 2.889.
Newman [3] reports a differing power-law degree distribution
2
125102050100101001000104105centrality · 10−5
9.76232
9.45441
9.08697
8.30777
7.91401
7.82901
7.75409
7.69387
7.50894
7.47370
author
Diane Crawford
Robert L. Glass
Chin-Chen Chang
Edwin R. Hancock
Grzegorz Rozenberg
Joseph Y. Halpern
Sudhakar M. Reddy
Philip S. Yu
Moshe Y. Vardi
Ronald R. Yager
Fig. 2. Degree distribution in GA (logarithmic x-axis: degree, logarithmic
y-axis: frequency)
TOP SEGMENT OF AUTHOR RANKING BY CENTRALITY
TABLE II
in the number of coauthors with γ = 3.41 for computer
science, based on NCSTRL.
d) Summary: General properties indicate that the net-
work of collaborations in computer science is in many respects
a typical social network: It shows participation inequality
(visible as a power-law degree distribution), with a few highly
prolific authors and many smaller contributions. It also features
a high degree of connectedness, a giant component, and mostly
short paths between arbitrary pairs of nodes. Our observations
are in agreement with the results of related studies (except
for the degree power-law exponent),
these
properties are universal features of scientific collaboration
networks.
indicating that
B. Centrality
Centrality measures were formulated to identify nodes
which are structurally prominent or influential, due to their
position in the center of a network. Betweenness and closeness
centrality have previously been applied to coauthorship graphs
with the goal of identifying influential scientists in their
respective fields ([4], [10]). Elmacioglu et al. report a ranking
of prominent scholars by closeness and betweenness central-
ity [7]. As a rationale, it has been stated that authors with
high betweenness are important intermediates for interactions
or information flows, as it allows them to control such flows;
high closeness is assumed to be an advantage for accessing
or disseminating information [7]. However, it is not clear
why academic influence should be understood mainly as the
ability to mediate interactions. Furthermore, the network of
information flow in academia and the network of coauthorship
relations may be quite distinct. We therefore follow a different
approach based on eigenvector centrality [11] in the bipartite
authorship graph: It assumes that an author’s influence is first
of all proportional to the amount of publications. Additionally,
the contribution of a paper to an author’s centrality should be
weighted depending on the centrality of the coauthors.
Def. 5. Eigenvector centrality: Given a graph G with adja-
cency matrix A, we require a centrality score xi of node vi to
be proportional to the scores of its neighbors:
n(cid:88)
j=1
xi = c
A(i, j) xj
c (cid:54)= 0
By the Perron-Frobenius theorem, there exists a nonnegative
eigenvector x of A (satisfying Ax = 1
c x = λx) which
corresponds to the largest eigenvalue λ. An entry xi constitutes
the desired centrality score for vertex vi.
Modeling the collaboration network as the bipartite graph
GPA has the benefit that it allows us to assign a centrality
score to a publication as a node, rather than just account
for a publication as an edge attribute or weight in GA [12].
Thus, our centrality scores express the concept that authors are
central in the collaboration network to the extent that they have
collaborated on central publications with other central authors.
In this respect, the approach is similar to ranking webpages
with the PageRank algorithm, where hyperlinks are treated
as votes to the relevance of the target page and are weighted
by the relevance of the source page.
Figure 3 shows the distributions of centrality scores for
authors and publications. Extreme values are less frequent,
and the distribution does not exhibit a power law. Table II
contains the top segment of an author ranking by our ap-
proach to centrality. (See [13] for a comparison to a purely
productivity-based ranking of DBLP authors.) The respective
ranking of publications places papers with unusually high
author counts at the top, e.g. work on large supercomputing
and database projects, and further study would be needed
to interpret publication centrality properly. With respect to
the evaluation in Section IV, it should also be noted that
Dagstuhl seminar invitees have a significantly higher median
eigenvector centrality score than other authors (3.8 · 10−6
versus 2.4 · 10−7). We therefore propose that eigenvector
centrality in bipartite author-paper networks is a promising
approach for studying the role and impact of collaborating
individuals in science, and might serve as an objective measure
of influence in scientific publishing.
3
102050100200500101001000104105(a) authors
(b) publications
Fig. 3. Centrality scores (logarithmic y-axis), sorted
C. Modularity-driven Clustering
Graph clustering comprises a variety of methods for detect-
ing natural communities in networks. Formally, it is concerned
with partitioning the node set into disjoint subsets (clusters),
the result of which is called a clustering. The notion of a clus-
ter is usually based on the intra-cluster density versus inter-
cluster sparsity paradigm, according to which a clustering
should identify groups of nodes which are internally densely
connected, while only sparse connections exist between the
groups. One of the primary measures of clustering quality
based on this paradigm is modularity [14].
Def. 6. For a graph G = (V, E) and a clustering ζ =
(cid:0)(cid:80)
v∈C deg(v)(cid:1)2
{C1, . . . , Ck} of G, modularity is defined as
(cid:88)
(cid:88)
mod (G, ζ) :=
E(C)
E −
C∈ζ
C∈ζ
(2 · E)2
The measure considers the clustering’s coverage (the frac-
tion of edges placed within a cluster) on the actual graph
and subtracts the coverage it would achieve on a randomly
connected version of the graph (preserving degree distribu-
tion). Modularity-based clusterings often agree with human
intuition, although criticism has emerged recently [15]. Since
maximizing modularity is an NP-hard problem [16], we use
a heuristic based on local greedy agglomeration. The base
algorithm, commonly referred to as the Louvain Method [17],
starts with a singleton clustering, considers nodes in turn,
moves them to the best neighboring cluster and contracts
the graph for the next iteration. This yields a hierarchy of
graphs with increasing coarseness where the clustering in the
coarsest level induces the resulting clustering in the original
4
Fig. 4.
y-axis: frequency)
Size distribution for the 300 largest clusters (x-axis: cluster size,
graph. Rotta etal. [18] enhance this algorithm by a refinement
phase that iteratively projects this clustering to lower levels of
the hierarchy and further improves modularity by local node
moves. We use this modified algorithm.
It is a common approach to apply a clustering method
to a real world network and then compare it to a ground-
truth partition of the node set in order to interpret the result.
For example, Rodriguez et al. [19] study sensor networks
research groups and apply clustering techniques like leading
eigenvector, but not modularity maximization; these network-
structural communities are then compared to communities
defined by socio-academic similarities.
We therefore proceed as follows: Applying local greedy
agglomeration to GPA yields a clustering with 86761 clusters,
achieving a modularity of 0.896896. The majority of clusters
contain only a handful of nodes, and likely correspond to
the many tiny components of the graph, while the dominant
connected component is divided into several large clusters (see
Figure 4). With a clustering of the authorship graph at hand,
we attempt to interpret such a modularity-driven clustering
in the context of collaboration networks. The partition found
by maximizing modularity locally identifies groups of authors
who are densely connected through collaborative ties. Our
hypothesis is that we can infer a topical similarity from these
connections. More precisely, we conjecture that researchers
form collaborative ties around distinct areas of research, which
is reflected in the clustering structure of the graph. To put this
hypothesis to the test, we compare the modularity clustering of
GPA to a ground-truth subdivision of the author set based on
conferences: Assuming that distinct areas of computer science
generally have dedicated conferences, we assign all authors
who have published at a particular conference to an author-
cluster. (Unlike the modularity clustering, this does not yield a
proper, complete and disjoint partition of the author set, but is
nonetheless informative.) Thereby we arrive at topical clusters
of authors, which are suited as a ground-truth to compare the
modularity clustering to.
In order to evaluate the similarity between the two com-
munity structures, one being the modularity clustering, the
other the topical clustering defined by conferences, we apply
overlap measures to each pair of clusters: The Jaccard index
0501001502002503001000020000300004000050000A∩B
A∩B
A∪B favors exact match of the two sets; the
J(A, B) :=
overlap coefficient O(A, B) :=
min(A,B) treats containment
of one set
in the other set as a strong match, which is
more equitable when dealing with clusters of uneven sizes.
Applying these measures yields matrices of overlap values
between modularity clusters and topical clusters. Additionally,
we arrive at a baseline for the overlap values by calculating
the overlap matrix of modularity clustering and a random
clustering. The random clustering is constructed by copying
the size distribution of the 250 largest modularity clusters, but
randomly assigning authors to the clusters.
In these overlap matrices, we are interested in the maximum
entry for each row, pointing to pairs of clusters that are most
similar. Table III shows the means of these maximum overlap
values. It is evident that the maximum J and O overlap is
significantly better for modularity clusters than for random
clusters. This shows that a more than coincidental relation
between modularity clusters and topical clusters exists. How-
ever, the values are not close to 1.0 and indicate that the
correspondence is not very strong. Thus, factors in addition
to joint conferences are influential in shaping the community
structure of the network. In the following section, we take
an in-depth look at one possible factor of this kind, namely
participation in research seminars.
IV. IMPACT OF SEMINARS ON NETWORK EVOLUTION
After describing static aspects of the network in the previous
section,
this section is concerned with its dynamics: We
examine whether the Dagstuhl Seminars, as academic and
social events, leave a track in the structure of the network,
preferably in the form of increased collaboration between
the participants. In the authors’ subjective experience,
the
seminars present valuable opportunities for networking. Our
approach to this question can be summarized as follows: Track
groups of researchers (seminar participants and others selected
as reference groups) in the time-resolved graph G1,1
PA and
observe their publication output as well as their collaborative
links; take into account the date of a seminar in order to
observe immediate or long-term effects. The preparations
necessary for this approach are described in the following:
A. Preparations
a) Aligning Data Sets: Our data sets record a total of
11 625 seminar guests in the Dagstuhl database and 852 250
authors in DBLP. All seminars took place in the 2000s.
We align the tests by author name, whereby some false
(mis)matches cannot be avoided. Still, a matching author in the
random
O 0.04404
0.00372
J
topical
0.22832
0.01390
MEAN MAXIMUM OVERLAP FOR MODULARITY CLUSTERING AND
TABLE III
RANDOM VS TOPICAL CLUSTERING
Fig. 5.
Illustrating collaboration measure cad: cad(A) = 2/3
publication database was found for 72 percent of the seminar
invitees.
it
b) Area Launchers: In order to detect increased collabo-
ration which can be clearly attributed to the seminars, we first
try to identify area launchers. These are seminars intended
to bring together a group of researchers who have not collab-
orated much before. A stated goal of the Dagstuhl Seminars
is that some of them are intended to launch new areas of
research by fostering collaboration between previously unaffil-
iated researchers, thereby contributing to emerging fields. Area
launchers are relevant to us due to the following argument:
If participants develop collaborative ties in the aftermath of
an area launcher seminar,
is possible to attribute this
more clearly to the seminar rather than existing relationships,
developed, for instance, in the course of a common conference.
We classify a set of seminars as area launchers without
special knowledge about the intent or content of the seminar,
but solely from participation data: It is assumed that well-
established areas of research generally spawn their own dedi-
cated conference, and that the participants of such a conference
represent the researchers active in this area. By this logic,
a seminar corresponds to an established area of research if
the invitees have a strong overlap with the participants of the
respective conference. Furthermore, if researchers attend the
same conference, it is likely that they are already familiar
with each other as well as each other’s work. We therefore
reason that a seminar is an area launcher if its invitees do
not overlap strongly and clearly with the participants of any
particular conference. From this calculated set of seminars, 10
seminars are selected by hand and classified as area launchers.
c) Measures: We quantify the publication output and
intensity of collaboration among researchers using several
measures which map sets of authors to real numbers. For
example, Figure 5 shows a small number of authors (light
nodes) and their publications (dark nodes) in the authorship
graph. Authors belonging to A are colored blue. Blue lines
show existing (dashed line) and nonexisting (dotted line)
coauthorship relations between pairs of authors in A. This
illustrates the measure cad (A), which is the fraction of ac-
tually existing coauthorship relations within an author set.
Before introducing all measures, it is helpful to define sets
of (co)publications, copublications internal to a group, and
coauthors first: Given a set of authors A ⊆ A, the set of their
5
\x{FFFF}\x{FFFF}\x{FFFF}publications P (A) is equal to
(cid:91)
a∈A
(cid:91)
a∈A
{p ∈ P : a (cid:94) p}
P (A) :=
P (a) =
The set of copublications for an author a consists of
publications which were written as collaborations with another
author:
CP (a) := {p ∈ P (a) : ∃b ∈ A : b (cid:94) p}
For an author set A ⊆ A, the aggregated copublications are
CP (A) :=
CP (a)
(cid:91)
a∈A
(cid:91)
a∈A
The set of intra-copublications of a set of authors is defined
as
CPintra(A) := {p ∈ CP (A) : ∃a, b ∈ A : a (cid:94) p, b (cid:94) p}
The set of coauthors for a given author a ∈ A are those authors
with whom a has authored a collaboration.
CA(a) := {b ∈ A : b (cid:95) a}
This can be generalized for a set of authors A:
CA(A) :=
CA(a)
Based on these sets, we formulate five measures, listed and
defined in Table IV. These measures are intended to answer
the following questions:
• ap(A): What is the general productivity of an average
• acp(A): What is the productivity of such an author in
author from the group?
terms of collaborations?
• aca(A): With how many other authors does an average
author from the group collaborate?
• cpr intra(A): Do the authors collaborate more often within
the group or outside of the group?
• cad (A): How close is the group to a collaborative clique,
i.e. a group in which all authors have collaborated with
each other?
measure
ap(A)
acp(A)
aca(A)
cprintra(A)
cad(A)
definition
P (A)
CP (A)
CA(A)
CPintra(A)
CP (A)
A
A
A
{{a, b} ∈(cid:0)A
(cid:1) : a (cid:95) b}/(cid:0)A
(cid:1)
2
2
OVERVIEW OF COLLABORATION MEASURES AND THEIR DEFINITIONS
TABLE IV
6
d) Author Classes: The classes of author groups which
we track are the seminar participants on the one hand and
several reference classes on the other:
• seminar attendees (Ats): For each seminar s, the set of
researchers who attended the seminar.
• seminar absentees (Abs): For each seminar s, the set of
researchers who were invited to the seminar but did not
attend. (For some seminars, the set was empty or very
small, so these are only included if they have a sufficient
size.)
• random samples (RSi) Contains randomly assembled sets
of authors with the size of a typical seminar.
• connected samples (CSi) Contains sets of authors found
by collecting nodes from GPA in a breadth-first search
from a random initial node until the typical size of a
seminar is reached.
• all authors (A) A single set containing all authors.
B. Evaluation and Results
We speculate that joint participation in a seminar leads to
increased collaboration between the participants. This would
be measurable as higher values for the collaboration measures
(cad, cpr intra) on the respective subgraph. Additionally, we
measure whether seminar participation leads to a higher pub-
lication output for the participants (ap, acp, aca). In order to
test this, seminar-related groups as well as reference groups
are tracked within the graph G1,1
PA: For any author set A, a
subset A(cid:48)
⊆ A has corresponding nodes VA(cid:48) in the graph Gy.
For all measures M, we evaluate M (A(cid:48)), yielding a sequence
of values for each group. The evaluation yields one value
sequence per author group, and thus several data points per
year. All seminar-related sequences are aligned according to
the time of the seminar, in order to compare values before
and after seminar participation. We present these data points in
boxplot form (e.g. Figure 6), with the horizontal axis denoting
time relative to the seminar date and the vertical axis values of
the respective measure. By following the plotted median and
quantiles along the time axis, one can identify trends for the
author class as a whole. The point in time where a seminar
occurs is marked by an arrow.
In the following section, we describe a selection of notable
observations:
a) Average publication output remains rather constant:
For the authors as a whole (A), average publication output
and number of coauthors remain stable over time, even as the
graph grows at an increasing rate and author nodes accumulate.
b) Randomly grouped authors as a baseline for publica-
tion output: As a reference class, we evaluate the randomly
compiled author groups RS. Both ap and aca are, on average,
in the range of 0.6-0.8, showing that there are typically inactive
authors in any given time frame. As expected, there is no
collaboration between authors in the random samples.
c) Connected Sample Groups: Authors from the CS
have a significantly higher productivity than randomly selected
authors, since breadth-first search finds high-degree nodes
with a higher probability. There is also an upward trend over
time for all measures. A possible explanation for this is that
nodes gain connections over time according to degree,
if
there is an underlying preferential-attachment process at work
(as suggested by the power-law degree distribution). Overall
cpr intra remains clearly below 0.5, showing that these sample
groups are just sections from greater collaborative clusters.
(a) cpr intra: At
(a) aca: At
(b) cpr intra: Ab
Fig. 7.
relative to seminar, arrow: seminar date)
cpr intra (y-axis) for seminar attendees and absentees (x-axis: time
after. This effect would be most clearly captured by the
measures cpr intra (Figure 8) and cad. The plots in Figure 8
support our reasoning about area launchers, namely that the
authors invited have a comparatively low probability of collab-
oration in the time prior to the seminar: Values for cpr intra are
generally in the lower range compared to all seminars. Still,
a visible change after the time of the seminar is missing. The
influence of an area launcher seminar does not seem to differ
from the other seminars.
g) Subdivision by career stage: Suspecting that seminar
participation affects researchers in early stages of their career
more strongly, we repeat a part of the evaluation with the
authors classified by career length (≤ 5, ≤ 15, > 15 years of
publication history). However, the results do not modify our
conclusions: A seminar effect for academic newcomers is no
more observable than for all other authors.
h) Summary and Interpretation: Seminar invitees are
more productive and more collaborative than randomly se-
lected authors. Yet there is little difference between attendees
and absentees in terms of their productivity. Invited researchers
are already actively publishing, with an upward trend, prior
to the time of the seminar. For cpr intra and cad, attendees
are consistently better than absentees. This indicates that
those who attend are already a tightly connected collaborative
group before the seminar, possibly influencing their decision
to participate. The general trend over time is an increase
(b) aca: Ab
Fig. 6. aca (y-axis) for seminar attendees and absentees (x-axis: time relative
to seminar, arrow: seminar date)
d) Attendees and absentees are equally productive: The
effect of seminar participation is best judged by contrasting at-
tendees with absentees. With respect to productivity, measured
by the number of coauthors and the number of publications,
attendees and absentees are quite similar, with some outliers
among the absentees surpassing the attendees (see Figure 6).
For the productivity measures, an upward trend before the
seminar continues for a few years but then tends to reverse.
e) Attendees form a more cohesive group: For seminar
attendees, a larger fraction of their collaborations are internal
to the seminar group, both before and after the seminar (Fig-
ure 7). This indicates that attendees already come from a more
cohesive group. Values for cad agree with this interpretation:
Clearly, those who choose to attend the seminar form a denser
subgraph in the collaboration network. There seems to be
no lasting increase in collaboration after the seminar, but a
downward trend for both attendees and absentees.
f) Area launchers are not exceptional: For the subset of
seminars classified as area launchers, we expect comparatively
less collaboration before the seminar, and a stronger increase
7
051015051015200.00.10.20.30.40.50.60.70.00.20.40.60.81.0social network, as observed before in similar studies: We
encounter properties such as low average distances between
researchers, a giant connected component, a power-law dis-
tribution with regard to publications and coauthors (making
it a scale-free network), and a regular k-core structure. We
detect dense communities of researchers through modularity
maximization, and compare the resulting clustering to ground-
truth communities defined by conferences, from which topical
similarity is inferred. The overlap between the two partitions
is clearly not coincidental, although other factors seem to
be at work in shaping the community structure. In order to
identify influential researchers by their network centrality, we
test a novel combination of bipartite author-paper graph and
eigenvector centrality. We are the first to incorporate data on
participants of the Schloss Dagstuhl research seminars and use
it to evaluate the impact of such seminars on the evolution
of collaborative ties. Since the seminars are designed to
foster collaboration on cutting-edge research topics, and many
participants experience the seminars as a valuable opportunity
for networking, we investigate whether such effects can be
observed as structural changes in the collaboration network.
Seminar invitees are more productive, more collaborative and
structurally prominent compared to the average researcher.
However, our methods suggest that seminar participation does
not directly affect the structure of the collaboration network.
An interesting finding of this analysis was that researchers who
choose to attend the seminar form a distinctly more cohesive
subgraph than those who decline.
ACKNOWLEDGMENT
We thank Ulrik Brandes for helpful discussions during the
preparation of this work. We also thank the Schloss Dagstuhl
conference center for providing us with the necessary data on
their seminars.
REFERENCES
[1] M. E. Newman, “The structure of scientific collaboration networks.”
Proceedings of the National Academy of Sciences of the United States
of America, vol. 98, no. 2, pp. 404–9, Jan. 2001. [Online]. Available:
http://www.pubmedcentral.nih.gov/articlerender.fcgi?artid=14598
[2] M. E. J. Newman, “Coauthorship networks and patterns of scientific
the National Academy of Sciences
the United States of America, vol. 101 Suppl, pp. 5200–5,
[Online]. Available: http://www.pubmedcentral.nih.gov/
collaboration.” Proceedings of
of
Apr. 2004.
articlerender.fcgi?artid=387296
[3] M. Newman, “Scientific collaboration networks. I. Network construction
and fundamental results,” Physical Review E, vol. 64, no. 1, pp.
1–8, Jun. 2001.
[Online]. Available: http://link.aps.org/doi/10.1103/
PhysRevE.64.016131
[4] M. E. J. Newman, “Scientific collaboration networks. II. Shortest
and centrality,” Physical Review E,
[Online]. Available: http:
Jun. 2001.
paths, weighted networks,
vol. 64, no. 1, pp. 1–7,
//link.aps.org/doi/10.1103/PhysRevE.64.016132
[5] “DBLP - Digital Bibliography and Library Project,” 2007, http://dblp.
[6] “Schloss Dagstuhl,” http://www.dagstuhl.de. [Online]. Available: http:
uni-trier.de/.
//www.dagstuhl.de
[7] E. Elmacioglu, “On Six Degrees of Separation in DBLP-DB and More,”
Distribution, vol. 34, no. 2, pp. 33–40, 2005.
[8] J. Scott, Social Network Analysis - a Handbook, 2nd ed.
SAGE
Publications, 2000.
(a) cpr intra: At
(b) cpr intra: Ab
Fig. 8. cpr intra (y-axis) for attendees and absentees of area launchers (x-axis:
time relative to seminar, arrow: seminar date)
up to the seminar and a slight decrease afterwards for both
classes of researchers. A possible explanation for the increase
and decrease over time is that invitations are biased towards
researchers who are currently most active: Invitations to sem-
inars occur at a period of peak activity. There is, however,
no significant change of structure connected to seminars
(either significant short-term increase in collaboration directly
after the seminar or long-term increase). Most importantly,
attendees and absentees do not differ in this respect. While
the focus on area launcher seminars supports our assumption
that the invited researchers had collaborated less, a significant
structural change after the seminar is not visible. These results
suggest that a single event like a seminar is not influential
enough to alter the network structure of collaboration for the
group of participants in ways observable with our measures.
Clearly, other factors have additional and apparently more
influence on the structure. Rather in the opposite direction,
the network structure might be employed to predict who will
attend the seminar and who will decline, since the participants
evidently come from a more cohesive group.
V. CONCLUSION
This paper ties in with the existing work on scientific
collaboration networks and explores several new variations of
network analysis methods. The coauthorship graph in the field
of computer science constitutes in many respects a typical
8
0.000.050.100.150.200.250.300.000.050.100.15[9] C. Giatsidis, D. Thilikos, and M. Vazirgiannis, “Evaluating Cooperation
in Communities with the k-Core Structure,” Social Networks. [Online].
Available: http://graphdegeneracy.org/k-cores.pdf
[10] K. Boerner, L. Dall’Asta, W. Ke, and A. Vespignani, “Studying
the emerging global brain: Analyzing and visualizing the impact of
co-authorship teams,” Complexity, vol. 10, no. 4, pp. 57–67, Mar. 2005.
[Online]. Available: http://doi.wiley.com/10.1002/cplx.20078
[11] P. Bonacich, “Factoring and Weighting Approaches to Status Scores
and Clique Identification,” Journal of Mathematical Sociology, vol. 2,
pp. 113–120, 1972.
[12] P. Bonacich, A. Cody Holdren, and M. Johnston, “Hyper-edges
and multidimensional centrality,” Social networks, vol. 26, no. 3,
pp. 189–203, 2004. [Online]. Available: http://www.sciencedirect.com/
science/article/pii/S0378873304000024
[13] “Most Prolific DBLP Authors,” http://www.informatik.uni-trier.de/∼ley/
db/indices/a-tree/prolific/. [Online]. Available: http://www.informatik.
uni-trier.de/∼ley/db/indices/a-tree/prolific/
[14] M. E. J. Newman and M. Girvan, “Finding and evaluating community
structure in networks,” Physical Review E, vol. 69, no. 026113, pp. 1–16,
2004. [Online]. Available: http://link.aps.org/abstract/PRE/v69/e026113
[15] A. Lancichinetti and S. Fortunato, “Limits of modularity maximization
in community detection,” Phys. Rev. E, vol. 84, p. 066122, Dec
2011. [Online]. Available: http://link.aps.org/doi/10.1103/PhysRevE.84.
066122
[16] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hofer, Z. Nikoloski,
and D. Wagner, “On Modularity Clustering,” IEEE Transactions on
Knowledge and Data Engineering, vol. 20, no. 2, pp. 172–188,
February 2008. [Online]. Available: http://doi.ieeecomputersociety.org/
10.1109/TKDE.2007.190689
[17] V. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, “Fast
unfolding of communities in large networks,” Journal of Statistical
Mechanics: Theory and Experiment, vol. 2008, no. 10, 2008. [Online].
Available: http://dx.doi.org/10.1088/1742-5468/2008/10/P10008
[18] R. Rotta and A. Noack, “Multilevel
local search algorithms for
modularity clustering,” ACM Journal of Experimental Algorithmics,
vol. 16, pp. 2.3:2.1–2.3:2., July 2011.
[Online]. Available: http:
//doi.acm.org/10.1145/1963190.1970376
[19] M. a. Rodriguez and A. Pepe, “On the relationship between the structural
and socioacademic communities of a coauthorship network,” Journal of
Informetrics, vol. 2, no. 3, pp. 195–201, Jul. 2008. [Online]. Available:
http://linkinghub.elsevier.com/retrieve/pii/S1751157708000230
9
|
1505.05663 | 1 | 1505 | 2015-05-21T10:04:42 | Inferring Graphs from Cascades: A Sparse Recovery Framework | [
"cs.SI",
"cs.LG",
"stat.ML"
] | In the Network Inference problem, one seeks to recover the edges of an unknown graph from the observations of cascades propagating over this graph. In this paper, we approach this problem from the sparse recovery perspective. We introduce a general model of cascades, including the voter model and the independent cascade model, for which we provide the first algorithm which recovers the graph's edges with high probability and $O(s\log m)$ measurements where $s$ is the maximum degree of the graph and $m$ is the number of nodes. Furthermore, we show that our algorithm also recovers the edge weights (the parameters of the diffusion process) and is robust in the context of approximate sparsity. Finally we prove an almost matching lower bound of $\Omega(s\log\frac{m}{s})$ and validate our approach empirically on synthetic graphs. | cs.SI | cs | Inferring Graphs from Cascades: A Sparse Recovery Framework
5
1
0
2
y
a
M
1
2
]
I
S
.
s
c
[
1
v
3
6
6
5
0
.
5
0
5
1
:
v
i
X
r
a
Jean Pouget-Abadie
Harvard University
Thibaut Horel
Harvard University
Abstract
In the Network Inference problem, one seeks to
recover the edges of an unknown graph from the
observations of cascades propagating over this
graph.
In this paper, we approach this prob-
lem from the sparse recovery perspective. We
introduce a general model of cascades, includ-
ing the voter model and the independent cascade
model, for which we provide the first algorithm
which recovers the graph’s edges with high prob-
ability and O(s log m) measurements where s is
the maximum degree of the graph and m is the
number of nodes. Furthermore, we show that
our algorithm also recovers the edge weights (the
parameters of the diffusion process) and is ro-
bust in the context of approximate sparsity. Fi-
nally we prove an almost matching lower bound
of Ω(s log m
s ) and validate our approach empiri-
cally on synthetic graphs.
1. Introduction
Graphs have been extensively studied for their propaga-
tive abilities: connectivity, routing, gossip algorithms, etc.
A diffusion process taking place over a graph provides
valuable information about the presence and weights of its
edges. Influence cascades are a specific type of diffusion
processes in which a particular infectious behavior spreads
over the nodes of the graph. By only observing the “in-
fection times” of the nodes in the graph, one might hope
to recover the underlying graph and the parameters of the
cascade model. This problem is known in the literature as
the Network Inference problem.
More precisely, solving the Network Inference problem
involves designing an algorithm taking as input a set of
Proceedings of the 32 nd International Conference on Machine
Learning, Lille, France, 2015. JMLR: W&CP volume 37. Copy-
right 2015 by the author(s).
[email protected]
[email protected]
observed cascades (realisations of the diffusion process)
and recovers with high probability a large fraction of the
graph’s edges. The goal is then to understand the relation-
ship between the number of observations, the probability
of success, and the accuracy of the reconstruction.
The Network Inference problem can be decomposed and
analyzed “node-by-node”. Thus, we will focus on a sin-
gle node of degree s and discuss how to identify its par-
ents among the m nodes of the graph. Prior work has
shown that the required number of observed cascades is
O(poly(s) log m) (Netrapalli & Sanghavi, 2012; Abrahao
et al., 2013).
A more recent line of research (Daneshmand et al., 2014)
has focused on applying advances in sparse recovery to the
network inference problem. Indeed, the graph can be in-
terpreted as a “sparse signal” measured through influence
cascades and then recovered. The challenge is that influ-
ence cascade models typically lead to non-linear inverse
problems and the measurements (the state of the nodes at
different time steps) are usually correlated. The sparse re-
covery literature suggests that Ω(s log m
s ) cascade obser-
vations should be sufficient to recover the graph (Donoho,
2006; Candes & Tao, 2006). However, the best known up-
per bound to this day is O(s2 log m) (Netrapalli & Sang-
havi, 2012; Daneshmand et al., 2014)
The contributions of this paper are the following:
• we formulate the Graph Inference problem in the con-
text of discrete-time influence cascades as a sparse re-
covery problem for a specific type of Generalized Lin-
ear Model. This formulation notably encompasses the
well-studied Independent Cascade Model and Voter
Model.
• we give an algorithm which recovers the graph’s edges
using O(s log m) cascades. Furthermore, we show
that our algorithm is also able to efficiently recover the
edge weights (the parameters of the influence model)
up to an additive error term,
• we show that our algorithm is robust in cases where
the signal to recover is approximately s-sparse by
Inferring Graphs from Cascades: A Sparse Recovery Framework
proving guarantees in the stable recovery setting.
• we provide an almost tight lower bound of Ω(s log m
s )
observations required for sparse recovery.
The work of (Du et al., 2014) is slightly orthogonal to ours
since they suggest learning the influence function, rather
than the parameters of the network directly.
The organization of the paper is as follows: we conclude
the introduction by a survey of the related work. In Sec-
tion 2 we present our model of Generalized Linear Cas-
cades and the associated sparse recovery formulation. Its
theoretical guarantees are presented for various recovery
settings in Section 3. The lower bound is presented in Sec-
tion 4. Finally, we conclude with experiments in Section 5.
Related Work The study of edge prediction in graphs
has been an active field of
research for over a
decade (Liben-Nowell & Kleinberg, 2008; Leskovec et al.,
2007; Adar & Adamic, 2005). (Gomez Rodriguez et al.,
2010) introduced the NETINF algorithm, which approx-
imates the likelihood of cascades represented as a con-
tinuous process. The algorithm was improved in later
work (Gomez-Rodriguez et al., 2011), but is not known to
have any theoretical guarantees beside empirical validation
on synthetic networks. Netrapalli & Sanghavi (2012) stud-
ied the discrete-time version of the independent cascade
model and obtained the first O(s2 log m) recovery guaran-
tee on general networks. The algorithm is based on a like-
lihood function similar to the one we propose, without the
(cid:96)1-norm penalty. Their analysis depends on a correlation
decay assumption, which limits the number of new infec-
tions at every step. In this setting, they show a lower bound
of the number of cascades needed for support recovery with
constant probability of the order Ω(s log(m/s)). They also
suggest a GREEDY algorithm, which achieves a O(s log m)
guarantee in the case of tree graphs. The work of (Abra-
hao et al., 2013) studies the same continuous-model frame-
work as (Gomez Rodriguez et al., 2010) and obtains an
O(s9 log2 s log m) support recovery algorithm, without the
correlation decay assumption. (Du et al., 2013) propose a
similar algorithm to ours for recovering the weights of the
graph under a continuous-time independent cascade model,
without proving theoretical guarantees.
Closest to this work is a recent paper by Daneshmand et al.
(2014), wherein the authors consider a (cid:96)1-regularized ob-
jective function. They adapt standard results from sparse
recovery to obtain a recovery bound of O(s3 log m) under
an irrepresentability condition (Zhao & Yu, 2006). Under
stronger assumptions, they match the (Netrapalli & Sang-
havi, 2012) bound of O(s2 log m), by exploiting similar
properties of the convex program’s KKT conditions.
In
contrast, our work studies discrete-time diffusion processes
including the Independent Cascade model under weaker as-
sumptions. Furthermore, we analyze both the recovery of
the graph’s edges and the estimation of the model’s param-
eters, and achieve close to optimal bounds.
2. Model
We consider a graph G = (V, E, Θ), where Θ is a V ×
V matrix of parameters describing the edge weights of G.
Intuitively, Θi,j captures the “influence” of node i on node
j. Let m ≡ V . For each node j, let θj be the jth column
vector of Θ. A discrete-time Cascade model is a Markov
process over a finite state space {0, 1, . . . , K − 1}V with
the following properties:
1. Conditioned on the previous time step, the transition
events between two states in {0, 1, . . . , K − 1} for
each i ∈ V are mutually independent across i ∈ V .
2. Of the K possible states, there exists a contagious
state such that all
transition probabilities of the
Markov process can be expressed as a function of the
graph parameters Θ and the set of “contagious nodes”
at the previous time step.
3. The initial probability over {0, 1, . . . , K − 1}V is
such that all nodes can eventually reach a contagious
state with non-zero probability. The “contagious”
nodes at t = 0 are called source nodes.
In other words, a cascade model describes a diffusion pro-
cess where a set of contagious nodes “influence” other
nodes in the graph to become contagious. An influence cas-
cade is a realisation of this random process, i.e. the succes-
sive states of the nodes in graph G. Note that both the “sin-
gle source” assumption made in (Daneshmand et al., 2014)
and (Abrahao et al., 2013) as well as the “uniformly chosen
source set” assumption made in (Netrapalli & Sanghavi,
2012) verify condition 3. Also note that the multiple-source
node assumption does not reduce to the single-source as-
sumption, even under the assumption that cascades do not
overlap. Imagining for example two cascades starting from
two different nodes; since we do not observe which node
propagated the contagion to which node, we cannot at-
tribute an infected node to either cascade and treat the prob-
lem as two independent cascades.
In the context of Network Inference, (Netrapalli & Sang-
havi, 2012) focus on the well-known discrete-time indepen-
dent cascade model recalled below, which (Abrahao et al.,
2013) and (Daneshmand et al., 2014) generalize to contin-
uous time. We extend the independent cascade model in
a different direction by considering a more general class
of transition probabilities while staying in the discrete-time
setting. We observe that despite their obvious differences,
both the independent cascade and the voter models make
Inferring Graphs from Cascades: A Sparse Recovery Framework
the network inference problem similar to the standard gen-
eralized linear model inference problem. In fact, we define
a class of diffusion processes for which this is true:
the
Generalized Linear Cascade Models. The linear threshold
model is a special case and is discussed in Section 6.
2.1. Generalized Linear Cascade Models
Let susceptible denote any state which can become conta-
gious at the next time step with a non-zero probability. We
draw inspiration from generalized linear models to intro-
duce Generalized Linear Cascades:
Definition 1. Let X t be the indicator variable of “conta-
gious nodes” at time step t. A generalized linear cascade
model is a cascade model such that for each susceptible
node j in state s at time step t, the probability of j becom-
ing “contagious” at time step t + 1 conditioned on X t is a
Bernoulli variable of parameter f (θj · X t):
P(X t+1
j = 1X t) = f (θj · X t)
(1)
where f : R → [0, 1]
)
In other words, each generalized linear cascade pro-
vides, for each node j ∈ V a series of measurements
(X t, X t+1
sampled from a generalized linear model.
X t] = f (θi · X t). As such, f can
Note also that E[X t+1
be interpreted as the inverse link function of our general-
ized linear cascade model.
t∈Tj
j
i
2.2. Examples
2.2.1. INDEPENDENT CASCADE MODEL
In the independent cascade model, nodes can be either sus-
ceptible, contagious or immune. At t = 0, all source nodes
are “contagious” and all remaining nodes are “susceptible”.
At each time step t, for each edge (i, j) where j is suscep-
tible and i is contagious, i attempts to infect j with proba-
bility pi,j ∈ [0, 1]; the infection attempts are mutually in-
dependent. If i succeeds, j will become contagious at time
step t +1. Regardless of i’s success, node i will be immune
at time t + 1, such that nodes stay contagious for only one
time step. The cascade process terminates when no conta-
gious nodes remain.
If we denote by X t the indicator variable of the set of con-
tagious nodes at time step t, then if j is susceptible at time
step t + 1, we have:
j = 1 X t(cid:3) = 1 − m(cid:89)
P(cid:2)X t+1
(1 − pi,j)X t
i .
i=1
Defining Θi,j ≡ log(
1
1−pi,j
j = 1 X t(cid:3) = 1 − m(cid:89)
P(cid:2)X t+1
), this can be rewritten as:
e−Θi,j X t
i
(IC)
i=1
= 1 − e−Θj·X t
Therefore, the independent cascade model is a Generalized
Linear Cascade model with inverse link function f : z (cid:55)→
1− e−z. Note that to write the Independent Cascade Model
as a Generalized Linear Cascade Model, we had to intro-
). The re-
duce the change of variable Θi,j = log(
covery results in Section 3 pertain to the Θj parameters.
Fortunately, the following lemma shows that the recovery
error on Θj is an upper bound on the error on the original
pj parameters.
Lemma 1. (cid:107)θ − θ∗(cid:107)2 ≥ (cid:107)p − p∗(cid:107)2.
1−pi,j
1
2.2.2. THE LINEAR VOTER MODEL
malized such that ∀i, (cid:80)
In the Linear Voter Model, nodes can be either red or blue.
Without loss of generality, we can suppose that the blue
nodes are contagious. The parameters of the graph are nor-
j Θi,j = 1. Each round, every
node j independently chooses one of its neighbors with
probability Θi,j and adopts their color. The cascades stops
at a fixed horizon time T or if all nodes are of the same
color. If we denote by X t the indicator variable of the set
of blue nodes at time step t, then we have:
j = 1X t(cid:3) =
P(cid:2)X t+1
m(cid:88)
Θi,jX t
i = Θj · X t
(V)
i=1
Thus, the linear voter model is a Generalized Linear Cas-
cade model with inverse link function f : z (cid:55)→ z.
2.2.3. DISCRETIZATION OF CONTINUOUS MODEL
Another motivation for the Generalized Linear Cascade
model is that it captures the time-discretized formula-
tion of the well-studied continuous-time independent cas-
cade model with exponential transmission function (CICE)
of (Gomez Rodriguez et al., 2010; Abrahao et al., 2013;
Daneshmand et al., 2014). Assume that the temporal reso-
lution of the discretization is ε, i.e. all nodes whose (con-
tinuous) infection time is within the interval [kε, (k + 1)ε)
are considered infected at (discrete) time step k. Let X k
be the indicator vector of the set of nodes ‘infected’ before
or during the kth time interval. Note that contrary to the
j = 1 =⇒
discrete-time independent cascade model, X k
X k+1
= 1, that is, there is no immune state and nodes
remain contagious forever.
Let Exp(p) be an exponentially-distributed random vari-
able of parameter p and let Θi,j be the rate of transmis-
j
Inferring Graphs from Cascades: A Sparse Recovery Framework
Figure 1. Illustration of the sparse-recovery approach. Our objec-
tive is to recover the unknown weight vector θj for each node j.
We observe a Bernoulli realization whose parameters are given by
applying f to the matrix-vector product, where the measurement
matrix encodes which nodes are “contagious” at each time step.
sion along directed edge (i, j) in the CICE model. By the
memoryless property of the exponential, if X k
j (cid:54)= 1:
P(X k+1
j = 1X k) = P( min
i∈N (j)
Exp(Θi,j) ≤ )
= P(Exp(
Θi,jX t
i ) ≤ ) = 1 − e−Θj·X t
m(cid:88)
overfitting and controls the sparsity of the solution.
The generalized linear cascade model is decomposable in
the following sense: given Definition 1, the log-likelihood
can be written as the sum of m terms, each term i ∈
{1, . . . , m} only depending on θi. Since this is equally
true for (cid:107)Θ(cid:107)1, each column θi of Θ can be estimated by
a separate optimization program:
θi ∈ argmax
θ
Li(θi x1, . . . , xn) − λ(cid:107)θi(cid:107)1
(2)
where we denote by Ti the time steps at which node i is
susceptible and:
Li(θi x1, . . . , xn) =
1
Ti
t∈Ti
+ (1 − xt+1
i
xt+1
i
log f (θi · xt)
) log(cid:0)1 − f (θi · xt)(cid:1)
(cid:88)
i=1
Therefore,
the -discretized CICE-induced process is a
Generalized Linear Cascade model with inverse link func-
tion f : z (cid:55)→ 1 − e−·z.
2.2.4. LOGISTIC CASCADES
“Logistic cascades” is the specific case where the inverse
link function is given by the logistic function f (z) =
1/(1 + e−z+t). Intuitively, this captures the idea that there
is a threshold t such that when the sum of the parameters of
the infected parents of a node is larger than the threshold,
the probability of getting infected is close to one. This is
a smooth approximation of the hard threshold rule of the
Linear Threshold Model (Kempe et al., 2003). As we will
see later in the analysis, for logistic cascades, the graph in-
ference problem becomes a linear inverse problem.
2.3. Maximum Likelihood Estimation
Inferring the model parameter Θ from observed influence
cascades is the central question of the present work. Recov-
ering the edges in E from observed influence cascades is
a well-identified problem known as the Network Inference
problem. However, recovering the influence parameters is
no less important. In this work we focus on recovering Θ,
noting that the set of edges E can then be recovered through
the following equivalence: (i, j) ∈ E ⇔ Θi,j (cid:54)= 0
Given observations (x1, . . . , xn) of a cascade model,
we can recover Θ via Maximum Likelihood Estimation
(MLE). Denoting by L the log-likelihood function, we con-
sider the following (cid:96)1-regularized MLE problem:
L(Θ x1, . . . , xn) − λ(cid:107)Θ(cid:107)1
Θ ∈ argmax
1
n
Θ
where λ is the regularization factor which helps prevent
In the case of the voter model, the measurements include all
time steps until we reach the time horizon T or the graph
coalesces to a single state. For the independent cascade
model, the measurements include all time steps until node
i becomes contagious, after which its behavior is determin-
istic. Contrary to prior work, our results depend on the
number of measurements and not the number of cascades.
Regularity assumptions To solve program (2) effi-
ciently, we would like it to be convex. A sufficient condi-
tion is to assume that Li is concave, which is the case if f
and (1 − f ) are both log-concave. Remember that a twice-
differentiable function f is log-concave iff. f(cid:48)(cid:48)f ≤ f(cid:48)2.
It is easy to verify this property for f and (1 − f ) in the
Independent Cascade Model and Voter Model.
Furthermore, the data-dependent bounds in Section 3.1 will
require the following regularity assumption on the inverse
link function f: there exists α ∈ (0, 1) such that
max(cid:8)(log f )(cid:48)(zx),(log(1 − f ))(cid:48)(zx)(cid:9) ≤ 1
(LF)
α
z and
f (z) = 1
f(cid:48)(z)
(1−f )(z) = 1
for all zx ≡ θ∗ · x such that f (zx) /∈ {0, 1}.
In the voter model, f(cid:48)(z)
1−z . Hence
(LF) will hold as soon as α ≤ Θi,j ≤ 1 − α for all (i, j) ∈
E which is always satisfied for some α for non-isolated
nodes. In the Independent Cascade Model, f(cid:48)(z)
f (z) = 1
ez−1
f(cid:48)(z)
(1−f )(z) = 1. Hence (LF) holds as soon as pi,j ≥ α for
and
all (i, j) ∈ E which is always satisfied for some α ∈ (0, 1).
For the data-independent bound of Proposition 1, we will
require the following additional regularity assumption:
max(cid:8)(log f )(cid:48)(cid:48)(zx),(log(1 − f ))(cid:48)(cid:48)(zx)(cid:9) ≤ 1
(LF2)
α
Inferring Graphs from Cascades: A Sparse Recovery Framework
for some α ∈ (0, 1) and for all zx ≡ θ∗·x such that f (zx) /∈
{0, 1}. It is again easy to see that this condition is verified
for the Independent Cascade Model and the Voter model
for the same α ∈ (0, 1).
(cid:80)
Convex constraints The voter model is only defined
when Θi,j ∈ (0, 1) for all (i, j) ∈ E. Similarly the in-
dependent cascade model is only defined when Θi,j > 0.
Because the likelihood function Li is equal to −∞ when
the parameters are outside of the domain of definition of
the models, these contraints do not need to appear explic-
itly in the optimization program.
In the specific case of the voter model,
the constraint
j Θi,j = 1 will not necessarily be verified by the es-
timator obtained in (2). In some applications, the exper-
imenter might not need this constraint to be verified, in
which case the results in Section 3 still give a bound on
the recovery error. If this constraint needs to be satisfied,
then by Lagrangian duality, there exists a λ ∈ R such that
j θj − 1(cid:1) to the objective function of (2) en-
adding λ(cid:0)(cid:80)
forces the constraint. Then, it suffices to apply the results
of Section 3 to the augmented objective to obtain the same
recovery guarantees. Note that the added term is linear and
will easily satisfy all the required regularity assumptions.
restricted eigenvalue condition introduced by (Bickel et al.,
2009a).
Definition 2. Let Σ ∈ Sm(R) be a real symmetric matrix
and S be a subset of {1, . . . , m}. Defining C(S) ≡ {X ∈
Rm : (cid:107)XSc(cid:107)1 ≤ 3(cid:107)XS(cid:107)1}. We say that Σ satisfies the
(S, γ)-restricted eigenvalue condition iff:
∀X ∈ C(S), X T ΣX ≥ γ(cid:107)X(cid:107)2
2
(RE)
A discussion of the (S, γ)-(RE) assumption in the context
of generalized linear cascade models can be found in Sec-
tion 3.3. In our setting we require that the (RE)-condition
holds for the Hessian of the log-likelihood function L: it es-
sentially captures the fact that the binary vectors of the set
of active nodes (i.e the measurements) are not too collinear.
Theorem 1. Assume the Hessian ∇2L(θ∗) satisfies the
(S, γ)-(RE) for some γ > 0 and that (LF) holds for some
α > 0. For any δ ∈ (0, 1), let θ be the solution of (2) with
λ ≡ 2
(cid:113) log m
αn1−δ , then:
(cid:114)
(cid:107)θ − θ∗(cid:107)2 ≤ 6
γ
s log m
αn1−δ w.p. 1 −
1
enδ log m
(3)
3. Results
In this section, we apply the sparse recovery framework to
analyze under which assumptions our program (2) recovers
the true parameter θi of the cascade model. Furthermore,
if we can estimate θi to a sufficiently good accuracy, it is
then possible to recover the support of θi by simple thresh-
olding, which provides a solution to the standard Network
Inference problem.
We will first give results in the exactly sparse setting in
which θi has a support of size exactly s. We will then relax
this sparsity constraint and give results in the stable recov-
ery setting where θi is approximately s-sparse.
As mentioned in Section 2.3, the maximum likelihood es-
timation program is decomposable. We will henceforth fo-
cus on a single node i ∈ V and omit the subscript i in the
notations when there is no ambiguity. The recovery prob-
lem is now the one of estimating a single vector θ∗ from a
set T of observations. We will write n ≡ T .
3.1. Main Theorem
In this section, we analyze the case where θ∗ is exactly
sparse. We write S ≡ supp(θ∗) and s = S. Recall,
that θi is the vector of weights for all edges directed at the
node we are solving for. In other words, S is the set of all
nodes susceptible to influence node i, also referred to as its
parents. Our main theorem will rely on the now standard
Note that we have expressed the convergence rate in the
number of measurements n, which is different from the
number of cascades. For example, in the case of the voter
model with horizon time T and for N cascades, we can
expect a number of measurements proportional to N × T .
Theorem 1 is a consequence of Theorem 1 in (Negahban
et al., 2012) which gives a bound on the convergence rate
of regularized estimators. We state their theorem in the
context of (cid:96)1 regularization in Lemma 2.
Lemma 2. Let C(S) ≡ {∆ ∈ Rm (cid:107)∆S(cid:107)1 ≤ 3(cid:107)∆Sc(cid:107)1}.
Suppose that:
∀∆ ∈ C(S), L(θ∗ + ∆) − L(θ∗)
− ∇L(θ∗) · ∆ ≥ κL(cid:107)∆(cid:107)2
2 − τ 2L(θ∗)
(4)
for some κL > 0 and function τL. Finally suppose that
λ ≥ 2(cid:107)∇L(θ∗)(cid:107)∞, then if θλ is the solution of (2):
(cid:107)θλ − θ∗(cid:107)2
2 ≤ 9
λ2s
κL
+
λ
κ2L
2τ 2L(θ∗)
To prove Theorem 1, we apply Lemma 2 with τL = 0.
Since L is twice differentiable and convex, assumption (4)
with κL = γ
2 is implied by the (RE)-condition. For a good
convergence rate, we must find the smallest possible value
of λ such that λ ≥ 2(cid:107)∇Lθ∗(cid:107)∞. The upper bound on the
(cid:96)∞ norm of ∇L(θ∗) is given by Lemma 3.
Inferring Graphs from Cascades: A Sparse Recovery Framework
Lemma 3. Assume (LF) holds for some α > 0. For any
δ ∈ (0, 1):
solving (2) for λ ≡ 2
αn1−δ we have:
(cid:113) log m
(cid:114)
(cid:115)
(cid:114)
(cid:107)∇L(θ∗)(cid:107)∞ ≤ 2
log m
αn1−δ w.p. 1 −
1
enδ log m
(cid:107)θ − θ∗(cid:107)2 ≤ 3
γ
s log m
αn1−δ + 4 4
s log m
γ4αn1−δ (cid:107)θ∗ − θ∗
(cid:98)s(cid:99)(cid:107)1
The proof of Lemma 3 relies crucially on Azuma-
Hoeffding’s inequality, which allows us to handle corre-
lated observations. This departs from the usual assump-
tions made in sparse recovery settings, that the measure-
ments are independent from one another. We now show
how to use Theorem 1 to recover the support of θ∗, that is,
to solve the Network Inference problem.
Corollary 1. Under the same assumptions as Theorem 1,
let Sη ≡ {j ∈ {1, . . . , m} : θj > η} for η > 0. For
0 < < η, let S∗
i > η + } be
the set of all true ‘strong’ parents. Suppose the number of
measurements verifies: n > 9s log m
αγ22 . Then with probability
1 − 1
η+ ⊆ Sη ⊆ S∗. In other words we recover all
‘strong’ parents and no ‘false’ parents.
η+ ≡ {i ∈ {1, . . . , m} : θ∗
m , S∗
Assuming we know a lower bound α on Θi,j, Corollary 1
can be applied to the Network Inference problem in the fol-
lowing manner: pick = η
η+ = S
. That is, the support of θ∗
provided that n = Ω
can be found by thresholding θ to the level η.
(cid:16) s log m
3 , then S∗
2 and η = α
(cid:17)
α3γ2
3.2. Approximate Sparsity
In practice, exact sparsity is rarely verified. For social net-
works in particular, it is more realistic to assume that each
node has few “strong” parents’ and many “weak” parents.
In other words, even if θ∗ is not exactly s-sparse, it can be
well approximated by s-sparse vectors.
Rather than obtaining an impossibility result, we show that
the bounds obtained in Section 3.1 degrade gracefully in
(cid:98)s(cid:99) ∈ argmin(cid:107)θ(cid:107)0≤s (cid:107)θ − θ∗(cid:107)1
this setting. Formally, let θ∗
be the best s-approximation to θ∗. Then we pay a cost pro-
portional to (cid:107)θ∗−θ∗
(cid:98)s(cid:99)(cid:107)1 for recovering the weights of non-
exactly sparse vectors. This cost is simply the “tail” of θ∗:
the sum of the m − s smallest coordinates of θ∗. We re-
cover the results of Section 3.1 in the limit of exact spar-
sity. These results are formalized in the following theorem,
which is also a consequence of Theorem 1 in (Negahban
et al., 2012).
Theorem 2. Suppose the (RE) assumption holds for the
(cid:107)θ∗(cid:107)1 on the fol-
Hessian ∇2f (θ∗) and τL(θ∗) = κ2 log m
lowing set:
C(cid:48) ≡{X ∈ Rp : (cid:107)XSc(cid:107)1 ≤ 3(cid:107)XS(cid:107)1 + 4(cid:107)θ∗ − θ∗
(cid:98)s(cid:99)(cid:107)1}
n
∩ {(cid:107)X(cid:107)1 ≤ 1}
If the number of measurements n ≥ 64κ2
γ s log m, then by
As in Corollary 1, an edge recovery guarantee can be de-
rived from Theorem 2 in the case of approximate sparsity.
3.3. Restricted Eigenvalue Condition
There exists a large class of sufficient conditions under
which sparse recovery is achievable in the context of regu-
larized estimation (van de Geer & Bühlmann, 2009). The
restricted eigenvalue condition, introduced in (Bickel et al.,
2009b), is one of the weakest such assumption. It can be
interpreted as a restricted form of non-degeneracy. Since
we apply it to the Hessian of the log-likelihood function
∇2L(θ), it essentially reduces to a form of restricted strong
convexity, that Lemma 2 ultimately relies on.
Observe that the Hessian of L can be seen as a re-weighted
Gram matrix of the observations:
(cid:20)
(cid:88)
1
T
− (1 − xt+1
t∈T
i
)
xt(xt)T
xt+1
i
f(cid:48)(cid:48)f − f(cid:48)2
(θ∗ · xt)
f 2
f(cid:48)(cid:48)(1 − f ) + f(cid:48)2
(1 − f )2
(θ∗ · xt)
(cid:21)
∇2L(θ∗) =
If f and (1 − f ) are c-strictly log-convex for c > 0, then
min ((log f )(cid:48)(cid:48), (log(1 − f ))(cid:48)(cid:48)) ≥ c. This implies that the
(S, γ)-(RE) condition in Theorem 1 and Theorem 2 re-
duces to a condition on the Gram matrix of the observations
X T X = 1T
(cid:80)
t∈T xt(xt)T for γ(cid:48) ≡ γ · c.
(RE) with high probability The Generalized Linear
Cascade model yields a probability distribution over the ob-
served sets of infected nodes (xt)t∈T . It is then natural to
ask whether the restricted eigenvalue condition is likely to
occur under this probabilistic model. Several recent papers
show that large classes of correlated designs obey the re-
stricted eigenvalue property with high probability (Raskutti
et al., 2010; Rudelson & Zhou, 2013).
The (RE)-condition has the following concentration prop-
erty:
the expected Hessian matrix
E[∇2L(θ∗)], then it holds for the finite sample Hessian ma-
trix ∇2L(θ∗) with high probability.
Therefore, under an assumption which only involves the
probabilistic model and not the actual observations, we can
obtain the same conclusion as in Theorem 1:
Proposition 1. Suppose E[∇2L(θ∗)] verifies the (S, γ)-
(RE) condition and assume (LF) and (LF2). For δ > 0,
28γα s2 log m, then ∇2L(θ∗) verifies the (S, γ
if n1−δ ≥ 1
2 )-
(RE) condition, w.p ≥ 1 − e−nδ log m.
it holds for
if
Inferring Graphs from Cascades: A Sparse Recovery Framework
Observe that the number of measurements required in
Proposition 1 is now quadratic in s.
If we only keep
the first measurement from each cascade, which are in-
dependent, we can apply Theorem 1.8 from (Rudelson &
Zhou, 2013), lowering the number of required cascades to
s log m log3(s log m).
If f and (1 − f ) are strictly log-convex, then the previous
observations show that the quantity E[∇2L(θ∗)] in Propo-
sition 1 can be replaced by the expected Gram matrix:
A ≡ E[X T X]. This matrix A has a natural interpretation:
the entry ai,j is the probability that node i and node j are
infected at the same time during a cascade. In particular,
the diagonal term ai,i is simply the probability that node i
is infected during a cascade.
4. A Lower Bound
In (Netrapalli & Sanghavi, 2012), the authors explicitate
s ) on the number of cascades
a lower bound of Ω(s log m
necessary to achieve good support recovery with constant
probability under a correlation decay assumption. In this
section, we will consider the stable sparse recovery set-
ting of Section 3.2. Our goal is to obtain an information-
theoretic lower bound on the number of measurements nec-
essary to approximately recover the parameter θ∗ of a cas-
cade model from observed cascades. Similar lower bounds
were obtained for sparse linear inverse problems in (Price
& Woodruff, 2011; 2012; Ba et al., 2011).
Theorem 3. Let us consider a cascade model of the form
(1) and a recovery algorithm A which takes as input n ran-
dom cascade measurements and outputs θ such that with
probability δ > 1
2 (over the measurements):
(cid:107)θ − θ∗(cid:107)2
(cid:107)θ − θ∗(cid:107)2 ≤ C min
(cid:107)θ(cid:107)0≤s
(5)
where θ∗ is the true parameter of the cascade model. Then
n = Ω(s log m
s / log C).
This theorem should be contrasted with Theorem 2: up to
an additive s log s factor, the number of measurements re-
quired by our algorithm is tight. The proof of Theorem 3
follows an approach similar to (Price & Woodruff, 2012).
We present a sketch of the proof in the Appendix and refer
the reader to their paper for more details.
5. Experiments
In this section, we validate empirically the results and as-
sumptions of Section 3 for varying levels of sparsity and
different initializations of parameters (n, m, λ, pinit), where
pinit is the initial probability of a node being a source node.
We compare our algorithm to two different state-of-the-art
algorithms: GREEDY and MLE from (Netrapalli & Sang-
havi, 2012). As an extra benchmark, we also introduce
a new algorithm LASSO, which approximates our SPARSE
MLE algorithm.
Experimental setup We evaluate the performance of the
algorithms on synthetic graphs, chosen for their similarity
to real social networks. We therefore consider a Watts-
Strogatz graph (300 nodes, 4500 edges) (Watts & Stro-
gatz, 1998), a Barabasi-Albert graph (300 nodes, 16200
edges) (Albert & Barabási, 2001), a Holme-Kim power law
graph (200 nodes, 9772 edges) (Holme & Kim, 2002), and
the recently introduced Kronecker graph (256 nodes, 10000
edges) (Leskovec et al., 2010). Undirected graphs are con-
verted to directed graphs by doubling the edges.
For every reported data point, we sample edge weights
and generate n cascades from the (IC) model for n ∈
{100, 500, 1000, 2000, 5000}. We compare for each algo-
rithm the estimated graph G with G. The initial probability
of a node being a source is fixed to 0.05, i.e. an average of
15 nodes source nodes per cascades for all experiments, ex-
cept for Figure (f). All edge weights are chosen uniformly
in the interval [0.2, 0.7], except when testing for approxi-
mately sparse graphs (see paragraph on robustness). Ad-
justing for the variance of our experiments, all data points
are reported with at most a ±1 error margin. The param-
eter λ is chosen to be of the order O((cid:112)log m/(αn)). We
report our results as a function of the number of cascades
and not the number of measurements: in practice, very few
cascades have depth greater than 3.
Benchmarks We compare our SPARSE MLE algorithm
to 3 benchmarks: GREEDY and MLE from (Netrapalli &
Sanghavi, 2012) and LASSO. The MLE algorithm is a
maximum-likelihood estimator without (cid:96)1-norm penaliza-
tion. GREEDY is an iterative algorithm. We introduced the
LASSO algorithm in our experiments to achieve faster com-
putation time:
θi ∈ arg min
θ
f (θi · xt) − xt+1
i
2 + λ(cid:107)θi(cid:107)1
(cid:88)
t∈T
i
LASSO has the merit of being both easier and faster to opti-
mize numerically than the other convex-optimization based
algorithms. It approximates the SPARSE MLE algorithm by
making the assumption that the observations xt+1
are of the
i = f (θi· xt) + , where is random white noise.
form: xt+1
This is not valid in theory since depends on f (θi · xt),
however the approximation is validated in practice.
We did not benchmark against other known algorithms
(NETRATE (Gomez-Rodriguez et al., 2011) and FIRST
EDGE (Abrahao et al., 2013)) due to the discrete-time as-
sumption. These algorithms also suppose a single-source
model, whereas SPARSE MLE, MLE, and GREEDY do not.
Learning the graph in the case of a multi-source cascade
Inferring Graphs from Cascades: A Sparse Recovery Framework
(a) Barabasi-Albert (F1 vs. n)
(b) Watts-Strogatz (F1 vs. n)
(c) Holme-Kim (Prec-Recall)
(d) Sparse Kronecker ((cid:96)2-norm vs. n)
(e) Non-sparse Kronecker ((cid:96)2-norm vs. n)
(f) Watts-Strogatz (F1 vs. pinit)
Figure 2. Figures (a) and (b) report the F1-score in log scale for 2 graphs as a function of the number of cascades n: (a) Barabasi-Albert
graph, 300 nodes, 16200 edges. (b) Watts-Strogatz graph, 300 nodes, 4500 edges. Figure (c) plots the Precision-Recall curve for various
values of λ for a Holme-Kim graph (200 nodes, 9772 edges). Figures (d) and (e) report the (cid:96)2-norm (cid:107) Θ − Θ(cid:107)2 for a Kronecker graph
which is: (d) exactly sparse (e) non-exactly sparse, as a function of the number of cascades n. Figure (f) plots the F1-score for the
Watts-Strogatz graph as a function of pinit.
model is harder (see Figure 2 (f)) but more realistic, since
we rarely have access to “patient 0” in practice.
Graph Estimation In the case of the LASSO, MLE and
SPARSE MLE algorithms, we construct the edges of G :
∪j∈V {(i, j) : Θij > 0.1}, i.e by thresholding. Finally, we
report the F1-score= 2precision·recall/(precision+recall),
which considers (1) the number of true edges recovered by
the algorithm over the total number of edges returned by
the algorithm (precision) and (2) the number of true edges
recovered by the algorithm over the total number of edges
it should have recovered (recall). Over all experiments,
SPARSE MLE achieves higher rates of precision, recall, and
F1-score. Interestingly, both MLE and SPARSE MLE per-
form exceptionally well on the Watts-Strogatz graph.
Quantifying robustness The previous experiments only
considered graphs with strong edges. To test the algorithms
in the approximately sparse case, we add sparse edges to
the previous graphs according to a bernoulli variable of pa-
rameter 1/3 for every non-edge, and drawing a weight uni-
formly from [0, 0.1]. The non-sparse case is compared to
the sparse case in Figure 2 (d)–(e) for the (cid:96)2 norm show-
ing that both the LASSO, followed by SPARSE MLE are the
most robust to noise.
6. Future Work
Solving the Graph Inference problem with sparse recovery
techniques opens new venues for future work. Firstly, the
sparse recovery literature has already studied regulariza-
tion patterns beyond the (cid:96)1-norm, notably the thresholded
and adaptive lasso (van de Geer et al., 2011; Zou, 2006).
Another goal would be to obtain confidence intervals for
our estimator, similarly to what has been obtained for the
Lasso in the recent series of papers (Javanmard & Monta-
nari, 2014; Zhang & Zhang, 2014).
Finally, the linear threshold model is a commonly stud-
ied diffusion process and can also be cast as a general-
ized linear cascade with inverse link function z (cid:55)→ 1z>0:
= sign (θj · X t − tj). This model therefore falls
X t+1
into the 1-bit compressed sensing framework (Boufounos
& Baraniuk, 2008). Several recent papers study the the-
oretical guarantees obtained for 1-bit compressed sensing
with specific measurements (Gupta et al., 2010; Plan &
Vershynin, 2014). Whilst they obtained bounds of the order
O(s log m
s ), no current theory exists for recovering positive
bounded signals from binary measurememts. This research
direction may provide the first clues to solve the “adaptive
learning” problem: if we are allowed to adaptively choose
the source nodes at the beginning of each cascade, how
much can we improve the current results?
j
50100500100020005000Number of Cascades0.00.20.40.60.81.0F1 scoreGreedyLassoMLEOur MethodInferring Graphs from Cascades: A Sparse Recovery Framework
Acknowledgments
We would like to thank Yaron Singer, David Parkes, Jelani
Nelson, Edoardo Airoldi and Or Sheffet for helpful discus-
sions. We are also grateful to the anonymous reviewers for
their insightful feedback and suggestions.
References
Abrahao, Bruno D., Chierichetti, Flavio, Kleinberg,
Robert, and Panconesi, Alessandro. Trace complexity
of network inference. In The 19th ACM SIGKDD Inter-
national Conference on Knowledge Discovery and Data
Mining, KDD 2013, Chicago, IL, USA, August 11-14,
2013, pp. 491–499, 2013.
Adar, Eytan and Adamic, Lada A. Tracking information
epidemics in blogspace. In 2005 IEEE / WIC / ACM In-
ternational Conference on Web Intelligence (WI 2005),
19-22 September 2005, Compiegne, France, pp. 207–
214, 2005.
Albert, Réka and Barabási, Albert-László.
Statisti-
cal mechanics of complex networks. CoRR, cond-
mat/0106096, 2001.
Ba, Khanh Do, Indyk, Piotr, Price, Eric, and Woodruff,
David P. Lower bounds for sparse recovery. CoRR,
abs/1106.0365, 2011.
Du, Nan, Song, Le, Woo, Hyenkyun, and Zha, Hongyuan.
Uncover topic-sensitive information diffusion networks.
In Proceedings of the Sixteenth International Confer-
ence on Artificial Intelligence and Statistics, pp. 229–
237, 2013.
Du, Nan, Liang, Yingyu, Balcan, Maria, and Song, Le. In-
fluence function learning in information diffusion net-
works. In Proceedings of the 31st International Confer-
ence on Machine Learning (ICML-14), pp. 2016–2024,
2014.
Gomez Rodriguez, Manuel, Leskovec, Jure, and Krause,
Andreas. Inferring networks of diffusion and influence.
In Proceedings of the 16th ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
KDD ’10, pp. 1019–1028, New York, NY, USA, 2010.
ACM. ISBN 978-1-4503-0055-1.
Gomez-Rodriguez, Manuel, Balduzzi, David,
and
Schölkopf, Bernhard. Uncovering the temporal dy-
namics of diffusion networks. CoRR, abs/1105.0697,
2011.
Gupta, Ankit, Nowak, Robert, and Recht, Benjamin. Sam-
ple complexity for 1-bit compressed sensing and sparse
classification. In IEEE International Symposium on In-
formation Theory, ISIT 2010, June 13-18, 2010, Austin,
Texas, USA, Proceedings, pp. 1553–1557, 2010.
Bickel, Peter J, Ritov, Ya’acov, and Tsybakov, Alexan-
dre B. Simultaneous analysis of lasso and dantzig se-
lector. The Annals of Statistics, pp. 1705–1732, 2009a.
Holme, Petter and Kim, Beom Jun. Growing scale-free
networks with tunable clustering. Physical review E, 65:
026–107, 2002.
Bickel, Peter J., Ritov, Ya’acov, and Tsybakov, Alexan-
dre B. Simultaneous analysis of lasso and dantzig se-
lector. Ann. Statist., 37(4):1705–1732, 08 2009b.
Boufounos, Petros and Baraniuk, Richard G. 1-bit com-
pressive sensing. In 42nd Annual Conference on Infor-
mation Sciences and Systems, CISS 2008, Princeton, NJ,
USA, 19-21 March 2008, pp. 16–21, 2008.
Candes, Emmanuel J and Tao, Terence. Near-optimal sig-
nal recovery from random projections: Universal encod-
ing strategies? Information Theory, IEEE Transactions
on, 52(12):5406–5425, 2006.
Daneshmand, Hadi, Gomez-Rodriguez, Manuel, Song, Le,
and Schölkopf, Bernhard. Estimating diffusion network
structures: Recovery conditions, sample complexity &
soft-thresholding algorithm. In Proceedings of the 31th
International Conference on Machine Learning, ICML
2014, Beijing, China, 21-26 June 2014, pp. 793–801,
2014.
Donoho, David L. Compressed sensing. Information The-
ory, IEEE Transactions on, 52(4):1289–1306, 2006.
Javanmard, Adel and Montanari, Andrea. Confidence in-
tervals and hypothesis testing for high-dimensional re-
gression. The Journal of Machine Learning Research,
15(1):2869–2909, 2014.
Kempe, David, Kleinberg, Jon M., and Tardos, Éva. Maxi-
mizing the spread of influence through a social network.
In Proceedings of the Ninth ACM SIGKDD International
Conference on Knowledge Discovery and Data Mining,
Washington, DC, USA, August 24 - 27, 2003, pp. 137–
146, 2003.
Leskovec, Jure, McGlohon, Mary, Faloutsos, Christos,
Glance, Natalie S., and Hurst, Matthew. Patterns of cas-
In Proceedings
cading behavior in large blog graphs.
of the Seventh SIAM International Conference on Data
Mining, April 26-28, 2007, Minneapolis, Minnesota,
USA, pp. 551–556, 2007.
Leskovec, Jure, Chakrabarti, Deepayan, Kleinberg, Jon M.,
Faloutsos, Christos, and Ghahramani, Zoubin. Kro-
necker graphs: An approach to modeling networks.
Journal of Machine Learning Research, 11:985–1042,
2010.
Inferring Graphs from Cascades: A Sparse Recovery Framework
Society: Series B (Statistical Methodology), 76(1):217–
242, 2014.
Zhao, Peng and Yu, Bin. On model selection consistency
of lasso. J. Mach. Learn. Res., 7:2541–2563, December
2006. ISSN 1532-4435.
Zou, Hui. The adaptive lasso and its oracle properties.
Journal of the American Statistical Association, 101
(476):1418–1429, 2006.
Liben-Nowell, David and Kleinberg, Jon. Tracing infor-
mation flow on a global scale using Internet chain-letter
data. Proceedings of the National Academy of Sciences,
105(12):4633–4638, 2008.
Negahban, Sahand N., Ravikumar, Pradeep, Wrainwright,
Martin J., and Yu, Bin. A unified framework for high-
dimensional analysis of m-estimators with decompos-
able regularizers. Statistical Science, 27(4):538–557,
December 2012.
Netrapalli, Praneeth and Sanghavi, Sujay. Learning the
graph of epidemic cascades. SIGMETRICS Perform.
Eval. Rev., 40(1), June 2012. ISSN 0163-5999.
Plan, Yaniv and Vershynin, Roman. Dimension reduction
by random hyperplane tessellations. Discrete & Compu-
tational Geometry, 51(2):438–461, 2014.
Price, Eric and Woodruff, David P. (1 + eps)-approximate
sparse recovery. In Ostrovsky, Rafail (ed.), IEEE 52nd
Annual Symposium on Foundations of Computer Sci-
ence, FOCS 2011, Palm Springs, CA, USA, October 22-
25, 2011, pp. 295–304. IEEE Computer Society, 2011.
ISBN 978-1-4577-1843-4.
Price, Eric and Woodruff, David P. Applications of the
shannon-hartley theorem to data streams and sparse re-
covery. In Proceedings of the 2012 IEEE International
Symposium on Information Theory, ISIT 2012, Cam-
bridge, MA, USA, July 1-6, 2012, pp. 2446–2450. IEEE,
2012. ISBN 978-1-4673-2580-6.
Raskutti, Garvesh, Wainwright, Martin J., and Yu, Bin. Re-
stricted eigenvalue properties for correlated gaussian de-
signs. Journal of Machine Learning Research, 11:2241–
2259, 2010.
Rudelson, Mark and Zhou, Shuheng. Reconstruction from
anisotropic random measurements. IEEE Transactions
on Information Theory, 59(6):3434–3447, 2013.
van de Geer, Sara, Bühlmann, Peter, and Zhou, Shuheng.
The adaptive and the thresholded lasso for potentially
misspecified models (and a lower bound for the lasso).
Electron. J. Statist., 5:688–749, 2011.
van de Geer, Sara A. and Bühlmann, Peter. On the condi-
tions used to prove oracle results for the lasso. Electron.
J. Statist., 3:1360–1392, 2009.
Watts, Duncan J. and Strogatz, Steven H. Collective dy-
namics of ‘small-world’ networks. Nature, 393(6684):
440–442, 1998.
Zhang, Cun-Hui and Zhang, Stephanie S. Confidence in-
tervals for low dimensional parameters in high dimen-
sional linear models. Journal of the Royal Statistical
Inferring Graphs from Cascades: A Sparse Recovery Framework
7. Appendix
In this appendix, we provide the missing proofs of Sec-
tion 3 and Section 4. We also show additional experiments
on the running time of our recovery algorithm which could
not fit in the main part of the paper.
7.1. Proofs of Section 3
Proof of Lemma 1. Using the inequality ∀x > 0, log x ≥
1−p(cid:48) ) ≥ max(1 −
1 − 1
1−p(cid:48) , 1 − 1−p(cid:48)
1−p
1−p ) − log( 1
1−p ) ≥ max(p − p(cid:48), p(cid:48) − p).
x, we have log( 1
Proof of Lemma 3. The gradient of L is given by:
∇L(θ∗) =
1
T
xt
xt+1
i
f(cid:48)
f
(θ∗ · xt)
(cid:20)
(cid:88)
t∈T
(cid:21)
− (1 − xt+1
i
)
f(cid:48)
1 − f
(θ∗ · xt)
(cid:80)
Let ∂jL(θ) be the j-th coordinate of ∇L(θ∗). Writing
∂jL(θ∗) = 1T
xt] = f (θ∗·xt),
k=1 Yk is a
we have that E[Yt+1Yt] = 0. Hence Zt = (cid:80)t
t∈T Yt and since E[xt+1
martingale.
Using assumption (LF), we have almost surely Zt+1 −
Zt ≤ 1
α and we can apply Azuma’s inequality to Zt:
i
P(cid:2)ZT ≥ λ(cid:3) ≤ 2 exp
(cid:18)−λ2α
(cid:19)
2n
Applying a union bound to have the previous inequality
hold for all coordinates of ∇L(θ) implies:
P(cid:2)(cid:107)∇L(θ∗)(cid:107)∞ ≥ λ(cid:3) ≤ 2m exp
(cid:18)−λ2nα
(cid:19)
2
Choosing λ ≡ 2
αn1−δ concludes the proof.
(cid:113) log m
Proof of Corollary 1. By choosing δ = 0, if n > 9s log m
αγ22 ,
then (cid:107)θ − θ∗(cid:107)2 < < η with probability 1 − 1
i = 0
and θ > η, then (cid:107)θ − θ∗(cid:107)2 ≥ θi − θ∗
i > η, which is
If
a contradiction. Therefore we get no false positives.
i < =⇒ θj > η and we get all
i > η + , then θi − θ∗
θ∗
strong parents.
m. If θ∗
(RE) with high probability We now prove Proposi-
tion 1. The proof mostly relies on showing that the Hessian
of likelihood function L is sufficiently well concentrated
around its expectation.
Proof. Writing H ≡ ∇2L(θ∗), if ∀∆ ∈ C(S), (cid:107) E[H] −
H](cid:107)∞ ≤ λ and E[H] verifies the (S, γ)-(RE) condition
then:
√
i,jL(θ∗) = 1T
∀∆ ∈ C(S), ∆H∆ ≥ ∆ E[H]∆(1 − 32sλ/γ)
inequality as in the proof of Lemma 3, this implies:
Indeed, ∆(H − E[H])∆ ≤ 2λ(cid:107)∆(cid:107)2
Writing ∂2
(6)
s(cid:107)∆s(cid:107)2)2.
t∈T Yt and using (LF ) and
α. Applying Azuma’s
(cid:80)
1 ≤ 2λ(4
(LF 2) we have (cid:12)(cid:12)Yt − E[Yt](cid:12)(cid:12) ≤ 3
(cid:18)
P(cid:2)(cid:107) E[H] − H(cid:107)∞ ≥ λ(cid:3) ≤ 2 exp
(cid:113) 9logm
αn1−δ , (cid:107)E[H] − H(cid:107)∞ ≤ λ w.p
Thus, if we take λ =
at least 1 − e−nδ log m. When n1−δ ≥ 1
28γα s2 log m, (6)
implies ∀∆ ∈ C(S), ∆H∆ ≥ 1
2 ∆ E[H]∆, w.p. at least
1− e−nδ log m and the conclusion of Proposition 1 follows.
− nαλ2
3
+ 2 log m
(cid:19)
7.2. Proof of Theorem 3
Let us consider an algorithm A which verifies the recovery
guarantee of Theorem 3: there exists a probability distri-
bution over measurements such that for all vectors θ∗, (5)
holds w.p. δ. This implies by the probabilistic method that
for all distribution D over vectors θ, there exists an n × m
measurement matrix XD with such that (5) holds w.p. δ (θ
is now the random variable).
Consider the following distribution D: choose S uni-
formly at random from a “well-chosen” set of s-sparse
supports F and t uniformly at random from X ≡ (cid:8)t ∈
{−1, 0, 1}m supp(t) ∈ F(cid:9). Define θ = t + w where
w ∼ N (0, α s
Consider the following communication game between Al-
(1) Alice sends y ∈ Rm drawn from a
ice and Bob:
Bernouilli distribution of parameter f (XDθ) to Bob. (2)
Bob uses A to recover θ from y. It can be shown that at
the end of the game Bob now has a quantity of information
s ) about S. By the Shannon-Hartley theorem, this
Ω(s log m
information is also upper-bounded by O(n log C). These
two bounds together imply the theorem.
m Im) and α = Ω( 1
C ).
7.3. Running Time Analysis
We include here a running time analysis of our algorithm.
In Figure 3, we compared our algorithm to the benchmark
algorithms for increasing values of the number of nodes.
In Figure 4, we compared our algorithm to the benchmarks
for a fixed graph but for increasing number of observed
cascades.
In both Figures, unsurprisingly, the simple greedy algo-
rithm is the fastest. Even though both the MLE algorithm
Inferring Graphs from Cascades: A Sparse Recovery Framework
and the algorithm we introduced are based on convex op-
timization, the MLE algorithm is faster. This is due to the
overhead caused by the (cid:96)1-regularisation in (2).
The dependency of the running time on the number of cas-
cades increases is linear, as expected. The slope is largest
for our algorithm, which is again caused by the overhead
induced by the (cid:96)1-regularization.
Figure 3. Running time analysis for estimating the parents of a
single node on a Barabasi-Albert graph as a function of the num-
ber of nodes in the graph. The parameter k (number of nodes each
new node is attached to) was set to 30. pinit is chosen equal to .15,
and the edge weights are chosen uniformly at random in [.2, .7].
The penalization parameter λ is chosen equal to .1.
Figure 4. Running time analysis for estimating the parents of a
single node on a Barabasi-Albert graph as a function of the num-
ber of total observed cascades. The parameters defining the graph
were set as in Figure 3.
100200500100015002000Number of Nodes04812162024CPU time (s)GreedyMLEOur Method100200500100015002000Number of Cascades04812162024CPU time (s)GreedyMLEOur Method |
1802.09597 | 1 | 1802 | 2018-02-26T20:43:18 | Mapping the Invocation Structure of Online Political Interaction | [
"cs.SI",
"cs.CY",
"cs.HC",
"physics.soc-ph"
] | The surge in political information, discourse, and interaction has been one of the most important developments in social media over the past several years. There is rich structure in the interaction among different viewpoints on the ideological spectrum. However, we still have only a limited analytical vocabulary for expressing the ways in which these viewpoints interact.
In this paper, we develop network-based methods that operate on the ways in which users share content; we construct \emph{invocation graphs} on Web domains showing the extent to which pages from one domain are invoked by users to reply to posts containing pages from other domains. When we locate the domains on a political spectrum induced from the data, we obtain an embedded graph showing how these interaction links span different distances on the spectrum. The structure of this embedded network, and its evolution over time, helps us derive macro-level insights about how political interaction unfolded through 2016, leading up to the US Presidential election. In particular, we find that the domains invoked in replies spanned increasing distances on the spectrum over the months approaching the election, and that there was clear asymmetry between the left-to-right and right-to-left patterns of linkage. | cs.SI | cs | Mapping the Invocation Structure of Online Political Interaction
Manish Raghavan
Cornell University
Ashton Anderson
University of Toronto
Jon Kleinberg
Cornell University
8
1
0
2
b
e
F
6
2
]
I
S
.
s
c
[
1
v
7
9
5
9
0
.
2
0
8
1
:
v
i
X
r
a
ABSTRACT
The surge in political information, discourse, and interaction has
been one of the most important developments in social media over
the past several years. There is rich structure in the interaction
among different viewpoints on the ideological spectrum. However,
we still have only a limited analytical vocabulary for expressing
the ways in which these viewpoints interact.
In this paper, we develop network-based methods that operate
on the ways in which users share content; we construct invocation
graphs on Web domains showing the extent to which pages from
one domain are invoked by users to reply to posts containing pages
from other domains. When we locate the domains on a political
spectrum induced from the data, we obtain an embedded graph
showing how these interaction links span different distances on
the spectrum. The structure of this embedded network, and its
evolution over time, helps us derive macro-level insights about
how political interaction unfolded through 2016, leading up to the
US Presidential election. In particular, we find that the domains
invoked in replies spanned increasing distances on the spectrum
over the months approaching the election, and that there was clear
asymmetry between the left-to-right and right-to-left patterns of
linkage.
ACM Reference Format:
Manish Raghavan, Ashton Anderson, and Jon Kleinberg. 2018. Mapping
the Invocation Structure of Online Political Interaction. In WWW 2018: The
2018 Web Conference, April 23–27, 2018, Lyon, France. ACM, New York, NY,
USA, 10 pages. https://doi.org/10.1145/3178876.3186129
1 INTRODUCTION
Political interaction has long constituted a key use of social media,
and there is a correspondingly rich history of research into its
structure - one that extends the much longer history of scholarship
on the role of media in the political process [6, 14, 23, 25].
A crucial issue in this line of work is the extent to which political
interaction on social media takes place primarily among users who
are ideologically similar, or whether it reaches across the political
spectrum. Early analysis of political blogging indicated a clustered
structure, with a high density of linkage among ideologically similar
blogs and a lower density of linkage between blogs with strongly
differing views [1]. Subsequent work, looking at platforms that
arose further into the evolution of social media, suggested that a
more complex structure was developing, in which homophily in
views remained a powerful force, but where the platforms were
providing users with some level of cross-cutting exposure [3, 4].
This paper is published under the Creative Commons Attribution 4.0 International
(CC BY 4.0) license. Authors reserve their rights to disseminate the work on their
personal and corporate Web sites with the appropriate attribution.
WWW 2018, April 23–27, 2018, Lyon, France
© 2018 IW3C2 (International World Wide Web Conference Committee), published
under Creative Commons CC BY 4.0 License.
ACM ISBN 978-1-4503-5639-8/18/04.
https://doi.org/10.1145/3178876.3186129
These questions are important, as they ask whether online political
interaction consists of opposing sides who engage with each other,
or well-separated clusters who are isolated in "echo chambers" or
"filter bubbles" [11, 27, 30].
The answers to such questions depend intrinsically on which
types of interactions are being considered. Existing work in the
online domain has implicitly focused on two standard forms of in-
teraction: page-to-page interaction, expressed by hyperlinks among
documents [1]; and user-to-user interaction, expressed by commu-
nication among people on social platforms [3, 4, 9]. Each of these
induces a network on a set of entities - sources and users respec-
tively - which can then be analyzed relative to an underlying
political spectrum.
Networks of sources invoked by users. Here we consider a
different type of political interaction network, defined as follows.
When a user u shares a page A, and a user v replies by sharing a
page B, there is not simply an interaction between users u and v;
an interaction is also induced between pages A and B. As reshares
develop into a widespread style of social media content production
[8, 10, 17, 24], the ability of users to deploy page references as
proxies in their discussion becomes an activity requiring very low
effort, and we find through a large-scale analysis of Twitter data
leading up to the 2016 U.S. Presidential election that such A-B
interactions are widespread: users regularly invoke links in this
back-and-forth fashion when they interact with each other.
These invoked interactions between pages A and B are fundamen-
tally different from both user-to-user and page-to-page interaction
networks. Unlike free-form user-to-user interactions, they create
logical relationships among the information sources, not just the
consumers and sharers of these sources. But they are not like tradi-
tional page-to-page interactions either, because they are not based
on a hyperlink from A to B, and they are not in general determined
by the authors of either A or B; it is the readers deciding how A and
B should be used in discussion who are determining the logical link
between them. In this sense, invoked interactions between A and B
are not directly under the control of the authors of A and B; they
form a kind of "revealed interpretation" of A and B once they are
released into social media.
The idea that replying to page A with page B can create a se-
mantically meaningful connection between A and B formed the
basis of an elegant technique due to Frigerri, Adamic, Eckles, and
Cheng [12] for identifying pages to debunk widely circulated ru-
mors. Drawing on the fact that snopes.com is a heavily-used site
for evaluating Internet rumors, they demonstrated that many in-
stances of a pair (B, A), where A is a page appearing in Facebook
posts and B is a page on snopes.com, serves as strong evidence
that B is providing a judgment on the credibility of A. In this way,
scanning the replies to posts where A occurs for pages residing on
snopes.com provides an automated method for identifying a page
B that can help users evaluate the veracity of A.
WWW 2018, April 23–27, 2018, Lyon, France
Manish Raghavan, Ashton Anderson, and Jon Kleinberg
Figure 1: A section from an example invocation graph containing instances from our data. In each case, an article from domain
B in response to an article from domain A contributes to the link from B to A. The link from Breitbart to The New York Times
comes from articles like the pair shown here, a Breitbart article on the Times' taxes in response to a Times article on Donald
Trump's taxes. Other links demonstrate an interaction where one article supports another: for example, a New York Times
article shared in response to a Guardian article on Russian information operations contributes to the link from The Times to
The Guardian.
Given that invoked interactions between pages A and B more
generally are voluminous, transcending any one particular domain
or use case, what do we learn if we consider the set of all such
interactions as a network in its own right, latent in a social media
platform?
The present work: The structure of invocation graphs. We
are interested in understanding the global structure of the network
of invoked interactions, and developing methods that can probe this
structure, particularly for questions related to political interaction.
Because our primary focus in this work will be at the granularity
of news and blogging sources rather than the individual pages they
produce, we will consider this network at the level of domains:
using a large Twitter dataset covering all of 2016 up to the U.S. Pres-
idential election, we say that an invoked interaction from domain B
to domain A occurs whenever a user replies to a tweet containing
a page from domain A with a page from domain B.
We define the invocation graph on a set of domains of interest as
follows: for all pairs of domains A and B where there is at least one
invoked interaction from B to A, we include a weighted directed
edge (B, A) whose weight is equal to the number of such invoked
interactions. Because we want to study how portions of the invo-
cation graph reflect aspects of political interaction, we choose the
node set (i.e. the domains of interest) using a preprocessing step
that only includes domains that were extensively retweeted with
the official Twitter accounts of Hillary Clinton and Donald Trump,
and then apply some further filtering heuristics that we describe in
the next section.
After this filtering, we have an invocation graph that reflects
the ways in which Twitter users interacted with one another by
invoking content from different politically relevant domains over
the course of 2016. Figure 1 shows a few domains of such an invo-
cation graph with some sample interactions from our data. We can
see these interactions can be supportive, like an in-depth New York
Times report on Russian information operations shared in reply to
an article from The Guardian on the same subject, or adversarial,
like a Breitbart article on the New York Times' taxes shared in
response to a Times article on Donald Trump's taxes. These replies
exhibit rich structure and give a sense for how complex political
interactions unfold on social media
We can thus return to some of the initial motivating questions
and ask how this interaction was structured relative to a political
spectrum containing support for Clinton on the left and support for
Trump on the right. We do this using a political spectrum induced
from the data, rather than relying on external domain knowledge.
There are a number of ways to do this [5, 11, 14] that yield broadly
consistent results, and we employ a method of Benkler et al (de-
scribed further in the next section) that bases the spectrum on the
relative frequency of co-tweets with the Clinton and Trump Twitter
accounts [5].
Embedding the Invocation Graph in a Political Spectrum.
Having thus located the domains on a political spectrum, we now
have an embedded version of the invocation graph: the nodes, repre-
senting domains, are embedded in a one-dimensional spectrum, and
the weighted directed edges span pairs of points in this spectrum.
We can now ask how the edges are distributed across distances on
the spectrum, ranging from short-range interactions that connect
domains of similar political orientation to long-range interactions
that reach across sides. In examining these questions, it is crucial to
recall that these links among domains are not defined by hyperlinks
in the content on these domains, but instead via the replies made
by users when they invoke this content in discussions: it is not
that the domains are replying to each other, but that they are being
invoked in replies by users. The data thus reflects choices made by
the consumers of the content, rather than by authors of the content.
In Section 3, we propose a set of methods to analyze how the
edges of the invocation graph span the underlying spectrum. A
core component of these methods is, for a domain x, to consider
its out-link distribution - the distribution of "landing points" on
the political spectrum for all links out of x. As we move from left
to right along the spectrum, tracking the out-link distributions
of domains we encounter along the way, do the means of these
distributions tend to move from left to right as well, or do they
tend to move inversely from right to left? The former case would
indicate a positive correlation in the locations of the source and
target of an invoked interaction (B, A), suggesting links are used
Mapping the Invocation Structure of Online Political Interaction
WWW 2018, April 23–27, 2018, Lyon, France
to connect to similar sides of the political spectrum; the latter case
would correspond to a negative correlation and hence connections
across the spectrum, with domains on the left being invoked to
reply to domains on the right, and vice versa.
It is not a priori obvious which type of correlation we should
expect to see; and as a reinforcement of this fact, we find that the
nature of the correlation actually inverts over the course of 2016
leading up to the U.S. Presidential election. In the early parts of
2016 we have a positive correlation, with politically similar domains
being invoked to reply to each other; but by the time we reach
the months directly preceding the election, this same correlation
measure has become negative, indicating that most of the linking
is now crossing the spectrum. We verify this effect using multiple
measures, including one in which we compare the trends across
the spectrum to what we'd observe in a randomly rewired version
of the embedded graph.
We also propose a set of methods to identify inherent asymme-
tries in the patterns of linkage: do replies from left to right have the
same structure as replies from right to left? Using our measures, we
find strong asymmetries in the 2016 Twitter data, with domains on
the right side of the spectrum having a disproportionately high rate
of out-links in the invocation graph and domains on the left side
of the spectrum having a disproportionately high rate of in-links.
This right-to-left flow in the replies persists across the entire time
range, and is a key characteristic of the structure.
Since a recurring theme in our analyses is the way in which
replies increasingly engaged opposite sides of the political spectrum
as 2016 went on, it is interesting to ask whether we see a similar
effect in a more traditional user-to-user interaction graph, with
nodes corresponding to users and directed edges to replies from one
user to another. To explore this, we adapt the techniques developed
for the invocation graph to a user-to-user graph built from Reddit.
Specifically, we analyze a snapshot of Reddit's politics subreddit,
r/politics, for the same period of 2016 up to the election; we
classify users by whether they had posted to the Clinton or Trump
subreddits, and then look at the rate of replies among different
types of users. We find that the trend on Reddit closely tracks the
trend in the invocation graph built from Twitter, with increasing
linkage between the two sides as the election approached.
Overall, our methodology suggests that the invocation graph
on domains, and its embedding into a one-dimensional spectrum,
captures important aspects of political interaction on social media
- the tendency of users to interact by invoking links to authored
content, and the use of these interaction patterns to thus reveal
relationships among the content based on usage in everyday dis-
cussion.
2 BASIC DEFINITIONS
We begin with a Twitter dataset containing aggregate-level infor-
mation about tweet-reply pairs. For each month from January to
November 2016 (the US Presidential election was held on Novem-
ber 8, 2016), the dataset consists of pairs of domains x1 and x2
along with an accompanying count, the number of times a tweet
containing a page from domain x1 was posted in reply to a tweet
containing a page from domain x2. In addition, for each month, we
have an auxiliary dataset of co-occurrences: for each domain x, the
number of times a user posted a tweet containing a page from x on
the same day that the user retweeted Hillary Clinton's or Donald
Trump's personal Twitter account. Finally, we have the number of
retweets of Clinton or Trump for each month.
The invocation graph we construct from this data is a directed
graph with domains as vertices, where each domain corresponds
to a news source. We draw an edge x1 → x2 if a tweet containing
a URL from domain x1 is posted in reply to a tweet containing a
URL from domain x2. The weight of this edge is the number of such
tweet-reply pairs. On first inspection, the most prominent feature
of this graph is that self-loops (consisting of links from a domain x
to itself) have much higher weight than other edges. Since our goal
is to examine political interactions between domains, we remove
all self-loops from the graph.
Isolating Political Domains. The first issue we encounter is
that Twitter contains a wide range of URLs, not just pages from
politically relevant domains. We could select only known political
domains by whitelisting them, i.e. only considering the subgraph
over a predefined set of domains; however, this approach will in-
evitably miss out on influential but less well-known news sources.
On the other hand, there are challenges to a completely unsu-
pervised approach. URLs on Twitter are dominated by social media
sites (e.g. twitter.com, facebook.com) as well as content-hosting
sites (e.g. imgur.com, bitly.com) which produce virtually no content
of their own, but instead host user-uploaded content such as im-
ages, links, and text. While the usage of these content-hosting sites
would be interesting to study, this is outside the scope of our work.
We begin by blacklisting several known social media and content-
hosting domains and remove them from the graph. However, there
are plenty of domains that appear on Twitter that are not politically
relevant, and we cannot individually remove each such domain.
To filter out such domains, we need some measure of political
engagement for each domain. We can construct such a measure
by using the observation that politically relevant domains should
frequently co-occur with known political entities – in our case, the
official Twitter accounts of Hillary Clinton and Donald Trump.
Our measure of political engagement for a domain, then, is sim-
ply the number of times a user posted a tweet with that domain on
the same day that he or she retweeted either Clinton's or Trump's
official Twitter account. Intuitively, the more politically engaging
a domain is, the more it will co-occur with these political enti-
ties. With this proxy, we can select domains with high political
engagement, excluding social-media and content-hosting domains.
As a final filter, we require that each domain have an edge of at
weight least W to some other domain in the political subgraph. This
restricts our attention to the most actively used political domains.
Based on this, we can formally define the invocation graph. Every
domain in the invocation graph
• is not blacklisted (social media and content-hosting domains)
• has political engagement above some threshold p
• has at least one edge to another domain in the invocation
graph with weight at least W
We require the invocation graph be connected and contain some
seed domain. Any choice of popular American news outlet would
WWW 2018, April 23–27, 2018, Lyon, France
Manish Raghavan, Ashton Anderson, and Jon Kleinberg
yield exactly the same result, as they all belong to the same con-
nected component. (We use nytimes.com, but the choice is immate-
rial.)
Based on this definition, the algorithm to construct the invoca-
tion graph is as follows: begin with the full graph, remove all nodes
that are either blacklisted or have political engagement below p,
and run a breadth-first search beginning at nytimes.com following
only edges of weight at least W . In practice, we find that the values
we use for p and W don't affect our results much, and all of the
results presented here use p = 10000 and W = 100. Because we
study the change in this invocation graph over time, we build a
new graph Gm for each month m from January to November 2016.
A Political Spectrum. In order to characterize the political
nature of this graph, we need some way of organizing the domains
along a political spectrum. Drawing on techniques from [5] and our
definition of political engagement, we define the quantities PT (xC)
and PT (xT) for each domain x as the empirical probabilities that
a user posted a tweet containing a URL from domain x given that,
on the same day, he/she retweeted Clinton's or Trump's official
account respectively. Intuitively, if a user has retweeted Clinton on
a given day, the domains that he/she invokes are more likely to be
on Clinton's end of the political spectrum, and the same is true for
Trump. Figure 2 shows the resulting values, where the blue line
is PT (xC) = PT (xT). Interestingly, most domains lie above this
line, suggesting a difference in the populations of users retweeting
Clinton and Trump respectively.
Figure 2: PT (xC) vs. PT (xT) for September 2016
Furthermore, we can condense this information into a single
political score for each domain:
PT (xT)
sT (x) =
(1)
Note that sT (x) ∈ [0, 1], and the larger sT (x) is, the closer x is to
the Trump end of the spectrum. Throughout this section, we use
the spectrum built on January-September 2016.
PT (xC) + PT (xT)
3 METHODOLOGY
With these definitions, we can analyze various properties of the
invocation graph, and in particular, its interaction with the political
spectrum. Do usage patterns of news articles and other political
content differ across the political spectrum? How do these patterns
change leading up to the election? Using the invocation graph in
tandem with the political spectrum, we can shed light on these
questions.
Out-link Distributions. A key characteristic we study is the
out-link distribution for a domain x: the distribution of positions
on the political spectrum where edges originating from x land. A
domain's out-links describe the way in which it is used to reply
to other domains. For example, if a domain has many out-links to
other domains near it on the political spectrum, one might expect
that it is being used to reinforce a particular point of view; however,
if it has many out-links to the opposite end of the spectrum, it may
instead be used to disagree or argue with an opposing viewpoint.
To draw upon this intuition, we ask how x's out-link distribution
varies based on its political score sT (x). As a baseline for compari-
son, we compute the global out-link distribution - the distribution
over the political spectrum of where edges in G land. Comparing to
this baseline will give us some insight as to how x's linking pattern
differs from the "average" linking pattern.
However, since G contains no self-loops, x doesn't link to itself,
while the global out-link distribution contains links to x. To prevent
this from biasing the comparison, we instead compare x's out-link
distribution to the out-link distribution of G\x, that is, G with x
and all edges into or out of x removed.
Thus, x's out-link distribution distribution d(x, G) is a distribu-
tion over [0, 1] assigning probability mass to y ∈ [0, 1] proportional
to the weight of edges from x to x′ such that sT (x′) = y. The global
out-link distribution D(G\x) can then be expressed as
x′∈G\x d(x′, G\x) · vol(x′, G\x)
D(G\x) =
x′∈G\x vol(x′, G\x)
,
where vol(x′, G\x) is the total weight of edges leaving x′ in G\x.
In other words, D(G\x) is the weighted average of d(x′, G\x) for
x′ ∈ G\x.
We make the comparison between these distributions formal as
follows: for each x, let µout(x) be the weighted average political
score of the domains that x links to, so that µout(x) = E[d(x, G)].
This gives an estimate of what types of domains x is used to reply
to - if µout(x) is close to 0, then x is used primarily to reply to
Clinton-related domains, while if it is close to 1, then x is used
primarily to reply to Trump-related domains. In a slight abuse of
notation, let µout(G\x) be the weighted average political score of
all endpoints of edges in G\x, so µout(G\x) = E[D(G\x)]. Then,
(2)
δout(x) = µout(x) − µout(G\x)
is a measure of how much x deviates from other domains towards
the Trump end of the political spectrum.
From past work documenting homophily in online political ac-
tivity [1], one might expect that a domain will be used primarily
to engage with politically similar domains, implying that sT (x) is
positively correlated with δout(x). Furthermore, it is not a priori
obvious whether this trend should become more or less pronounced
leading up to the election - do the opposing parties increasingly
converse within themselves, or do they engage with one another?
Mapping the Invocation Structure of Online Political Interaction
WWW 2018, April 23–27, 2018, Lyon, France
(a) January 2016
(b) October 2016
Figure 3: Correlation between sT (x) and δout(x) for January and October
had length close to 0 in with respect to the political spectrum in
January, by October, many longer edges were present.
Figure 3 shows that in January, domains are more likely to have
links in the graph to politically similar domains, so sT (x) and δout(x)
are positively correlated. However, by October, this correlation has
reversed: on average, domains are being used to reply across the
political spectrum instead of to politically similar domains. Replies
seem to be adversarial, as with the breitbart.com → nytimes.com
edge in Figure 1.
To understand this change in correlation over time, we define
a(Gm) to be the slope of the correlation between sT (x) and δout(x)
for month m. Figure 4 shows that a(Gm) decreases significantly
from January to October 2016. This suggests that as the election
drew nearer, the fraction of interaction between opposite ends of
the spectrum increased, and domains from the two opposing sides
were actually being invoked more often to reply to each other.
Figure 5: Edge length distributions for January vs. October
To enable us to visualize where on the spectrum edges lie, we
make the following definitions. For a point y ∈ [0, 1], let f→(y, G)
be the number of edges (x1, x2) such that sT (x1) < y < sT (x2).
Similarly, let f←(y, G) be the number of edges such that sT (x1) >
y > sT (x2). In other words, f→(y, G) is the number of edges crossing
y from left to right on the political spectrum, and f←(y, G) is the
number of edges crossing y from right to left.
In order to interpret these functions, we need a baseline to com-
pare against. A natural baseline in such scenarios is the randomly
rewired graph G, the idea of which goes back to [26]. In G, ev-
ery vertex has the same indegree and outdegree as in G, but each
edge has a randomly chosen endpoint. Note that this can create
self-loops, which G does not have by construction; however, the
number of self-loops in G is small (often 0 for a given randomiza-
tion) and therefore their effect on this analysis is negligible. Figure 6
shows f→ and f← for G and G, where the values shown for G are
in expectation. In January, both f→ and f← are dominated by their
rewired counterparts, while in October, the opposite is true. This
suggests that at the beginning of the year, domains were used to
Figure 4: a(G) for January-November
Edge Lengths and Crossing Points. Another way of charac-
terizing the political aspects of the invocation graph is to consider
the lengths and locations of the edges on the political spectrum. As
the interaction between opposing viewpoints increases, we expect
to see longer edges in the invocation graph that cross the political
spectrum instead of staying on one side. Figure 5 shows that this
trend holds true between January and October - while most links
WWW 2018, April 23–27, 2018, Lyon, France
Manish Raghavan, Ashton Anderson, and Jon Kleinberg
(a) January 2016
(b) October 2016
Figure 6: f→(y) and f←(y) for G and G
reply to politically similar domains, resulting in shorter edges than
a random baseline, while closer to the election, domains were used
to reply across the political spectrum. This comparison allows us to
get a sense for how actual behavior deviates from random behavior,
and how this deviation changes over time.
Asymmetry in Out-links. Another striking feature of Figure 6
is that f← dominates f→, showing that many more links crossed
right-to-left than left-to-right. Intuitively, it seems that a dispro-
portionate number of edges originate on the right and end on the
left, corresponding to right-leaning domains being used to reply
to left-leaning domains. We can make this precise by defining r(x)
as the ratio of indegree(x)/(indegree(x) + outdegree(x)) and ana-
lyzing how r(x) changes with sT (x). Figure 7 shows that r(x) is
negatively correlated with sT (x), meaning that domains on the right
end of the political spectrum produce a disproportionate number
of out-links compared to domains on the left end. In other words,
domains on the right are more often used to reply to other domains,
while domains on the left are more often the recipients of replies.
Figure 7: sT (x) vs. r(x) for October
4 COMPARING TO THE USER LEVEL
Having established a set of results for the structure of invocation
graphs on Twitter, we would like to verify that our findings are
qualitatively consistent with what we see in more traditional user-
to-user communication graphs on social media. Since our Twitter
dataset doesn't contain information about individual users, we
instead turn to a publicly available Reddit dataset1. Reddit is a com-
munity discussion website organized into posts, or "submissions,"
and comments on those submissions. Comments are threaded, so
that a comment is either in reply to a top-level post or to another
comment. The data consists of every post and comment from Red-
dit in 2016, along with its author's username. Reddit is subdivided
into forums for particular topics called subreddits. We focus on
three subreddits in particular: r/politics, r/hillaryclinton,
and r/The_Donald, which are devoted to politics, Hillary Clinton,
and Donald Trump respectively. All three subreddits were among
the most active subreddits during 2016. Note that in addition to
studying user-to-user dynamics on Reddit, in principle we could
also use Reddit data to replicate our Twitter invocation-graph anal-
ysis at the domain level; however, it turns out that Reddit contains
too few comments with URLs for robust domain-level trends to
emerge.
Interactions at the User Level. In order to test for analogous
trends at the user level to those we found at the domain level, we
need to modify our methods. In particular, we now need some
kind of political information about users. Whereas in Section 2 we
anchored the political spectrum to the official Clinton and Trump
Twitter accounts, here we anchor our notion of political affiliations
to r/hillaryclinton and r/The_Donald. Since most users are
active in at most one of the two subreddits, we have a simpler
notion of a political score: we define a set UC of users who posted in
r/hillaryclinton but not r/The_Donald, and we define a set UT
of users who posted in r/The_Donald but not r/hillaryclinton.
There are 22,164 users in UC and 281,334 users in UT (more than
1https://files.pushshift.io/reddit/
Mapping the Invocation Structure of Online Political Interaction
WWW 2018, April 23–27, 2018, Lyon, France
Twitter
donaldjtrump.com
thegatewaypundit.com
Reddit
thegatewaypundit.com
zerohedge.com
breitbart.com
donaldjtrump.com
dailycaller.com
dailymail.co.uk
foxnews.com
nypost.com
bbc.co.uk
theguardian.com
cbsnews.com
cnn.com
thehill.com
nbcnews.com
huffingtonpost.com
washingtonpost.com
nytimes.com
politico.com
newsweek.com
politifact.com
hillaryclinton.com
breitbart.com
dailycaller.com
zerohedge.com
foxnews.com
nypost.com
dailymail.co.uk
thehill.com
politico.com
cbsnews.com
nbcnews.com
cnn.com
washingtonpost.com
bbc.co.uk
theguardian.com
nytimes.com
huffingtonpost.com
politifact.com
newsweek.com
hillaryclinton.com
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Table 1: Comparison of Twitter and Reddit political spectra
ten times the size of UC). We assume that most users in UC are pro-
Clinton, while most users in UT are pro-Trump (this is consistent
with the explicit ground rules for participating in these subreddits).
Validating Political Information from Subreddits. We ver-
ify that r/hillaryclinton and r/The_Donald contain strong sig-
nal about political orientation by adapting our methodology from
Twitter to build a spectrum over the domains on Reddit, and then
comparing this spectrum to the one built from Twitter. To do this,
we define PR(xC) to be the empirical probability that a post or
comment in r/hillaryclinton contains a URL from domain x
(and analogously for PR(xT) and r/The_Donald). As in (1), we can
define a political score from Reddit as
sR(x) =
PR(xT)
PR(xC) + PR(xT) .
(3)
Table 1 shows the orderings of the Twitter and Reddit spectra
for 21 domains. The Spearman rank correlation [28] (a measure of
squared distance) between the two orderings is 0.871 (compared
to a maximum of 0.757 over 10, 000 randomly shuffled orderings).
Thus the two settings align well, demonstrating that our notion
of political affiliation is adaptable to Reddit, and that it contains
strong and consistent signal.
Building a User-to-User Graph on Reddit. With this notion
of political affiliation, we can now investigate some basic prop-
erties of political discourse on Reddit. Just as we first restricted
our attention to political domains on Twitter, here we restrict our
attention to the main political subreddit r/politics. Since only a
subset of the users in r/politics are in either UC or UT , we focus
on comment-reply pairs in which both users involved are in one
of UC or UT . There are 4 possible types of interaction: UC → UC,
UC → UT , UT → UC, and UT → UT where p → q means that a
user from p posts a reply to a comment from a user in q. Let np→q
be the number of p → q interactions in a given time period. We
organize the data into sliding windows of 30 days. In the following
plots, the value at a particular date represents the 30-day window
ending at that date. Figure 8a shows comment counts throughout
2016 averaged over the next 30 days, and Figure 8b shows what
fraction of the comments were each type of interaction.
Figure 8b shows that a steadily rising number of comments are
cross-cutting (e.g., are of types UC → UT and UT → UC) from the
beginning of 2016 up until the election in early November, followed
by a return to a baseline rate. Figure 8c further reinforces this point,
showing a strong negative slope in the ratio of edges between
users of the same political leaning and users of different political
leanings from January until the November 8 election. These results
are consistent with our findings our Twitter, where an increasing
fraction of political interactions reach across the political spectrum
on Twitter up until the election.
To interpret the significance of these results, we adapt our ran-
dom rewiring technique to the user level by randomly reassign-
ing users to comments, preserving the invariant that each user
still posts the same number of comments as in the original data.
Whether we randomize globally (a comment is randomly attrib-
uted to any user from all of 2016) or each month (a comment is
attributed to a randomly chosen user from the same month that
comment was written), the results are the same – the observed
slope is significantly more negative than the minimum over 100
random trials.
Using our Reddit dataset, we've shown that our invocation graph
methodology can be adapted to analyze traditional user-user com-
munication graphs. In particular, we've used co-occurrences to
determine political information about both users and domains. The
month-to-month trend found at the user level mirrors our findings
on Twitter - in the months leading up to the election, online polit-
ical interaction increasingly reached across the political spectrum.
5 TWO-DIMENSIONAL ALIGNMENT
Our formulation of the political spectrum in this work indicates
that it has a natural two-dimensional structure, with one dimension
corresponding to co-occurrence probabilities with content related
to one candidate, and the other dimension corresponding to co-
occurrence probabilities with content related to the other candidate.
In Section 4, when we established that our invocation graph
methodology extends naturally to the traditional user-level set-
ting, part of our analysis involved measuring how well the one-
dimensional spectra sT (·) and sR(·) shown in Table 1 align. Here
we consider how to measure the alignment of the corresponding
two-dimensional spectra.
To make this comparison, we need to account for the fact that
axes may have different scales (e.g. posts on Reddit contain URLs
at a different rate than on Twitter). This means we need to scale
PR(xC) and PR(xT) in order to find the "best match" between
the two spectra. We formalize this as the following optimization
problem, minimizing the squared ℓ2 distance of each pair of points:
(PT (xC) − aPR(xC))2 + (PT (xT) − bPR(xT))2 (4)
min
a,b:a,b≥0
x ∈D
where D is the set of domains. Since all points lie in the first quad-
rant, we can drop the constraint a, b ≥ 0. Note that (4) can be
WWW 2018, April 23–27, 2018, Lyon, France
Manish Raghavan, Ashton Anderson, and Jon Kleinberg
(a) Comment counts
(b) Interaction types
(c) Ratio of replies across the political spectrum
Figure 8: User-level trends from the Reddit dataset. In Figure 8c, a decrease in (nC→C + nT→T )/(nC→T + nT→C) shows more
interaction reaching across the spectrum.
separated into 2 identical optimization problems of the form
(ux − cvx)2.
min
c
respectively, then this can be written as minc
(5)
If u and v are the vectors [ux : x ∈ D]⊤ and [vx : x ∈ D]⊤
2. This
is convex and has derivative
x ∈D ∥u −cv∥2
x ∈D
d
dc
∥u − cv∥2
2 = d
dc
(u − cv)⊤(u − cv) = 2v
⊤
u − 2cv
⊤
v.
Setting this equal to 0, we find that (5) has the solution c = v⊤u
v⊤v .
Using this, we can scale the Reddit spectrum to compare it to
the Twitter spectrum, producing the plot shown in Figure 9. The
spectra roughly align, with the domains in approximately the same
positions for both Twitter and Reddit.
Figure 9: Scaled spectrum comparison
If instead we wish to minimize ℓ1 distance between pairs of
points, we get the optimization problem
PT (xC) − aPR(xC) + PT (xT) − bPR(xT)
x ∈D
min
a,b:a,b≥0
Again, this results in two separate optimizations of the form
x ∈D
min
c
ux − cvx .
The subgradient of each term is
[−vx , vx]
(cid:40){vx · sign(cvx − ux)} ux (cid:44) cvx
vxj and
vxj >
vxj <
otherwise
j ≤i
j >i
j <i
vxj .
j ≥i
We sort the x's by increasing ux/vx , so i < j =⇒ uxi/vxi ≤
uxj/vxj , and then choose i such that
Essentially, i balances the vxj 's, splitting them into two sets such
that adding vxi to either set gives that set the larger sum of the two.
Thus, the subgradient of (7) contains 0 for c = uxi
, making this the
vxi
solution to (6).
We can also use this same alignment technique to compare spec-
tra between months. Figures 10a and 10b show that in absolute
terms, the spectra produced by January and February on Twitter
look quite different. In fact, after scaling the axes, the spectra align
very well (Figure 10c, using ℓ1-minimization). One way to see this
is to compare the quality of alignment in our data the quality of
alignment among shuffled versions of the spectra for January and
February, where the domains labeling the points are randomly per-
muted; we find that the alignment for the real data has much lower
cost than the typical alignment for shuffled data. The disparity
between the unscaled spectra seems to indicate an influx of users
in February who retweeted Clinton but didn't necessarily engage
in other sorts of political activity; this left the relative position of
other domains in the two-dimensional spectrum unaffected.
We also note this type of scaling doesn't affect the one-dimensional
orderings in Table 1. We can rewrite the political score as sT (x) =
, where θT is the angle of x from the PT (xC) axis. Since
1+tan θT
scaling the axes preserves the ordering of these angles, it also pre-
serves the one-dimensional rankings.
1
(6)
(7)
6 FURTHER RELATED WORK
Our work builds on rich literatures in online social media, online
news, information diffusion, and the landscape of online political
interaction, and it also draws on a long history of work studying
the role of media in politics.
Mapping the Invocation Structure of Online Political Interaction
WWW 2018, April 23–27, 2018, Lyon, France
(a) January 2016
(b) February 2016
(c) Scaled Comparison
Figure 10: Spectrum Comparison for January and February 2016 on Twitter
With access to information now abundant, a growing line of
work has investigated how this impacts consumption of political
information. As mentioned in the introduction, a key issue has been
measuring the extent to which online political interaction crosses
ideological divides, or whether it stays relatively confined in "filter
bubbles" or "echo chambers" [3, 11, 13, 15, 27, 31]. Concerns about
the Web potentially catalyzing balkanization, or fragmentation into
isolated ideological divisions, date from the 1990s [32]. Early em-
pirical work on the structure of online political interaction through
blogging identified strong ideological partitions evident in large-
scale analysis of linking patterns [1], whereas analyses of more
recent social media platforms finds evidence for a more complex
structure, in which both ideological entrenchment and exposure to
more diverse content is promoted on the Web [3, 11].
More broadly, our paper relates to the extensive work on the
structure of information sharing on the Web [4], as well as theoreti-
cal work on how network structure affects information flow [18, 20].
This structure has been quantified in many ways, particularly by or-
ganizing shares into information cascades [8, 17], where nodes are
typically people and edges between people indicate if one person
directly shared a piece of content with another person. In contrast,
our work here introduces and studies invocation graphs, where
nodes are information sources and edges indicate that a user shared
content from one source in response to content from another source.
The role of the media in politics is the subject of an active field
of study [19, 29]. Particularly relevant to our work here is the study
of how news and public opinion spread through social networks,
including the early theory of two-step flow [21]. More recently,
there has been a spirited debate about the impact that "influencers"
have on these processes [2, 7, 16, 22, 33].
7 CONCLUSION
In this work we have introduced invocation graphs, together with
a set of techniques for analyzing them, as a means of probing
the structure of online political interaction. In combination with
previous methods for inducing a political spectrum from data, we
develop methods for measuring several important phenomena. In
particular, we analyzed a natural embedding of the invocation graph
in the political spectrum, and asked how its edges are distributed
across this spectrum-whether they are sequestered in ideological
pockets or whether they span larger ideological distances. Applying
these techniques to political interaction on Twitter in the months
leading up to the 2016 US Presidential election, we observed that
political interaction via the invocation graph became increasingly
cross-cutting as the election neared. We also developed methods
to analyze whether there are inherent asymmetries between how
the right and the left engage each other via replies. Applying our
techniques to Twitter, we found that edges in in the invocation
graph more consistently went from sources on the right to sources
on the left than in the other direction.
It is worth emphasizing a critical feature of invocation graphs,
which is that they are composed of invoked interactions as opposed
to direct interactions. Although on a surface level invocation graphs
may resemble the hyperlink graphs that form a basic staple of Web
analysis, they are actually quite different, as the links are generally
not under the nodes' control. News sources publish content, and
then it is up to the readership to determine how these sources
connect to each other in the invocation graph. In this sense, relative
positions and functions of news domains in invocation graphs are
indicative of how the public actually uses them in online political
discussion. Beyond the ideological territory news sources may try
to explicitly claim for themselves, invocation graphs position these
sources according to their roles in political interaction.
There are a number of important directions that remain to be
pursued. First, it is intriguing to see how interaction both in the
invocation graph on Twitter and the user-to-user interaction graph
on Reddit became more and more ideologically cross-cutting as
the election approached, given that homophily would suggest that
most links should link to nearby points on the spectrum. Is there a
systematic way to relate this trend to an underlying level of polar-
ization, so that changes in the structure of the embedded invocation
graph might provide insight into polarization and how it evolves?
Second, beyond the two large social media datasets we considered,
it would be illuminating to apply our methods in other settings as
well. In particular, does online debate increasingly cross ideological
divides in the run-up to milestone events in general, or was this
specific to the 2016 US Presidential election? In general, we believe
that applying and extending our methods for online political inter-
action using invocation graphs contains many promising directions
for future work.
WWW 2018, April 23–27, 2018, Lyon, France
Manish Raghavan, Ashton Anderson, and Jon Kleinberg
[26] Michael Molloy and Bruce Reed. 1995. A critical point for random graphs with a
given degree sequence. Random structures & algorithms 6, 2-3 (1995), 161–180.
[27] Eli Pariser. 2011. The Filter Bubble: What the Internet is Hiding from You. Viking.
[28] Charles Spearman. 1904. The proof and measurement of association between
two things. The American journal of psychology 15, 1 (1904), 72–101.
[29] John Street. 2010. Mass media, politics and democracy. Palgrave Macmillan.
[30] Cass Sunstein. 2007. Republic.com. Princeton University Press.
[31] Cass R Sunstein. 2001. Echo chambers: Bush v. Gore, impeachment, and beyond.
Princeton University Press Princeton, NJ.
[32] Marshall Van Alstyne and Erik Brynjolfsson. 1996. Could the Internet balkanize
science? Science 274, 5292 (1996), 1479.
[33] Duncan J Watts and Peter Sheridan Dodds. 2007. Influentials, networks, and
public opinion formation. Journal of consumer research 34, 4 (2007), 441–458.
Acknowledgements. We thank Lada Adamic, Glenn Altschuler,
Isabel Kloumann, and Michael Macy for valuable discussions about
these topics. MR is supported by an NSF Graduate Research Fellow-
ship (DGE-1650441). JK is supported in part by a Simons Investigator
Award, an ARO MURI grant, and NSF grant 1741441. This work was
performed in part while AA and MR were at Microsoft Research.
REFERENCES
[1] Lada A. Adamic and Natalie Glance. 2005. The Political Blogosphere and the
2004 U.S. Election: Divided They Blog. In Proceedings of the 3rd International
Workshop on Link Discovery (LinkKDD '05). ACM, New York, NY, USA, 36–43.
https://doi.org/10.1145/1134271.1134277
[2] Eytan Bakshy, Jake M Hofman, Winter A Mason, and Duncan J Watts. 2011.
Everyone's an influencer: quantifying influence on twitter. In Proceedings of the
fourth ACM international conference on Web search and data mining. ACM, 65–74.
[3] Eytan Bakshy, Solomon Messing, and Lada A Adamic. 2015. Exposure to ideologi-
cally diverse news and opinion on Facebook. Science 348, 6239 (2015), 1130–1132.
[4] Eytan Bakshy, Itamar Rosenn, Cameron A. Marlow, and Lada A. Adamic. 2012.
The Role of Social Networks in Information Diffusion. In Proc. World Wide Web
Conference.
[5] Yochai Benkler, Robert Faris, Hal Roberts, and Ethan Zuckerman. 2017. Study:
Breitbart-led right-wing media ecosystem altered broader media agenda.
Columbia Journalism Review 1, 4.1 (2017), 7.
[6] W. Lance Bennett. 1996. News: The politics of illusion. Longman.
[7] Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and P Krishna Gummadi.
2010. Measuring user influence in twitter: The million follower fallacy. ICWSM
10, 10-17 (2010), 30.
[8] Justin Cheng, Lada A. Adamic, P. Alex Dow, Jon M. Kleinberg, and Jure Leskovec.
2014. Can cascades be predicted?. In 23rd International World Wide Web Conference,
WWW '14, Seoul, Republic of Korea, April 7-11, 2014. 925–936. https://doi.org/10.
1145/2566486.2567997
[9] Michael Conover, Jacob Ratkiewicz, Matthew R. Francisco, Bruno Gonçalves,
Filippo Menczer, and Alessandro Flammini. 2011. Political Polarization on Twitter.
In Proceedings of the Fifth International Conference on Weblogs and Social Media,
Barcelona, Catalonia, Spain, July 17-21, 2011. http://www.aaai.org/ocs/index.php/
ICWSM/ICWSM11/paper/view/2847
[10] P. Alex Dow, Lada A. Adamic, and Adrien Friggeri. 2013. The Anatomy of Large
Facebook Cascades. In Proceedings of the Seventh International Conference on
Weblogs and Social Media, ICWSM 2013, Cambridge, Massachusetts, USA, July 8-11,
2013. http://www.aaai.org/ocs/index.php/ICWSM/ICWSM13/paper/view/6123
[11] Seth Flaxman, Sharad Goel, and Justin Rao. 2016. Filter Bubbles, Echo Chambers,
and Online News Consumption. Public Opinion Quarterly 80 (2016).
[12] Adrien Friggeri, Lada A Adamic, Dean Eckles, and Justin Cheng. 2014. Rumor
Cascades. In ICWSM.
[13] R Kelly Garrett. 2009. Echo chambers online?: Politically motivated selective expo-
sure among Internet news users. Journal of Computer-Mediated Communication
14, 2 (2009), 265–285.
[14] Matthew Gentzkow and Jesse M Shapiro. 2010. What drives media slant? Evidence
from US daily newspapers. Econometrica 78, 1 (2010), 35–71.
[15] Eric Gilbert, Tony Bergstrom, and Karrie Karahalios. 2009. Blogs are echo cham-
bers: Blogs are echo chambers. In HICSS'09. 42nd Hawaii International Conference
on System Sciences. IEEE, 1–10.
[16] Malcolm Gladwell. 2006. The tipping point: How little things can make a big
difference. Little, Brown.
[17] Sharad Goel, Ashton Anderson, Jake M. Hofman, and Duncan J. Watts. 2016. The
Structural Virality of Online Diffusion. Management Science 62, 1 (2016), 180–196.
https://doi.org/10.1287/mnsc.2015.2158
[18] Benjamin Golub and Matthew O Jackson. 2009. How homophily affects learning
and diffusion in networks. (2009).
[19] Doris A Graber and Johanna Dunaway. 2017. Mass media and American politics.
Cq Press.
[20] Matthew O Jackson and Leeat Yariv. 2006. Diffusion on social networks. Economie
publique/Public economics 16 (2006).
[21] Elihu Katz. 1957. The two-step flow of communication: An up-to-date report on
an hypothesis. Public opinion quarterly 21, 1 (1957), 61–78.
[22] Elihu Katz and Paul Felix Lazarsfeld. 1966. Personal Influence, The part played by
people in the flow of mass communications. Transaction Publishers.
[23] Bill Kovach and Tom Rosenstiel. 1999. Warp Speed: America in the Age of Mixed
Media. Century Foundation Press.
[24] Ravi Kumar, Mohammad Mahdian, and Mary McGlohon. 2010. Dynamics of
Conversations. In ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining. 553–562.
[25] Paul F. Lazarsfeld, Bernard Berelson, and Hazel Gaudet. 1944. The People's Choice:
How the Voter Makes Up His Mind in a Presidential Campaign. Duell, Sloan, and
Pearce.
|
1706.10223 | 1 | 1706 | 2017-06-30T14:42:01 | Press F1 for help: participatory design for dealing with on-line and real life security of older adults | [
"cs.SI",
"cs.HC"
] | In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of the end user, not only improves the design and development of the application, but also provides an effective method for designing and applying solutions aimed at improving the security of older adults while using online and mobile tools. | cs.SI | cs | Press F1 for help: participatory design for
dealing with on-line and real life security of older
adults
Bartłomiej Balcerzak, Wiesław Kopeć, Radosław Nielek, Sebastian Kruk,
Kamil Warpechowski, Mateusz Wasik and Marek Węgrzyn
Polish-Japanese Institute of Information Technology,
ul. Koszykowa 86, 02-008 Warsaw, Poland
Email: [email protected]
Abstract-In this paper we present the report on the
design and development of a platform for the inter-
generational exchange of favors. This platform was
designed using participatory design approach during a 24-
hour hackathon by a
team consisting of younger
programmers and older adults. The findings of this report
show that inter-generational cooperation in which the
older adults serve as representatives of the end user, not
only
improves the design and development of the
application, but also provides an effective method for
designing and applying solutions aimed at improving the
security of older adults while using online and mobile tools.
Index Terms-on-line security, participatory design, co-
design, user-center design,
elderly,
hackathons, intergenerational interaction and cooperation
older adults,
I. INTRODUCTION
Paper presents a process of designing and implementing an
on-line platform dedicated for matching people that need help
with volunteers wiling do offer it. Platform is intended to be
used mostly, but not exclusively, by older adults. Therefore,
design process has to include both older adults and young
volunteers, and the final product has to meet their, often
contradictory, needs. Special focus was put on designing
security measures for older adults, in order to cope with their
needs in this regard. Platform described in this paper was
developed during 24-hours long hackathon organized in
Warsaw by the Polish-Japanese Academy of Information
Technology. Team developing this platform was composed of
four male students and two older adults. In this case study, we
aim at describing how the use of participatory design, and
intergenerational communication may improve the design
process of security within applications created for social
interaction.
Aging is a gradual process, which is usually connected with
deterioration
in autonomy. House cleaning, shopping,
maintenance or visiting family graves, those activities are
often beyond the abilities of older adults. Some of them are
done by social workers, but an opportunity to outsource part of
them to volunteers might improve the coherence of society by
fostering intergenerational interactions. Moreover, it might
also limit the costs of social services and remove pressure
from professional caregivers.
Although the most obvious scenario is the one including
young volunteers helping older adults, it is not the only
possibility. Surprisingly, older adults often do some
volunteering works e.g. helping young kids in homework or
guiding tours in local museums. It is also quite common that
older adults help other people their age. Therefore, it is
important to design a system that will be taking into account a
variety of scenarios and will not impose predefined roles
associated with age. It is also important that such system
addresses the issues of safety of both the parties involved.
Demographic models indicate that in 2050 the population
aged 65+ in the USA will almost double and reach 83.7
million (over 20% of the society) [11]. Report prepared by
OCED [10] shows that Japan will be the oldest society in
2050. Spijker et al. argument that, although demographic data
is true, in reality, the number of older adults requiring
assistance in the UK and other countries has actually been
falling in recent years [17].
The paper is organized as follows. Section II [Related
works] describes the related works concerning volunteering of
older adults, platforms for managing volunteers as well as the
basics of participatory design approach. Section III [Project
phases] relates to the process of the preparing and designing
the platform's project. The next section, i.e. section IV
[Design], describes in details the platform for exchanging
favors. Final section contains conclusions and future work.
II. RELATED WORKS
A. Platforms for managing volunteers
Platforms that manage voluntary work are abundant on the
Internet, including large communities of contributors, such as
the Wikipedia [21,22]. However, virtual online platforms lack
the ability of organizing non-virtual voluntary work. Platforms
for managing volunteers have been so far focused on
organizing the work of a homogenous group of people
interested in volunteering. Products available online are
mostly
allow volunteering
organizations to improve their work when in comes to
administration of human resources. Prime examples of such
commercially
include
http://ivolunteer.com or http://www.volunteerhub.com. These
platforms offer mostly methods
the
communication between the organization and the volunteers,
mostly through volunteers tracking and providing methods of
individual volunteer review. To the best of the authors
commercial projects
platforms
for
improving
that
available
knowledge no platform system was designed with inter-
generational communication in mind.
B. Older adults and on-line security
According to the studies done by [4] older adults are, on
average, less knowledgeable and aware of on-line risks than
younger adults. Also, as shown by [1], older adults show
limited trust to on-line technology. This effect, however,
diminishes with the usage of ICT. Another dimension crucial
for on-line security is trust. Studies done by [7] as well as [4]
show that trust among older adults is not affected by age, and
relies more on experience that comes with the use of ICT.
Therefore, the design of applications addressing the issue of
trust is important.
C. User participation and interaction
Fundamental idea relevant to this case is connected with the
concept of user-center design, as a part of general idea of
human focused approach related to another important idea:
participatory design, sometimes called co-design. While there
are different origins for the two latter terms, they actually refer
to the same idea of bottom-up approach, which is widely used
besides software engineering, from architecture and landscape
design to healthcare industry.[18] All those concepts put
human in the center of designing process, there is, however, a
small, but significant distinction between user-center design
and participatory design: the former refers the process of
designing FOR users, while the latter WITH users.[14], [16]
Another case is the work done by [19], describing the
cooperation between seniors and preschool children in a
design task. An interesting observation made in this research
was the fact that both groups needed the equal amount of time
together and in separation in order to function properly. The
broader context for these topics is covered by the contact
theory, a widely recognized psychological concept coined by
Allport [2] and developed for many years by others, e.g.
Pettigrew.[12] According to the theory, the problem of
intergroup stereotypes can be faced by intergroup contact.
There are several conditions for optimal intergroup contact,
but many studies proved
is a
worthwhile approach, since it typically reduces intergroup
prejudice.[13]
intergroup contact
that
D. Volunteering of older adults
The effects that volunteering has on older adults is a
developing field of study within various disciplines. The
consensus that can be reached throughout various studies, is
that participation in volunteer activity has many positive
effects on the elderly. [6] claim that older adults who
frequently volunteer in various activities, tend to have
improved physical and mental health, compared to those who
do not participate in volunteering. The work of [9] extends this
correlation to wellbeing (with volunteering being correlated
with higher levels of well-being), this is also reinforced by
[3]and [5]. This is crucial since studies also show that in some
regards, elders are more likely to be engaged in volunteer
activity [8].
III. PROJECT PHASES
According to Sanders [15] there is the distinction between
main product design process and pre-design stage. The latter is
an early stage usually related to idea development process. In
case described in this paper the pattern was observed: the
design process was preceded with pre-design phase with
clearly visible idea development stage.
A. Pre-design stage
In pre-design stage there was a vivid and intense process of
idea development between both parties:
the younger
programmers (four male undergraduate students of the Polish-
Japanese Academy of Information Technology) and senior
team members (a woman and a man – a pair of participants of
the Living Laboratory PJAIT, distributed laboratory and
platform devoted to IT solutions development in cooperation
with the city of Warsaw, Poland).
The developers team had their own idea of application,
which was then discussed with elder team members. During
team brainstorming process in pre-design stage final solution
emerged: an on-line platform for matching older adults with
younger volunteers in order to exchange services.
B. Design stage
During the design stage the insight provided by the seniors
working with the team was applied to the construction of the
platform. Upon discussion between members of the two
generations, the name 'F1' was chosen for the application. The
name, inspired by the F1 hotkey used in various kinds of
software to open the help window, was proposed by one of the
seniors, who knew of the hotkey's role from previous
experience and computer courses he had participated in. Based
on the discussion made during the pre-design stage and the
topics raised by the older adults, focus was put by the
programmers on designing solutions related to accessibility of
the platform for all users, and issues of user safety and security
of the exchange of favors. During the design stage the role of
seniors was limited mostly due to the lack of technical
expertise required in the process of designing a platform. This
does not mean, however, that the older adults were passive.
They tried to be active and engaged throughout the whole
process e.g. via e-mail or phone. As it was mentioned above,
participatory design approach can be applied at any stage of
the process, but its influence is the most apparent and
significant in pre-design stage. We observed a similar shift in
time: from co-design at early stage of teamwork to more
typical user-center approach towards the end of the hackathon.
According to the workflow observed, the opinions that seniors
voiced upon seeing the final product were implemented into
the working prototype presented upon the conclusion of the
hackathon. This mode of cooperation can be considered as a
natural continuation of the model observed in the pre-design
stage.
A. Platform architecture
IV. DESIGN
The F1 platform was designed as a client-server model and
requires access to the Internet for the proper functioning. It
might be a serious limitation for less developed and less
populated countries, but as the platform is intended to be
deployed in Poland, we decided to sacrifice versatility for
simplicity.
Access to the system is possible either through a web site or
a dedicated mobile application. Although both ways provide
the same functionality, there are also substantial differences.
Mobile application was designed to be most convenient for
people offering support. Web site is more focused on posting
requests for help. The reason for this differentiation is that
mobile application will be more frequently used by younger
volunteers and web browsers are better suited for older adults.
In the case described in this paper senior participants were
more familiar with traditional desktop or mobile computers
than with smartphones. Moreover, computer web browsers can
be more suitable for people with certain disabilities – e.g.
visually impaired or with limited hand dexterity. On the other
hand, mobile devices are becoming more and more widespread
and the adoption of touch interface by the elderly can be faster
and more effective than traditional computer interfaces (e.g.
observed in our previous research studies). Thus, in the final
product the application mode (web site or mobile app) is
intended to be freely interchangeable at any time by the user.
B. Functionality
The web-based application contains all key information and
functions important for the user searching for the help of a
volunteer. The screen informs the user about his or her
previous favor requests, as well as the location of other users
in the area. There is also an S.O.S button, which can be used in
the case of emergency.
The mobile application view, used by the potential volunteer
is shown in Figure1a. When using the mobile view, the user
can view a map of the nearest area where favor requests are
marked. When the user selects a favor, a brief description of
the favor and the requesting user is provided.
C. Security related features
Another direct benefit from applying participatory design
approach refers to security issues. During the pre-design
phase, older adults voiced their concerns related to the user
security, taking into account threats for both parties of the
process. The main areas in which they stated older adults
require aid when it comes to security, were related to
minimizing the risks of coming in contact with fake profiles,
or malicious users, as well as dealing with problems of
potential identity theft. The older adults involved in the project
also stressed that the platform should be able to aid the older
users while dealing with emergencies, when swift help is
needed. These
the
following solutions into the design of the platform.
issues were addressed by applying
1)
Trusted profiles: Sign up is free for all and requires
only a valid email account. Lowering the barrier makes the
system more user-friendly but also prone to malicious users.
Discussions with prospect users during the design phase
revealed that the elderly are afraid of letting unknown people
visit their apartments. To address this problem a voluntary
procedure for confirming profiles was implemented. User
profile might be confirmed by external organizations that are
trustworthy: e.g. schools or local NGOs. Confirmation of the
verified status is visible for everyone next to profile picture –
see fig. 2.
(a) Detailed information about request for assist.
Fig. 1: Mobile application dedicated to those who offer
assistance.
Fig. 2: Pop-up window displaying the confirmation details for
selected volunteer
2)
Challenge-response authentication: Next to the threat
of fake or malicious profiles mentioned in previous section,
yet another problem was identified by participatory approach.
Even if identity of volunteer is confirmed on the platform, still
we need a way to confirm it in real world, when a volunteer is
knocking at the door of senior's apartment. This is the
REFERENCES
[1] N. Adams, D. Stubbs, and V. Woods. Psychological barriers to internet
usage among older adults in the uk. Medical informatics and the
Internet in medicine, 30(1):3–17, 2005.
[2] G. W. Allport. The nature of prejudice. Basic books, 1979.
[3] E. A. Greenfield and N. F. Marks. Formal volunteering as a protective
factor for older adults' psychological well-being. The Journals of
Gerontology Series B: Psychological Sciences and Social Sciences,
59(5):S258–S264, 2004.
[4] G. A. Grimes, M. G. Hough, E. Mazur, and M. L. Signorella. Older
adults' knowledge of internet hazards. Educational Gerontology,
36(3):173–192, 2010.
[5] Y. Hao. Productive activities and psychological well-being among older
adults. The Journals of Gerontology Series B: Psychological Sciences
and Social Sciences, 63(2):S64–S72, 2008.
[6] T. Y. Lum and E. Lightfoot. The effects of volunteering on the physical
and mental health of older people. Research on aging, 27(1):31–55,
2005.
[7] D. W. McCloskey. The importance of ease of use, usefulness, and trust
to online consumers: An examination of the technology acceptance
model with older consumers. Journal of Organizational and End User
Computing, 18(3):47, 2006.
[8] N. Morrow-Howell. Volunteering in later life: Research frontiers. The
Journals of Gerontology Series B: Psychological Sciences and Social
Sciences, 65(4):461–469, 2010.
[9] N. Morrow-Howell, J. Hinterlong, P. A. Rozario, and F. Tang. Effects
of volunteering on the well-being of older adults. The Journals of
Gerontology Series B: Psychological Sciences and Social Sciences,
58(3):S137–S145, 2003.
[10] U. Nations. World population ageing 2015. Department of Economic
and Social Affairs, 2015.
[11] J. M. Ortman, V. A. Velkoff, H. Hogan, et al. An aging nation: the older
population in the united states. Washington, DC: US Census Bureau,
pages 25–1140, 2014.
[12] T. F. Pettigrew. Intergroup contact theory. Annual review of psychology,
49(1):65–85, 1998.
[13] T. F. Pettigrew and L. R. Tropp. A meta-analytic test of intergroup
contact theory. Journal of personality and social psychology, 90(5):751,
2006.
[14] E. B.-N. Sanders. From user-centered
to participatory design
approaches. Design and the social sciences: Making connections, pages
1–8, 2002.
[15] E. B.-N. Sanders. Perspectives on participation in design. Wer gestaltet
die Gestaltung, pages 61–74, 2013.
[16] E. B.-N. Sanders and P. J. Stappers. Co-creation and the new landscapes
of design. Co-design, 4(1):5–18, 2008.
[17] J. Spijker and J. MacInnes. Population ageing: the timebomb that isn't.
BMJ, 347(6598):1–5, 2013.
[18] D. Szebeko and L. Tan. Co-designing for society. Australasian Medical
Journal, 3(9):580–590, 2010.
[19] B. Xie, A. Druin, J. Fails, S. Massey, E. Golub, S. Franckel, and K.
Schneider. Connecting generations: developing co-design methods for
older adults and children. Behaviour & Information Technology,
31(4):413–423, 2012.
[20] P. Turek et al. Wikiteams: How do they achieve success? IEEE
Potentials 30.5 (2011): 15-20.
[21] A. Wierzbicki, P. Turek, and R. Nielek. Learning about team
collaboration from Wikipedia edit history. Proc. of the 6th International
Symposium on Wikis and Open Collaboration. ACM, 2010.
situation when digital system should face analogue world and
a bottom-up approach proved to be helpful once again.
Therefore, a standard challenge-response authentication has
been adapted and implemented. The platform generates two
keywords for both users. Elderly should ask about the right
password before letting someone in. Passwords are randomly
selected from a subset of Polish words to make them easy to
remember and dictation by entry phone.
3)
Reputation score: Limiting the amount of frauds is
crucial for assuring the wide acceptance of the platform, but it
is not enough. Next to deliberate and planed frauds, we can
see poor quality service. Therefore, the platform contains a
reputation management system. Every agreed and conducted
service can be evaluated on Likert-type scale. To make the
scale easier to understand for users, first two grades are red,
neutral score is gray and the two positive levels are green.
Sum of all evaluations for a given user are displayed next to
the picture – see Fig. 2.
4)
and
emergency button has been added to the F1 platform.
Emergency button: In real life exhaustive list of risks
to complete. Therefore, an
impossible
threats
is
V. CONCLUSION AND FUTURE WORK
In this paper we presented the report from the design and
development of a platform for inter-generational exchange of
favors, that was created by an inter-generational team during a
24-hour academic hackathon. The team working on the
application consisted of younger programmers and older adults
serving as representatives of the end users. Cooperation during
pre-design and design stage helped to improve the quality of
the final product, as well as helped to reduce the social
distance between the members of the two generations. The
platform was developed in a way that it addressed the issues
raised by the end users represented here by two older adults.
The younger programmers decided to follow the senior's idea
of an application and implemented solutions that deal with the
issues that older adults considered important while using an
on-line platform. As a result, the programmers introduced a
multistage system of security measures that foster the
development of trust with a network of volunteers in social
work.
In our future work we plan to further describe the live
testing and implementation of the platform in real-life
volunteer communities in Poland and abroad. We will also
describe in more details the hackathon during which the
platform was developed, and focus more on analyzing the
modes of intergenerational cooperation observed during this
event.
ACKNOWLEDGMENTS
This project has received funding from the European Union's
Horizon 2020 research and innovation programme under the
Marie Skłodowska-Curie grant agreement No 690962.
This project was partially supported by the infrastructure
bought within the project „Heterogenous Computation Cloud"
funded by the Regional Operational Programme of Mazovia
Voivodeship.
|
1702.01586 | 1 | 1702 | 2017-02-06T12:15:22 | Real-Time Influence Maximization on Dynamic Social Streams | [
"cs.SI",
"cs.DS"
] | Influence maximization (IM), which selects a set of $k$ users (called seeds) to maximize the influence spread over a social network, is a fundamental problem in a wide range of applications such as viral marketing and network monitoring. Existing IM solutions fail to consider the highly dynamic nature of social influence, which results in either poor seed qualities or long processing time when the network evolves. To address this problem, we define a novel IM query named Stream Influence Maximization (SIM) on social streams. Technically, SIM adopts the sliding window model and maintains a set of $k$ seeds with the largest influence value over the most recent social actions. Next, we propose the Influential Checkpoints (IC) framework to facilitate continuous SIM query processing. The IC framework creates a checkpoint for each window slide and ensures an $\varepsilon$-approximate solution. To improve its efficiency, we further devise a Sparse Influential Checkpoints (SIC) framework which selectively keeps $O(\frac{\log{N}}{\beta})$ checkpoints for a sliding window of size $N$ and maintains an $\frac{\varepsilon(1-\beta)}{2}$-approximate solution. Experimental results on both real-world and synthetic datasets confirm the effectiveness and efficiency of our proposed frameworks against the state-of-the-art IM approaches. | cs.SI | cs | Real-Time Influence Maximization on Dynamic Social
Streams
Yanhao Wang, Qi Fan, Yuchen Li, Kian-Lee Tan
School of Computing, National University of Singapore, Singapore
{yanhao90, fanqi, liyuchen, tankl}@comp.nus.edu.sg
7
1
0
2
b
e
F
6
]
I
S
.
s
c
[
1
v
6
8
5
1
0
.
2
0
7
1
:
v
i
X
r
a
ABSTRACT
Influence maximization (IM), which selects a set of k users
(called seeds) to maximize the influence spread over a social
network, is a fundamental problem in a wide range of ap-
plications such as viral marketing and network monitoring.
Existing IM solutions fail to consider the highly dynamic
nature of social influence, which results in either poor seed
qualities or long processing time when the network evolves.
To address this problem, we define a novel IM query named
Stream Influence Maximization (SIM) on social streams.
Technically, SIM adopts the sliding window model and main-
tains a set of k seeds with the largest influence value over the
most recent social actions. Next, we propose the Influential
Checkpoints (IC) framework to facilitate continuous SIM
query processing. The IC framework creates a checkpoint
for each window slide and ensures an ε-approximate solu-
tion. To improve its efficiency, we further devise a Sparse
Influential Checkpoints (SIC) framework which selectively
keeps O( log N
β ) checkpoints for a sliding window of size N
and maintains an ε(1−β)
-approximate solution. Experimen-
tal results on both real-world and synthetic datasets confirm
the effectiveness and efficiency of our proposed frameworks
against the state-of-the-art IM approaches.
2
1.
INTRODUCTION
Social media advertising has become an indispensable tool
for many companies to promote their business online. Such
trends have generated over 17 billion dollars advertising rev-
enue for Facebook in 2015 alone1. Influence Maximization
(IM) is a key algorithmic problem behind social media viral
marketing [12, 17]. Through the word-of-mouth propaga-
tion among friends, IM aims to select a set of k users such
that the source information (e.g., advertisement) is maxi-
mally spread in the network, and it has been extensively
researched [1, 6, 9, 10, 15–17, 21, 23–25, 28, 29, 35–37, 39] in the
last decade. Besides viral marketing, IM is also the corner-
stone in many other important applications such as network
monitoring [20] and recommendation [33].
Most existing IM solutions rely on influence probabilities
between users to acquire the seeds. The influence probabil-
ities are usually derived from social actions in online social
networks [14, 19, 31], e.g., "retweets" on Twitter. In reality,
social influences are highly dynamic and the propagation
tendencies between users can be altered drastically by break-
ing news and trending topics. Consequently, the seeds se-
lected by IM methods [6,17,28,35,36] that assume static so-
cial influences can quickly become outdated. Recently, there
are some research efforts on IM under dynamic social influ-
ences. However, existing solutions for dynamic IM either do
not offer theoretical guarantees for the qualities of the seeds
selected (e.g., [1,39]) or provide guarantees at the expense of
high processing overhead for updates (e.g., [10, 29]). In fact,
the state-of-the-art dynamic IM solution [29] is only able
to process several hundred updates per second, which is far
lower than the update rates of real-world social networks.
For example, over 7.4K tweets are generated on Twitter in
one second2.
To resolve the aforementioned drawbacks and make dy-
namic IM both effective and efficient, we propose a novel
Stream Influence Maximization (SIM) query to support real-
time influential users tracking. SIM utilizes the widely avail-
able social actions (e.g., "retweets" on Twitter, "replies" on
Reddit and "comments" on Facebook) to estimate the social
influence and maintain the seed set continuously. To capture
the short-term memory effect of social influences [32], where
past influences quickly fade as new influences emerge, SIM
adopts the sliding window model [11] which always considers
the most recent N actions and strives to find k users who
collectively have the largest influence value in the current
window. In addition, SIM supports general monotone sub-
modular functions to compute the influence values as such
functions are often used to represent the "diminishing re-
turns" property of social influences in different types of IM
problems [4, 9, 15, 17, 21, 23, 37].
Due to the NP-hardness of SIM, we focus on processing
it approximately with theoretical bounds. Leveraging the
monotonicity and submodularity of influence functions, a
naıve greedy algorithm [27] can provide a (1 − 1/e) appro-
ximate solution for SIM. However, the greedy algorithm re-
quires O(k · U ) (U is the number of users in the network)
influence function evaluations for each update. Empirically,
it takes around 10 seconds to select 100 seeds from a net-
work with 500, 000 users, which hardly matches the rates of
real-world social streams. Another closely related technique
to SIM is Streaming Submodular Optimization (SSO) [3,18].
Existing SSO approaches [3, 18] can provide solutions with
theoretical guarantees for maximizing submodular functions
with cardinality constraints over append-only streams. How-
ever, to the best of our knowledge, none of the proposed SSO
algorithms can support the sliding window model.
In this paper, we propose a novel Influential Checkpoints
(IC) framework to support efficient continuous SIM process-
ing with theoretical guarantees. IC not only tracks the so-
1https://www.bamsec.com/companies/1326801/facebook-inc
2http://www.internetlivestats.com/one-second/
lution for the current window but also maintains partial so-
lutions called Checkpoints for future windows that overlap
with the current window. Therefore, for every subsequent
window shift, the up-to-date solution can be retrieved effi-
ciently. We further design a generic Set-Stream Mapping
(SSM) interface which can adapt a wide range of existing
SSO algorithms to SIM so that the solution retrieved for
each sliding window has at least the same approximation
ratio as those algorithms. However, maintaining all O(N )
checkpoints incurs significant update overhead (N is the
number of actions in a window). To support efficient IC
maintenance, we propose a Sparse Influential Checkpoints
(SIC) framework to selectively maintain a subset of check-
points by leveraging the monotonicity and subadditivity of
the influence values returned by different checkpoints. Con-
sequently, SIC only keeps O( log N
β ) checkpoints and main-
tains an ε(1−β)
-approximate solution.
2
We hereby summarize our contributions as follows.
• We address the limitations of existing IM solutions in
supporting fast evolving social networks and propose
a novel SIM query over sliding windows. (Section 3)
• We develop a novel Influential Checkpoints (IC) frame-
work for SIM query processing. It is integrated with a
generic Set-Stream Mapping (SSM) interface to incor-
porate existing ε-approximate SSO algorithms while
retaining their approximation ratios. (Section 4)
• We further propose the SIC framework to selectively
maintain O( log N
β ) checkpoints for a sliding window of
size N . Leveraging the subadditivity and submodular-
ity of the influence values returned by different check-
points, an ε(1−β)
-approximation ratio is always guar-
anteed. (Section 5)
2
• We experimentally evaluate the effectiveness and effi-
ciency of our proposed frameworks. First, the qualities
of the seeds selected by IC and SIC are competitive
with the state-of-the-art IM algorithms on both static
and dynamic graphs. Second, SIC achieves speedups of
up to 2 orders of magnitude over the static approaches.
Third, SIC achieves up to 8 times speedups over IC
with less than 5% quality losses. (Section 6)
2. RELATED WORK
We summarize the most relevant literature from three
influence maximization, streaming submodular op-
areas:
timization and function estimation on sliding windows.
2.1 Influence Maximization (IM)
IM aims to extract a given number of users that maximize
the influence spread over a network. Previous efforts on
IM can be generally categorized into static methods and
dynamic methods based on their abilities to handle changes
in social influences. Here, we summarize them separately.
IM in Static Networks: There has been a vast amount of
literature on influence maximization (IM) in static networks
over the last decade (see [6, 9, 17, 21, 23, 25, 28, 35–37]). The
state-of-the-art static IM method on the classic influence
models (i.e., independent cascade (IC) and linear threshold
(LT)) is IMM [35].
It runs in nearly linear time wrt. the
graph size with a (1 − 1/e − ε) approximation guarantee.
Nevertheless, these static IM methods including IMM can-
not efficiently support highly evolving networks since a com-
plete rerun is required for every update on influence graphs.
There are also many static methods considering different
types of IM problems by extending classic influence models.
For example, topic-aware IM [4, 9] considers the influence
diffusion under topic models; location-aware IM [21, 37] fo-
cuses on maximizing the influence spread in certain spatial
areas; and conformity-aware IM [23] considers users' confor-
mity tendencies in the influence estimation.
IM in Dynamic Networks: Recently, there are emerg-
ing studies about IM in dynamic networks. However, most
of these methods cannot provide a theoretical guarantee
of their seed quality and may return arbitrarily bad solu-
tions [1, 39]. Chen et al. [10] proposed an Upper Bound
Interchange (UBI) method with a 1/2-approximation ratio.
Nevertheless, UBI is sensitive to the number of users se-
lected. When the size of the seed set increases, both its per-
formance and solution quality degrade dramatically. This
prevents UBI from being practically useful. Very recently,
a new dynamic IM method with a theoretical bound is pre-
sented in [29].
It dynamically maintains a RIS-based [6]
index against changes on graphs and achieves a (1 − 1/e − ε)
approximation guarantee. However, due to the high mainte-
nance cost, it can only process several hundred of influence
graph updates per second. This is far from the requirement
of real-world social streams. Therefore, existing dynamic IM
methods cannot provide high-quality solutions efficiently.
2.2 Streaming Submodular Optimization
Another closely related field to SIM is the Streaming Sub-
modular Optimization (SSO) [2, 3, 18, 30, 38]. SSO adopts
the append-only streaming model where elements arrive one
by one and the objective is to dynamically maintain a set
of at most k elements to maximize a submodular function
wrt. all the observed elements at any time. Saha et al. [30]
and Ausiello et al. [2] developed two swapping-based ap-
proaches for a special case of SSO (i.e., the online Maximum
k-Coverage problem) with the same 1/4 approximation ra-
tio. Then, Yu and Yuan [38] proposed a greedy-based algo-
rithm for the online Maximum k-Coverage problem with an
approximation ratio around 0.3 based on computer-aided
simulation. The state-of-the-art SSO solutions are Sieve-
Streaming [3] and ThresholdStream [18]. They main-
tain a sequence of candidate solutions by estimating the opti-
mal value and each solution uses its own threshold to decide
whether a new element is included. At any time, the candi-
date solution with the largest function among all maintained
solutions is returned as the result. Both of them can achieve
a (1/2 − β) approximation ratio for any β > 0.
Unfortunately, SSO algorithms cannot be directly applied
to the sliding window model because they do not handle the
continuous expiry of elements. Nevertheless, we will show
in Section 4.2 that existing SSO algorithms can serve as
checkpoint oracles in the IC and SIC frameworks.
2.3 Function Estimation on Sliding Windows
Several works [7,11] studied how to continuously estimate
a function in the sliding window model. They leverage spe-
cial properties of target functions to achieve sublinear per-
formance and reasonable quality. Let g be the target func-
tion, and A,B,C be three sequences on streams such that
B is a tail subsequence of A and C is contiguous to B.
The exponential histogram [11] is proposed to approximate
weakly additive functions, i.e., g(A) + g(C) ≤ g(A ∪ C) ≤
c(g(A) + g(C)) for some small constant c. The smooth
histogram [7] requires that the target functions are (α, β)-
smooth. Specifically, we say g is (α, β)-smooth if g(B)
g(A) ≥
1 − β, then g(B∪C)
g(A∪C) ≥ 1 − α for some 0 < β ≤ α < 1. Follow-
ing the analysis in [7], smooth histograms are applicable only
when g can be computed with an approximation ratio of at
least 0.8 in the append-only streaming setting. In this pa-
per, we use monotone submodular influence functions [17]
widely adopted in the social influence analysis. However,
monotone submodular functions are not weakly additive and
existing SSO algorithms [3, 18] can only achieves an appro-
ximation of at most 1/2. This imply that these techniques
cannot be directly applied to our scenario.
3. PROBLEM STATEMENT
We consider a social stream over a social network with a
user set U . The social stream comprises unbounded time-
sequenced social actions which are generated by user activ-
ities in the social network. Let at = hu, at′ it (t′ < t) be an
action at time t representing the following social activity:
user u performs at at time t responding to an earlier action
at′ . Typical actions include "retweet" on Twitter, "reply" on
Reddit, "comment" on Facebook, to name just a few. If an
action at does not respond to any previous action, e.g., a
user u posted an original tweet, we call it a root action and
denote it by at = hu, nilit.
Like many data streams, social streams are time-sensitive:
recent actions are more valuable than those in the past. We
adopt the well-recognized sequence-based sliding window [11]
model to capture such essence. Let N be the window size,
a sequence-based sliding window Wt maintains the latest N
actions till at in the stream, i.e., Wt = {at−N+1, . . . , at}.
For simplicity, we use Wt[i] to represent the i-th (i ≥ 1)
action within Wt. Then, we use At ⊆ U to denote the set
of active users who perform at least one action in Wt, i.e.,
At = {Wt[i].ui = 1, . . . , N }.
Since social actions directly reflect the information diffu-
sion in the social network [14, 15, 19, 34], we define the in-
fluence between users according to their performed actions.
We say user u influences user v in Wt, denoted by (u ❀ v)t,
if there exists an action a performed by user v s.t. a ∈ Wt
and a is directly or indirectly triggered by an action a′ of u.
It is notable that such an a′ is not necessarily in Wt.
We formally define the influence set of a user as follows:
Definition 1. The influence set of a user u ∈ U at time
t, denoted as It(u) ⊆ At, is the set of users who are in-
fluenced by u wrt. the sliding window at time t (i.e., Wt).
Equivalently, It(u) = {v(u ❀ v)t}.
Intuitively, the influence set of u denotes the set of users
who recently performed actions under the impact of u. The
concept of the influence set can be naturally extended to a
set of users. In particular, let S = {u1, . . . , uk} be a set of k
users, the influence set of S wrt. Wt is a union of the influ-
ence sets of all its members, i.e., It(S) = ∪u∈SIt(u). Then
the influence value of S is measured by f (It(S)) : 2U →
R≥0. We consider f (It(·)) as a nonnegative monotone3 sub-
3A set function g is monotone if for all A ⊆ B, g(A) ≤ g(B).
(a) Social action stream
(b) Influence sets at time 8
(c) Influence sets at time 10
User
I8(u)
User
a1 <u1, nil>1
a2 <u2, a1>2
a3 <u3, nil>3
a4 <u3, a1>4
a5 <u4, a3>5
a6 <u1, a3>6
a7 <u5, a3>7
a8 <u4, a7>8
a9 <u2, nil>9
a10 <u6, a9>10
u1
u2
u3
u4
u5
u6
{u1,u2,u3}
{u2}
{u1,u3,u4,u5}
{u4}
{u4,u5}
(cid:1486)
(d) Diffusion
I10(u)
{u1,u3}
{u2,u6}
{u1,u3,u4,u5}
{u4}
{u4,u5}
{u6}
u1
u2
u3
u4
u5
u6
a1
a2
a4
a3
a5
a6
a7
a9
a10
a8
Figure 1: A social action stream and the influences
of users over sliding windows.
modular4 function [27] which is widely adopted by many IM
problems for its natural representation of the "diminishing
returns" property on the social influence [17].
For ease of presentation, we only consider the cardinality
function, i.e., f (It(·)) = It(·), as the influence function in
the main text of this paper.
It should be noted that any
other monotone submodular influence functions can also be
used in our frameworks. In Appendix A, we will discuss how
to extend our frameworks to different types of IM problems
by filtering the streams or using different influence functions.
Example 1 illustrates our definition of influence over the
sliding windows on a social action stream.
Example 1. Figure 1(a) gives an example of a social action
stream. Given the window size N = 8, two windows, W8 and
W10, are highlighted in blue and red boxes respectively. In
Figure 1(b), I8(u1) = {u1, u2, u3} as a1,a6 are performed by
u1 and a2,a4 performed by u2,u3 respectively are triggered
by a1 in W8. When the window slides from W8 to W10, a1,a2
expire while a9,a10 arrive. Then, I10(u1) = {u1, u3} as Fig-
ure 1(c). Due to the expiry of a2, u2 is deleted from I10(u1).
However, since a4 has not expired yet, u1 still influences u3
in W10 regardless of the expiry of a1.
As new actions arrive at high speed while old ones expire
at the same rate, users with the largest influence values keep
evolving. To track the influential users over social streams
in real-time, we propose a Stream Influence Maximization
(SIM) query which is formally defined as follows:
Definition 2. Let Wt be the sliding window at time t,
Stream Influence Maximization (SIM) is a continuous query
on a social stream that returns a set of at most k users Sopt
who collectively achieve the largest influence value wrt. Wt:
t
Sopt
t = argmaxS∈U ∧S≤k f (It(S))
(1)
We continue with the running example in Figure 1 to show
how SIM keeps track of the most influential users over the
sliding windows.
Example 2. Given k = 2, SIM returns Sopt
8 = {u1, u3} as
the most influential users at time 8 since I8(Sopt
) = I8(u1) ∪
I8(u3) contains all users in A8. We have f (I8(Sopt
)) = 5
4A set function g is submodular if for all A ⊆ B, and any
element x 6∈ B, g(A ∪ {x}) − g(A) ≥ g(B ∪ {x}) − g(B).
8
8
using the cardinality function. However, as a1,a2 expire
while a9,a10 arrive at time 10, f (I10(Sopt
)) = 4 as u2 is
). Thus, SIM returns Sopt
deleted from I10(Sopt
10 = {u2, u3}
in W10 because I10(Sopt
10 ) contains all users in A10. We have
f (I10(Sopt
10 )) = 6 accordingly.
8
8
Note that the solutions proposed in this paper also sup-
port the case where the sliding window shifts for more than
one action. For simplicity, we focus on presenting solutions
for handling sliding windows with single action shift at a
time and leave the discussion on handling multiple action
shifts at a time to Section 5.3.
Then, we prove the NP-hardness of SIM by showing that a
well-known NP-hard problem, i.e.,the Maximum k-Coverage
problem [2, 13, 30], is polynomial-time reducible to SIM.
Theorem 1. SIM is NP-hard.
Proof. We prove the theorem by reducing a well-known
NP-hard problem, i.e., Maximum k-Coverage [13], to SIM. A
Maximum k-Coverage instance consists of an integer k and a
collection of m non-empty sets S = {s1, s2, . . . , sm}. It aims
to find a subset S ′ ⊆ S such that S ′ ≤ k and ∪si∈S ′ si is
maximized. Any Maximum k-Coverage instance is reduced
to a SIM instance as follows: Let t be the timestamp and
G = ∪si∈S si be the ground set. For any set si ∈ S, we create
an action at′ = hui, nilit′ where ui /∈ G. For each element
e ∈ si, we create an action at = he, at′ it(t′ < t). Next, we
stream all actions created to SIM in the ascending order of t.
Since the total number of actions created is O(m · G), the
reduction is performed in polynomial time. Let the window
size N equal to the total number of actions created. Let
Sopt
N = {ui, · · · , uj} be the optimal solution of SIM wrt. WN
using the cardinality function. {si, · · · , sj} will be optimal
for the corresponding Maximum k-Coverage instance as well.
Thus, the reduction naturally follows.
Before moving on to the technical parts of this paper, we
summarize the frequently used notations in Table 1.
4.
INFLUENTIAL CHECKPOINTS
Since SIM is NP-hard, it is infeasible to maintain the op-
timal seed set for each sliding window in polynomial time.
Therefore, our goal is to maintain an approximate solution
achieving a bounded ratio to the optimal one efficiently. A
naıve scheme is to run the greedy algorithm [27] for each
window slide. The greedy algorithm starts with an empty
user set S0 = ∅, and at each iteration i (1 ≤ i ≤ k), it in-
crementally adds a user u to the partial user set Si−1 max-
imizing f (I(Si−1 ∪ {u})) − f (I(Si−1)) wrt. Wt. Although
the greedy algorithm obtains a (1−1/e)-approximation ratio
which is the best achievable for submodular maximization
with cardinality constraints [27], it takes O(k · U ) influence
function evaluations for each update. Such an inefficient up-
date scheme makes the greedy algorithm unable to handle a
large window size with new actions arriving at high speed.
A key challenge for efficiently supporting SIM over sliding
windows is to handle the expiry of old actions and the arrival
of new actions simultaneously. Such a compound update
pattern brings about fluctuations on users' influence sets
which potentially degrade the quality of previously main-
tained seeds.
In the remaining of this section, we present
a novel Influential Checkpoints (IC) framework, which con-
sists of a sequence of checkpoint oracles to efficiently handle
Symbol
U
at = hu, at′ it
N
L
Wt, Wt[i]
It(u), It(S)
It[i](u), It[i](S)
Table 1: Frequently used notations
Definition and Description
the set of all users in a social network
a user u performs an action at time t
triggered by an action at′ (t′ < t)
the size of the sliding window
the number of actions for each window
slide, L = 1 by default
the sliding window at time t, and the
i-th action in the window
the influence set of a user u or a set of
users S wrt. Wt
the influence set of u or S for contigu-
ous actions {Wt[i], . . . , Wt[N ]}
a monotone
function
the cardinality constraint of SIM
an influential checkpoint maintaining
an ε-approximate solution of SIM for
{Wt[i], . . . , Wt[N ]}
the optimal seed set of SIM wrt. Wt,
influence value OPTt =
and its
f (It(Sopt
))
the optimal seed set of SIM for {Wt[i],
. . . , Wt[N ]}, and its influence value
submodular
influence
t
, OPTt
[i], OPTt[i]
f
k
Λt[i]
Sopt
t
Sopt
t
the expiry and the arrival of actions simultaneously. We
first give an overview of the IC framework in Section 4.1.
Then, we describe how to construct a checkpoint oracle in
Section 4.2. Finally, we take SieveStreaming [3] as an
example to illustrate the Set-Stream Mapping interface in
Section 4.3.
4.1 The Influential Checkpoints Framework
The high level idea of the IC framework is to avoid han-
dling the expiry of old actions when the window slides. To-
wards this goal, the framework maintains a partial result
(i.e., an influential checkpoint) incrementally for each win-
dow slide. When an old action expires, the outdated result
is simply deleted. In this way, the sliding window model is
transformed to a simpler append-only model for each check-
point, where many existing approaches [3, 18] can provide
theoretically bounded approximate solutions.
Technically, let an influential checkpoint Λt[i] (1 ≤ i ≤ N )
denote a checkpoint oracle 5 which provides an ε-approximate
solution for SIM over contiguous actions {Wt[i], . . . , Wt[N ]}.
By maintaining N checkpoints (i.e., Λt[1], . . . , Λt[N ]), a sim-
ple procedure to handle a window slide from Wt−1 to Wt is
presented in Algorithm 1. Whenever a new action at arrives,
the oldest checkpoint in Wt−1 (i.e., Λt−1[1]) expires and a
new checkpoint Λt[N ] is added to Wt (Line 2). After adding
the remaining checkpoints in Wt−1 to Wt (Lines 3-5), each
checkpoint in Wt processes at as an appending action to
update its partial solution (Lines 6-8). To answer the SIM
query for Wt, we simply return the solution of Λt[1].
Example 3. Figure 2 illustrates the maintenance of check-
points in the IC framework following Example 1. Let N = 8
and k = 2. The number of checkpoints always equals to
5 We overload the notation Λt[i] to denote the influence
value returned by the oracle when it is clear in the context.
(cid:513)8[1]=5 (cid:513)8[2]=5 (cid:513)8[3]=4 (cid:513)8[4]=4 (cid:513)8[5]=3 (cid:513)8[6]=3 (cid:513)8[7]=2 (cid:513)8[8]=1
a1
a1
a1
a2
a2
a2
a3
a3
a3
a4
a4
a4
a5
a5
a5
(cid:513)9[1]=5 (cid:513)9[2]=5 (cid:513)9[3]=5 (cid:513)9[4]=4 (cid:513)9[5]=4 (cid:513)9[6]=3 (cid:513)9[7]=2 (cid:513)9[8]=1
a6
a6
a6
a7
a7
a7
a8
a8
a8
a9
a9
a10
Checkpoints
Seed users
Checkpoints
Seed users
(cid:513)8[1]
(cid:513)8[2]
(cid:513)8[3]
……
(cid:513)8[8]
u1,u3
u1,u3
u3
……
u3
……
(cid:513)10[1]
(cid:513)10[2]
(cid:513)10[3]
……..
(cid:513)10[8]
u2,u3
u2,u3
u2,u3
……
u2
(cid:513)10[1]=6 (cid:513)10[2]=6 (cid:513)10[3]=5 (cid:513)10[4]=5 (cid:513)10[5]=4 (cid:513)10[6]=3 (cid:513)10[7]=2 (cid:513)10[8]=1
Figure 2: An example of checkpoint maintenance in IC.
Algorithm 1 IC Maintenance
Require: IC:{Λt−1[1], . . . , Λt−1[N ]}
1: - on receiving action at -
2: Delete Λt−1[1], create Λt[N ];
3: for all Λt−1[i] do
4:
5: end for
6: for all Λt[i] do
7:
8: end for
9: - on query -
10: return the solution of Λt[1];
Λt[i − 1] ← Λt−1[i];
Λt[i].process(at);
the window size (i.e., 8). When action a10 arrives, a2 will
expire. Consequently, the checkpoint Λ10[8] is created and
Λ9[1] is deleted. When the SIM query is issued at time 10,
the result from Λ10[1] (i.e.,{u2, u3}) is returned.
It is not hard to see that once each checkpoint oracle main-
tains an ε-approximate solution for its append-only action
stream, IC always returns the solution with the same appro-
ximation ratio.
4.2 Checkpoint Oracle
The approximation ratio of IC relies on the checkpoint
oracle providing an ε-approximate solution over an append-
only action stream. Although submodular maximization in
an append-only stream has attracted many research inter-
ests [2, 3, 18, 30, 38], they focused on a different set-stream
model where elements in the stream are sets instead of ac-
In general, an algorithm A on an append-only set-
tions.
stream contains two components: f ′(·) is a monotone sub-
modular objective function and CXt is a candidate solu-
tion containing no more than k sets from t observed sets
(i.e., X1, . . . , Xt). Given a stream of sets {X1, X2, . . . , Xm},
the objective of A is to maximize f ′(CXt) at any time t
(1 ≤ t ≤ m). Although this problem resembles our problem,
the set-stream model cannot directly fit in our scenario due
to the following mismatch: it strives to keep k sets from a
stream of sets but all observed sets are immutable. How-
ever, SIM aims to maintain k user s from a sequence of ac-
tions and each arrival action may induce updates in existing
users' influence sets.
To bridge the gap between the two stream models and
leverage existing algorithms based on the set-stream model,
we propose a generic Set-Stream Mapping (SSM) interface.
The interface makes two adaptations for a set-stream algo-
rithm to serve as the checkpoint oracle. First, the candi-
date solution CX is adapted to store k users. Second, the
objective function f ′ is adapted to the influence function
f (It[i](·)), where It[i] denotes the influence set of user(s)
over contiguous actions {Wt[i], . . . , Wt[N ]}. Subsequently,
SSM maps an action stream to a set-stream and feeds the
set-stream to Λt[i]. Whenever a new action at arrives, the
following steps are taken for each Λt[i]:
(1) Identify users u1, u2, . . . , ud whose It[i](·) is updated.
(2) Feed Λt[i] with a stream S′
(3) Update the solution of Λt[i] for each It[i](u) ∈ S′
t.
t = {It[i](u1), . . . , It[i](ud)}.
There are several choices of oracles that are developed for
the set-stream model with differences on the solution quality,
update performance, and function generality. Typical ora-
cles are listed in Table 2. An important conclusion is that
our SSM procedure does not affect the quality guarantee of
the mapped algorithms. Formally:
Theorem 2. Let A be an ε-approximate SSO algorithm
in the set-stream model and A be the mapped algorithm of
A using SSM. Then, A is also ε-approximate for SIM.
Proof. To show A is also ε-approximate, we consider an
append-only set-stream generated by SSM over the action
stream. At any time t, let OPTt be the optimal influence
value of SIM wrt. Wt, and OPT∗
t be the optimal influence
value achieved by any set of at most k sets from the mapped
set-stream. We treat all influence sets in the mapped stream
as independent sets regardless of whether they belong to
the same user. We run A on the mapped set-stream till
time t and produce a result with at most k sets: CXt =
{Ita (uta ), . . . , Itb (utb )}. Note that the influential sets in
CXt may be outdated and refer to the same user. Neverthe-
less, we can still use CXt to approximate OPTt without af-
fecting the approximation ratio. To obtain the seed set from
CXt, we select a set of distinct users Ut from CXt. Since the
influence function f is monotone and the up-to-date influ-
ence set of any user always grows larger in the append-only
stream, we have f (It(Ut)) ≥ f (∪X∈CXt X). Moreover, CXt
is an ε-approximate solution over the append-only stream,
i.e., f (∪X∈CXt X) ≥ εOPT∗
t . As the up-to-date influence
sets always appear in the append-only set-stream, we have
OPT∗
t ≥ OPTt, and thus f (It(Ut)) ≥ εOPTt. Therefore, Ut
is an ε-approximate solution for SIM wrt. Wt.
According to the SSM steps, an action at is mapped to
at most d influence sets, where d is the number of ancestors
of at in its propagation. In practice, d is usually small, e.g.,
d is less than 5 on average as shown in our experiments
(see Table 3). Since the number of checkpoints in the IC
framework is N , the total number of checkpoint evaluations
is O(dN ). If the update complexity of the checkpoint oracle
for each set is O(g), the total time complexity of the IC
framework for each action is O(dgN ).
In the remaining of this section, we conduct a case study
on using SieveStreaming [3] as the checkpoint oracle. The
Table 2: Candidate checkpoint oracles
Oracle
SieveStreaming [3]
ThresholdStream [18]
Blog Watch [30]
MkC [2]
Quality Update
1/2 − β
β )
β )
1/2 − β
1/4
1/4
Function
General
O( log k
O( log k
General
O(k)
Cardinality
O(k log k) Cardinality
adoption of other oracles can be similarly inferred.
4.3 A Case Study on SieveStreaming
The SieveStreaming Algorithm: SieveStreaming [3]
works as follows: Given a monotone submodular function
f ′ and the optimal value OPT′ of f ′ over the entire stream
under a cardinality constraint, SieveStreaming maintains
a candidate solution CX that includes an incoming set Xt
if CX has less than k sets and the following holds:
f ′(CX ∪ {Xt}) − f ′(CX) ≥
OPT′/2 − f ′(CX)
k − CX
(2)
However, since OPT′ is unknown in advance, SieveStream-
ing maintains a sequence of possible values for OPT′, i.e.,
Ω = {(1 + β)jj ∈ Z, m ≤ (1 + β)j ≤ 2 · k · m} where
m = maxX f ({X}) that has been observed. Accordingly,
SieveStreaming keeps Ω = O( log k
β ) instances to ensure
at least one of them achieves a (1/2−β) approximation ratio
(see [3] for more details).
Set-Stream Mapping for SieveStreaming: Following
SSM, we create Λt[i] as follows: Let CXi be the user set
maintained by Λt[i]. For each user u with her updated in-
fluence set It[i](u), Λt[i] selects u to CXi if CXi < k and:
f (It[i](CXi ∪ {u})) − f (It[i](CXi)) ≥ OPTt[i]/2−f (It[i](CXi))
k−CXi
where OPTt[i] is the optimal influence value achievable on
all actions from Wt[i] to Wt[N ]. Similar to SieveStream-
ing, each Λt[i] keeps a set of possible values for OPTt[i],
i.e., Ωt[i] = {(1 + β)jj ∈ Z, m ≤ (1 + β)j ≤ 2 · k · m}
where m denotes the maximum influence value of a sin-
gle influence set over the actions {Wt[i], . . . , Wt[N ]}, i.e.,
m = maxu∈U f (It[i](u)), and maintains Ωt[i] = O( log k
β )
corresponding instances. To answer the SIM query, we al-
ways maintain the candidate user set achieving the largest
influence value within the checkpoint. Figure 3 is an ex-
ample for using SieveStreaming as the checkpoint oracle.
Example 4. Figure 3 illustrates the contents of Λ8[1] in
Example 3. Λ8[1] consists of the meta information and a
sequence of SieveStreaming instances. In the meta infor-
mation, the Checkpoint ID indicates the relative position of
this checkpoint in the current window. The Seed Users and
the Influence Value are maintained for query processing and
checkpoint maintenance (as shown in Figure 3). The Max
Cardinality is the maximum cardinality of a single user's in-
fluence set, i.e., I8(u3) = 4 for Λ8[1]. Suppose β = 0.3,
5 candidates with j = 6, . . . , 10 are maintained for Λ8[1]
(4 < 1.36 < . . . < 1.310 < 16). Each instance is maintained
independently over the mapped set-stream and the instance
with the largest influence value is used as the candidate so-
lution (i.e., Instance with j = 6 as highlighted in Figure 3).
Combining the results of Table 2 with Theorem 2, we can
see that at least one user set maintained by Λt[1] guarantees
(a) Meta Information
(b) SieveStreaming Instances
Checkpoint ID
1
Seed Users
u1,u3
Influence Value
f=5
Max Cardinality
4
j
6
7
8
9
10
Contents
OPT=1.36, seeds={u1,u3}, f=5
OPT=1.37, seeds={u1,u3}, f=5
OPT=1.38, seeds={u1,u3}, f=5
OPT=1.39, seeds={u1,u3}, f=5
OPT=1.310, seeds={u3}, f=4
Figure 3: Contents of Checkpoint Λ8[1]
a (1/2 − β)-approximate solution for SIM wrt. Wt when Sie-
veStreaming is used as the checkpoint oracle. In addition,
the time complexity of IC for each update is O( dN log k
),
since the update complexity of SieveStreaming is O( log k
β ).
β
5. SPARSE INFLUENTIAL CHECKPOINTS
In the IC framework, N checkpoints should be maintained
to guarantee an ε-approximation ratio. This implies that
O(dN ) checkpoint oracle updates need to be performed for
each arrival action. However, real world applications often
require millions of actions in one window. Therefore, it in-
curs prohibitive cost to maintain all checkpoints in practice.
To reduce the number of checkpoints maintained and thus
improve the update efficiency, we design a Sparse Influential
Checkpoints (SIC) framework to selectively maintain a sub-
set of checkpoints without losing too much solution accuracy
as the window slides. Specifically, the number of checkpoints
maintained by SIC is logarithmic with the window size N
while its approximation ratio remains ε(1−β)
for any β > 0
if the checkpoint oracle is ε-approximate.
2
In this section, we first present the SIC framework and
demonstrate its checkpoint maintenance in Section 5.1. In
Section 5.2, we analyze the theoretical soundness and the
complexity of SIC. Finally, we discuss how to generalize IC
and SIC to handle multiple window shifts in Section 5.3.
5.1 The SIC Framework
The idea of SIC is to leverage a subset of checkpoints
to approximate the rest. On the one hand, to reduce the
update cost, the number of checkpoints maintained should
be as small as possible; on the other hand, the approximation
ratio should remain tight. To achieve both goals, we propose
a strategy to safely remove some checkpoints in the current
window while ensuring the remaining checkpoints are able
to approximate any windows with a bounded ratio.
We consider a sequence of checkpoints {Λt[x0], Λt[x1], . . . ,
Λt[xs]} maintained by SIC at time t. Intuitively, given any
three consecutive checkpoints Λt[xi−1], Λt[xi], Λt[xi+1] kept
by SIC and a parameter β ∈ (0, 1), as long as (1−β)Λt[xi−1]
is less than Λt[xi] and Λt[xi+1], we can safely delete Λt[xi]
as Λt[xi+1] is at least (1−β)-approximate to Λt[xi]. Given a
checkpoint oracle with an ε-approximation for SIM, it is not
hard to identify that using Λt[xi+1] for OPTt[xi] offers an
ε(1−β) approximate solution. Although such a maintenance
strategy is simple, we need to ensure that the approximation
ratio does not degrade seriously over time, i.e., the ratio
should be at least ε(1−β)
at any time t′ > t. We leave
this rather complex analysis to Section 5.2 and focus on
describing the maintenance procedure in the remaining of
this subsection for ease of presentation.
2
a1
(cid:513)8[1]=5
a1
(cid:513)9[0]=5
a1
(cid:513)10[0]=6
a2
a2
a2
a3
a3
a3
a4
a5
(cid:513)8[4]=4 (cid:513)8[5]=3 (cid:513)8[6]=3 (cid:513)8[7]=2 (cid:513)8[8]=1
a6
a6
a6
a7
a7
a7
a8
a8
a8
a4
(cid:513)9[3]=5
a4
a5
a5
(cid:513)9[5]=4 (cid:513)9[6]=3 (cid:513)9[7]=2 (cid:513)9[8]=1
a9
a9
a10
(cid:513)10[4]=5 (cid:513)10[5]=4 (cid:513)10[6]=3 (cid:513)10[7]=2 (cid:513)10[8]=1
Checkpoints
(cid:513)8[x1=1]
(cid:513)8[x2=4]
(cid:513)8[x3=6]
……
(cid:513)8[x5=8]
Seed users
u1,u3
u3
u3
……
u3
……
Checkpoints
(cid:513)10[x0=0]
(cid:513)10[x1=4]
(cid:513)10[x2=5]
……
(cid:513)10[x5=8]
Seed users
u2,u3
u2,u3
u2,u3
……
u2
Figure 4: An example of checkpoint maintenance in SIC.
Λt[xi] ← Λt−1[xi], xi ← xi − 1;
Algorithm 2 SIC Maintenance
Require: SIC:{Λt−1[x0], Λt−1[x1], ..., Λt−1[xs]}
1: - on receiving action at -
2: Create Λt[xs+1] where xs+1 = N ;
3: for all Λt−1[xi] do
4:
5: end for
6: for all Λt[xi] do
7:
8: end for
9: for all xi do
10:
11:
12:
Λ− ← ∅;
for all xj > xi do
Λt[xi].process(at);
if xj+1 ≤ xs and Λt[xj] ≥ (1 − β)Λt[xi] and
Λt[xj+1] ≥ (1 − β)Λt[xi] then
else
break
Λ− ← Λ− ∪ {Λt[xj ]};
end if
end for
13:
14:
15:
16:
17:
18: Delete all checkpoints in Λ− from SIC;
19:
20: end for
21: if x1 = 0 then
22: Delete Λt[x0] and shift the remaining checkpoints;
23: end if
24: - on query -
25: return the solution of Λt[x1];
Shift the remaining checkpoints accordingly;
Algorithm 2 presents how to efficiently maintain the check-
points over sliding windows in the SIC framework. Similar
to the maintenance of IC, upon receiving a new action at,
we create a new checkpoint for at (Line 2), add all check-
points in Wt−1 to Wt, and use at to update all checkpoints
in Wt (Lines 3-8). Then the efficient deletion of checkpoints
are presented in Lines 9-20. For each checkpoint Λt[xi], we
find the first xj (j ≥ i) such that Λt[xj ] ≥ (1 − β)Λt[xi] and
Λt[xj+1] < (1 − β)Λt[xi]. Then, all checkpoints between xi
and xj are deleted and will be approximated by Λt[xj] in
the subsequent window slides. Finally, if the second check-
point (i.e., Λt[x1]) has expired, the earliest checkpoint (i.e.,
Λt[x0]) will be deleted (Lines 21-23). It is notable that an
additional checkpoint (Λt[x0]) is stored in SIC to keep track
of the solution over a window with size larger than N . Since
Λt[x0] approximates the upper bound of the optimal solu-
tion for the current window and Algorithm 2 always main-
tains a bounded ratio between two neighboring checkpoints,
a bounded approximation ratio is guaranteed by using Λt[x1]
as the solution for the current window. Figure 4 and Exam-
ple 5 provide the running example of the SIC maintenance.
Example 5. Figure 4 illustrates the maintenance of check-
points in the SIC framework following Example 1. Let N =
8, k = 2 and β = 0.3. There are initially 6 checkpoints in
SIC at time 8. According to Algorithm 2, Λ8[5] is deleted
from SIC since Λ8[6] = 3 > (1 − 0.3) × 3 = (1 − β)Λ8[4].
At time 8, Λ8[1] will be used to answer the SIM query. As
the window shifts at time 9 with the arrival of a9, a1 and
Λ8[1] (which later becomes Λ9[0]) expire. But Λ9[0] is stored
because Λ9[3] has not expired yet. Then all checkpoints will
be updated according to a9. After the update procedure, we
find Λ9[3] can be deleted since Λ9[5] > (1 − β)Λ9[0]. Finally,
all checkpoints are updated according to a10 at time 10 and
no checkpoints are deleted. Λ10[4] will be used to answer
the SIM query at time 10.
In the following, we will demonstrate the theoretical soun-
dness of SIC and also analyze the complexity of SIC.
5.2 Theoretical Analysis
To establish our theoretical claims for SIC, we first analyze
the property of the optimal checkpoint oracle which always
returns the optimal solution for SIM over an append-only
action stream. There are two important properties of the
optimal checkpoint oracle.
Definition 3
(Monotonicity & Subadditivity).
Let ta ≤ tb be two timestamps and W ta
tb represents a window
containing a set of contiguous actions: ata , ..., atb with the
corresponding checkpoint denoted as Λta
. Given any t1, t2, t3
tb
t3 ≥ Λt1
s.t. t1 ≤ t2 ≤ t3, the checkpoint is monotone if Λt1
t2 .
Moreover, the checkpoint is subadditive if Λt1
t3 ≤ Λt1
t2 + Λt2
t3 .
Lemma 1. Let ta ≤ tb be two timestamps and OPTta
tb de-
note the optimal oracle (as well as the optimal value) for
W ta
. The optimal oracle is both monotone and subadditive.
tb
Proof. Let I ta
t3 , it is obvious to see OPTt1
tb (S) be the influence set of S and Sopt
ta,tb
be the optimal solution of SIM for contiguous actions {Wta ,
. . . , Wtb }. Because Sopt
t1,t2 must be a candidate solution for
W t1
t2 . Then, we prove
OPTt1
t3 (S) =
I t1
t2 (S) ∪ I t2
OPTt1
t3 . For any S ⊆ U , we have I t1
t3 ≥ OPTt1
t3 ≤ OPTt1
t2 + OPTt2
t3 (S). Then, we have:
t3 = f (Sopt
t1,t3 ) ≤ f (I t1
≤ OPTt1
t1,t3 )) + f (I t2
t2 (Sopt
t2 + OPTt2
t3
t3 (Sopt
t1,t3 ))
where the first inequality holds for the property of influence
sets, and the second inequality is satisfied because Sopt
t1,t3 is
also a candidate solution for both W t1
t2 and W t2
t3 .
We note that although the optimal checkpoint oracle is
both monotone and subadditive, it is intractable unless P =
N P . In practice, we utilize the approximate checkpoint ora-
cles as listed in Table 2. The approximate oracles are mono-
tone. This is essential due to their greedy nature: updating
the maintained result only when this update increases the
function value. Given the monotonicity of the approximate
checkpoint oracles, the monotonicity and subadditivity of
the optimal oracle, we are ready to prove that the checkpoint
maintenance strategy used in SIC is theoretically bounded.
Lemma 2. Given any t1, t2, t3, t4 s.t. t1 ≤ t2 ≤ t3 ≤ t4,
∀β ∈ (0, 1), if (1 − β)Λt1
t3 , then ε(1−β)
Proof. The following inequalities hold:
t3 ≤ Λt2
2
OPTt1
t4 ≤ Λt2
t4 .
t3 + Λt2
t4 ) ≥
1
2
((1 − β)Λt1
t3 + Λt2
t4 )
(Λt1
t3 + Λt2
t4 ) ≥
ε(1 − β)
2
(OPTt1
t3 + OPTt2
t4 )
(Λt2
1
2
1 − β
2
Λt2
t4 ≥
≥
≥
ε(1 − β)
2
OPTt1
t4
where the first inequality holds from the monotonicity of the
approximate checkpoint oracles; the second inequality is due
to the condition that Λt2
t3 ; the third inequality is
obvious since β ∈ (0, 1); the fourth inequality holds because
of the approximation ratio of checkpoint oracles and the final
inequality holds as the optimal checkpoint oracle is both
monotone and subadditive.
t3 ≥ (1−β)Λt1
According to Lemma 2, if (1 − β)Λt1
t3 , using the
checkpoint oracle started at t2 to approximate any check-
points between t1 and t2 always achieves an ε(1−β)
appro-
ximation for any number of appending actions. Next, we
present Lemma 3 to demonstrate the property of the check-
points maintained by Algorithm 2.
t3 ≤ Λt2
2
Lemma 3. The SIC on window Wt contains s checkpoints
Λt[x0], Λt[x1], . . . , Λt[xs] (x0 < x1 < . . . < xs) maintained
by Algorithm 2. Given a constant β ∈ (0, 1), any neighboring
checkpoints Λt[xi], Λt[xi+1] and Λt[xi+2] satisfy one of the
following conditions:
1. if Λt[xi+1] ≥ (1 − β)Λt[xi], then Λt[xi+2] < (1 − β)Λt[xi].
2. if xi+1 6= xi + 1 ∧ Λt[xi+1] < (1 − β)Λt[xi], then ε(1−β)
2
OPTt[xi] ≤ Λt[xi+1].
3. xi+1 = xi + 1 ∧ Λt[xi+1] < (1 − β)Λt[xi].
Proof. We prove the lemma by induction. As the base
case, initially there are only 2 actions in the window and
either condition 1 or 3 holds.
Next, assume Lemma 3 holds at time t and we show that it
still holds after the update procedure in Algorithm 2 at time
t + 1. Let Λt[xi] be a checkpoint instantiated before t + 1
and is not deleted during the update procedure at t + 1,
then Λt[xi+1] is the subsequent checkpoint of Λt+1[xi] at
time t, Next, we discuss all possible cases when performing
the update procedure of Algorithm 2 at time t + 1:
Case 1: xi+1 6= xi +1 and Λt[xi+1] is deleted at t+1. In this
case, we have Λt+1[xi+1] ≥ (1−β)Λt+1[xi] and Λt+1[xi+2] <
(1 − β)Λt+1[xi] according to Lines 9-20 of Algorithm 2. In
this case, condition 1 holds at t + 1.
Case 2: xi+1 6= xi + 1 and Λt+1[xi+1] is not deleted at
t + 1. In this case, Λt+1[xi+1] must become the subsequent
2
checkpoint of Λt+1[xi] at some time t′ ≤ t. Then, at t′,
we have Λt′ [xi+1] ≥ (1 − β)Λt′ [xi]. According to Lemma 2,
Λt+1[xi+1] ≥ ε(1−β)
OPTt+1[xi] holds. Because Λt+1[xi+1]
is not deleted at t + 1, we have either condition 1 (when
Λt+1[xi+1] ≥ (1 − β)Λt+1[xi]) or condition 2 holds (when
Λt+1[xi+1] < (1 − β)Λt+1[xi]) at t + 1.
If Λt+1[xi+1] ≥ (1 − β)Λt+1[xi],
Case 3: xi+1 = xi + 1.
then condition 1 holds since Λt+1[xi+1] is not deleted at
t + 1; otherwise, condition 3 holds.
Therefore, at least one condition in Lemma 3 holds in all
possible cases at t + 1 and we conclude the proof.
Leveraging Lemma 3, we are able to analyze SIC theo-
retically. First, from conditions 1 and 2, we can infer that
if there are checkpoints deleted between xi and xi+1, the
ratios between Λt[xi+1] and the optimal solution of deleted
checkpoints are guaranteed to be at least ε(1−β)
. Next, by
collectively examining conditions 1–3, we can see that there
is at least one checkpoint in Λt[xi+1] and Λt[xi+2] return-
ing an influence value of smaller than (1−β)Λt[xi], and thus
the number of checkpoints maintained is O( log N
β ). Based on
these intuitions, we then formally state the approximation
guarantee and the complexity of SIC in Theorems 3–5:
2
Theorem 3. SIC maintains a ε(1−β)
-approximate solu-
tion for SIM in Λt[x1] when a ε-approximate checkpoint or-
acle is used.
2
Proof. We use OPTt to denote the optimal solution of
is a lower bound
SIM w.r.t. Wt and we prove that ε(1−β)
2
for the ratio between Λt[x1] and OPTt.
Let Λt[x0] be the expired checkpoint just before Λt[x1].
Since Λt[x0] and Λt[x1] are neighboring checkpoints in SIC,
one of the conditions in Lemma 3 holds at time t.
If condition 3 in Lemma 3 holds, we have OPTt ≤ εΛt[x1]
since Λt[x1] directly maintains an approximate solution on
Wt. Otherwise, we have: OPTt ≤ OPTt[x0] ≤ 2
ε(1−β) Λt[x1]
since Λt[x0] has expired. Thus, SIC maintains an at least
ε(1−β)
-approximate solution in Λt[x1].
2
Theorem 4. SIC obtains a (1/4 − β)-approximate solu-
tion for SIM when SieveStreaming is used as the check-
point oracle.
Proof. Since the SieveStreaming algorithm guaran-
tees a (1/2 − β) approximation ratio to the optimal solu-
tion, SIC with SieveStreaming as the checkpoint oracle
preserves a 1
2 −β)(1−β) approximation guarantee accord-
4 β +β2 > 1
ing to Theorem 3. As 1
4 −β,
we get at least a (1/4−β)-approximate solution for SIM.
2 −β)(1−β) = 1
4 − 3
2 ( 1
2 ( 1
Theorem 5. The number of checkpoints maintained by
SIC wrt. a sliding window of size N is O( log N
β ).
Proof. Lemma 3 guarantees either Λt[xi+1] or Λt[xi+2]
is less than (1 − β)Λt[xi]. Since we have Λt[x1]/Λt[N ] is
bounded by O(N ), the number of checkpoints is at most
log(1−β)−1 for β ∈ (0, 1). Therefore, the number of check-
points maintained by SIC is O( log N
2·log N
β ).
As the time complexity for a checkpoint to update each
action is O(dg) if each checkpoint takes O(g) to evaluate one
influence set and the number of checkpoints maintained by
SIC is O( log N
β ), the time complexity of SIC to update each
action is O( dg log N
checkpoint oracle, we have g = O( log k
complexity of SIC for each update is O( d log N log k
). When SieveStreaming is used as the
β ) and thus the time
β
β2
).
5.3 Handling Multiple Window Shifts
Although we have discussed how to handle SIM queries for
windows which shift for one action at a time, many applica-
tions do not require to retrieve the result at such an intense
rate. Hereby, we discuss how to handle multiple window
shifts, i.e., each window shift receives L new actions while
the earliest L actions become expired at the same time.
To handle multiple window shifts for IC, we create only
one new checkpoint and delete the earliest checkpoint when
the window slides from time t to t + L. Subsequently, all
actions from at+1 to at+L are collected to update all check-
points in the window. Thus, the number of checkpoints cre-
ated for multiple window shifts will be (cid:6) N
L (cid:7). On top of the
IC maintenance strategy, we still use the same SIC algorithm
over the checkpoints created by IC to support multiple win-
dow shifts.
Lastly, the aforementioned maintenance strategies still pre-
serve the theoretical results as there is no fundamental dif-
ferences between handling single window shift and multiple
window shifts using our proposed frameworks.
6. EXPERIMENTAL RESULTS
In this section, we evaluate the efficiency and effectiveness
of our proposed frameworks on several real-world and syn-
thetic datasets. First, we compare IC and SIC for influence
values and processing efficiency with varying β. Then, we
compare the solution qualities and throughputs of all ap-
proaches with different seed set size. Finally, we evaluate
the scalability of all compared approaches.
6.1 Experimental Setup
Datasets: We collect two real-world datasets and synthe-
size two datasets for extensive studies.
• Reddit: Reddit is an online forum where user actions
include post and comment. We collect all Reddit comment
actions in May 2015 from kaggle 6 and query the Reddit
API for the post actions in the same period. The dataset
contains 48, 104, 875 actions from 2, 628, 904 users.
• Twitter: Twitter is an online social network where ac-
tions include tweet, retweet, quote and reply. We crawl
these actions for one week via Twitter stream API7 on
trending topics such as US presidential election, 2016 NBA
finals and Euro 2016. The dataset contains 9, 724, 908 ac-
tions from 2, 881, 154 users.
• Synthetic Datasets: We synthesize two action streams
with different response patterns to test the robustness of
the proposed solutions. There are two types of actions in
concern: post and follow. We use the R-MAT model [8] to
synthesize 5 different power law graphs with the number
of users ranging from 1-5 million (2 million by default).
For each synthetic graph, we generate 10 million actions
by randomly selecting a user to perform either a post or a
follow action. If an action at is follow, it will respond to a
previous action at′ with a response distance ∆ = t−t′. To
demonstrate different response patterns, two datasets are
6https://www.kaggle.com/reddit/reddit-comments-may-2015
7https://dev.twitter.com/streaming/overview
Table 3: Statistics on datasets
Dataset Users Actions Resp. dist. Avg. depth
Reddit 2,628,904 48,104,875
Twitter 2,881,154 9,724,908
SYN-O 1M–5M 10,000,000
SYN-N 1M–5M 10,000,000
404714.9
294609.4
500,000
5,000
4.58
1.87
2.5
2.59
generated based on the distances conforming to exponen-
tial distributions with different parameters: (1)SYN-O:
∆ ∼ exp(λ = 2.0 × 10−6), which indicates "old posts get
more followers"; (2)SYN-N: ∆ ∼ exp(λ = 2.0 × 10−4),
which represents "recent posts get more followers".
The statistics of these datasets are summarized in Table 3.
Approaches: All approaches compared in the experiments
are listed as follows:
• IMM [35]: To support our argument on the effective-
ness, we use the state-of-the-art IM algorithm on static
graphs as a baseline. At each time t, we construct an
influence graph Gt by treating users as vertices and the
influence relationships between users wrt. Wt as directed
edges. The edge probabilities between users are assigned
by the weighted cascade (WC) [17] model. To extract the
influential users at time t, we set the parameters of IMM
to be ε = 0.5, l = 1 [35] and run the algorithm on the
generated influence graph Gt.
• UBI [10]: We use the state-of-the-art method for IM on
dynamic graphs as another baseline. The generation of
influence graphs is the same as IMM. Then, a sequence of
influence graphs {G1, G2, . . .} are fed to UBI in a chrono-
logical order to track the influential users. We keep the
same interchange threshold as used in [10], i.e., γ = 0.01.
• Greedy [27]: We also implement the classic greedy algo-
rithm in [27] since it achieves the best theoretical appro-
ximation (i.e., 1−1/e) of SIM queries. A detailed descrip-
tion of this algorithm is presented in Section 4. Since the
Greedy algorithm does not store any intermediate result,
it always recomputes the solution when being queried.
• IC: The IC framework proposed in Section 4. We use
SieveStreaming [3] as the checkpoint oracle.
• SIC: The SIC framework proposed in Section 5. We use
the same checkpoint oracle as IC.
Quality Metric: We note that IMM and UBI work under
the WC model whereas Greedy, IC and SIC are proposed
to answer SIM queries in Section 3. To verify the effective-
ness of our proposed solutions, we retrieve the seed users
returned by all approaches for each window slide. When a
set of seed users is returned by each approach at time t,
we evaluate the influence spread of the users under the WC
model with 10,000 rounds of Monte-Carlo simulation on the
corresponding influence graph Gt. Finally, we use the aver-
age influence spread of all windows for each approach as the
quality metric.
Performance Metric: We use throughput as our perfor-
mance metric. Specifically, whenever the window slides for L
actions, we measure the elapsed CPU time of each approach
and the throughput is L divided by the elapsed time. We
do not measure the query processing time because all ap-
proaches maintain the seed users explicitly and the time to
retrieve them is negligible.
Parameters: The parameters examined in our experiments:
(1) β is the parameter in IC and SIC to achieve a trade-off
between quality and efficiency. (2) k is the size of the seed
SIC
IC
l
e
u
a
V
e
c
n
e
u
l
f
n
I
38k
36k
34k
32k
30k
28k
26k
95k
90k
85k
80k
75k
70k
65k
l
e
u
a
V
e
c
n
e
u
l
f
n
I
SIC
IC
SIC
IC
l
e
u
a
V
e
c
n
e
u
l
f
n
I
14k
13k
12k
11k
10k
SIC
IC
l
e
u
a
V
e
c
n
e
u
l
f
n
I
17k
16k
15k
14k
13k
12k
11k
0.1
0.2
0.3
β
0.4
0.5
(a) Reddit
0.1
0.2
0.3
β
0.4
0.5
(b) Twitter
0.1
0.2
0.3
β
0.4
0.5
(c) SYN-O
0.1
0.2
0.3
β
0.4
0.5
(d) SYN-N
Figure 5: Influence Values of IC and SIC with varying β.
120
SIC
IC
120
SIC
IC
120
SIC
IC
120
SIC
IC
i
s
t
n
o
p
k
c
e
h
C
f
o
.
o
N
100
80
60
40
20
0
0.1
100
i
s
t
n
o
p
k
c
e
h
C
80
60
40
20
0
0.1
f
o
.
o
N
0.4
0.5
0.2
0.3
β
(a) Reddit
100
i
s
t
n
o
p
k
c
e
h
C
80
60
40
20
0
0.1
f
o
.
o
N
0.2
0.3
β
0.4
0.5
(b) Twitter
100
i
s
t
n
o
p
k
c
e
h
C
80
60
40
20
0
0.1
0.2
0.3
β
0.4
0.5
(d) SYN-N
f
o
.
o
N
0.2
0.3
β
0.4
0.5
(c) SYN-O
Figure 6: The number of checkpoints maintained by IC and SIC with varying β.
SIC
IC
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
0.1
SIC
IC
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0.4
0.5
0
0.1
0.2
0.3
β
(a) Reddit
0.2
0.3
β
0.4
0.5
(b) Twitter
SIC
IC
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
0.1
0.2
0.3
β
0.4
0.5
(c) SYN-O
SIC
IC
150
)
s
/
K
120
(
t
u
p
h
g
u
o
r
h
T
90
60
30
0
0.1
0.2
0.3
β
0.4
0.5
(d) SYN-N
Figure 7: Throughputs of IC and SIC with varying β.
100k
SIC
IC
Greedy
IMM
UBI
d
a
e
r
p
S
e
c
n
e
u
l
f
n
I
35k
30k
25k
20k
15k
10k
5k
0
SIC
IC
Greedy
IMM
UBI
d
a
e
r
p
S
e
c
n
e
u
l
f
n
I
5
25
50
k
75
100
(a) Reddit
80k
60k
40k
20k
0
d
a
e
r
p
S
e
c
n
e
u
l
f
25k
20k
15k
10k
5k
0
SIC
IC
Greedy
IMM
UBI
SIC
IC
Greedy
IMM
UBI
25k
20k
15k
10k
d
a
e
r
p
S
e
c
n
e
u
l
f
5
25
50
k
75
100
(c) SYN-O
n
I
5k
0
5
25
50
k
75
100
(d) SYN-N
n
I
5
25
50
k
75
100
(b) Twitter
Figure 8: Solution qualities of compared methods with varying k.
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
SIC
IC
UBI
IMM
Greedy
0
25
50
k
75
100
(a) Reddit
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
SIC
IC
UBI
IMM
Greedy
0
25
50
k
75
100
(b) Twitter
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
120
90
60
30
0
0
SIC
IC
UBI
IMM
Greedy
75
100
25
50
k
(c) SYN-O
200
150
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
SIC
IC
UBI
IMM
Greedy
50
0
0
25
50
k
75
100
(d) SYN-N
Figure 9: Throughputs of compared methods with varying k.
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
SIC
IC
UBI
IMM
Greedy
0
250
500
N (x103)
750
1000
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
SIC
IC
UBI
IMM
Greedy
0
250
500
N (x103)
750
1000
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
120
90
60
30
0
SIC
IC
UBI
IMM
Greedy
0
250
500
N (x103)
750
1000
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
160
120
80
40
0
0
SIC
IC
UBI
IMM
Greedy
250
500
N (x103)
750
1000
(a) Reddit
(b) Twitter
(c) SYN-O
(d) SYN-N
Figure 10: Throughputs of compared approaches with varying W .
SIC
IC
UBI
IMM
Greedy
0
2.5
5
L (x103)
7.5
10
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
SIC
IC
UBI
IMM
Greedy
0
2.5
5
L (x103)
7.5
10
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
100
80
60
40
20
0
SIC
IC
UBI
IMM
Greedy
0
2.5
5
L (x103)
7.5
10
160
120
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
40
0
0
SIC
IC
UBI
IMM
Greedy
2.5
5
L (x103)
7.5
10
(a) Reddit
(b) Twitter
(c) SYN-O
(d) SYN-N
Figure 11: Throughputs of compared approaches with varying L.
Table 4: Parameters in experiments
Parameter Values
k
β
N
L
U
5, 25, 50, 75, 100
0.1, 0.2, 0.3, 0.4, 0.5
100K, 250K, 500K, 750K, 1,000K
1K, 2.5K, 5K, 7.5K, 10K
1M, 2M, 3M, 4M, 5M
set. (3) N is the window size. (4) L is the number of ac-
tions for each window slide. (5) U is the total number of
users for synthetic datasets. We vary N , L and U to test
the scalability of the compared approaches. The summary
of parameters is listed in Table 4. The default values of all
parameters are in bold.
Experiment Settings: All experiments are conducted on
a desktop machine running Ubuntu 14.04 with a quad core
3.4 GHz Intel i7-2600 processor and 16 GB memory. All the
approaches except IMM are implemented in Java 8. The
IMM implementation available8 is written in C++.
6.2 Testing β for IC and SIC
We first vary β to test its effect on IC and SIC in terms of
the average influence value of SIM queries using the cardi-
nality function, the number of maintained checkpoints and
the throughput. Note that we compare the seed qualities of
IC and SIC with the baselines in Section 6.3 and only focus
on their effectiveness of answering SIM queries here.
Influence Value: The influence values of IC and SIC with
varying β are presented in Figure 5a–5d. The influence val-
ues of IC are slightly better than SIC in most experiments.
This is because SIC trades quality for efficiency by main-
taining fewer checkpoints. In spite of that, SIC is able to
obtain competitive values with at most 5% off from IC. In
addition, we can see that both SIC and IC achieve better
influence values for a smaller β and the influence values of
8https://sourceforge.net/projects/im-imm/
SIC degrade faster than IC for a larger β due to the dele-
tion of checkpoints. We note that in the SYN-N dataset, the
influence values of SIC degrade more severely than other
datasets for a larger β. This is because the average reply
distance is very short, which leads to the frequent changes
of the influential users. Nevertheless, SIC still returns solu-
tions within the theoretical bound stated in Section 5.2.
Number of checkpoints: We examine the average number
of checkpoints maintained by IC and SIC for all sliding
windows. The results are presented in Figure 6a–6d.
IC
maintains a constant number of checkpoints wrt. β. This
is because the number of checkpoints maintained by IC in
each sliding window exactly equals to ⌈ N
L ⌉. On the contrary,
the number of checkpoints in SIC is O( log N
β ) according to
Theorem 5 in Section 5.2, and is thus negatively correlated
with β. The trend for the number of checkpoints emphasizes
the superiority of SIC in both space and time efficiencies.
Throughput: The throughputs of IC and SIC are pre-
sented in Figure 7a–7d. Both IC and SIC achieve better
performance for a larger β. There are two reasons behind
such an observation. First, both approaches employ Sie-
veStreaming as the checkpoint oracle where fewer candi-
date instances are kept within each checkpoint for a larger
β, which makes the update time shorter for each check-
point. Second, SIC maintains fewer checkpoints as β be-
comes larger, which naturally leads to shorter processing
time. Thus, for a larger β, SIC shows even more superior-
ity over IC in all experiments because fewer checkpoints are
maintained by SIC.
6.3 Comparing Approaches with Varying k
We compare different approaches by using the quality and
the performance metric defined in Section 6.1 for varying k.
Quality: The results of solution qualities for different ap-
proaches are presented in Figure 8a–8d. Compared with
IMM, Greedy, IC and SIC achieve less than 10% quality
losses. The results have verified the effectiveness of SIM as
the seeds for SIM queries achieve nearly equivalent influence
spreads as the seeds retrieved by IMM under the WC model.
100
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
80
60
40
20
0
SIC
IC
UBI
IMM
Greedy
1
2
3
U (x106)
4
5
)
s
/
K
(
t
u
p
h
g
u
o
r
h
T
120
SIC
IC
UBI
IMM
Greedy
90
60
30
0
1
2
3
U (x106)
4
5
(a) SYN-O
(b) SYN-N
Figure 12: Throughputs with varying U .
Moreover, SIC shows competitive qualities though it main-
tains fewer checkpoints than IC. In contrast, the qualities of
UBI are close to IMM when k is small (i.e., k ≤ 25). But
its qualities degrade dramatically when k increases. This is
because UBI relies on interchanging users to maintain the
influential users against the updates of the influence graph.
It interchanges a user into the maintained influential user set
only when a substantial gain is achieved for the estimated
influence spread (i.e., 1% of the total influence spread prior
to the interchange). Thus, for a larger k, it becomes harder
for a user to be interchanged since the total influence spread
of the maintained user set is larger. This results in the delays
of interchanges and causes larger errors.
Throughput: The performances with varying k are pre-
sented in Figure 9a–9d. The throughputs of all approaches
are inversely proportional to k. IC and SIC both employ
SieveStreaming as the checkpoint oracle, each checkpoint
maintains a number of candidate instances and each instance
contains up to k candidate users. When k gets larger, it is
more expensive to evaluate the influence function for each
checkpoint. This explains why the performances of IC and
SIC drop while k becomes larger. Compared with IC and all
baseline methods, SIC shows significant advantages in effi-
ciency for all experiments. Moreover, SIC dominates Greedy
and IMM by achieving a speedup of up to 2 orders of magni-
tude across all datasets. The throughput of UBI is also far
behind SIC and IC on all datasets except Twitter, where it
achieves an equivalent throughput compared to IC. Nonethe-
less, UBI is still more than 3 times slower than SIC.
6.4 Scalability
In this section, we evaluate the scalability of compared
methods through measuring the throughputs when varying
the window size N , the length of each window slide L and
the total number of users U .
Varying N : The performances for varying N are presented
in Figure 10a–10d. Although the throughputs of all ap-
proaches decrease with increasing N , SIC shows better scal-
ability as it only maintains O(log N ) checkpoints when β is
fixed. We observe a smaller performance gap between IC
and SIC in all datasets when N is small (i.e., N = 100, 000).
This is because the number of checkpoints maintained by IC
is very close to SIC (fewer than 8) and the benefits of sparse
checkpoints become less significant. Nonetheless, when N
increases, SIC regains its superiority. Moreover, SIC achie-
ves speedups of up to 40x, 100x and 70x compared to Greedy,
IMM and UBI respectively.
Varying L: We show the performances for varying L in
Figure 11a–11d. As L increases, the throughputs of IC and
SIC increase. This is because larger L results in a smaller
number of checkpoints for both methods. IC exhibits a lin-
ear performance improvement wrt. larger L since it main-
tains ⌈ N
L ⌉ checkpoints. As SIC deletes some checkpoints
created by IC, it continues to be superior to IC in terms
of performance, which demonstrates its scalability in han-
dling multiple window slides. Like the results for varying
N , SIC dominates Greedy, IMM and UBI in terms of the
throughput.
Varying U : Finally, we show the performances for varying
U on two synthetic datasets in Figure 12a–12b. We observe
that the throughputs of SIC, IC and UBI increase as U
becomes larger. Fixing the window size N , the influence
graphs become more sparse for a larger U . All these three
approaches show better performance on more sparse graphs.
However, Greedy and IMM need more processing time to
run as U increases since these complexities are directly re-
lated to U . Finally, SIC still shows superior performances
in all experiments with various U settings.
7. CONCLUSION
In this paper, we proposed a novel Stream Influence Max-
imization (SIM) query to retrieve k influential users who
collectively maximize the influence value over a social action
stream. Then, we presented a novel framework Influential
Checkpoints (IC) and its improved version Sparse Influen-
tial Checkpoints (SIC) to efficiently support the continuous
SIM queries over high-speed social streams. Theoretically,
β ) checkpoints to obtain an ǫ(1−β)
SIC maintained O( log N
-
approximate solution for SIM queries. Empirically, our ex-
periments showed that SIC achieves up to 2 orders of magni-
tude speedups over the state-of-the-art static and dynamic
IM approaches with less than 10% losses in seed quality.
In particular, SIC demonstrated a peak processing rate of
more than 150K actions per second, which is adequate for
real-world social streams. In the future, we plan to extend
our proposed frameworks to support a broader class of IM
problems, e.g., competitive IM [5, 22, 26].
2
Acknowledgment
We thank Mr. Ohsaka Naoto for providing his implementa-
tion of algorithms in [29].
8. REFERENCES
[1] C. C. Aggarwal, S. Lin, and P. S. Yu. On influential
node discovery in dynamic social networks. In SDM,
pages 636–647, 2012.
[2] G. Ausiello, N. Boria, A. Giannakos, G. Lucarelli, and
V. T. Paschos. Online maximum k-coverage. Discrete
Applied Mathematics, 160(13–14):1901–1913, 2012.
[3] A. Badanidiyuru, B. Mirzasoleiman, A. Karbasi, and
A. Krause. Streaming submodular maximization:
Massive data summarization on the fly. In KDD, pages
671–680, 2014.
[4] N. Barbieri, F. Bonchi, and G. Manco. Topic-aware
social influence propagation models. In ICDM, pages
81–90, 2012.
[5] S. Bharathi, D. Kempe, and M. Salek. Competitive
influence maximization in social networks. In WINE,
pages 306–311, 2007.
[6] C. Borgs, M. Brautbar, J. Chayes, and B. Lucier.
Maximizing social influence in nearly optimal time. In
SODA, pages 946–957, 2014.
[7] V. Braverman and R. Ostrovsky. Smooth histograms
9(2):60–71, 2015.
for sliding windows. In FOCS, pages 283–293, 2007.
[8] D. Chakrabarti, Y. Zhan, and C. Faloutsos. R-mat: A
recursive model for graph mining. In SDM, pages
442–446, 2004.
[27] G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An
analysis of approximations for maximizing submodular
set functions-i. Mathematical Programming,
14(1):265–294, 1978.
[9] S. Chen, J. Fan, G. Li, J. Feng, K.-L. Tan, and
[28] H. T. Nguyen, M. T. Thai, and T. N. Dinh.
J. Tang. Online topic-aware influence maximization.
PVLDB, 8(6):666–677, 2015.
[10] X. Chen, G. Song, X. He, and K. Xie. On influential
nodes tracking in dynamic social networks. In SDM,
pages 613–621, 2015.
[11] M. Datar, A. Gionis, P. Indyk, and R. Motwani.
Maintaining stream statistics over sliding windows.
SIAM Journal on Computing, 31(6):1794–1813, 2002.
[12] P. Domingos and M. Richardson. Mining the network
value of customers. In KDD, pages 57–66, 2001.
[13] U. Feige. A threshold of ln n for approximating set
cover. Journal of the ACM, 45(4):634–652, 1998.
[14] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan.
Learning influence probabilities in social networks. In
WSDM, pages 241–250, 2010.
[15] A. Goyal, F. Bonchi, and L. V. S. Lakshmanan. A
data-based approach to social influence maximization.
PVLDB, 5(1):73–84, 2011.
[16] L. Guo, D. Zhang, W. Wu, G. Cong, and K.-L. Tan.
Influence maximization in trajectory databases. IEEE
Transactions on Knowledge and Data Engineering. to
appear.
[17] D. Kempe, J. Kleinberg, and E. Tardos. Maximizing
the spread of influence through a social network. In
KDD, pages 137–146, 2003.
[18] R. Kumar, B. Moseley, S. Vassilvitskii, and
A. Vattani. Fast greedy algorithms in mapreduce and
streaming. ACM Transactions on Parallel Computing,
2(3):1–14, 2015.
[19] K. Kutzkov, A. Bifet, F. Bonchi, and A. Gionis. Strip:
Stream learning of influence probabilities. In KDD,
pages 275–283, 2013.
[20] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos,
J. VanBriesen, and N. Glance. Cost-effective outbreak
detection in networks. In KDD, pages 420–429, 2007.
[21] G. Li, S. Chen, J. Feng, K.-L. Tan, and W.-S. Li.
Efficient location-aware influence maximization. In
SIGMOD, pages 87–98, 2014.
[22] H. Li, S. S. Bhowmick, J. Cui, Y. Gao, and J. Ma.
Getreal: Towards realistic selection of influence
maximization strategies in competitive networks. In
SIGMOD, pages 1525–1537, 2015.
[23] H. Li, S. S. Bhowmick, A. Sun, and J. Cui.
Conformity-aware influence maximization in online
social networks. The VLDB Journal, 24(1):117–141,
2015.
[24] Y. Li, J. Fan, D. Zhang, and K.-L. Tan. Discovering
your selling points: Personalized social influential tag
exploration. In SIGMOD, 2017. to appear.
[25] Y. Li, D. Zhang, and K.-L. Tan. Real-time targeted
influence maximization for online advertisements.
PVLDB, 8(10):1070–1081, 2015.
[26] W. Lu, W. Chen, and L. V. S. Lakshmanan. From
competition to complementarity: Comparative
influence diffusion and maximization. PVLDB,
Stop-and-stare: Optimal sampling algorithms for viral
marketing in billion-scale networks. In SIGMOD,
pages 695–710, 2016.
[29] N. Ohsaka, T. Akiba, Y. Yoshida, and K.-i.
Kawarabayashi. Dynamic influence analysis in
evolving networks. PVLDB, 9(12):1077–1088, 2016.
[30] B. Saha and L. Getoor. On maximum coverage in the
streaming model and application to multi-topic
blog-watch. In SDM, pages 697–708, 2009.
[31] K. Saito, R. Nakano, and M. Kimura. Prediction of
information diffusion probabilities for independent
cascade model. In KES, pages 67–75, 2008.
[32] G. Soda, A. Usai, and A. Zaheer. Network memory:
The influence of past and current networks on
performance. Academy of Management Journal,
47(6):893–906, 2004.
[33] X. Song, B. L. Tseng, C.-Y. Lin, and M.-T. Sun.
Personalized recommendation driven by information
flow. In SIGIR, pages 509–516, 2006.
[34] K. Subbian, C. C. Aggarwal, and J. Srivastava.
Querying and tracking influencers in social streams. In
WSDM, pages 493–502, 2016.
[35] Y. Tang, Y. Shi, and X. Xiao. Influence maximization
in near-linear time: A martingale approach. In
SIGMOD, pages 1539–1554, 2015.
[36] Y. Tang, X. Xiao, and Y. Shi. Influence maximization:
near-optimal time complexity meets practical
efficiency. In SIGMOD, pages 75–86, 2014.
[37] X. Wang, Y. Zhang, W. Zhang, and X. Lin.
Distance-aware influence maximization in geo-social
network. In ICDE, pages 1–12, 2016.
[38] H. Yu and D. Yuan. Set coverage problems in a
one-pass data stream. In SDM, pages 758–766, 2013.
[39] H. Zhuang, Y. Sun, J. Tang, J. Zhang, and X. Sun.
Influence maximization in dynamic social networks. In
ICDM, pages 1313–1318, 2013.
APPENDIX
A. DISCUSSION
In this section, we discuss how to extend our proposed
frameworks to different types of IM problems in a streaming
setting. Here, we take topic-aware IM [4, 9], location-aware
IM [21, 37], and conformity-aware IM [23] as examples.
Topic-Aware IM: First, we consider processing topic-aware
SIM queries in a dynamic social stream. Given a set of top-
ics T , we assume that a topic oracle can provide a subset of
topics Tt ⊆ T for each arrival action at, where Tt contains
all topics that are related to at. Then, we consider each
SIM query q only concerns a subset of topics Tq ⊆ T . To
maintain the influential users for q, we can invoke IC or SIC
but only process a sub-stream of actions {atTt ∩ Tq 6= ∅}.
Location-Aware IM: Then, we consider the location-aware
SIM queries in a dynamic social stream. For a location-
aware SIM query q with a spatial region R, we aim to find
users who have the largest influences in R. It can be pro-
cessed in a similar way with topic-aware SIM queries. We
assume each action at is associated with a position pt, which
means that at happens at pt. To maintain the influential
users for q, we can also invoke IC or SIC but only process a
sub-stream of actions {atpt ∈ R}.
Conformity-Aware IM: In conformity-aware IM, the in-
fluence and conformity scores of all users are calculated
offline. To incorporate these scores into SIM, we can de-
sign the influence function as follows: given any user set
S, the influence function is set to Pu′∈I(S) wS(u′) where
I(S) is the set of users influenced by S in our model and
wS(u′) is the conformity-aware influence score from S to
a user u′. Specifically, wS(u′) is evaluated as wS(u′) =
1 − Qu∈S∧u′∈I({u})(1 − Φ(u)Ω(u′)) with Φ(·) and Ω(·) de-
noting the influence and conformity scores calculated by the
conformity-aware model offline. As conformity-aware scores
naturally evolve slowly, it is reasonable to treat them as
constants for a long time and recompute them periodically.
As the adapted influence function retains the monotone and
submodular properties, our proposed frameworks remain ef-
fective and efficient when considering conformity-aware IM.
From the above examples, we see different types of IM
problems with monotone submodular objective functions can
be adapted to our frameworks. However, it is still an open
problem to use our frameworks to support IM problems hav-
ing non-monotone or non-submodular objective functions
(e.g. opinion-aware IM) or considering the dependency of
different queries (e.g., competitive IM).
|
1507.04192 | 1 | 1507 | 2015-07-15T12:45:35 | Beyond Contagion: Reality Mining Reveals Complex Patterns of Social Influence | [
"cs.SI",
"physics.soc-ph"
] | Contagion, a concept from epidemiology, has long been used to characterize social influence on people's behavior and affective (emotional) states. While it has revealed many useful insights, it is not clear whether the contagion metaphor is sufficient to fully characterize the complex dynamics of psychological states in a social context. Using wearable sensors that capture daily face-to-face interaction, combined with three daily experience sampling surveys, we collected the most comprehensive data set of personality and emotion dynamics of an entire community of work. From this high-resolution data about actual (rather than self-reported) face-to-face interaction, a complex picture emerges where contagion (that can be seen as adaptation of behavioral responses to the behavior of other people) cannot fully capture the dynamics of transitory states. We found that social influence has two opposing effects on states: \emph{adaptation} effects that go beyond mere contagion, and \emph{complementarity} effects whereby individuals' behaviors tend to complement the behaviors of others. Surprisingly, these effects can exhibit completely different directions depending on the stable personality or emotional dispositions (stable traits) of target individuals. Our findings provide a foundation for richer models of social dynamics, and have implications on organizational engineering and workplace well-being. | cs.SI | cs |
Beyond Contagion: Reality Mining Reveals Complex
Patterns of Social Influence
Aamena Alshamsi1, Fabio Pianesi2, Bruno Lepri2,3, Alex Pentland3, and Iyad
Rahwan1,3
1Masdar Institute, UAE
2Foundation Bruno Kessler, Italy
3Massachusetts Institute of Technology, USA
October 1, 2018
Abstract
Contagion, a concept from epidemiology, has long been used to characterize social in-
fluence on people's behavior and affective (emotional) states. While it has revealed
many useful insights, it is not clear whether the contagion metaphor is sufficient to fully
characterize the complex dynamics of psychological states in a social context. Using
wearable sensors that capture daily face-to-face interaction, combined with three daily
experience sampling surveys, we collected the most comprehensive data set of person-
ality and emotion dynamics of an entire community of work. From this high-resolution
data about actual (rather than self-reported) face-to-face interaction, a complex picture
emerges where contagion (that can be seen as adaptation of behavioral responses to the
behavior of other people) cannot fully capture the dynamics of transitory states. We
found that social influence has two opposing effects on states: adaptation effects that
go beyond mere contagion, and complementarity effects whereby individuals' behaviors
tend to complement the behaviors of others. Surprisingly, these effects can exhibit com-
pletely different directions depending on the stable personality or emotional dispositions
(stable traits) of target individuals. Our findings provide a foundation for richer models
of social dynamics, and have implications on organizational engineering and workplace
well-being.
Introduction
Social influence is a fundamental force in society that drives the formation and propa-
gation of opinions [1], attitudes [2], behaviors [3], social norms [4] and of psychological
states [5].
Its power can be exploited to increase political participation [6], promote
physical activity and personal well-being [7], and reduce energy consumption [8].
1
The metaphor of contagion provides a powerful framework for modeling social influ-
ence [9, 10, 11]. Psychological and behavioral phenomena can be seen to spread, like a
disease, from one person to another as a result of face-to-face [12] or electronic communi-
cation [13, 14]. Recent work showed that contagion can characterize (at least partially)
the spread of obesity [12], eating habits [15], cooperative behavior [16, 17, 18], generosity
[19], smoking [20], happiness [21], smiling [22], depression [23, 24], and emotion more
generally [25, 26]. It is also possible to estimate parameters of epidemic models, such as
the Susceptible-Infected-Susceptible (SIS) model, directly from behavioral data [27, 28].
Recently, the notion of behavioral contagion in social networks has become a sub-
ject of heated debate, particularly surrounding the difficulty of differentiating between
contagion and homophily from observational data [29, 11, 30, 31]. The present article is
not a contribution to this debate, but rather raises a number of orthogonal issues that
we believe are equally important to our understanding of social dynamics.
Firstly, existing literature has mostly captured the dynamics of long-lasting state,
with a temporal resolution of months [10] or years [11], with no consideration to the
fleeting states that we all go through daily. One possible reason for this could be that
traditional sampling methodologies have so far made it difficult to capture those states,
as well as the similarly fast-changing situational factors, at a high enough temporal
resolution.
Another limitation of existing work stems from the fact that social and biological
contagion are fundamentally different [32]. In particular, existing contagion models focus
on social-situational influences [21, 27] and neglect the role of individual differences in
psychological state dynamics [33, 34]. Individuals differ in their tendencies to experience
given psychological states, since the dynamics of states are a result of the interplay
between situational factors (e.g., social interaction) and individuals' stable traits (also
known as dispositions) [35]. Thus, one should expect that individual between-subject
differences should play an equally important role in social dynamics as situational factors
[36, 37].
For example, consider the Big-Five personality model, which measures openness,
conscientiousness, extraversion, agreeableness, and neuroticism [38]. A person might be
high on the extraversion trait, but his extraversion state fluctuates over time. Indeed,
through experience sampling, Fleeson [39] showed that: (a) people pass through all
levels of personality states in their daily lives; (b) the central tendency of personality
states is stable and reflects the corresponding trait level; (c) within-person variation in
personality states can be attributed to the interplay between situational aspects and the
stable dispositions captured by traits.
Another source of limitation in the classical contagion model is that it typically deals
with transition among discrete conditions -- infected and not infected. Yet, sociological
and psychological theory has long recognized that social influence often involves changes
across continuous [40] or ordinal state structure [36], as people transition among levels
of the same state (e.g. higher or lower extraversion).
We collected high-resolution data of daily face-to-face interaction among members of
an organization, along with detailed experience sampling (3 times per day) of their Big-
2
Five personality states, and their affective (emotional) states using measures of Positive
and Negative Affect [41]. Results reveal a complex picture whereby: (a) contagion plays
a marginal role; (b) more nuanced effects like attraction, inertia, repulsion and push that
are reminiscent of the mimicry/adaptation vs. complementarity distinction [42, 43]; (c)
these processes are moderated by individual dispositions (traits).
Our findings suggest that the intuitive preventive actions, of avoiding infection by
staying away from people in undesirable states (e.g. depression) and seeking people in
desirable states (e.g. high positive affect) may not always be effective. A more nuanced
approach, which takes into account these subtle social influences, would be necessary.
These results are highly relevant to organizational engineering [44] and efforts to make
work environments, teamwork, and schools more effective [45, 46, 47, 48].
Methods
High-resolution sensors have made collecting and analyzing enormous amount of social
interaction data possible [49, 50, 51, 52, 53], alleviating the exclusive reliance on un-
reliable, subjective self-reports based on people's memory [54]. Moreover, sensors can
log data at very fine time-scales without interfering with people's routines or consuming
their time, making it easier to investigate short-duration phenomena.
Data Collection
Sociometric Badges, designed and built by author Pentland, are capable of tracking
various activities and behaviors of individuals [49]. These sensors -- Fig. 1(ii) -- track
face-to-face interactions by means of infrared (IR) sensors that recognize similar sensors
facing them, implying that the two participants wearing them had a conversation or eye
contact.
We used these badges to track face-to-face interactions of 52 individuals and con-
ducted three daily experience sampling surveys [55] to collect information about their
personality and emotional states -- Fig. 1(i).
In addition, affect and personality (sta-
ble) traits were measured at the beginning of the study. This methodology was applied
to five personality states and their corresponding traits (extraversion, agreeableness,
conscientiousness, emotional stability and creativity) and two affect states and their
corresponding traits -- high positive affect (HPA) and low negative affect (LNA).
Specifically, we followed the well-established procedure proposed by Fleeson [39]. At
the beginning and at the end of the experiment the participants filled extended surveys
about: (1) dispositional (stable) personality traits (2) dispositional affective traits. These
scores are considered as the dispositional factors of participants in our study. During the
30 work days, participants were asked to fill three experience sampling surveys about
transient psychological states (personality and affect) that they have experienced in
the last 30 minutes. The three daily reports were the same format as Big Five scales
traditionally used for traits, with the exception that rather than describing themselves in
general, participants described their personality-related behaviors during the previous
3
Figure 1: (i) Framework of the Study: First, participants filled a survey capturing
personality and affect (stable) traits. Then they filled 3 daily surveys for 30 work days
to measure personality and affect (dynamic) states. (ii) Sociometric Badge: Each
participant's social network between any two consecutive surveys was constructed from
infrared sensor data from sociometric badges worn around the neck [49]. (iii) Mea-
suring Situational Factors: An example of how the situational factors (intensity of
contacts) is calculated. The ego's infrared sensor (in the middle) detected 7 alters be-
tween two consecutive surveys. Two of the alters were in the high level (green) with
14 infrared hits, leading to intensity of contact 14/2 = 7. Similarly, the intensity of
contact with three alters in the neutral level (yellow) is 15/3 = 5 and that for alters in
the low level (red) is 20/2 = 10. (iv) Social Influences: Four possible social influences
exemplified. Attraction: an ego in the high level interacts with others in the low level,
then moves to the low level to adapt to his peers. Repulsion: a participant in the high
level interacts with others in the low level, and consequently remains in the high level
in complement to his peers. Inertia: a participant in the low level interacts with others
in the same level, who prevent him from moving to a different level, maintaining his
adaptation to their level. Push: a participant in the low level interacts with others in
the same level, as a result pushing him away to a different, complementary level.
4
30 minutes (e.g. during the last 30 minutes, how well does talkative describe you?).
It is very unlikely that people would have experienced significantly varying affect or
personality states during such a short period of time. The surveys were triggered to be
sent via email every working day at (11:00 AM, 2:00 PM and 5:00 PM). The participants
were given 2.5 hours to fill the surveys. We refer to the first survey as the morning survey,
the second survey as the midday survey and the third survey as the afternoon survey.
Group
Survey
Personality States
Affect
Ten-Item Personality Inventory (TIPI)
Measurement
Extraversion
Agreeableness
Conscientiousness
Emotional Stability
Traits
Creativity
Big Five Marker Scale (BFMS)
High Positive Affect
States
High Negative Affect
Positive and Negative Affect Schedule (PANAS)
Traits
Low Positive Affect
Multidimentional Personality Questionnaire (MPQ) Low Negative Affect
Table 1: Surveys for personality and affect states and traits
Table 5 summarizes the types of surveys used to capture different groups of states
and traits. The Big Five Marker Scale (BFMS) is widely used to assess personality scores
for extraversion, agreeableness, conscientiousness, emotional stability and creativity [63].
Therefore, BFMS was used in the Sociometric Badge Corpus at the beginning and at the
end of the experiment to capture personality traits of participants [56]. Similarly, Mul-
tidimensional Personality Questionnaire (MPQ) was utilized to measure dispositional
affective scores of participants [64].
On the other hand, experience sampling surveys elicit transient states of personality
and affect (emotions) including questions about BIG5 personality scale and fifteen items
concerning affective states. Questions in these surveys report participants' states which
were experienced in the last 30 minutes. For transient states of personality, the ten-item
personality inventory TIPI was used in the experience sampling [65]. For each personality
dimension e.g. extraversion, we recoded the reverse-scored items and then we computed
the average of the two items (the standard item and the recoded reverse-scored item)
that make up each dimension.
The short version of Positive and Negative Affect Schedule (PANAS) was used to
evaluate the affective states of participants [66]. High positive affect (HPA) was assessed
using 3 items: enthusiastic, interested and active. High negative affect (HNA) was
assessed using 3 items: sad, bored and sluggish. Low positive affect was assessed using
2 items: calm and relaxed while low negative affect (LNA) was assessed using 2 items
lonely and isolated.
The study lasted 30 working days and was performed during work hours at the
premises of a research organization in northern Italy (for more details, see [56]). The
data comprised 1,426 surveys by the 52 participant (see SI for more details). The total
5
number of Infrared hits detected by participants' sensor while socializing with other
participants is 114,642. When discussing the social interaction that a given participant
was involved in, we refer to him/her as an ego and to the peers he/she interacted with
as alters. Based on source, destination and time of those Infrared hits, we were able
to construct the temporal face-to-face networks for each participant. When an ego's
Infrared sensor detects an alter, a directional transient edge is created between ego and
alter and the weight of the edge is determined by the number of Infrared hits detected
by ego's sensor that are triggered by the recognition of alter's sensor. The temporal
networks consisted of 1,643 transient edges.
Personality and affect states' scores are measured through continuous scales which are
quantized into three ordinal levels -- low, medium (neutral) and high -- according to the
three quantiles of their distributions in such a way that level L (Low) consisted of cases
between the 0-th and the 33rd quantile; level N (Neutral) consisted of cases between the
33rd and the the 66th quantiles, and level H (High) consisted of cases above the latter
(see SI for more details). In [27], high and low state levels are considered as infectious
while the medium (neutral) level is considered susceptible. In our case, state dynamics
consist of changes (or lack thereof) of level between two consecutive surveys filled by a
participant in a given day. Although our data is temporal, we focused on immediate
single transitions within each state rather than looking at longer-term temporal trends.
The addressed states fluctuate more than once on daily basis, so we just focused on
the transitions that take place between two subsequent time periods and therefore we
studied which social-situational factors are associated with those transitions.
Following the Italian regulations all participants were asked to sign an informed
consent form and the study was conducted in accordance to them. The form and the
general study was also approved by the Ethical Committee of Ca' Foscari University of
Venice.
Contact intensity is distinguished according to the level that the interacting partners
were at the beginning of the relevant time interval (i.e., t) as illustrated in Fig. 1(iii).
The intensity of contacts with alters in a particular level (e.g. high) of the state is the
ratio between the total number of infrared hits with those people and the total number
of unique alters in the level. As a consequence, we have three different measures of situ-
ational factors: L, N and H corresponding to the intensity of contact with people in the
low, medium (neutral) and high levels, respectively. Concerning individual dispositions,
the level transitions for a given state were associated with the normalized score of the
corresponding trait measured at the beginning of the study. In order to investigate the
moderating role each trait plays in the association between transitions between levels of
the state and the social-situational factors, we focused only on high and low trait scores
(± 1 standard deviation).
Statistical Models
For each possible transition between levels of a particular state (e.g. from Low to High
in extraversion), our model consists of one dependent variable, the transition probability.
Independent variables capture the corresponding trait score (T ), the three situational
6
measures L, N and H concerning contact intensity described above, the interaction
effects T ∗ L, T ∗ N and T ∗ H between trait and situational variables to account for the
moderating effect of the former on the latter. The association between the dependent and
the independent variables, including interactions, is modeled through logistic regression
as shown in Equation 2. Following Banerjee et al [57], we used logistic regression instead
of OLS regression (used by Hill et al [27]) because the value of the dependent variable
is binary (0 if there is no transition and 1 otherwise). Let X → Y denote a transition
by the ego from level X to level Y of some state S (X = Y denotes stability). Let
p(X → Y ) be the probability of this transition between two consecutive surveys. For
each dynamic state S, we fit the following model:
p(X → Y )
1 − p(X → Y
ln(
) = α+βLL+βN N +βH H+βT T +βT∗LT∗L+βT∗N T∗N +βT∗H T∗H+βCC
(1)
where α is a constant (intercept); βL, βN , βH and βT are coefficients of the main
effects; βT∗L, βT∗N and βT∗H are coefficients of the interaction effects between the trait
T and the situational variables, and βC is the coefficient of all the control variables. Our
inclusion of individual-level trait effect reduces the likelihood that correlation is driven
by choice of social connections, since it accounts for observable homophily [13, 57].
However, latent homophile effects cannot be completely ruled out [29].
The model also contains control variables, denoted C, whose role is modelled by
parameter βC (see SI for more details). Importantly, it has been shown that the time
of day can have a significant, universal (i.e. culture-independent) effect on mood -- e.g.
people tend to be more positive in the morning [58]. This circadian rhythm can be a
major confounding variable in our analysis. By controlling for it, we eliminate a major
confounding factor, since transitions between different levels of a particular state S (e.g.
HPA) may be correlated due to spontaneous changes due to the time of day.
Model and Parameter Estimation
Our dataset consists of repeated observations for each participant, so we expected to
have correlations within observations of participants. Hence, we used generalized linear
models to analyze our longitudinal data using unstructured covariance matrices whereby
variances and covariances are estimated directly from the data. Generalized Estimation
Equations (GEE) are used to estimate the parameters of our models. For each transition
in each state, we used backward elimination that starts with a full model that contains all
candidate variables. Then, we tested the effect of deletion of insignificant variables using
QICC (Corrected Quasilikelihood under Independence Models Criterion) [67] iteratively
until there is no further enhancement in the results. We evaluated the goodness of fit
based on QICC which is an indicator of goodness of fit of models that use generalized
estimating equations. Therefore, it can be utilized to choose between two models favoring
the one with the smaller QICC. After we end up with the best sub-model for each state
transition, we compare its QICC to the QICC of the null model thats contains only
7
the intercept. If the best sub-model is better than the null model, then we retain it.
Otherwise, we consider the null model.
Although it is not possible, with current statistical techniques, to check whether a
decrease in QICC is statistically significant, the significance of the independent variables
remain the same during the backward elimination in the majority of the cases. Moreover,
backward elimination is widely used with information criterion for model selection [61].
Hence, the usage of QICC for model selection, as suggested by Pan[67], is capable of
supporting the significance of our results.
Results
We investigated 63 types of transitions by applying Equation 2 (3 transitions for each
state level × three levels per state × 7 states). We analyzed 2,378 transitions and 3,390
stability cases in total (see Table 2 for other statistics).
Transition Max Min Median Mean
L → L
L → N
L → H
N → L
N → N
N → H
H → L
H → N
H → H
167
98
35
112
268
99
44
81
185
79
72
10
59
173
46
13
42
110
100
81
18
95
240
57
21
67
153
111
84
19
90
226
61
24
62
146
Table 2: The maximum, minimum, median and mean number of transitions between
levels of states for each transition.
Here, for simplicity, we discuss the results of conscientiousness state only and we move
the results of other states to the supporting information. Table 3 shows the detailed
results of the conscientiousness state. The search for confirmation of the contagion
model involves investigating the transition from the neutral level to another level, and
transitions from the high or the low level back to the neutral level. According to Hill et
al's SISa model [27], a high or a low level is infectious only if (a) transitions to that level
are only affected by the presence of people in that level, and (b) recovery is independent
of social contact. We could not find any case that conformed to these conditions in
conscientiousness state or the remaining six states as shown in SI.
We did, however, find evidence for conditional contagion. These are cases where
the satisfaction of Hill et al's definition was contingent on trait level. We found that
transitions (N → L) do satisfy these requirements for people who have low scores in
the conscientiousness trait. The same pattern was not observed for egos who have high
scores in the conscientiousness trait; in this case, the probabilities of (N → L) decrease
8
L to L
L to N
Variable Coefficient P-value Variable Coefficient P-value Variable
L
Intercept
(period=1)
H
L
N
T
N
L*T
T
L*T
H*T
N*T
0.0017
0.0129
0.0000
0.0286
0.0127
0.0060
0.003
-0.002
0.003
-0.269
0.003
-0.002
Intercept
N
0.0000
0.0000
-0.441
-0.003
N to L
N to N
Variable Coefficient P-value Variable Coefficient P-value Variable
Intercept
Intercept
(period=1)
L
L*T
T
H*T
-0.408
-0.0025
-0.006
-0.002
0.0447
0.0005
0.0007
0.0010
0.0005
0.0231
0.0000
0.0357
-0.001
-0.406
0.0025
0.003
H
T
L*T
H*T
H to L
H to N
Variable Coefficient P-value Variable Coefficient P-value Variable
Intercept
L
H
L*T
Intercept
N
T
0.0000
0.0294
0.0255
0.0006
-1.579
0.0024
-0.008
-0.003
-0.483
-0.0039
-0.270
0.0002
0.0004
0.0050
N
T
N*T
L to H
Coefficient P-value
-1.727
0.0000
0.0130
0.715
0.0000
-0.034
0.0041
-0.009
0.751
0.1131
0.0000
0.013
-0.008
0.0012
N to H
Coefficient P-value
-1.564
0.726
0.405
0.00
0.00
0.013
H to H
Coefficient P-value
0.0088
0.003
0.0000
0.5106
-0.003
0.0144
Table 3: Results of Conscientiousness State. The mere effects of social-situational
factors (intensity with alters in each level: L, N and H) and corresponding traits of egos
(T) are reported in the table, if they are statistically significant. The interaction results
between the two effect are reported also (L∗ T , N ∗ T and H ∗ T ), if they are statistically
significant. The coefficients of the control variables are reported also: the main effect
of the time of the day (period) and the interaction between the time of the day and
the trait (period*T). Some reported coefficients are relatively small, therefore we used
a threshold of 0.001 to consider them relevant. We focus more on the direction of the
effect (increase or decrease in the probability) rather than the actual value of the effect.
when the contact intensity with alters in state level L increases. This is illustrated in
the state diagram in Fig. 2 (left). No other cases conformed to the contagion model.
One reason for the failure of the contagion model is the fact that the role of alters in
the neutral state level is not as passive as required by Hill et al [27] to define the recovery
from infection. However, the presence of alters in the neutral level can be associated with
changing probabilities of moving towards that level. This is what happens with alters
in the neutral level whose presence was associated with a decrease in the probability of
(H → N ) and (L → N ) transitions.
We observed also other roles of alters. For example, the presence of alters in the low
level is associated with an increase in the probability of (H → L) for people who have
low scores in the conscientiousness trait; while contact with alters in a low level of the
9
Figure 2: (Left) Transition graph for conscientiousness: Nodes represent con-
scientiousness level of the ego. Arrows represent transitions from one level to another.
Transitions are labeled with conditions that affect the corresponding probabilities. Icons
represent the conscientiousness levels of alters and ego's trait level. Symbol ↑ (respec-
tively ↓) indicates an increase (respectively decrease) in transition probability associated
with the given combination of alters' state level and ego's trait level. For example, if the
ego high in the conscientiousness state, then the probability of the ego transitioning to
the high level decreases with ego's contact with alters in the neutral level of the state.
Another example is the transition from neutral to low level of conscientiousness, which
is moderated by the ego's trait score. If the ego is high in trait, then the probability
of transition from a neutral state to a low state decreases with his contact with alters
in high and low levels. But if the ego is low in the trait, then the probability increases
instead. (Right) Social influences: The table summarizes the level transition graph
by means of adaptation (A) and complementarity (C). Rows represent ego's state levels;
columns are labeled with alters' state levels and sub-labeled with ego's trait level (Low
or High). Cells report the effects observed when egos in the corresponding state level and
trait level interact with alters in the corresponding state level. For example, the square
with thick border indicates that when the ego is low in conscientiousness state and also
low in conscientiousness trait, contact with alters who are also low in conscientiousness
state results in an adaptation effect. Empty cells lack statistically significant effects in
a given combination.
10
state is associated with a decrease in the ego's probability of transition (N → N ).
Putting together all these observations, we introduce attraction, as a generalization
of contagion. Intuitively, attraction obtains whenever increased interaction with alters
in a state level different from the ego's corresponds to either an increased probability
for the ego to move towards that level or a decreased probability to move away from
that level. Two things should be noted about this definition: (a) it does not require the
"behavior" of the ego to fully conform to that of his/her alter, but simply to become
more similar to it; (b) nothing is assumed concerning the recovery mechanism.
Attraction, by itself, is not enough, though. Often, we observed repulsion -- cases in
which increased interaction with people in a certain state level corresponds to decreasing
probabilities of transition towards that level. This is what happens, for examples, with
transitions (L → N ) and (H → N ). In the trait-conditional mode, it applies to the
(N → L) transition of conscientiousness state for people who have high scores in the
corresponding trait.
Attraction and repulsion cover the associations between the intensity of contacts with
alters in a level different from the ego's initial one. But there is no reason not to expect
that the intensity of contacts with people in the same level as the ego's can also affect
his/her transition probabilities. For instance, Ego 1 of Fig. 3, who was in the neutral
level and interacted with an alter in the same level, was pushed to the high level at the
later sampling. Ego 2, who was in the high level and interacted with people in that same
level, did not move, a situation we call inertia.
At the level of the whole sample, inertia is exemplified by increasing probability for
people who are in the low level of the state but have high scores in the conscientiousness
trait to remain at that level when they interact with alters in the low level of state
(L → L). Similarly, the intensity of contacts with alters in the high level of the state is
associated with a decrease in the probability of people in the same level to go to the low
level (H → L). There are push effects in the conscientiousness state. However, there
are some cases in other states (for push effects, see SI).
In attraction, alters are in levels that are different from egos and therefore they
encourage people to move to their levels; whereas, in inertia, alters are in the same
levels of egos and encourage them to stay at the same levels. Both attraction and inertia
represent a tendency of egos to conform to their alters. In repulsion, alters are in levels
different from egos and therefore discourage people to move to their levels; whereas,
in push, alters are in the same levels of egos and push people away from their levels.
Therefore, repulsion and push represent the tendency to diverge from alters. We can,
therefore, subsume our four effects under the mimicry/adaptation vs. complementarity
distinction [42, 43, 50].
So far, we addressed one transition at a time. For a more complete picture, observe
the state diagram of conscientiousness in Fig. 2 (left) that summarizes the effect of the
interplay between social-situational factors and individual dispositional factors on each
transition. Due to space limitation, detailed results of other states can be found in SI.
We present our results in a more compact format in Fig. 2 (right). Alters in the low level
of the state attract egos to stay in the low level or switch to lower levels if those egos are
11
Figure 3: Two consecutive snapshots of 1st to 2nd survey in day 1, with
the transient social network. Nodes are participants who filled both surveys. Edge
thickness is proportional to contact intensity (IR hits) between surveys. Colors represent
state levels (red:low, yellow:medium, green:high) and are shown only for egos 1 -- 4 and
their alters. The four types of social influence discussed in the text can be seen: ego 1
moved from the neutral level to the high level in the presence of interaction with an alter
in the neutral level (push). Ego 2 remained in the high level in correspondence to intense
contact with an alter in the high level (inertia). Ego 3 was in the low level and moved
to neutral after intense contact with alters in the high level (attraction). Remarkably,
the three egos have low scores in their corresponding traits. Ego 4 remained in the low
level after contact with an alter in the high level (repulsion). The represented states are
creativity for node 1, extraversion for nodes 2 and 4 and agreeableness for node 3.
12
already not conscientious by nature. Nevertheless, the alters cannot drag conscientious
egos by nature towards their level unless the egos are already in the low level. Alters in
the neutral level repulse egos to stay in their transient levels. Alters in the high level
help egos to stay in the high level or move to their level except egos who are in the
neutral level and have low trait scores.
Discussion
Summary and Implications
From a methodological perspective, our study shows how the combination of automated
sensing of social interaction with high-frequency experience sampling [59] can build a
detailed picture of the dynamics of personality and affect states in a sizable work com-
munity. This provides a significantly finer grained perspective compared to methodolo-
gies that exclusively rely on surveys and self-reported social interaction [21, 27]. This
methodology can be applied well beyond the present study, e.g. to study the spread of
healthy behavior or productive work practices in an organization.
Our methodology quantified complex patterns of social influence that go beyond the
contagion metaphor [21, 27]. The associations we identified between social-situational
aspects and transition probabilities -- attraction, repulsion, inertia and push -- account
for a consistent majority (70%, 43 out of 63 ) of the transition types (3 transitions
for each state level × three levels per state × 7 states) within the seven personality
and affect states addressed in this work. They and their grouping under the headings
of adaptation/mimicry and complementarity constitute an alternative and, we think,
more appropriate taxonomy of social influence, one that is better suited to the ordinal
nature of our psychological states. The model that emerges is one in which personality
and affect states are not caught from someone else; they are not the result of mere
contact, but from the ways egos (possibly unconsciously) respond to other people's
behaviors by either adapting to it -- as discussed by social psychologists under the rubric
of the "perception behavior link" or "chamaleon effect" [42] -- or diverging from it.
From this perspective, the ubiquitous moderating effect of individual differences (traits)
corresponds to differential dispositions to respond to external solicitations.
Our observations suggest that interventions should not simply increase the prevalence
of desired behavior. For example, while extrovertedly acting peers bring an introvert out
of his shell (contagion), they push already extroverted persons towards introversion. So,
simply adding extroverts to a group may not lead to an increase in overall extraversion.
In this work, we examined the role of corresponding traits in moderating the rela-
tionship between social-situational factors and variability within personality and affective
states. Nevertheless, it was previously found that some traits such as extroversion and
emotional stability traits are associated with fleeting affective states [68, 69].
In the
future, it would be interesting to conduct similar investigations using all personality and
affective traits.
13
The Issue of Causality
Recently, the notion of contagion has been subject to considerable debate. In a seminal
paper, Shalizi and Thomas identified situations in which latent homophily (similarity
among interaction partners) together with causal effects from the homophilous trait
cannot be distinguished, observationally, from contagion [29]. They argue that this raises
barriers to many inferences social scientists would like to make about the underlying
causal mechanisms. They further argue that these barriers can only be overcome by
making exogenous assumptions about the causal architecture of the process in question.
While the contagion versus homophily debate is still ongoing [11, 30], it is important
to clarify that our present paper is neutral on this particular issue. Rather, our results
call for attention to a fundamental orthogonal issue: even if we take contagion as a
given, it would still fail to account for the majority of potential social influence effects
(i.e. effects that may be attributed to contact among individuals).
That is, regardless of whether true (causal) contagion exists, we show that all kinds
of other associations (not just positive) can be observed when psychological dynamics are
measured at higher resolution, and that these associations are moderated by individual
stable traits. But the nature of our data still restricts us to correlational conclusions. For
instance, just as contagion and homophily may be confounded in observational data [29],
it may very well be the case that our observed 'repulsion' or 'push,' may be confounded
with corresponding phenomena like 'heterophily' (the tendency to interact preferentially
with people who exhibit opposing behavior or traits). Whether these associations reflect
new causal mechanisms of influence remains an open question, and claims of causality
must be based on well-justified assumptions [11]. The goal of this paper is precisely to
motivate further investigation of these issues.
Said differently, we hope that our findings will encourage the broadening of the
present research agenda on social dynamics [29, 30, 31, 60, 27, 28, 62, 13], from the spe-
cific idea of 'contagion' to the broader notion of 'social influence' which manifests itself
through other psychological mechanisms (like mimicry/adaptation and complementar-
ity). If true social influence exists, contagion is only a small part of it, and more complex
interpersonal psychological dynamics are likely at play. Recognizing this is, we believe,
a necessary prerequisite to unravelling the true nature of social dynamics.
Competing Financial Interests
The author declare no competing interests.
Author Contributions
IR, BL, FP conceived, designed, and coordinated the study; BL and FP collected the
data; AA carried out data processing, statistical analysis, and visualization of results.
AP, BL, FP and IR interpreted the results; All authors wrote the manuscript and gave
final approval for publication.
14
References
[1] Asch, S. E. Opinions and social pressure. Readings about the social animal 17 -- 26
(1955).
[2] Wood, W. Attitude change: Persuasion and social influence. Annual review of
psychology 51, 539 -- 570 (2000).
[3] Pentland, A. Social Physics (Penguin Press, 2014).
[4] Cialdini, R. B. & Goldstein, N. J. Social influence: Compliance and conformity.
Annu. Rev. Psychol. 55, 591 -- 621 (2004).
[5] Fleeson, W. Situation-based contingencies underlying trait-content manifestation
in behavior. Journal of Personality 75, 825 -- 861 (2007).
[6] Bond, R. M. et al. A 61-million-person experiment in social influence and political
mobilization. Nature 489, 295 -- 298 (2012).
[7] Mani, A., Rahwan, I. & Pentland, A. Inducing peer pressure to promote coopera-
tion. Scientific reports 3, 1 -- 9 (2013).
[8] Schultz, P. W., Nolan, J. M., Cialdini, R. B., Goldstein, N. J. & Griskevicius, V. The
constructive, destructive, and reconstructive power of social norms. Psychological
science 18, 429 -- 434 (2007).
[9] Burt, R. S. Social contagion and innovation: Cohesion versus structural equivalence.
American journal of Sociology 92, 1287 -- 1335 (1987).
[10] Coleman, J., Katz, E. & Menzel, H. The diffusion of an innovation among physi-
cians. Sociometry 253 -- 270 (1957).
[11] Christakis, N. & Fowler, J. Social contagion theory: examining dynamic social
networks and human behavior. Statistics in Medicine 556 -- 577 (2013).
[12] Christakis, N. & Fowler, J. The Spread of Obesity in a Large Social Network over
32 Years. New England Journal of Medicine 357, 370 -- 379 (2007).
[13] Coviello, L. et al. Detecting emotional contagion in massive social networks. PLOS
ONE 9, e90315 (2014).
[14] Kramer, A. D., Guillory, J. E. & Hancock, J. T. Experimental evidence of massive-
scale emotional contagion through social networks. Proceedings of the National
Academy of Sciences 111, 8788 -- 8790 (2014).
[15] Madan, A., Moturu, S. T., Lazer, D. & Pentland, A. S. Social sensing: Obesity,
unhealthy eating and exercise in face-to-face networks. In Wireless Health 2010,
104 -- 110 (ACM, New York, NY, USA, 2010).
15
[16] Fowler, J. & Christakis, N. Cooperative Behavior Cascades in Human Social Net-
works. PNAS: Proceedings of the National Academy of Sciences 107, 5334 -- 5338
(2010).
[17] Jordan, J. J., Rand, D. G., Arbesman, S., Fowler, J. H. & Christakis, N. A. Con-
tagion of cooperation in static and fluid social networks. PLOS ONE 8, e66199
(2013).
[18] Suri, S. & Watts, D. J. Cooperation and contagion in web-based, networked public
goods experiments. PLOS ONE 6, e16836 (2011).
[19] Tsvetkova, M. & Macy, M. W. The social contagion of generosity. PLOS ONE 9,
e87275 (2014).
[20] Christakis, N. & Fowler, J. The Collective Dynamics of Smoking in a Large Social
Network. New England Journal of Medicine 358, 2249 -- 2258 (2008).
[21] Fowler, J. & Christakis, N. Dynamic spread of happiness in a large social network:
Longitudinal analysis over 20 years in the framingham heart study. British Medical
Journal 337, 1 -- 9 (2008).
[22] Pugh, S. D. Service with a smile: emotional contagion in the service encounter.
The Academy of Management Journal 44, 1018 -- 1027 (2001).
[23] Madan, A., Cebrian, M., Lazer, D. & Pentland, A. Social sensing for epidemiolog-
ical behavior change. In Proceedings of the 12th ACM international conference on
Ubiquitous computing, 291 -- 300 (ACM, 2010).
[24] Howes, M. J., Hokanson, J. E. & Loewenstein, D. A. Induction of depressive affect
after prolonged exposure to a mildly depressed individual. Journal of Personality
and Social Psychology 49, 1110 -- 1113 (1985).
[25] Hatfield, E., Cacioppo, J. & Rapson, R. L. Emotional contagion (Cambridge Uni-
versity Press, 1994).
[26] Barsade, S. G. The Ripple Effect: Emotional Contagion and its Influence on Group
Behavior. Administrative Science Quarterly 47, 644 -- 675 (2002).
[27] Hill, A., Rand, D., Nowak, M. & Christakis, N. Emotions as infectious diseases in
a large social network: the SISa model. Proceedings of Royal Society B: Biological
Sciences 277, 3827 -- 3835 (2010).
[28] Hill, A. L., Rand, D. G., Nowak, M. A. & Christakis, N. A.
Infectious disease
modeling of social contagion in networks. PLOS computational biology 6, e1000968
(2010).
[29] Shalizi, C. R. & Thomas, A. C. Homophily and contagion are generically confounded
in observational social network studies. Sociological Methods & Research 40, 211 --
239 (2011).
16
[30] Steeg, G. V. & Galstyan, A. Statistical Tests for Contagion in Observational So-
cial Network Studies. In Paper presented at International Conference on Artificial
Intelligence and Statistics (2013).
[31] Aral, S., Muchnik, L. & Sundararajan, A. Distinguishing influence-based contagion
from homophily-driven diffusion in dynamic networks. Proceedings of the National
Academy of Sciences 106, 21544 -- 21549 (2009).
[32] Dodds, P. S. & Watts, D. J. A generalized model of social and biological contagion.
Journal of Theoretical Biology 232, 587 -- 604 (2005).
[33] Friedkin, N. E. The attitude-behavior linkage in behavioral cascades. Social Psy-
chology Quarterly 73, 196 -- 213 (2010).
[34] Smilkov, D., Hidalgo, C. A. & Kocarev, L. Beyond network structure: How hetero-
geneous susceptibility modulates the spread of epidemics. Scientific reports 4, 1 -- 7
(2014).
[35] Zelenski, J. M. & Larsen, R. J. The distribution of basic emotions in everyday life:
A state and trait perspective from experience sampling data. Journal of Research
in Personality 34, 178 -- 197 (2000).
[36] Fleeson, W. Moving personality beyond the person-situation debate the challenge
and the opportunity of within-person variability. Current Directions in Psychological
Science 13, 83 -- 87 (2004).
[37] Fleeson, W. & Noftle, E. The end of the person-situation debate: an emerging syn-
thesis in the answer to the consistency question. Social and Personality Psychology
Compass 2, 1667 -- 1684 (2008).
[38] Costa, P. T. & McCrae, R. R. The revised neo personality inventory (neo-pi-r).
The SAGE handbook of personality theory and assessment 2, 179 -- 198 (2008).
[39] Fleeson, W. Toward a structure- and process-integrated view of personality: traits
as density distribution of states. Journal of Personality and Social Psychology 80,
1011 -- 1027 (2001).
[40] Friedkin, N. E. & Johnsen, E. C. Social influence network theory: a sociological
examination of small group dynamics, vol. 33 (Cambridge University Press, 2011).
[41] Watson, D., Clark, L. A. & Tellegen, A. Development and validation of
Jour-
URL
brief measures of positive and negative affect:
nal of Personality and Social Psychology 54,
http://view.ncbi.nlm.nih.gov/pubmed/3397865.
the PANAS scales.
1063 -- 1070 (1988).
[42] Chartrand, T. L. & Bargh, J. A. The chameleon effect: The perception -- behavior
link and social interaction. Journal of personality and social psychology 76, 893
(1999).
17
[43] Tiedens, L. Z. & Fragale, A. R. Power moves: complementarity in dominant and
submissive nonverbal behavior. Journal of personality and social psychology 84,
558 (2003).
[44] Pentland, A. The New Science of Building Great Teams. Harvard Business Review
90, 60 -- 70 (2012).
[45] Barrick, M. R., Mount, M. K. & Judge, T. A. Personality and Performance at the
Beginning of the New Millennium: What Do We Know and Where Do We Go Next?
International Journal of Selection and Assessment 9, 9 -- 30 (2001).
[46] Ilies, R. & Judge, T. A. Understanding the dynamic relationships among personal-
ity, mood, and job satisfaction: A field experience sampling study. Organizational
Behavior and Human Decision Processes 89, 1119 -- 1139 (2002).
[47] Bell, S. T. Deep-level composition variables as predictors of team performance: a
meta-analysis. Journal of Applied Psychology 92, 595 -- 615 (2007).
[48] Barsade, S., Brief, A. P. & Spataro, S. E. The affective revolution in organizational
behavior: The emergence of a paradigm. Organizational Behavior: The State of the
Science 3 -- 52 (2003).
[49] Olgu´ın Olgu´ın, D. et al. Sensible organizations: Technology and methodology for
automatically measuring organizational behavior. IEEE Transactions on Systems,
Man, and Cybernetics, Part B (Cybernetics) 39, 43 -- 55 (2009).
[50] Pentland, A. S. Honest signals (MIT press, 2010).
[51] Cattuto, C. et al. Dynamics of person-to-person interactions from distributed rfid
sensor networks. PLOS ONE 5 (2010).
[52] Salath´e, M. et al. A high-resolution human contact network for infectious disease
transmission. Proceedings of the National Academy of Sciences 107, 22020 -- 22025
(2010).
[53] Stehl´e, J. et al. High-resolution measurements of face-to-face contact patterns in a
primary school. PLOS ONE 6, e23176 (2011).
[54] Todd, P. M., Penke, L., Fasolo, B. & Lenton, A. P. Different cognitive processes
underlie human mate choices and mate preferences. Proceedings of the National
Academy of Sciences 104, 15011 -- 15016 (2007).
[55] Csikszentmihalyi, M. & Hunter, J. Happiness in everyday life: The uses of experi-
ence sampling. Journal of Happiness Studies 4, 185 -- 199 (2003).
[56] Lepri, B. et al. The sociometric badges corpus: A multilevel behavioral dataset
for social behavior in complex organizations. In Privacy, Security, Risk and Trust
(PASSAT), International Confernece on Social Computing (SocialCom), 623 -- 628
(IEEE, 2012).
18
[57] Banerjee, A., Chandrasekhar, A. G., Duflo, E. & Jackson, M. O. The diffusion of
microfinance. Science 341 (2013).
[58] Golder, S. A. & Macy, M. W. Diurnal and seasonal mood vary with work, sleep,
and daylength across diverse cultures. Science 333, 1878 -- 1881 (2011).
[59] Killingsworth, M. A. & Gilbert, D. T. A wandering mind is an unhappy mind.
Science 330, 932 -- 932 (2010).
[60] Aral, S. & Walker, D.
Identifying influential and susceptible members of social
networks. Science 337, 337 -- 341 (2012).
[61] Patrick Royston, Karel GM Moons, Douglas G Altman, and Yvonne Vergouwe.
Prognosis and prognostic research: developing a prognostic model. Bmj, 338:b604,
2009.
[62] Muchnik, L., Aral, S. & Taylor, S. J. Social influence bias: A randomized experi-
ment. Science 341, 647 -- 651 (2013).
[63] M. Perugini and Blas L. The big five marker scales (bfms) and the italian ab5c
taxonomy: Analyses from an emic-etic perspective, 2012.
[64] Auke Tellegen and Niels G. Waller. Exploring personality through test construc-
tion: Development of the multidimensional personality questionnaire. In Gregory J.
Boyle, Gerald Matthews, and Donald H. Saklofske, editors, The SAGE Handbook
of Personality Theory and Assessment: Volume 2 -- Personality Measurement and
Testing, pages 261 -- 293. SAGE Publications Ltd, 2008.
[65] Samuel Gosling, Peter Rentfrow, and William Swann. A very brief measure of the
big-five personality domains. Journal of Research in Personality, 37(6):504 -- 528,
2003.
[66] David Watson, Lee A Clark, and Auke Tellegen. Development and validation of brief
measures of positive and negative affect: the PANAS scales. Journal of personality
and social psychology, 54(6):1063, 1988.
[67] Wei Pan. Akaike's information criterion in generalized estimating equations. Bio-
metrics, 57(1):120 -- 125, 2001.
[68] Auke Tellegen. Structures of mood and personality and their relevance to assessing
anxiety, with an emphasis on self-report. 1985.
[69] David Watson and Lee A Clark. Negative affectivity: the disposition to experience
aversive emotional states. Psychological bulletin, 96(3):465, 1984.
[70] Brian S. Yandell. Practical data analysis for designed experiments (1997).
19
[71] Tamlin S. Conner and Howard Tennen and William Fleeson and Lisa Feldman Bar-
rett Experience sampling methods: A modern idiographic approach to personality
research. Social and personality psychology compass, 3, 2009.
[72] Mihaly Csikszentmihalyi and Reed Larson Validity and reliability of the experience-
sampling method. The journal of nervous and mental disease, 175:9, 1987.
20
Supporting Information
Methods
Data Collection
Through an experiment, the SocioMetric Badges Corpus tracked the activities of 52
participants [56]. The fifty two participants are employees in a research institution in
Italy who volunteered to participate in the experiment for six weeks (working days are
considered only). They belong to five units whereby all the employees of these units
participated in the experiment along with the heads of these units. Their ages range
from 23 to 53 with an average of 36. Forty seven participants are men (90.3%) and five are
women (9%). Forty four participants are Italian (84%) and eight participants are from
other countries (15.3%). Forty-six out of the fifty-three participants were researchers in
computer science belonging to four research groups; the remaining six participants were
part of the full-time IT support staff.
Procedure
At the beginning and at the end of the experiment, the participants filled extended sur-
veys about: (1) dispositional (stable) personality traits (2) dispositional affective traits.
These scores are considered as the dispositional factors of participants in our study. Dur-
ing the 6 weeks, participants were asked to fill three experience sampling surveys about
transient psychological states (personality and affect) that they have experienced in the
last 30 minutes.
It is very unlikely that people would have experienced significantly
varying affect or personality states during such a short period of time. The surveys were
triggered to be sent via email every working day at (11:00 AM, 2:00 PM and 5:00 PM).
The participants were given 2.5 hours to fill the surveys. We refer to the first survey
as the morning survey, the second survey as midday survey and the third survey as the
afternoon survey.
Table 5 summarizes the types of surveys used to capture different groups of states
and traits. The Big Five Marker Scale (BFMS) is widely used to assess personality scores
for extraversion, agreeableness, conscientiousness, emotional stability and creativity [63].
Therefore, BFMS was used in the Sociometric Badge Corpus at the beginning and at the
end of the experiment to capture personality traits of participants [56]. Similarly, Mul-
tidimensional Personality Questionnaire (MPQ) was utilized to measure dispositional
affective scores of participants [64].
On the other hand, experience sampling surveys elicit transient states of personality
and affect (emotions) including questions about BIG5 personality scale and fifteen items
concerning affective states. Questions in these surveys report participants' states which
were experienced in the last 30 minutes. For transient states of personality, the ten-item
personality inventory TIPI was used in the experience sampling [65]. For each personality
dimension e.g. extraversion, we recoded the reverse-scored items and then we computed
the average of the two items (the standard item and the recoded reverse-scored item)
21
that make up each dimension.
The short version of Positive and Negative Affect Schedule (PANAS) was used to
evaluate the affective states of participants [66]. High positive affect (HPA) was assessed
using 3 items: enthusiastic, interested and active. High negative affect (HNA) was
assessed using 3 items: sad, bored and sluggish. Low positive affect was assessed using
2 items: calm and relaxed while low negative affect (LNA) was assessed using 2 items
lonely and isolated.
After we calculate the scores of personality and affective states of each participant
in each filled survey, we centered all the scores of personality and affect dynamic states
using the median of each state. We generated the quantiles for each state, discretizing
the scores of personality and affect dynamic states into three ordered levels (Low, Neutral
and High).The three levels were identified on the basis of the 33rd and 66th quantiles of
the state scores distribution in such a way that level L (low) consisted of cases between
the 0-th and the 33rd quantile; level N (neutral) consisted of cases between the 33rd
and the the 66th quantiles, and level H (high) consisted of cases above the latter.
Note that the experience sampling method has a long history and is highly reliable
in measuring dynamics of psychological states within individuals [71]. For those inter-
ested in the caveats around the use of experience sampling, we also point to extensive
discussions elsewhere [72].
The participants wore SocioMetric Badges every working day within the institution.
These sensors are equipped with accelerometers, audio, Bluetooth and Infrared to re-
spectively capture: body movements, prosodic speech features, co-location with other
individuals and face-to-face interactions [49]. We harnessed Infrared (IR) transmissions
to detect face-to-face interactions between people. In order for a badge to be detected
through IR, two of them must have a direct line of sight and the receiving badge's IR
must be within the transmitting badge's IR signal cone of height h <= 1 meter and a
radius of r <= htanθ, where θ = 15◦ degrees; the infrared transmission rate (TRir) was
set to 1Hz.
Preprocessing the surveys
The data comprises 1,426 surveys by the 52 participants. Ideally, the number of filled
surveys should be 4,680 (52 participants × 3 daily surveys × 30 working days). However,
participants reported absence from work 536 times [56]. This reduces the number of
expected responses to 4,144. We addressed transitions in states, the levels between
daily first surveys and second surveys and transitions in states, the levels between the
second and the third surveys. Therefore, the number of daily expected transitions is
2. This further reduces the number of records (transitions) by 1,560 (52 participants ×
30 days) to reach 2,582 expected records. Also, it has been observed that the majority
of participants used to leave the organization before 5PM on Fridays afternoon. This
further reduces the number of expected responses. The response rate of filling surveys
is 83.9% according to Lepri et al [56] which means that participants skip some surveys
despite their availability at work. Unfilling surveys has an impact on the number of
transitions. For example, if a participant missed the second daily survey, then two
22
transitions will be missing: transition from first to second survey and transition from
second survey. Also, we did not consider the transitions of egos in which the alters have
not filled the corresponding surveys. Therefore, we ended up having only 1,426 surveys.
Transient states of personality and affect First we centered all the scores of personality
and affect dynamic states using the median of each state. Then, we generated the
quantiles for each state, discretized the scores of personality and affect dynamic states
into three ordered levels (Low, Neutral and High).The three levels were identified on
the basis of the 33rd and 66th quantiles of the state scores distribution in such a way
that level L (low) consisted of cases between the 0-th and the 33rd quantile; level N
(neutral) consisted of cases between the 33rd and the the 66th quantiles, and level H
(high) consisted of cases above the latter. We discarded both high negative affect and low
positive affect because their distributions are very skewed making it difficult to identify
appropriate intervals for each level of these states. Hence, high negative affect and low
positive affect were not discussed in the results.
Accordingly, the level of each participant in each dynamic state recorded at a given
survey is identified to be one of the three above levels. We leveraged those levels to
extract the transitions in levels of dynamic states between two consecutive survey in
the same day. Also, we used those levels to extract the social-situational factors by
categorizing the social ties (other participants) whom the Infrared sensor of a particular
participant detected between two consecutive surveys to be one of the three predefined
levels. Remarkably, we used the lagged levels of the social ties. For example, the
transition in question is taking place between the morning survey (time t) and midday
survey (time t + 1) for a particular participant. Therefore, we consider the scores of
social ties recorded in the morning survey (time t). The statistics of transitions in each
level is provided in Table 4.
Transition
L → L
L → N
L → H
N → L
N → N
N → H
H → L
H → N
H → H
Extraversion Agreeableness Conscientiousness Emotional Stability Creativity HPA LNA
79
77
35
59
240
99
44
76
115
100
98
25
90
254
51
25
71
110
167
83
21
112
173
47
18
50
153
147
72
10
79
187
57
20
67
185
107
97
14
102
246
60
21
45
132
91
81
18
95
217
65
13
81
163
89
79
13
95
268
46
25
42
167
Transition to Extraversion Agreeableness Conscientiousness Emotional Stability Creativity HPA LNA
25.364
L
52.925
N
H
34.451
27.913
54.114
33.226
24.150
51.705
37.730
29.854
48.154
41.653
22.087
52.752
37.275
26.092
58.425
29.712
36.044
46.575
38.502
Table 4: Statistics of transitions between levels of each state: The first sub-table presents
the number of cases per transition in each state. The second sub-table presents the
percentage of transitions to each target level of each state.
23
Dispositional Traits of Personality and Affect We considered the trait scores that were
reported by participants at the beginning of the experiment. Then, we normalized the
trait scores of participants using the mean and the standard deviation. To discuss the
statistical interaction between traits and social-situational factors associated with a given
transition, we focused on only on participants with high scores in the trait (+1 standard
deviation) and participants with low scores in the trait (-1 standard deviation). By using
this method, we are able to know how levels of traits moderates the association between
the social-situational factors and transitions in states. For example, we are interested to
know how introverts respond to an increase in the intensity of contacts with others in a
certain extraversion level in comparison to extroverts' response to the same increase.
One might argue that there might be a systematic difference in how emotive mar-
keting and sales people are compared to engineers. However, our control for personality
traits would capture these variations. In fact, our control for traits goes significantly
beyond broad classifications based on profession, since it captures underlying personality
types using a systematic approach founded in well-established dimensions of personality.
Group
Survey
Personality States
Affect
Ten-Item Personality Inventory (TIPI)
Measurement
Extraversion
Agreeableness
Conscientiousness
Emotional Stability
Traits
Creativity
Big Five Marker Scale (BFMS)
High Positive Affect
States
High Negative Affect
Positive and Negative Affect Schedule (PANAS)
Low Positive Affect
Traits
Multidimentional Personality Questionnaire (MPQ) Low Negative Affect
Table 5: Surveys for personality and affect states and traits.
Dynamic Social networks
We created dynamic temporal networks of face-to-face interaction for each participant .
Between each two subsequent surveys a participant filled, we created the participant's
temporal social network based on the social ties that the Infrared sensor had detected.
We considered only social networks that were formed between morning and midday daily
surveys or between midday and afternoon daily surveys. Based on this, we considered
the transition in personality and emotional states of egos between these surveys (time t
and time t + 1) and compared them to lagged states' levels of alters and traits of egos
at time t + 1. To generate our social networks, we exploited the Sociometric Badges
Corpus, first introduced by Lepri et al. [56].
We harnessed the experience sampling data and Infrared readings to create the dy-
namic social networks for participants. The time boundary of each social network is
delineated by the time of subsequent surveys a participant filled. Between the two sur-
veys, all face-to-face interactions detected via Infrared sensors are considered to be the
24
social-situational factors for the participant. Particularly, what matters is the level at
which each alter was at time t (morning survey if the transition was initiated at the
morning survey and midday surveys if the transition was initiated at midday survey).
Model and Parameter Estimation
Our dataset consists of repeated observations for each participant, so we expected to
have correlations within observations of participants. Hence, we used generalized linear
models to analyze our longitudinal data using unstructured covariance matrices whereby
variances and covariances are estimated directly from the data. Generalized Estimation
Equations (GEE) are used to estimate the parameters of our models. For each transition
in each state, we used backward elimination that starts with a full model that contains all
candidate variables. Then, we tested the effect of deletion of insignificant variables using
QICC (Corrected Quasilikelihood under Independence Models Criterion) iteratively until
there is no further enhancement in the results. We evaluated the goodness of fit based on
QICC which is an indicator of goodness of fit of models that use generalized estimating
equations. Therefore, it can be utilized to choose between two models favoring the
one with the smaller QICC. After we end up with the best sub-model for each state
transition, we compare its QICC to the QICC of the null model thats contains only
the intercept. If the best sub-model is better than the null model, then we retain it.
Otherwise, we consider the null model. Table 6 compares between the QICC of our best
sub-model and the null model for each transition in each state. If the QICC of the null
model is better, then we report only the QICC of the null model.
In other words, we used QICC to penalize having complex models that might cause
overfitting. Therefore, for each transition in each state, we start with having the complete
model M odel1 that includes all of the candidate independent variables and calculate the
QICC of the model. Then, each time we encounter a statistically insignificant inde-
pendent variable, we drop the variable, run the model again without this variable and
calculate the QICC of the reduced model M odel2. If the QICC of M odel2 is higher than
the QICC of M odel1, we consider the results of Model1 and report them in the paper.
If there is any statistically insignificant variable, we drop the variable from the model,
run the model again without this variable M odel3 and calculate the QICC of M odel3.
Then, we compare QICC of M odel2 and QICC of M odel3. If the QICC of M odel2 is
lower, then we report the results of M odel2. Otherwise, we repeat the same process
until there is no further reduction in QICC.
Although we do not have any statistical test to check whether the decrease in QICC
is statistically significant, the significance of the independent variables remain the same
during the backward elimination in the majority of the cases. Hence, we believe that
using QICC for model selection is capable of supporting the significance of our results.
For each possible transition between levels of a particular state, our model consists
of: one dependent variable, the transition probability; nine independent variables that
capture the corresponding trait score (T ) and the three situational measures concerning
contact intensity described above: L, N and H. The model also contains the interaction
effects between trait and situational variables, in order to account for the moderating
25
effect of the former on the latter: T ∗ L, T ∗ N and T ∗ H. The level transitions might
take place spontaneously due to the time of the day as highlighted by Golder and Macy
[58]. Therefore, we added a time period variable that can act as a control variable to
capture possible diurnal rhythms P . Particularly, we are interested to study the effect
of time of day at time t + 1 for the transition that takes place between time t and time
t+1. Therefore, the time period could be either midday or afternoon. Also, we expect to
have an interaction between the time of the day and the corresponding trait. Therefore,
we added one more control variable P ∗ T . The association between the dependent and
the independent variables, including interactions, is modeled through logistic regression
as shown in Equation 2. We used logistic regression instead of OLS regression (used by
Hill et al [27]) because the value of the dependent variable is binary (0 if there is no
transition and 1 otherwise). Let X → Y denotes a transition by the ego from level X
to level Y of some state S (we permit X = Y denoting stability). Let p(X → Y ) be
the probability of this transition between two consecutive surveys. For a given dynamic
personality or affect state S :
p(X → Y )
1 − p(X → Y
ln(
) = α+βLL+βN N +βH H+βT T +βT∗LT∗L+βT∗N T∗N +βT∗H T∗H+βP P +βP∗T P∗T
(2)
where α is a constant (intercept); T , L, N and H are as explained above. βL, βN ,
βH and βT are the coefficients of the main effects L, N , H and T , respectively. βT∗L,
βT∗N and βT∗H are the coefficients of the interaction effects between the trait T and the
situational variables L, N and H, respectively. βP is the coefficient of time of the day
and βP∗T is the coefficient of the interaction between the corresponding trait and the
time of the day.
Results
First, we discuss some descriptive statistics about network dynamics and potential ho-
mophily in the networks of participants. Second, we describe the four social influence
processes that we identified in our model. Third, we describe our results in the context
of these processes.
Descriptive Statistics
We provide some descriptive statistics about social network dynamics. Fig. 5 and Fig.
6 show the degree distribution and interaction distribution. In most cases, the dynamic
networks of participants vary in terms of the number of alters and the total number of
interactions.
Also, we quantify the similarity between egos and alters in terms of their state levels.
We calculated the ratio between the number of alters in the same level of egos and the
total number of alters using the following equation similaritys = ns
n where similaritys is
the quantified similarity between egos at level s in a given state, ns is the number of alters
at level s for a given state and n is the total number of alters. We calculated this ratio
26
for each dynamic network of participants and considered the levels of egos and alters at
the same time. Then, we took the average of all calculated ratios. In all cases, we found
that the percentage of similar alters does not exceed 50% which means that interaction
between people does not necessarily take place based on homophily (Check Table 7). We
repeated the same process to quantify the similarity between people with respect to the
number of interaction. We calculated the ratio between the number of interactions with
alters in the same level of egos and the total number of interactions using the following
equation similaritys = is
i where similaritys is the quantified similarity between egos at
level s in a given state, is is the total interaction with alters at level s for a given state
and i is the total number of interactions with alters. Again, we calculated this ratio for
each dynamic network of participants and considered the levels of egos and alters at the
same time. Then, we took the average of all calculated ratios. Again, we found that the
percentage of similar alters does not exceed 50% (Check Table 7).
Social Influence Processes
In our results, we identified four social influence processes : (1) attraction (2) repulsion
(3) inertia (4) push.
Attraction and Repulsion
Formally, let P (X → Y K) be the probability of transition X → Y conditional on
intensity of contacts K with alters in level Z of a state S:
Attraction by K on egos in X level iff, for X different from Y , P (X → Y K) is
increasing with K and either Z<X and Y < X, or Z > X and Y > X.
Repulsion we have repulsion by K on people in X iff, for X different from Y , P (X →
Y K) is decreasing with K and either Z < X and Y < X, or Z > X and Y > X.
Equivalently, we have repulsion by K on people in X iff, for X different from Y ,
P (X → Y K) is increasing with K and either Z < X and Y ≥ X or Z > X and
Y ≤ X
Fig. 7 exemplifies some ways in which attraction and repulsion can manifest. We
already gave examples of Case 1 in the main paper. Concerning Case 2, it was observed
with agreeableness state and transition (L → N ): the intensity of contacts with alters
in the high level is associated with egos scoring high in the trait to upgrade the level
from low to neutral.
Case 3 is exemplified by transition (H → L) of conscientiousness state. Intensity of
contacts with alters in the neutral level is associated with shifting egos who have high
trait score to the low level.
Case 4 is exemplified by transition (N → N ) of conscientiousness.
Intensity of
contacts with alters in the low level is associated with increased probabilities of that
stability of egos with high scores in the trait. All detailed examples are provided in the
supporting information.
27
Inertia and Push
Formally, let P(X → Y K) be the probability of transition X → Y conditional to
contacts with people K in level X of a state S:
Inertia : K is inertial for people in level X iff P (X → XK) increases with K. Equiv-
alently, X is inertial iff, for X different from Y , P (X → Y K) decreases with
K.
Push : K pushes away egos in level X iff, for X different from Y , P (X → Y X) increase
with K. Equivalently, K pushes away alters in level X iff P (X → XK) decreases
with K.
Fig. 8 depicts the inertia and push influences triggered by intensity contacts with
alters in egos' initial levels.
Control Variables
We believe that there might be diurnal rhythms in the between-subject correlations
observed in our data [58]. Hence, transitions between levels of states can be attributed
to the day of the week or the time of the day and not only attributed to social-situational
factors and dispositional traits. To test for the existence of diurnal rhythm, we ran an
ANOVA to check if the average level of each personality and affect measure changes
systematically across days of the week or times of the day. Then, we controlled for the
statistically significant diurnal rhythms by running regressions which controls for those
rhythms.
Analysis of variance (ANOVA) is used to analyze the differences between group
In our case, the groups contain either the days of the week or the times of
means.
the day (morning, midday and afternoon).
In the case of week days, we found that
there are no statistically significant differences of affect and personality states between
weekdays except for creativity (p-value 0.00006). We took one more step to pairwise
compare means of affect and personality states using Tukey's test [70]. Tukey HSD is
a statistical test that is used with an ANOVA to do pairwise comparisons between the
means of different treatments. In our case, we have seven weekdays and thus we have 10
pairwise comparisons. We found that people tend to be more creative at the end of the
week than the beginning of the week: (1) Monday-Friday (diff: -0.23, p-value: 0.003)
(2) Thursday-Friday (diff: 0.27, p-value: 0.0001). Also, there is a difference in the mean
of creativity between Wednesday and Thursday (diff: -0.19, p-value: 0.018). If we were
addressing transitions in creativity states between days, then controlling for the day of
the week would be essential. However, we address transitions between times of the day.
Therefore, the days of the week are not suitable to be used as control variables in our
model.
When we ran the ANOVA test to investigate whether the means of personality and
affect states changes systematically across times of the day, we found that those dif-
ferences are statistically significant for most of the states. Therefore, we ran Tukey's
28
test to check for pairwise comparisons across different times of the day. With respect to
extraversion, people are less extrovert on average at the end of the day in comparison to
their extraversion state's mean score at the beginning of the day (diff: -0.136, p-value:
0.029) or at midday (diff: -0.2, p-value: 0.0003). With respect to agreeableness, people
got less agreeable on average in comparison to their mean score at the beginning of the
day (-0.113, p-value: 0.023). With respect to conscientiousness, people got less consci-
entious on average at midday in comparison to their mean score at the beginning of the
day (diff: -0.2, p-value: 0.0000006) and they are less conscientious on average at the end
of the day in comparison to their score at the beginning of the day (diff: -0.118, p-value:
0.016). However, people are more conscientious on average at the end of the day in com-
parison to their mean score at midday. With respect to emotional stability, people are
less emotionally stable on average at the end of the day in comparison to midday (diff:
-0.117, p-value: 0.033) and beginning of the day (diff: -0.14, p-value: 0.0078). Creativity
on average doesn't change according to the time period. With respect to high positive
affect state, people's mean score is lower at midday in comparison to the beginning of
the day (-0.177, p-value = 0). Also, their mean score in HPA is lower at the end of the
day in comparison to the beginning of the day. However, people's mean score at the end
of the day is higher at the end of the day than the mean score at midday (diff: 0.088,
p-value). With respect to low negative affect state, people's mean score is lower at the
end of the day in comparison to their mean score at midday (diff: -0.099, p-value: 0.018)
and the mean score at the beginning of the day (diff: -0.095, p-value: 0.0245). In our
model, we address the transitions in states' level from mornings to middays and from
middays to afternoons. Thus, we are interested in the mean differences in states in those
two types of transitions.
29
Figure 4: The composite social network of participants. The aggregate social
network is plotted showing the social ties among participants where the nodes are the
participants and the edges are the IR hits detected between each pair of participants.
The size of the nodes indicates their degree while the thickness of the edges is propor-
tional number of total number of IR hits between a pair of participants. Remarks: We
considered only IR hits that are in total more than 10 to create the social ties between
participants.
30
llllllllllllllllllllllllllllllllllllllllllllllllllllllExtraversion
Agreeableness
Conscientiousness
258.823
Transition Our Model Null Model
261.053
260.987
194.776
348.420
540.690
460.236
239.164
303.378
329.069
L to L
L to N
L to H
N to L
N to N
N to H
H to L
H to N
H to H
193.796
346.415
536.751
321.325
231.949
302.3
303
167.87
Transition Our Model Null Model
309.7
308.9
171.7
435.9
520.5
316.1
171.5
270.8
290.359
L to L
L to N
L to H
N to L
N to N
N to H
H to L
H to N
H to H
262.045
271.5
519.7
314.4
Transition Our Model Null Model
367.347
340.500
167.498
430.617
463.190
286.849
142.188
247.471
281.446
355.184
336.434
156.765
420.844
455.696
273.47
140.832
236.687
263.305
L to L
L to N
L to H
N to L
N to N
N to H
H to L
H to N
H to H
Emotional Stability
Creativity
High Positive Affect (HPA)
111.789
299.310
Transition Our Model Null Model
304.301
302.174
126.067
463.480
551.166
356.400
153.455
226.689
270.706
L to L
L to N
L to H
N to L
N to N
N to H
H to L
H to N
H to H
205.969
251.582
348.1
400.737
Transition Our Model Null Model
406.689
310.175
306.805
206.045
176.941
203.480
374.595
316.248
481.045
L to L
L to N
L to H
N to L
N to N
N to H
H to L
H to N
H to H
294.914
196.9
175.454
355.656
307.305
443.738
Transition Our Model Null Model
305.981
293.489
101.587
367.961
442.637
310.707
163.776
315.597
354.350
L to L
L to N
L to H
N to L
N to N
N to H
H to L
H to N
H to H
91.054
359.896
434.818
305.636
161.530
Low Negative Affect (LNA)
251.309
Transition Our Model Null Model
252.927
250.422
111.148
452.999
531.894
308.433
184.558
242.474
302.914
L to L
L to N
L to H
N to L
N to N
N to H
H to L
H to N
H to H
107.607
449.815
529.541
302.882
169.170
232.818
263.323
Table 6: Comparison of Goodness of Fit: We compare between the QICC of our best
sub-model and the QICC of the null model of each transition in each state. Only the
QICC of the null model is reported if it is less (better) than the QICC of the sub-model.
31
Figure 5: The Degree Distribution for each Participant Each box plot shows the
variation in the number of alters in dynamic networks of participants. We can observe
that there is a variation in the number of alters in the dynamic networks of participants.
32
Figure 6: The Interaction Distribution for each Participant Each box plot shows
the variation in the total number of interactions (IR hits) in dynamic networks of par-
ticipants. We can observe that there is a variation in the number of interactions in the
dynamic networks of participants.
Figure 7: Attraction and Repulsion. Case 1-3 exemplify different ways which attraction
can manifest. In Case 1, the presence of alters in level Z is associated with ego's switching
to that level. In Case 2, the ego moves to level Y which is though lower than that of the
attracting alters but higher than his/her original level. In Case 3, the ego moves to a
level that is higher of both his/her original one and that of the attracting alters. Case
4 exemplifies repulsion: the presence of alters in a lower level is associated with the ego
remaining at his/her current state or moving to a higher level. Attraction to lower levels
works in the same way.
33
Ego in XAlters in ZType 1Attraction (+)Level XLevel Y = Level ZEgo in XAlters in ZType 2Attraction (+)Level XLevel YLevel ZEgo in XAlters in YType 3Attraction (+)Level YLevel XLevel ZEgo in XAlters in ZLevel XLevel ZRepulsion (+)Type 4Level YRepulsion (+)State
Number of Alters
Total Interaction
0.38
0.41
0.38
0.4
0.39
0.388
0.35
0.41
0.37
0.335
0.42
0.29
0.28
0.49
0.28
0.34
0.44
0.3
0.266
0.199
0.49
Mean Standard Deviation Mean Standard Deviation
Extroversion
0.4
Low
0.366
Neutral
High
0.45
Conscientiousness Mean Standard Deviation Mean Standard Deviation
Low
0.43
0.45
Neutral
High
0.417
Mean Standard Deviation Mean Standard Deviation
Agreeableness
Low
0.41
0.45
Neutral
High
0.422
Emotional Stability Mean Standard Deviation Mean Standard Deviation
0.44
Low
0.44
Neutral
High
0.44
Mean Standard Deviation Mean Standard Deviation
Creativity
0.42
Low
0.45
Neutral
High
0.445
Mean Standard Deviation Mean Standard Deviation
High PA (HPA)
0.44
Low
0.39
Neutral
High
0.45
Mean Standard Deviation Mean Standard Deviation
Low NA (LNA)
0.4
Low
0.45
Neutral
High
0.44
0.387
0.22
0.5
0.39
0.39
0.4
0.38
0.4
0.4
0.31
0.45
0.29
0.36
0.43
0.38
0.38
0.21
0.5
0.27
0.48
0.4
0.29
0.45
0.27
0.35
0.43
0.39
0.4
0.36
0.42
0.37
0.4
0.39
0.3
0.54
0.346
0.31
0.55
0.344
0.25
0.51
0.43
Table 7: Quantifying similarity between people according to their states. We
quantified the similarity between egos and alters in terms of their state levels. We
calculated the ratio between the number of alters in the same level of egos and the
total number of alters. Then, we took the mean and the standard deviation of those
quantities. Also, we calculated the ratio between the total number of interactions with
alters in the same level of egos and the total number of interactions. Then, we took the
mean and the standard deviation of those quantities. In both cases, the similarity does
not exceed 50%.
34
Figure 8: Inertia and Push: Alters are inertial for egos to move away from the alters'
levels by either lowering the transition probability to another level or increasing the
probability of staying at the alter's level. Vice versa for the push affect
Figure 9: Social Influences: The table summarizes each state's results by means of
the two adverse effects introduced in the text: adaptation (A) and complementarity
(C). Also, the detailed effects are listed between the brackets: (1) attraction (T) (2)
repulsion (R) (3) inertia (I) and (4) push (P). Rows represent ego's state levels; columns
are labeled with alters' levels and sub-labeled with ego's trait level (Low or High). Cells
report the effects observed when egos in the corresponding state level and trait level
interact with alters in the corresponding state level.
35
Ego in XAlters in XLevel XInertia (+) Level YPush (+)C(P)dddLNHA(I)A(I)C(R)A(T)C(R)C(R)A(T)C(R)A(T)C(R)A(T)C(R)A(I)C(P)Extrav.dddLNHA(I)A(I)A(I)C(R)C(R)A(T)A(I)A(T)C(R)A(T)C(R)A(I)C(P)LowNeutralHighLowNeutralHighAgr.dddLNHC(R)C(R)C(R)C(R)C(P)A(I)LowNeutralHighESdddLNHA(I)A(I)C(R)C(R)A(T)A(T)C(P)A(I)A(I)A(I)LowNeutralHighCreat.dddLNHC(P)A(I)C(P)A(I)C(R)C(R)C(R)A(T)C(P)A(I)LowNeutralHighHPAdddLNHA(I)A(I)C(R)C(R)A(T)C(R)A(T)A(T)C(R)A(T)C(R)A(T)LowNeutralHighLNALegendIntensity of contacts with alters in the low level of the stateIntensity of contacts with alters in the neutral level of the stateIntensity of contacts with alters in the high level of the stateEgos scoring low in the trait Egos scoring high in the traitdddLNHA(I)A(I)C(R)C(R)A(T)A(T)C(R)C(R)A(T)A(T)C(R)C(R)A(I)A(I)LowNeutralHighConsc.Figure 10: Level transition graph for extraversion state: Nodes represent extraversion
level of the ego. An arrow between two circles represents the transition from one level
to another. These transitions are labeled with conditions that affect the correspond-
ing probabilities. Icons represent the extraversion levels of alters and ego's trait level.
Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition prob-
ability associated with the given combination of alters state level and ego trait level. For
example, if the ego is in the low level of the extraversion state, then the probability of
him/her transitioning to the high level decreases with his/her interactions with alters in
the high level.
36
Neutral Level of StateHigh Level of StateLow Level of StateExtraversion= ↓= ↓= ↓= ↑= ↓= ↓= ↑= ↑= ↓= ↑= ↑= ↓= ↑= ↓Figure 11: Level transition graph for conscientiousness state: Nodes represent consci-
entiousness level of the ego. An arrow between two circles represents the transition
from one level to another. These transitions are labeled with conditions that affect the
corresponding probabilities.
Icons represent the conscientiousness levels of alters and
ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease)
in transition probability associated with the given combination of alters state level and
ego trait level. For example, if the ego is in the low level of the conscientiousness state,
then the probability of him/her interactions with alters in the high level.
37
Neutral Level of StateHigh Level of StateLow Level of StateConscientiousness= ↓= ↑= ↑= ↓= ↓= ↓= ↓= ↓= ↑= ↑= ↓= ↓= ↑= ↑= ↓= ↑= ↓= ↑We added the time of day as a diurnal control variable in our model besides the
social-situational factors and dispositional traits to capture between-subject effect. We
are interested to know the effect of the time period to which the transition takes place:
midday (second surveys) in case of transitions from mornings to middays and the after-
noon and afternoons (third surveys) in case of transitions from middays to afternoons.
We represent the time of day as a dummy variable: 0 for middays (reference group) and
1 for afternoons.
First, we present the effects of time of the day and the interaction between time of the
day and the corresponding trait. The coefficients of time of the day and the interactions
are reported in tables 8, 9, 3, 10, 11, 12 and 13.
Variable
Intercept
N*T
L to L
Coefficient P-value
-0.363
0.0016
0.0011
-0.002
Variable
Intercept
N
H*T
(Period=1)
N to L
Coefficient P-value
0.0000
-1.508
0.0155
0.0009
0.003
0.0100
0.0258
0.352
Variable
Intercept
(period=1)
T
H*T
period*T
H to L
Coefficient P-value
0.0000
-1.503
0.0000
0.792
-0.466
0.0042
0.0008
0.005
0.487
0.0112
L to N
L to H
Variable Coefficient P-value Variable Coefficient P-value
Intercept
0.0000
0.0000
0.0016
-0.758
H -0.005
L -0.005
Intercept
0.0382
-0.218
N to N
N to H
Variable Coefficient P-value Variable Coefficient P-value
Intercept
0.0000
Intercept
-0.720
0.177
T -0.284
H*T -0.0009
L*T 0.002
period*T 0.239
0.0193
0.0382
0.0015
0.0034
0.0065
H to N
H to H
Variable Coefficient P-value Variable Coefficient P-value
0.0001
Intercept
0.0006
H* T -0.007
N*T 0.004
0.0002
-0.415
Table 8: Extraversion Results
38
Figure 12: Level transition graph for agreeableness state: Nodes represent agreeableness
level of the ego. An arrow between two circles represents the transition from one level
to another. These transitions are labeled with conditions that affect the correspond-
ing probabilities. Icons represent the agreeableness levels of alters and ego's trait level.
Symbol ↑ (respectively ↓) indicates an increase (respectively decrease) in transition prob-
ability associated with the given combination of alters state level and ego trait level. For
example, if the ego is in the low level of the agreeableness state, then the probability of
him/her transitioning to the high level decreases with his/her interactions with alters in
the high level.
39
Neutral Level of StateHigh Level of StateLow Level of StateAgreeableness= ↑= ↓= ↓= ↓= ↓= ↑= ↓= ↑= ↑= ↓= ↓= ↓= ↓= ↓= ↓= ↑= ↑= ↓= ↑= ↓= ↑= ↑= ↑= ↑= ↑Figure 13: Level transition graph for emotional stability state: Nodes represent emo-
tional stability level of the ego. An arrow between two circles represents the transition
from one level to another. These transitions are labeled with conditions that affect the
corresponding probabilities. Icons represent the emotional stability level of alters and
ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease)
in transition probability associated with the given combination of alters state level and
ego trait level. For example, if the ego is in the low level of the emotional stability states,
then the probability of him/her transitioning to the high level decreases with his/her
interactions with alters in the high level.
40
Neutral Level of StateHigh Level of StateLow Level of StateEmotional Stability= ↓= ↑= ↑= ↓= ↓= ↓= ↑Figure 14: Level transition graph for high positive affect state: Nodes represent high
positive affect level of the ego. An arrow between two circles represents the transition
from one level to another. These transitions are labeled with conditions that affect the
corresponding probabilities. Icons represent the high positive affect levels of alters and
ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease)
in transition probability associated with the given combination of alters state level and
ego trait level. For example, if the ego is in the low level of the high positive affect state,
then the probability of him/her transitioning to the high level decreases with his/her
interactions with alters in the high level.
41
Neutral Level of stateHigh Level of StateLow Level of StateHigh Positive Affectivity (HPA)= ↓= ↓= ↑= ↓= ↑= ↑= ↓= ↓= ↑= ↑= ↓= ↑= ↑= ↓= ↑= ↓= ↑= ↓= ↑= ↓Figure 15: Level transition graph for low negative affect state: Nodes represent low
negative affect level of the ego. An arrow between two circles represents the transition
from one level to another. These transitions are labeled with conditions that affect the
corresponding probabilities. Icons represent the low negative affect level of alters and
ego's trait level. Symbol ↑ (respectively ↓) indicates an increase (respectively decrease)
in transition probability associated with the given combination of alters state level and
ego trait level. For example, if the ego is in the low level of the low negative affect states,
then the probability of him/her transitioning to the high level decreases with his/her
interactions with alters in the high level.
42
Neutral Level of StateHigh Level of StateLow Level of State Low Negative Affectivity (LNA)= ↓= ↑= ↓= ↓= ↓= ↓= ↑= ↓= ↑= ↓= ↑L to L
L to N
L to H
Variable Coefficient P-value Variable
Intercept
H*T
-0.350
-0.007
0.003
0.001
H*T
0.004
Coefficient P-value Variable Coefficient P-value
0.0000
0.007
0.0000
0.0014
0.0020
0.0000
Intercept
L
N
H
N*T
-1.033
-0.009
-0.007
-0.002
-0.011
N to L
N to N
N to H
0.854
Coefficient P-value Variable Coefficient P-value
Variable Coefficient P-value Variable
0.365
Intercept
Intercept
N*T
0.002
(period=1) * T 0.205
(period=0) * T -0.170
0.0000
0.0187
0.0149
0.0841
Intercept
N*T
-1.472
-0.003
0.000
0.015
0.0000
H to L
H to N
H to H
-1.177
0.0000
Variable Coefficient P-value Variable
Intercept
Intercept
H
L*T
N*T
H*T
Coefficient P-value Variable Coefficient P-value
-0.282
-0.004
-0.003
-0.005
0.009
0.053
0.055
0.000
0.002
0.001
N
L*T
N*T
H* T
-.004
.005
.008
-.004
.004
.000
.000
.001
Table 9: Agreeableness Results
43
Variable
Intercept
L to L
L to N
L to H
0.0252
Intercept
Coefficient P-value
Coefficient P-value Variable Coefficient P-value Variable
0.0000
-2.451
Intercept
0.273
-0.005
0.0208
N
0.0079
1.102
T
0.0097
T*N
-0.006
(period=1) * T -3.001
0.0000
0.0001
-0.428
N to L
N to N
N to H
Coefficient P-value Variable Coefficient P-value Variable
Variable
Intercept
-1.005
Intercept
0.548
H
(period=1)
-0.002
H*T
L
T
0.271
(period=1) * T -0.907
0.000
0.002
0.000
0.056
0.002
0.001
0.005
0.379
-0.007
0.008
0.000
0.001
0.000
L
H
T
H*T
H to L
H to N
Coefficient P-value Variable Coefficient P-value Variable
Variable
-1.398
Intercept
Intercept
-0.503
(period=1)
-0.014
H
H*T
-0.018
(period=1) *T -0.771
(period=0) *T 0.035
0.000
0.006
0.034
0.021
0.014
0.890
Intercept
-0.690
0.000
Coefficient P-value
-1.001
-0.012
0.011
0.000
0.002
0.002
H to H
Coefficient P-value
0.325
0.044
Table 10: Emotional Stability Results
44
L to L
Variable Coefficient P-value Variable
H
Intercept
0.0009
-0.010
N to L
Variable Coefficient P-value Variable
Intercept
Intercept
0.0000
-0.916
H to L
Variable Coefficient P-value Variable
Intercept
0.0000
-1.268
H
T
H*T
(period=1)
0.1284
L to H
L to N
Coefficient P-value Variable
Coefficient P-value
Intercept
-0.115
0.0001
-1.125
L
-0.0432
0.0013
N
0.0001
-0.009
T
0.0000
1.910
L*T
0.0019
-0.022
0.0001
N*T
-0.0067
H*T
-0.027
0.0000
0.0025
(period=1) * T -1.085
N to N
Coefficient P-value Variable
Intercept
0.318
(period=1)
T
N*T
0.0000
N to H
Coefficient P-value
0.0000
-1.53
0.009
0.466
0.0000
0.689
-0.002
0.003
H to N
Coefficient P-value Variable
-0.026
-0.728
0.013
-0.660
0.0000
0.0000
0.0035
0.0015
T
H to H
Coefficient P-value
0.0012
0.533
Table 11: Creativity Results
45
P-value
0.0000
0.0015
0.0000
0.0005
P-value
0.006
P-value
0.0016
0.0484
0.0002
0.0019
0.0014
L to L
L to N
L to H
Variable Coefficient P-value Variable
T
Intercept
L*T
0.0002
0.0256
-0.424
0.0013
Coefficient P-value Variable Coefficient
-0.928
0.0000
Intercept
T
L*T
period
-1.027
0.4947
-0.002
0.511
N to L
N to N
N to H
Coefficient P-value Variable Coefficient
Variable Coefficient P-value Variable
-0.73
Intercept
Intercept
-0.005
H
N
N*T
N
0.0196
(period=1) *T -0.356
N*T
(period=0)*T 0.015
0
0.0486
0.0704
0.0198
0.9122
-0.439
0.002
0.007
-0.015
0.001
0.037
0.00
0.05
Intercept
-0.34
H to L
H to N
H to H
Variable Coefficient P-value Variable
Intercept
Intercept
H
L
T
T
L*T
L*T
H*T
0.0000
0.0306
0.0359
0.0451
0.002
-1.134
0.0011
-0.440
0.002
-0.006
Coefficient P-value Variable Coefficient
-1.180
-0.0042
-0.448
0.002
0.0000
0.0016
0.0080
0.0249
0.416
-0.0013
0.594
-0.003
0.003387911
Intercept
L
T
L*T
H*T
Table 12: High Positive Affect (HPA) Results
46
L to L
L to N
Variable Coefficient P-value Variable
H*T
Intercept
0.0215
0.003
Coefficient P-value Variable
-0.157
Intercept
L
N
0.1354
N to L
N to N
Variable Coefficient P-value Variable
Intercept
Intercept
N
N*T
period
(period=1) *T 0.248
(period=0) *T -0.267
0.0000
0.0481
0.0000
-1.156
0.001
0.615
Coefficient P-value Variable
Intercept
0.440
L
0.0005
N
0.0000
0.0602
0.0265
0.0567
H to L
H to N
Variable Coefficient P-value Variable
Intercept
Intercept
T
L
N*T
T
L*T
period
0.0000
0.0490
0.0072
0.0004
-1.193
-0.002
-0.594
0.004
Coefficient P-value Variable
-0.876
-0.403
0.002
0.403
(period=1)
(period=0)
T
L*T
0.0000
0.0018
0.0601
0.0011
L to H
Coefficient P-value
-1.151
0.0000
0.0059
-0.003
-0.017
0.0000
N to H
Coefficient P-value
0.0000
-1.317
0.0034
-0.009
-0.0007
0.0305
H to H
Coefficient P-value
0.9501
0.011
0.0587
0.321
0.0000
0.708
-0.003
0.0228
Table 13: Low Negative Affect (LNA) Results
Effect of Time of Day
Extraversion The spontaneous transition (N → L and H → L) during the afternoon
(transition from midday to afternoon) increases with respect to midday (transition from
morning to midday). This is consistent with the post hoc comparisons of ANOVA that
are reported earlier in this section. That is, the spontaneous tendency is for people who
behaved more extravertedly at middays to behave introvertedly in afternoons.
Conscientiousness During the afternoon, people tend to move from the low level of
conscientiousness state to reach the high level (L → H). Also during the afternoon, the
spontaneous transitions (N → H) increases with respect to midday. Quite generally,
people who behaved low or neutral in conscientiousness in midday tend to behave in a
highly conscientious way in the afternoon.
Emotional Stability During the afternoon, the spontaneous transition (N → L) increases
with respect to midday. However, the spontaneous transition (H → L) decreases with
respect to midday. Therefore, during the afternoon, emotional stability level tend to
decrease by only one level (N → L).
Creativity During the afternoon, people tend to move from the neutral level to the high
level (N → H) with respect to midday. On the other hand, during the afternoon, the
spontaneous transition (H → N) decreases with respect to midday.
47
Figure 16: Level transition graph for creativity state: Nodes represent creativity level of
the ego. An arrow between two circles represents the transition from one level to another.
These transitions are labeled with conditions that affect the corresponding probabilities.
Icons represent the creativity levels of alters and ego's trait level. Symbol ↑ (respectively
↓) indicates an increase (respectively decrease) in transition probability associated with
the given combination of alters state level and ego trait level. For example, if the ego is
in the low level of the creativity state, then the probability of him/her transitioning to
the high level decreases with his/her interactions with alters in the high level.
48
Neutral Level of StateHigh Level of StateLow Level of StateCreativity= ↓= ↑= ↓= ↓= ↓= ↑= ↓= ↓High Positive Affect During the afternoon, people move from the low level to the high
level (L → H) with respect to midday. This is consistent with ANOVA results that were
reported earlier for HPA.
Low Negative Affect During the afternoon, spontaneous transitions (N → L) and (H →
N) increases with respect to midday.
0.0.1
Interaction between Time of Day and Trait
We have anticipated that there would be an interaction between the corresponding trait
and the time of the day. Therefore, we added the interaction as an additional control
variable in our model.
With respect to extraversion, the baseline probablity of (N → N ) stability for ex-
troverts (according to trait level) increases from midday to the afternoon. However, the
baseline probability of the same stability for introverts decreases during the same period.
The probability of spontaneous (H → L) tranisition increases for all egos from midday
to the afternoon and more markedly so for extroverts.
With respect to agreeableness, the baseline probablity of (N → N ) stability for
people with high score in agreeableness trait decreases from midday to the afternoon.
However, the baseline probability of the same stability for people with low scores in
agreeableness trait increases during the same period.
With respect to emotional stability, the baseline probablity of (L → H) transition
for people with high score in emotional stability trait decreases from midday to the
afternoon. However, the baseline probability of the same transition for people with
low scores in emotional stability trait increases during the same period. The basline
probability of (N → L) transitions importantly increase from midday to afteroon for
neurotic people (according to trait) and decrease for emotionally stable ones. Putting
this together with the former, it seems that emotionally stable people are indeed more
stable because they have a strong tendency to maintain their level they had in the
morning. The spontaneous transition (H → L) for emotionally stable people (according
to the trait score) decreases. This confirms that emotionally stable people (according
to trait) have decreasing probability of moving from where they are from midday to the
afternoon while neurotic people tend to change their level more often.
With respect to creativity, the spontaneous (L → H) transition decreases in the
afternoon for highly creative people (according to their trait). The opposite holds for
people with low scores in the creativity trait.
With respect to high positive affect state, the probability of spontaneous (N → N )
stability increases for people who have low scores in the trait in the afternoon and
decreases for people who have high scores in the trait.
With respect to low negative affect state, the probability of spontaneous (N → N )
stability ncreases for people who have high scores in the trait in the afternoon and
decreases for people who have low scores in the trait.
Second, we present our results of social influences in an increasing order according
to provided details. First, we present the social influences of interaction between the
49
social-situational factors and the dispositional factor. Second, we present the results
from which we derive the social influences by reporting the direction of impact of each
interaction between the two aforementioned factors: either increasing or decreasing the
probability of the transition between each two levels of the state. Third, we present the
coefficients of main effects and the interaction effects as a result of running our logistic
regression model.
State-Specific Patterns
In Fig. 9, we demonstrate the role that social-situational factors (intensity of contacts
with alters in a certain level) played with respect to the dispositional factor (trait's level
of the ego) towards the transitions between levels of the state in question.
Extraversion:
• Generally, alters acting introvertedly (according to state level) attract egos to stay
or move towards their level except the egos who are already in the neutral state
level and have high scores in the trait.
• Alters in the neutral level urge egos to act according to their traits.
• Surprisingly, alters in the high level of the state mostly attract egos with low trait
scores to stay in the high level or move towards the alters' level whereas those
alters repulse egos with high trait scores.
Agreeableness:
• Generally, alters in the low level of the state encourage egos to be less agreeable
except for egos who are agreeable by nature (trait) and already in the high level.
• Alters in the neutral level urge egos with high trait scores to stay at their transient
states while they mostly have an inconsistent role in case of egos with low trait
scores.
• Alters in the high level play a balancing role. They encourage egos with low trait
scores to stay at their level but they repulse those egos if they are in the low level.
Inversely, they push egos with high trait scores who are in their level but they
attract those egos if they are in the low level of the state.
Conscientiousness:
• Alters in the low level of the state attract egos to stay in the low level or switch
to lower levels if those egos are already not conscientious by nature. Nevertheless,
the alters cannot drag conscientious egos by nature towards their level unless the
egos are already in the low level.
50
• Alters in the neutral level repulse egos to stay in their transient levels.
• Alters in the high level help egos to stay in the high level or move to their level
except egos who are in the neutral level and have low trait scores.
Emotional Stability:
• Alters in the low level repulse egos who are in the neutral level.
• Alters in the neutral level of the state repulse egos, if those egos are in the low
level of the state and have high scores in the trait.
• Mostly, alters in the high level repulse egos with low trait scores and enocurage
egos to stay at the high level if the egos already have high trait scores.
Creativity:
• Alters in the low level mostly encourage egos to stay at their level.
• Alters in the neutral level mostly repulse egos away from their level except the
egos who are in their level and have high trait scores.
• Alters in the high level mostly encourage egos to stay or move towards their level
regardless of egos' traits.
High Positive affect (HPA):
• Surprisingly, alters in the low level push egos with low trait scores away from their
level and attract egos with high scores in the trait to stay or move towards the low
level.
• Alters in the neutral level push egos with low trait scores away from their level
and encourage egos with high trait scores to stay at the neutral level
• Alters in the high level push egos with low trait scores away from the high level
and attract egos with high trait scores to stay at the high level of the state.
Low Negative affect (LNA):
• Mostly, alters in the low level attract egos to stay or move to their level except the
egos who are in the high state level and have low trait scores
• Alters in the neutral level mostly repulse egos away from their level.
• Surprisingly, alters in the high level attract egos with low trait scores and repulse
egos with high trait scores.
51
State Diagrams of Dynamic States
In order to derive the social influences depicted in Fig. 9, we observed the individual
effects of the interaction between social-situational factors (intensity of contacts with
alters in each level) and the dispositional factor (trait level of the ego) for each transition
in the state in question as illustrated in Fig. 10, Fig. 12, Fig. 11, Fig. 13, Fig. 16, Fig.
14 and Fig. 15. In the figures, we labeled each arrow between each pair of levels of the
state according to the direction of the effect of the mentioned factors (increasing (↑) or
decreasing the probability of transition (↓)) We reported only the effects of factors that
have statistically significant results in a given transition. Those effects could be: (1) the
marginal effects of intensity of contacts with alters in a certain level of the state (e.g.
intensity of contacts with alters in the high level) (2) the interaction between social-
situational and dispositional factors e.g. the interaction between intensity of contacts
with alters in the high level and the trait's high level of the ego.
Extraversion
L → L The intensity of contacts with alters in the neutral level is associated with an
increase in the probability that the ego will stay at the low level (L → L), in case the
ego has a low score in the extraversion trait. The intensity of contacts with the same
alters turns to be associated with a decrease in the probability of (L → L), if the ego
has a high score in the corresponding trait. This manifests the interaction effect of the
ego's trait level and the state's levels of alters with whom the ego get in touch with.
L → H The intensity of contacts with alters in low and high levels of the state is
associated with a decrease in the probability of this transition.
N → L The intensity of contacts with alters in the high level is associated with a
decrease in the probability of (N → L), if the ego has a low score in the trait. The
intensity of contacts with the same alters is associated with an increase in the probability
of the same transition, if the ego has a high score in the trait.
N → N The intensity of contacts with alters in the low level is associated with an
increase in the probability of stability in the neutral level (N → N ) if the ego has a
high score in the trait. However, the same intensity is associated with a decrease in the
probability of (N → N ), if the ego has a low score in the trait.
H → L The intensity of contacts with alters in the high level is associated with a
decrease in the probability of the transition, if the ego has a low score in the trait. The
intensity of contacts with alters in the high level is associated with an increase in the
probability of the transition, if the ego has a high score in the trait.
52
H → H The intensity of contacts with alters in the neutral level is associated with a
decrease in the probability of the stability, if the ego has a low score in the trait. However,
the intensity of contacts with the same alters becomes associated with an increase in
the probability of the stability, if the ego has a high score in the trait. The intensity of
contacts with alters in the high level is associated with an increase in the probability of
the stability, if the ego has a low score in the trait. However, the intensity of contacts
with alters in the high level of the state is associated with a decrease in the probability
of the stability, if the ego has a high score in the trait.
Agreeableness
L → L The intensity of contacts with alters in the high level is associated with an
increase in the probability of the stability, if the ego has a low score in the trait. However,
the intensity of contacts with alters in the high level is associated with a decrease in the
probability of the stability, if the ego has a high score in the trait.
L → N The intensity of contacts with alters in the high level of the state is associated
with an increase in the probability of the transition, if the ego has a high score in
the trait. However, the intensity of contacts with the same alters is associated with a
decrease in the probability of the transition, if the ego has a low score in the trait.
L → H The intensity of contacts with alters in low or high levels of the state is
associated with a decrease in the probability of the transition. Also, the intensity of
contacts with alters in the neutral level of the state is associated with a decrease in
the probability of the transition, if the ego has a high score in the trait. However, the
intensity of contacts with alters in the neutral level is associated with an increase in the
probability of transition of egos with low trait scores
N → N The intensity of contacts with alters in the neutral level of the state is asso-
ciated with a decrease in the probability of the stability, if the ego has a low score in
the trait. If the ego has a high score in the trait, then the intensity of contacts with the
same alters becomes associated with an increase in the probability of stability.
N → H The intensity of contacts with alters in the neutral level of the state is associ-
ated with an increase in the probability of the transition, if the ego has a low score in
the trait. However, the intensity of contacts with the same alters is associated with a
decrease in the transition, if the ego has a high score in the trait.
H → N The intensity of contacts with alters in low and neutral levels of the state is
associated with an increase in the probability of the transition, if the ego has a low score
in the trait. However, the intensity of contacts with the same alters is associated with
a decrease in the probability of the transition, if the ego has a high score in the trait.
The intensity of contacts with alters in the high level of the state is associated with
53
an decrease in the probability of the transition, if the ego has a low score in the trait.
However, the intensity of contacts with the same alters is associated with an increase in
the transition of egos with high trait scores.
H → H The intensity of contacts with alters in low and neutral levels of the state is
associated with a decrease in the probability of the stability of egos with low scores in
the trait, whereas the intensity of contacts with the alters is associated with an increase
in the probability of the stability of egos with high scores in the trait. The intensity of
contacts with alters in the high level of the state is associated with an increase in the
probability of the stability of egos with low scores in the trait, whereas the intensity is
associated with a decrease in the probability of the stability of egos with high scores in
the trait.
Conscientiousness
L → L The intensity of contacts with alters in the neutral level is associated with an
increase in the probability of staying at the low level. Also, the intensity of contacts
with alters in the low level is associated with an increase in the probability of stability
of egos with high trait scores. The intensity of contacts with alters in the high level is
associated with a decrease in the probability of stability of egos with high trait scores.
L → N The intensity of contacts with alters in the neutral level is associated with a
decrease in the probability of the transition.
L → H The intensity of contacts with alters in the neutral level is associated with a
decrease in the probability of the transition of egos with high trait scores. Also, the
intensity of contacts with alters in the low level is associated with a decrease in the
probability of the transition of all egos.
N → L The intensity of contacts with alters in the low level is associated with a
decrease in the probability of the transition of egos with high trait scores. However, the
intensity of contacts with the same alters becomes associated with an increase in the
probability of the transition of egos with low trait scores. The intensity of contacts with
alters in the high level of the state is associated with a decrease in the probability of
the transition of egos with high trait scores. However, the intensity of contacts with the
same alters becomes associated with an increase in the probability of the transition of
egos with low trait scores.
N → N The intensity of contacts with alters in low and high levels of the state is
associated with a decrease in the probability of the stability of egos with low traits
scores.The intensity of contacts with the same alters is associated with an increase in
the probability of the stability of egos with high trait scores.
54
H → L The intensity of contacts with alters in the high level is associated with a
decrease in the probability of the transition. The intensity of contacts with alters in the
low level is associated with an increase in the probability of the transition of egos with
low trait scores.
H → N The intensity of contacts with alters in the neutral level of the state is associ-
ated with a decrease in the probability of the transition.
H → H The intensity of contacts with alters in the neutral level of the state is associ-
ated with an increase in the probability of the stability of egos with low trait scores.
Emotional Stability
L → H The intensity of contacts with alters in the neutral level of the state is associated
with a decrease in the probability of the transition of egos with high trait scores.
N → L The intensity of contacts with alters in the low level of the state is associated
with a decrease in the probability of the transition.
N → N The intensity of contacts with alters in the low level of the state is associated
with an increase in the probability of the stability. Also, the intensity of contacts with
alters in the high level of the state is associated with an increase in the probability of
the stability of egos with low trait scores.
N → H The intensity of contacts with alters in the high level of the state is associated
with a decrease in the probability of the transition of egos with low trait scores.
H → L The intensity of contacts with alters in the high level of the state is associated
with a decrease in the probability of the transition of egos with high trait scores whereas
the intensity of contacts is associated with an increase in the probability of the transition
of egos with low trait scores.
Creativity
L → L The intensity of contacts with alters in the high level of the state is associated
with a decrease in the probability of the stability.
L → H The intensity of contacts with alters in the low and neutral levels of the state
is associated with a decrease in the probability of the transition. Also, the intensity of
contacts with alters in the high level of the state is associated with a decrease in the
probability of the transition of egos with high trait scores. However, the intensity of
contacts with alters in the high level is associated with an increase in the probability of
the transition of egos with low trait scores.
55
N → H The intensity of contacts with alters in the neutral level is associated with
an increase in the probability of the transition of egos with low trait scores whereas the
intensity becomes associated with a decrease in the probability of the transition of egos
with high trait scores.
H → N The intensity of contacts with alters in the high level of the state is associated
with a decrease in the probability of the transition.
High Positive Affect (HPA)
L → L The intensity of contacts with alters in the low level is associated with a
decrease in the probability of the stability of egos with low trait scores. The intensity of
contacts with the same alters becomes associated with an increase in the probability of
the stability of egos with high trait scores.
L → H The intensity of contacts with alters in the low level is associated with a
decrease in the probability of the transition of egos with high trait scores. The intensity
of contacts with the same alters becomes associated with a increase in the probability
of the transition of egos with low trait scores.
N → L The intensity of contacts with alters in the high levels is associated with an
increase in the probability of the transition. The intensity of contacts with alters in
the neutral level is associated with a decrease in the probability of the transition of egos
with high trait scores. The intensity of contacts with the same alters becomes associated
with a increase in the probability of the transition of egos with low trait scores.
N → N The intensity of contacts with alters in the neutral level is associated with a
decrease in the probability of the stability of egos with low trait scores. The intensity of
contacts with the same alters becomes associated with a increase in the probability of
the stability of egos with high trait scores.
H → L The intensity of contacts with alters in the low level is associated with a
decrease in the probability of the transition of egos with low trait scores whereas the
intensity becomes associated with an increase in the probability of the transition of egos
with high trait scores. The intensity of contacts with alters in the high level is associated
with a decrease in the probability of the transition of egos with high trait scores whereas
the intensity becomes associated with an increase in the probability of the transition of
egos with low trait scores.
H → N The intensity of contacts with alters in the high level is associated with a
decrease in the probability of the transition. The intensity of contacts with alters in
the low level is associated with a decrease in the probability of the transition of egos
56
with low trait scores whereas the intensity becomes associated with an increase in the
probability of the transition of egos with high trait scores.
H → H The intensity of contacts with alters in the high level is associated with an
increase in the probability of the stability of egos with high trait scores,whereas the
intensity becomes associated with an decrease in the probability of the stability of egos
with low trait scores. The intensity of contacts with alters in the low level is associated
with an increase in the probability of the stability of egos with low trait scores,whereas
the intensity becomes associated with an decrease in the probability of the stability of
egos with high trait scores.
Low Negative Affect (LNA)
L → L The intensity of contacts with alters in the high level is associated with an
increase in the probability of the stability of egos with high trait scores whereas the
intensity becomes associated with a decrease in the probability of the stability of egos
with low trait scores.
L → H The intensity of contacts with alters in neutral and low levels is associated
with a decrease in the probability of the transition.
N → H The intensity of contacts with alters in the low level is associated with a
decrease in the probability of the transition.
H → L The intensity of contacts with alters in the low level is associated with an
increase in the probability of the transition of egos with high trait scores, whereas the
intensity becomes associated with a decrease in the probability of the transition of egos
with low trait scores.
H → N The intensity of contacts with alters in the neutral level is associated with an
increase in the probability of the transition of egos with high trait scores, whereas the
intensity becomes associated with a decrease in the probability of the transition of egos
with low trait scores.
H → H The intensity of contacts with alters in the low level of the state is associated
with an increase in the probability of the stability of egos with low trait scores whereas
the intensity becomes associated with a decrease in the probability of the stability of
egos with high trait scores.
Detailed Results
We report our detailed results (best sub-model according to QICC) for each transition
in each state in Tables 8, 9, 3, 10, 11, 12 and 13. Each sub-table is labeled at the top
57
with the corresponding transition in a given state. The mere effects of social-situational
factors (intensity with alters in each level: L, N and H) and corresponding traits of egos
(T) are reported in the table, if they are statistically significant. The interaction results
between the two effect are reported also (L∗ T , N ∗ T and H ∗ T ), if they are statistically
significant. The coefficients of the control variables are reported also: the main effect
of the time of the day (period) and the interaction between the time of the day and
the trait (period*T). Some reported coefficients are relatively small, therefore we used
a threshold of 0.001 to consider them relevant. We focus more on the direction of the
effect (increase or decrease in the probability) rather than the actual value of the effect.
Broad Speculations and Further Work
So far, we have mainly been describing the data focusing on statistically significant
effects and on their interpretation in terms of broader patterns of adaptation and com-
plementarity. As stated in the main paper, we cannot make conclusive statements about
causality without adopting additional assumptions. Nevertheless, in this section, we
allow ourselves some liberty to make bolder speculations about possible implications of
our findings, in case they corresponded to causal mechanisms. By definition, these ob-
servations are preliminary, and require further validation. Nonetheless, we believe they
provide useful insights for further targeted studies.
Conscientiousness
Conscientious behaviors mutually reinforce: People acting conscientiously help each other
maintain conscientious behavior, regardless of their trait.
Unconscientious behaviors mutually reinforce: As above but in the opposite direction,
people acting unconscientiously help each other maintain the unconscientious behavior
regardless of their trait.
We cannot help you become good, but we can help you stay good: Conscientiously be-
having people fail to pull bad apples. However if the latter already engage in virtuous
behaviors, conscientiously behaving people can help them keep going.
We cannot make you bad, unless you already chose to: Similarly, unconscientiously be-
having people fail to pull good apples. But if the latter are already going astray, the
former can keep them on the wrong way.
Agreeableness
The spiral of stubbornness:
If someone is behaving stubbornly (e.g. being difficult,
argumentative, less agreeable), then interacting with people who are behaving similarly
helps keep him/her in that state irrespective of his/her trait.
58
stubbornly behaving people activate others' stubbornness:
If you are stubborn by nature,
and happen to behave agreeably, stay away from argumentative people, because they
can stimulate your natural stubbornness.
Extraversion
Bringing you out of the shell:
behaving extrovertedly can help you become more outgoing.
If you are introvert by nature, hanging out with people
Stealing the thunder effect:
If you are extrovert by nature, and acting extrovertedly in a
group of extroverts, the latter might "steal your thunder" and suppress your extroverted
behavior.
Creativity
Creative behaviors are attractive and mutually reinforce:
behaving in a creative way, hang out with creative people.
If you want to behave or continue
Low-creative behaviors mutually reinforce: People behaving uncreatively help each other
maintain the uncreative behavior, regardless of their trait.
59
|
1209.2910 | 1 | 1209 | 2012-09-13T14:35:58 | Community Detection in the Labelled Stochastic Block Model | [
"cs.SI",
"cs.LG",
"math.PR",
"physics.soc-ph"
] | We consider the problem of community detection from observed interactions between individuals, in the context where multiple types of interaction are possible. We use labelled stochastic block models to represent the observed data, where labels correspond to interaction types. Focusing on a two-community scenario, we conjecture a threshold for the problem of reconstructing the hidden communities in a way that is correlated with the true partition. To substantiate the conjecture, we prove that the given threshold correctly identifies a transition on the behaviour of belief propagation from insensitive to sensitive. We further prove that the same threshold corresponds to the transition in a related inference problem on a tree model from infeasible to feasible. Finally, numerical results using belief propagation for community detection give further support to the conjecture. | cs.SI | cs | Community Detection in the
Labelled Stochastic Block Model
Simon Heimlicher∗
University of Massachusetts
Amherst, USA
Marc Lelarge
INRIA-ENS
Paris, France
Laurent Massouli´e∗
INRIA-Microsoft Research Joint Centre
Palaiseau, France
2
1
0
2
p
e
S
3
1
]
I
S
.
s
c
[
1
v
0
1
9
2
.
9
0
2
1
:
v
i
X
r
a
Abstract
We consider the problem of community detection from observed interactions between
individuals, in the context where multiple types of interaction are possible. We use labelled
stochastic block models to represent the observed data, where labels correspond to inter-
action types. Focusing on a two-community scenario, we conjecture a threshold for the
problem of reconstructing the hidden communities in a way that is correlated with the true
partition. To substantiate the conjecture, we prove that the given threshold correctly iden-
tifies a transition on the behaviour of belief propagation from insensitive to sensitive. We
further prove that the same threshold corresponds to the transition in a related inference
problem on a tree model from infeasible to feasible. Finally, numerical results using belief
propagation for community detection give further support to the conjecture.
1
Introduction
Community detection consists in the identification of underlying clusters of individuals with
similar properties in an overall population.
It is relevant in vastly diverse contexts such as
biology and sociology, where one might want to classify proteins or humans respectively, based
on their interactions. Most methods assume interactions to be described by a graph, whose
edges represent pairs of individuals known to interact. They then amount to graph clustering,
with potentially distinct flavours: assortative communities see more interactions within than
across communities, while the opposite holds in the disassortative case.
The stochastic block model provides a versatile model of community structure, allowing
representation of diverse scenarios and analytical comparison of candidate algorithmic detection
procedures. In this model, nodes are partitioned into blocks, and an edge is present between
any two nodes with a probability depending only on the blocks to which each of the two nodes
belong. Despite its simplicity, this model already displays rich behaviours, some of which are
not yet fully understood. One phenomenon of practical interest consists in a phase transition
from a situation where the graph of interactions does not reveal any structure, to one where
it reflects some of the underlying structure. In the latter case, algorithmic procedures such as
belief propagation can perform non-trivial classifications of nodes.
The simplest example of this situation consists in a model with n nodes partitioned into two
equal-size blocks, and where two nodes are connected with probability a/n or b/n depending
on whether they belong to the same block or not. Then it is known that the Condition
(a − b)2 > 2(a + b)
(1)
∗part of this author’s work has been conducted while employed at Technicolor.
1
is necessary for reconstruction, i.e. cluster in a way correlated with the true partition. Mossel
et al. [1] have indeed shown that, if it is violated, then the distribution of the observed graph
is absolutely continuous with respect to that of an unstructured fully symmetric random graph
without underlying block structure. When this condition holds, it is conjectured by Decelle et
al. [2] that the underlying block structure can at least partially be recovered by belief propa-
gation. Beyond their theoretical interest, such threshold phenomena also have some practical
implications: they indicate what amount of downsampling or perturbation of original data can
be tolerated before all useful information is lost.
Three elements support the conjecture that under Condition (1) community detection is
possible. First, Decelle et al. [2] show that it implies sensitivity of belief propagation to noise.
Second, it is known to correspond to a certain reconstruction threshold for a model of infinite
random trees, whose structure locally resembles that of the stochastic block model. Third,
numerical evaluations indicate the ability of belief propagation to retrieve some of the underlying
structure under (1).
In the present work, we initiate an investigation of similar phenomena in the more general
context of labelled stochastic block models. In such models the observation of an interaction be-
tween any two individuals is enriched with a label which represents that interaction’s particular
type. Many applications of community detection naturally feature such labels. Protein-protein
chemical reactions may be exothermic or endothermic; (movie-user) associations in collabora-
tive filtering typically come with user ratings; email exchanges may be cold, formal, or familiar;
etc.
Our main contribution consists in a generalization of Condition (1) describing the transition
from unidentifiable to identifiable to the context of labelled stochastic block models. Specifi-
cally, after introducing necessary notation and our main conjecture in Section 3, we show in
Section 4 that our generalized condition corresponds to the transition between insensitivity to
sensitivity in belief propagation. We then show in Section 5 that it also coincides with the
reconstruction threshold for the corresponding labelled tree model. The conjecture is further
validated numerically in Section 6 where belief propagation is shown to achieve useful detection
only above the threshold. Conclusions are drawn in Section 7.
2 Related Work
Several works address community detection in the un-labelled stochastic block model. The
two main approaches are based on belief propagation and spectral methods. Spectral methods
typically ensure consistent reconstruction in regimes with high (ω(1)) average degree. An early
[4] use Laplacian spectra, and address
reference is McSherry [3]. More recently Rohe et al.
growing numbers of communities, but still require high (ω(1)) connectivity. Decelle et al.
[2]
rely on belief propagation, and heuristically determine a threshold for detectability in a “sparse”
regime, where node degrees are of order 1.
The related problem of tree reconstruction has initially been considered by Evans et al.
[5], who identified a threshold on the tree’s mean degree above which reconstruction is feasible
through a simple “census” method. This threshold was later shown to correctly identify the
onset of “robust reconstruction” by Janson and Mossel [6]. We refer to [7] for a survey of this
area.
A complete understanding of the relation between thresholds for community detectability
in block models and reconstrruction in associated tree models is still missing. See, however,
Gerschenfeld and Montanari [8] for conditions under which the two thresholds coincide. For
the symmetric two-community case, Mossel et al. [1] show that the threshold for community
detectability is at least as large as that for tree reconstruction; Coja-Oghlan [9] determines an
upper bound on the threshold for community detection, that is believed to be loose.
In contrast, to the best of our knowledge the problem of community detection and tree
2
reconstruction in the labelled case has not been explicitly considered in the literature.
3 Model description and main conjecture
In the sequel we focus on the simplest non-trivial labelled stochastic block model, which is
defined as follows. A total of n nodes are split into two equal-size blocks, namely block 0 and
block 1. The type of any given node i ∈ {1, . . . , n} refers to the block it belongs to, and is
denoted by σi ∈ {0, 1}. Any two nodes i, j are related with probability a/n if σi = σj, and
with probability b/n otherwise, where a, b are two positive constants. Furthermore, given any
two related nodes i, j, one observes a label Lij taking its values in some finite set L. Label Lij
is drawn from distribution {µ((cid:96))}(cid:96)∈L if σi = σj, and from distribution {ν((cid:96))}(cid:96)∈L otherwise.
Note that the present model generalizes the one studied in Mossel et al. [1], to which it
reduces when the labels do not bring extra information relative to the types of the underlying
nodes, that is when µ((cid:96)) ≡ ν((cid:96)). In this context, we make the following conjecture:
Conjecture: In the labelled stochastic block model with two symmetric blocks, connectivity
parameters a, b > 0 and label distributions µ, ν, reconstruction is infeasible if τ < 1, while it is
feasible when τ > 1, where the threshold value τ is defined as
(cid:88)
(cid:18) aµ((cid:96)) − bν((cid:96))
(cid:19)2
τ := λ
aµ((cid:96)) + bν((cid:96))
(cid:96)∈L
a + b
aµ((cid:96)) + bν((cid:96))
,
(2)
and λ := (a + b)/2 is the mean degree in the corresponding block model.
Note that this extends the conjecture made for the un-labelled case in [1], as the Condition
τ > 1 simplifies to (1) when µ((cid:96)) ≡ ν((cid:96)). We will now establish several results supporting this
conjecture.
4 Phase transition for belief propagation sensitivity
We first introduce a labelled tree which can be coupled with the original graph, see Proposition
5.2 in [1] (the only difference here is the addition of labels on edges). Consider the following
random tree version of the reconstruction problem. Starting from a root node r with type
σr ∈ {0, 1}, consider a branching process with the following characteristics. Each node i with
type σi gives birth to a number of children of type t = σi with Poisson distribution Poi(a/2)
and to a number of children of type t = 1 − σi with Poisson distribution Poi(b/2). Conditional
on the types (t, t(cid:48)) of a (parent-child) pair (i, j), a label Lij is attached to the edge (i, j), drawn
independently of everything else with distribution µ if t = t(cid:48), and with distribution ν if t (cid:54)= t(cid:48).
Consider now such a tree up to depth d, that we denote Td. For each node i ∈ Td, denote
by Td(i) the subtree rooted at node i, together with its labels. Let Xi = P(σi = 1Td(i)), and
Bayes formula entails that
Ri =
Ri :=
Xi
1 − Xi
·
(cid:89)
j child of i
Xjaµ(Lij) + (1 − Xj)bν(Lij)
Xjbν(Lij) + (1 − Xj)aµ(Lij)
·
This readily reduces to a recursion in terms of the random variables Rj:
(cid:89)
Ri =
j child of i
Rjaµ(Lij) + bν(Lij)
Rjbν(Lij) + aµ(Lij)
·
3
It also follows at once from these expressions that if one starts from uniform beliefs (X = 1/2
or equivalently R = 1 on the leaves), then uniform beliefs constitute a fixed point.
Following Decelle et al. [2], we introduce the following notion of robustness to noise for this
fixed point:
Definition 1. Assume that belief ratios R for leaf nodes at depth less than d are fixed to 1.
The belief ratio Rr at root r is then determined by induction from the belief ratios Rj of nodes
at depth d, i.e. j ∈ ∂Td, through a map Fd: Rr = Fd(Rj, j ∈ ∂Td).
The infinitesimal sensitivity χ(d) of the root belief Rr to noise at depth d is defined as
(3)
where the ξj are i.i.d. unit variance random variables. The fixed point R ≡ 1 is then said to be
insensitive to noise if limd→∞ χ(d) = 0, and sensitive to noise if limd→∞ χ(d) = +∞.
χ(d) = lim
→0
2 Var (Fd(1 + ξj, j ∈ ∂Td)Td) ,
1
With these definitions at hand, we are ready to state the following
Theorem 1. Let τ be defined by expression (2). Then the fixed point R ≡ 1 is insensitive to
noise if τ < 1 and sensitive to noise if τ > 1.
Before we prove the theorem, let us comment on the implications. As conjectured in Decelle
et al. in the case of un-labelled data, community detection is infeasible in an instance which is
insensitive to noise, while it is feasible (i.e. some reconstruction classifying correctly more than
half the nodes) in an instance that is sensitive to noise. This leads us to state the conjecture in
Section 3.
sampled in an i.i.d. fashion with moment generating function: ϕ(θ) = E(cid:2)eθW(cid:3) < ∞.
Before proving Theorem 1 we need a technical result. Consider thus a branching process
with Poisson offspring distribution with mean λ for some λ > 1. In addition, each parent-child
edge in the corresponding branching tree is endowed with a real weight. All weights W are
We let N (d) denote the number of descendants in the d−th generation. We further let
N +(d, s) (resp. N−(d, s)) denote the number of such descendants whose sum of weights along
the path from the ancestor to them is larger (resp. smaller) than ds.
Let us now introduce the so-called rate function h as follows. First, we let
h0(x) := sup
y∈R
(xy − log(ϕ(y))) .
determines the behaviour of large deviations of empirical means (1/d)(cid:80)d
This is the so-called Cram´er transform of the weights distribution, which by Cram´er’s theorem
t=1 Wt of i.i.d. weights
from their expectation ¯w := ϕ(cid:48)(0). Let now w− and w+ be defined as
(cid:26) w+ = inf{x ≥ ¯w : h0(x) ≥ log λ},
w− = sup{x ≤ ¯w : h0(x) ≥ log λ}.
(cid:26) h0(x)
if x ∈ [w−, w+],
+∞ otherwise.
We then let
h(x) :=
We are now ready to state the following
Theorem 2. For any x ≥ ¯w, x (cid:54)= w+, on the event that the branching process survives indefi-
nitely, one has the almost sure convergence
(5)
Similarly, for all x ≤ ¯w, x (cid:54)= w−, on the event that the branching process survives indefinitely,
one has
lim
d→∞
(cid:0)N +(d, x)(cid:1)1/d = λe−h(x).
(cid:0)N−(d, x)(cid:1)1/d = λe−h(x).
lim
d→∞
4
(4)
(6)
Proof. We only prove (5), as the other property (6) is shown similarly. Consider first the case
where x > w+. The expectation of the summation in (5) reads
EN +(d, x) = λdP
Wt ≥ xd
.
(cid:33)
(cid:32) d(cid:88)
1
Chernoff’s bound implies that this is no larger than ed(log λ−h0(x)). Being an integer-valued
random variable, the summation is then positive only with probability at most ed(log λ−h0(x)).
By Borel-Cantelli’s lemma, it is then positive only for finitely many d’s. Thus the limit in (5)
is 0, as announced.
The case where x ∈ [ ¯w, w+) follows from a general result for branching random walks [10].
Indeed consider the random measure on R:
Z(d) =
δ(Xi),
N (d)(cid:88)
i=1
(cid:90)
where Xi is the sum of the weigths along the path from the ancestor to the i-th individual in
generation d. Note that we have N +(d, x) = Z(d)[xd;∞).
It is well-known that
M (d)(x) := (λϕ(x))
−d
exyZ(d)(dy),
is a positive martingale and hence has an almost sure limit M (x) as d tends to infinity. For
x ∈ (w−, w+), as shown in [10], the limit M (x) is stricly positive if the process survives. Then
Theorem 4 in [10] implies that for any fixed 0 < h as d tends to infinity:
(cid:16)
Z(d)[xd − h, xd + h]
(cid:17)1/d → λe−ho(x).
(cid:90)
This clearly gives a lower bound to (5). The upper bound is easily obtained by the following
argument:
N +(d, x) = Z(d)[xd,∞) ≤
eθ(y−xd)Z(d)(dy)
minimizing over θ < w+ (which ensures that limd→∞ M (d)(θ) = M (θ) > 0) gives the desired
result.
= e−θxdM (d)(θ)λdϕ(θ)d,
Let us now prove Theorem 1. We first determine an expression for the infinitesimal sensi-
tivity χ(d). Using linearization, we have that
(cid:88)
(cid:89)
χ(d) =
j∈F (d)
(uv)∈path (j∼r)
The derivative in the above formula reads
Raµ(Luv) + bν(Luv)
aµ(Luv) + Rbν(Luv)
(cid:19)2
(cid:12)(cid:12)(cid:12)(cid:12)R=1
.
Let us denote the absolute value of this expression by eWuv for some suitably defined weight
Wuv, so that
∂
∂R
Raµ(Luv) + bν(Luv)
aµ(Luv) + Rbν(Luv)
aµ(Luv) − bν(Luv)
aµ(Luv) + bν(Luv)
· .
(cid:88)
j∈F (d)
χ(d) =
exp
2Wuv
(uv)∈path (r∼j)
.
∂R
(cid:18) ∂
(cid:12)(cid:12)(cid:12)(cid:12)R=1
(cid:88)
=
5
Note that in the present model, thanks to symmetry between the two classes 0, 1, the labels
Luv are i.i.d., with probability distribution P(L = (cid:96)) = aµ((cid:96))+bν((cid:96))
from this label distribution and the transform W = log(aµ(L) − bν(L)/(aµ(L) + bν(L)).
We are thus in the setup of Theorem 2, with a dsitribution for the weights suitably derived
a+b
.
We then have, from Theorem 2, applying the Laplace method, the exponential equivalent:
1
d
log χ(d) ∼ log λ + sup
x∈R
(7)
Consider the modified expression supx(2x − h0(x)), and let x∗ denote the point attaining this
supremum. By convexity of h0 and the fact that it achieves its minimum at ¯w, necessarily
x∗ ≥ ¯w. This supremum equals log Ee2W by convex duality. Note also that x∗ ≤ 0, since the
support of the distribution of W is in R−. Consider first the case where τ > 1, or equivalently,
(2x − h(x)).
log λ + log Ee2W > 0.
We then have h0(x∗) = 2x∗ − log Ee2W < log λ by the above condition, so that h0(x∗) = h(x∗).
Thus the logarithmic equivalent (7) reads log(τ ) and is strictly positive. We thus have sensitivity
to perturbations.
log Ee2W < − log λ. In that case, the logarith-
mic equivalent (7) is upper-bounded by log(τ ) and is thus strictly negative. Insensitivity to
perturbations follows.
Consider next the case where τ < 1, i.e.
5 Phase transition for reconstructability on labelled trees
In this section, T is an infinite tree with types σ ∈ {0, 1} on its vertices and labels L on its
edges. To have consistent notation with previous section, a child has the same type as its
parent with probability a
a+b . Given that the child has the same type as its parent, its label is
distributed as µ((cid:96)), otherwise it is distributed according to ν((cid:96)). Note that if T is a realization
of a Galton-Watson tree with offspring distribution Poi(cid:0) a+b
(cid:1) conditioned on non-extinction,
we get exactly the same tree model as in the previous section. In this section, the underlying
tree is fixed (i.e. non-random) so that the only randomness considered here is associated with
the types of the vertices and the labels of the edges.
labels of the edges of the tree. We define the function : L → [0, 1/2] by
We denote by P0 and E0 the probability distribution and expectation conditional on the
2
a If j is a child of i, we have
((cid:96)) =
bν((cid:96))
aµ((cid:96)) + bν((cid:96))
.
P0 (σi (cid:54)= σj) = (Lij).
We now give an alternative description of the random types of the vertices of the tree when
the labels of the edges are known, i.e. conditionally on the labels. At the root r of the tree
T a binary random variable is chosen uniformly at random. This type is then propagated,
with error, throughout the tree as follows: the child j of the vertex i receives the type of i
with probability 1 − (Lij), and the opposite type with probability (Lij). These events at
the vertices are statistically independent. This model has been studied in information theory,
mathematical genetics and statistical physics when the function is constant. We refer to [5]
for references.
Suppose we are given the types that arrived at the d-th level ∂Td of the tree T . Observing the
labels of the edges and using optimal reconstruction strategy (maximum likelihood), the prob-
ability of correctly reconstructing the original type at the root is denoted by (1 + ∆(T , d)) /2,
where clearly ∆(T , d) ≥ 0.
6
Galton-Watson tree with offspring distribution Poi(cid:0) a+b
For an infinite tree T , we denote by λ = lim supd ∂Td1/d its growth rate. Note that our
notation is consistent with the previous section, as in the case where T is a realization of a
2 a.s. We still define τ by the
(cid:1), λ = a+b
expression (2). Adapting the argument of [5], we are able to show:
Theorem 3. Let T be an infinite labelled tree with root r as defined above. Consider the problem
of reconstructing the type of the root σr from the types at the d-th level ∂Td of T and the labels
on the tree.
2
1. If τ > 1 then inf d≥1 ∆(T , d) > 0;
2. If τ < 1 then inf d≥1 ∆(T , d) = 0.
Proof. Following [5], we derive a lower bound for ∆(T , d) in terms of the effective electrical
conductance from the root r to ∂Td and an upper bound which is the maximum flow from r to
∂Td for certain edge capacities. We refer to [11] for background on these notions.
(cid:89)
child of i, we define θij = 1 − 2(Lij) = aµ(Lij )−bν(Lij )
For the conductance lower bound, we follow Section 5 of [5] and for each edge (i, j), j a
aµ(Lij )+bν(Lij ) and then assign the resistance
Rij = (1 − θ2
ij)
θ−2
uv ,
where path (r ∼ j) is the path from the root r to node j. We also define for each vertex i
(uv)∈path (r∼j)
(cid:89)
Θi =
θuv.
(uv)∈path (r∼i)
By Theorem 1.2’ and 1.3’ of [5], we have
where Reff(r ↔ ∂Td) is the effective resistance between the root r and the d-th level of the tree.
We first prove our second claim. Note that
and ∆(T , d)2 ≤ 2
Θ2
i ,
(cid:88)
i∈∂Td
∆(T , d) ≥
(cid:2)θ2
uv
E0
1
1 + Reff(r ↔ ∂Td)
(cid:88)
(cid:3) =
(cid:88)
a + b
Θ2
i
E0
(cid:96)
aµ((cid:96)) + bν((cid:96))
i∈∂Td
(cid:19)2
aµ((cid:96)) + bν((cid:96))
(cid:18) aµ((cid:96)) − bν((cid:96))
(cid:17)d → 0,
=
τ
λ
,
= ∂Td(cid:16) τ
(cid:88)
λ
so that we have for τ < 1,
as d tends to infinity. Hence by Fatou’s lemma, we have
lim inf
d
i∈∂Td
Θ2
i = 0 a.s.,
ij =(cid:81)
(uv)∈path (r∼j) θ−2
Our first claim will hold, once we prove that for τ > 1, we have Reff(r ↔ ∞) = supd≥1 Reff(r ↔
(cid:3) so that by Theorem 1(i) of [12], for τ > 1, we have
and our second claim holds.
∂Td) < ∞. This fact follows indeed from a computation done in [12]. Define the resistance
R(cid:48)
uv . Note that in our framework the labels of the edges are i.i.d. with
. In particular the random variables θuv are also i.i.d. and since θuv ≤ 1,
distribution aµ((cid:96))+bν((cid:96))
we have min0≤x≤1 E0
R(cid:48)
Reff(r ↔ ∞) ≤ R(cid:48)
(cid:2)θ2x
(cid:2)θ2
eff(r ↔ ∞) < ∞ a.s. Since Ruv ≤ R(cid:48)
eff(r ↔ ∞) < ∞ a.s.
uv, we have by Rayleigh’s monotonicity law (see [11]),
(cid:3) = E0
a+b
uv
uv
7
6 Numerical results
Figure 1: Overlap Q as a function of the parameter ε (left: a = b; right a < b)
We now investigate numerically the validity of our proposed conjecture. We consider first a
labelled stochastic block model with two symmetric blocks where the connectivity parameters
are identical, i.e. a = b, so that community detection can only succeed based on the labels. We
assume for simplicity only two labels + and − and define the distributions µ(+) = p for edges
among nodes of the same type and ν(+) = q for edges between nodes of different type for two
parameters p, q ∈ [0, 1]. In this case, Condition (1) does not hold, yet reconstruction may still
be feasible depending on the values of p and q. In order to validate our conjecture that if the
value τ given in (2) is greater than 1, reconstruction may be feasible, we parametrize p = 1
2 + ε
and q = 1
2 − ε, which leads to the simplified condition for reconstruction:
ε >
√
1
2
.
a
(8)
We characterize the success of the reconstruction using the overlap metric introduced by
Decelle et al. in equation (5) of [2], which we repeat below:
(cid:80)
Q({σi},{σi}) = max
π
1
n
i δσi,π(σi) − maxt nt
1 − maxa na
,
(9)
where σi denotes the original assignment of types to nodes i = 1 . . . n, σi, denotes the estimated
assignment, t denotes communities, and nt is the size of community t.
In our setup, t = 0
or 1 and nt = n/2. Since types may be assigned in different order in the estimate, we vary
over all permutations π(σi) of σi and take the one with maximum overlap. This overlap metric
ranges from 0 to 1, equating zero when classification is no better than assigning all nodes to a
fixed class (or equivalently, assigning nodes to a randomly chosen type). We generate a labelled
stochastic block model graph with the parameters given above and n = 5000 nodes. Then,
we use the standard sum–product belief propagation algorithm to infer the types of the nodes
based on the labels. We vary both the density, i.e. a = b, and ε. All plotted values are averages
over several different seeds.
In Fig. 1 (left), we plot the overlap metric Q against ε on the x-axis for a = b given by 2,
5, 10. For each curve, we indicate the threshold (8) as a vertical line in the same style as the
corresponding curve. We observe that to the left of the threshold, Q remains around zero and
the variation may be attributed to the initial conditions and small-scale effects. To the right of
the threshold, however, Q increases steadily.
For comparison, in Fig. 1 (right), we provide the same metric but with a < b given by
(a, b) = (1, 3), (4, 6), (8, 12). Accordingly, belief propagation can now exploit both edges as
well as their labels and the corresponding curves are shifted towards the left, along with the
threshold of ε where τ = 1, again indicated by a vertical line for each curve.
It is interesting, that even for reasonably small scales, belief propagation consistently fails
below the threshold, with overlap close to zero, yet achieves positive overlap above the threshold.
8
7 Concluding remarks
We have initiated an analysis of community detection in the context of labelled interactions.
We have formulated a conjecture on when detectability is feasible, in the form of Condition
(2). While restricted to the two symmetric communities case, this condition is already useful in
determining how the availability of labels affects detectability. A natural extension will consider
richer scenarios with more communities, where our techniques can potentially characterize the
corresponding transition thresholds. On the theoretical front, we have established that two
phase transitions, namely sensitivity of belief propagation, and tree reconstructability, coincide
in the case of labelled trees. The main outstanding question there is to validate our conjecture
that these thresholds characterize the onset of community detectability.
References
[1] Elchanan Mossel, Joe Neeman, and Allan Sly. Stochastic Block Models and Reconstruction,
February 2012, arXiv:1202.1499.
[2] Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborov´a. Asymptotic
analysis of the stochastic block model for modular networks and its algorithmic applica-
tions. Physical Review E, 84(6):066106, 2011.
[3] F. McSherry. Spectral partitioning of ranodm graphs. IEEE Symposium on Foundations
of Computer Science, pages 529–537, 2001.
[4] Karl Rohe, Sourav Chatterjee, and Bin Yu. Spectral Clustering and the High-Dimensional
Stochastic Blockmodel. Annals of Statistics, 39(4):1878–1915, 2011.
[5] William Evans, Claire Kenyon, Yuval Peres, and Leonard J. Schulman. Broadcasting on
trees and the Ising model. Ann. Appl. Probab., 10(2):410–433, 2000.
[6] S. Janson and E. Mossel. Robust reconstruction on trees is determined by the second
eigenvalue. Annals of Probability, pages 2630–2649, 2004.
[7] Elchanan Mossel. Survey: information flow on trees. In Graphs, morphisms and statistical
physics, volume 63 of DIMACS Ser. Discrete Math. Theoret. Comput. Sci., pages 155–170.
Amer. Math. Soc., Providence, RI, 2004.
[8] A. Gerschenfeld and A. Monatanari. Reconstruction for models on random graphs. IEEE
Symposium on Foundations of Computer Science, pages 194–204, 2007.
[9] A. Coja-Oghlan. Graph partitioning via adaptive specral techniques. Combinatorics, Prob-
ability and Computing, pages 227–284, 2010.
[10] J. D. Biggins. Uniform convergence of martingales in the branching random walk. Ann.
Probab., 20(1):137–151, 1992.
[11] Russel Lyons and Yuval Peres. Probability on Trees and Networks. Cambridge University
Press, in preparation.
[12] Russell Lyons and Robin Pemantle. Random walk in a random environment and first-
passage percolation on trees. Ann. Probab., 20(1):125–136, 1992.
9
|
1806.03211 | 1 | 1806 | 2018-06-08T15:14:06 | The landscape of NeuroImage-ing research | [
"cs.SI",
"stat.AP"
] | As the field of neuroimaging grows, it can be difficult for scientists within the field to gain and maintain a detailed understanding of its ever-changing landscape. While collaboration and citation networks highlight important contributions within the field, the roles of and relations among specific areas of study can remain quite opaque. Here, we apply techniques from network science to map the landscape of neuroimaging research documented in the journal NeuroImage over the past decade. We create a network in which nodes represent research topics, and edges give the degree to which these topics tend to be covered in tandem. The network displays small-world architecture, with communities characterized by common imaging modalities and medical applications, and with bridges that integrate these distinct subfields. Using node-level analysis, we quantify the structural roles of individual topics within the neuroimaging landscape, and find high levels of clustering within the structural MRI subfield as well as increasing participation among topics related to psychiatry. The overall prevalence of a topic is unrelated to the prevalence of its neighbors, but the degree to which a topic becomes more or less popular over time is strongly related to changes in the prevalence of its neighbors. Broadly, this work presents a cohesive model for understanding the landscape of neuroimaging research across the field, in broad subfields, and within specific topic areas. | cs.SI | cs |
The Landscape of NeuroImage-ing Research
Jordan D. Dworkina,∗, Russell T. Shinoharaa, Danielle S. Bassettb,c,d,e
aDepartment of Biostatistics, Epidemiology, and Informatics, Perelman School of Medicine, University of Pennsylvania,
bDepartment of Bioengineering, School of Engineering and Applied Sciences, University of Pennsylvania, Philadelphia, PA,
Philadelphia, PA, USA
cDepartment of Physics & Astronomy, College of Arts and Sciences, University of Pennsylvania, Philadelphia, PA, USA
dDepartment of Electrical & Systems Engineering, School of Engineering and Applied Sciences, University of Pennsylvania,
eDepartment of Neurology, Perelman School of Medicine, University of Pennsylvania, Philadelphia, PA, USA
Philadelphia, PA, USA
USA
Abstract
As the field of neuroimaging grows, it can be difficult for scientists within the field to gain and maintain a
detailed understanding of its ever-changing landscape. While collaboration and citation networks highlight
important contributions within the field, the roles of and relations among specific areas of study can remain
quite opaque. Here, we apply techniques from network science to map the landscape of neuroimaging
research documented in the journal NeuroImage over the past decade. We create a network in which nodes
represent research topics, and edges give the degree to which these topics tend to be covered in tandem. The
network displays small-world architecture, with communities characterized by common imaging modalities
and medical applications, and with bridges that integrate these distinct subfields. Using node-level analysis,
we quantify the structural roles of individual topics within the neuroimaging landscape, and find high levels
of clustering within the structural MRI subfield as well as increasing participation among topics related to
psychiatry. The overall prevalence of a topic is unrelated to the prevalence of its neighbors, but the degree to
which a topic becomes more or less popular over time is strongly related to changes in the prevalence of its
neighbors. Broadly, this work presents a cohesive model for understanding the landscape of neuroimaging
research across the field, in broad subfields, and within specific topic areas.
Keywords: knowledge network, graph theory, neuroimaging
1. Introduction
In many fields of research, scientists develop intu-
itive knowledge of which topics are popular, which
might be on the horizon, and which tend to be stud-
ied in tandem. Yet each scientist's view of the re-
search landscape is based on a subsampling of the
full space, depending on the nature and extent of
their experiences in the field.
It is therefore of-
ten daunting for those who are new to a field to
construct even a superficial picture of the research
landscape. Moreover, even for those steeped in a
particular research area, it can be challenging to
∗Corresponding author:
Email address: [email protected]
(Jordan D. Dworkin)
imagine new connections that might be drawn be-
tween topics that historically have been thought of
as unrelated.
Recently, the emerging field of network science
has proven useful for gaining an understanding of
the broader space of scientific research. Previous
work on collaboration and citation networks has
provided insight into authors social patterns 1,2, im-
portant turning points in the literature 3, and the
large-scale structure of the scientific landscape 4,5.
But to gain an understanding of the particular land-
scape of a subfield, it is useful to consider topic
networks, which reflect the relationships between
scientific ideas. Here, the operationalization of sci-
ence as a set of interconnected ideas provides a
unique opportunity to study how research topics
are related within and across sub-disciplines, and
June 11, 2018
how these topics and their relations have grown and
changed over time.
As neuroimaging researchers, we sought to apply
this technique to literature from our field. In this
work, we apply graph theoretical approaches to a
network of the 100 most common topics covered in
the journal NeuroImage over the ten-year span from
2008 to 2017. We discuss the large-scale structure
of this network, the communities of research areas
that emerge from the topic relationships, the roles
of individual topics in shaping the network, and the
ways in which these roles have changed over time.
In sum, our study offers unique insights into the na-
ture and use of scientific research in contemporary
neuroimaging.
Methods
Data collection
For this study, we retrieved keywords and ab-
stracts from 8,547 articles published in NeuroIm-
age between 2008 and 2017. We used the keyword
sections to create a list of potential topics to be
searched for in the abstracts. We chose this tech-
nique over latent topic modeling for two reasons:
(1) it reflected scientists' explicit opinions as to the
words and phrases that constitute relevant scientific
topics, and (2) it allowed for the incorporation of
multi-word phrases. We manually curated the list
of topics to eliminate redundancy, unify variations,
and account for abbreviations (i.e., functional mri,
fMRI, functional magnetic resonance imaging, and
functional magnetic resonance images were all de-
noted as fmri ). Finally, we algorithmically edited
abstracts to reflect these changes.
Network construction
We calculated the prevalence of each potential
topic by finding the proportion of abstracts or key-
word sections containing the topic phrase within the
timespan of study. We used the 100 most common
topics between 2008 and 2017 as nodes to construct
the network, as this value represented the approx-
imate number at which the least prevalent words
occurred sufficiently often to produce a statistically
reliable signal. Edges were weighted by the φ co-
efficient for binary association 6, representing the
degree to which two topics tended to be discussed
in the same articles. We applied a threshold of pos-
itive significance to increase the interpretability of
the inter-topic links, and the network that resulted
from them.
Network structure
To quantify the structural features of the full net-
work, we sought to investigate the degree to which
topics tended to form tightly connected clusters, as
well as the overall level of integration of research
topics across the network.
Local topic clustering can be quantified using the
clustering coefficient, which is defined for a node
as the probability that two of its adjacent nodes are
connected to one another. The version of the clus-
tering coefficient used here is a measure of transi-
tivity defined as follows 7:
(cid:88)
cw
i =
1
si(ki − 1)
h,j∈N
2
(wij + wih)
aijaihahj,
where N is the set of all nodes, and si is the node's
strength, or the sum of all edge weights originating
at node i. The variable ki is the node's degree, or
the number of edges originating at node i. Finally,
wij is the edge weight connecting node i and node j,
and aij is 1 if wij > 0 and 0 otherwise. The overall
clustering behavior of the network can be obtained
by taking the average clustering coefficient over all
nodes 8.
Integration across the network can be quantified
using the characteristic path length of a net-
work. Path length is defined as the average short-
est path length between all node pairs 9. A version
of the path length for a weighted network can be
defined as follows:
(cid:88)
i(cid:54)=j
L =
1
n(n − 1)
dij,
where n is the number of nodes and dij is the short-
est weighted path length between nodes i and j.
Notably, these two measures of clustering coeffi-
cient and path length can be combined to obtain
the small-world propensity of a network, which
represents the degree to which a network shows sim-
ilar clustering to that of a lattice network, and sim-
ilar path length to that of a random network 10.
This metric is similar to the commonly used small-
world index 9, σ, but has been shown to be unbi-
ased even in the context of networks with varying
densities 10. Both measures broadly represent how
well a network can be characterized as having both
disparate clusters and strong between-cluster inte-
gration. The small-world propensity of a network
is defined as follows:
2
(cid:114)
φ = 1 −
∆2
C + ∆2
L
2
,
∆C =
Clattice − Cobserved
Clattice − Crandom
∆L =
Lobserved − Lrandom
Llattice − Lrandom
,
where
and
with C representing the network clustering coeffi-
cient, defined as the average of all node-specific cw
i
values.
Community detection
To determine how the network clustered into sub-
fields, we performed community detection using an
iterative generalized Louvain-like locally greedy al-
gorithm to maximize a common modularity quality
function 11. This technique implements a stochastic
optimization of the quality index value Q, in which
nodes are reassigned to modules one by one until
no reassignment can improve Q. By iterating this
optimization until convergence, one obtains a glob-
ally optimal set of community assignments, after
accounting for local maxima in the Q space.
The modularity value, Q, of a network repre-
sents the degree of separation between nodes in dif-
ferent groups 12,13. Intuitively, it quantifies how well
the network can be separated into non-overlapping
communities with many, strong within-group con-
nections and few, weak between-group connections.
For a weighted network, the modularity can be de-
fined as follows:
(cid:88)
(cid:104)
i,j∈N
(cid:105)
Qw =
1
lw
wij − sisj
lw
δmimj ,
where lw is the sum of all edge weights in the net-
work, and δmimj
is 1 if i = j and 0 otherwise.
Importantly, it is well known that the modularity
landscape suffers from a near degeneracy of optimal
solutions 14. We addressed this issue by using 100
iterations of the Louvain-like algorithm 11. From
the set of partitions obtained across these many it-
erations, we build a agreement matrix from which
we subsequently extract a consensus partition 15.
Node-level structure
We examined several additional structural fea-
tures at the level of network nodes.
In addition
to the previously mentioned measures of node de-
gree and node strength, we sought to understand
the ways in which nodes served as bridges between
distant topics, and the degree to which they main-
tained connections to topics outside of their own
cluster.
Bridging behavior can be measured using the be-
tweenness centrality, which is the proportion
of all shortest paths within the network that pass
through a given node 16. It is defined as follows:
(cid:88)
bi =
1
(n − 1)(n − 2)
h,j∈N ;h(cid:54)=j,h(cid:54)=i,j(cid:54)=i
ρ(i)
hj
ρhj
,
where ρhj is the number of shortest weighted paths
between node h and node j, and ρ(i)
hj is the number
of shortest weighted paths between node h and node
j that pass through node i.
The diversity of a topic's connections can be
measured by the participation coefficient, which
quantifies the degree to which the node's connec-
tions are evenly distributed across all modules (or
clusters) in a network 17. The participation coeffi-
cient tends towards 1 as connections bridge mod-
ules, and tend towards 0 as connections remain
largely intramodular. This metric is defined as fol-
lows:
i = 1 − (cid:88)
P w
(cid:18) si(m)
(cid:19)2
,
m∈M
si
where M is the set of modules, and si(m) is the sum
of edge weights from node i to other nodes within
module m.
To understand how these measures of a node's
topological role within the network might relate to
the topic's usage in the literature, we examined the
prevalence of each topic. We defined the prevalence
of a topic as the proportion of article abstracts and
keyword sections in which that topic appeared. To
further understand how one topic's popularity in
the literature might be related to the popularity of
topics to which it was closely related, we defined a
new measure, ξ, that quantified the prevalence of a
topic's neighbors. This measure was defined as:
(cid:88)
j(cid:54)=i
wijpj,
ξi =
1
si
3
where pj is the overall prevalence of node j, given
by the proportion of articles in which topic j ap-
pears within the time window covered by the given
network.
Temporal node structure
To examine changes in topic contributions over
time, we created a dynamic network using a sliding
window of ±6 months from a central month. Cen-
tral months ranged from July, 2008 to June, 2017
and data from January, 2008 to December, 2017
were included in the analyses. This dynamic net-
work was comprised of 109 individual networks with
overlapping time windows, each with the same 100
topics examined in the full static network.
To examine how topics' structural roles changed
over time, we obtained the temporal slopes of
each network measure described previously. These
slopes were calculated using linear regression on
a 'month' variable, and were standardized by the
magnitude of the measure over the full 10 year time
window. The formula is given below, for an exam-
ple measure, θ:
θj,t = α + βt + ,
∆θ
j =
β
θj
,
where θj,t is the θ value for node j at the network
at time t, ∆θ
j represents the slope of measure θ for
node j, and θj represents the value of θ for node j
within the context of the full network.
We additionally introduced a measure, Ω, that
quantified the degree to which a node is connected
to topics that are increasingly used in the literature.
It is given by the weighted average of the prevalence
slope values of a node's neighbors. It is defined as
follows:
(cid:88)
j(cid:54)=i
Ωi =
1
si
wij∆p
j ,
where ∆p
j is the prevalence slope of node j, given by
the percent change per month in the proportion of
articles in which topic j appears, according to the
same algorithm given above for calculating slope
measures.
Results
We collated data from 8,547 articles published
in NeuroImage between January, 2008 and Decem-
ber, 2017. Using phrases in the keyword sections
4
and their appearance within abstracts, we created
a network of research topics. Nodes in the network
represented the 100 most common topics over this
time span. Edges in the network represented the co-
occurrence of topics within articles, quantified by
the φ coefficient of association for binary variables 6.
We removed negative and non-significant correla-
tions, comprising roughly 63% of edges; these edges
had notably lower magnitude and less variability
(range: [-0.23,0.02], interquartile range: 0.02) than
the edges that remained (range:
in-
terquartile range: 0.06).
[0.02,0.59],
Structure of the topic network
To understand the overall structure of the neu-
roimaging landscape, we calculated the average
node clustering and characteristic path length for
the topic network. For comparison, we constructed
benchmark distributions from 100 random net-
works with equivalent size, degree distribution, and
strength distribution 19. We found that the topic
network had high levels of clustering (p < 0.01),
with a clustering coefficient 2.24 times the aver-
age value found in the null networks. Additionally,
the network had a higher characteristic path length
than the random networks (p < 0.01), with a path
length 1.31 times the average value of the null net-
works.
High values of the clustering coefficient and mid-
dling values of the characteristic path length can
be indicative of small-world architecture in a net-
work. We therefore tested for the presence of small-
worldness in the topic network using the small-
world propensity score 10. Its value was 0.72, which
was significantly higher than would be expected
from a random network (p < 0.01). These re-
sults indicate that research topics in neuroimaging
have small-world properties, with high local clus-
tering within, and bridges between, distinct sub-
fields. This structure may suggest a pathway for in-
novation, in which tight clusters advance and refine
existing relationships and ideas, and links between
clusters facilitate the creation of new connections
and future research opportunities 20.
Topic communities
We next sought to characterize neuroimaging
subfields as defined in a data-driven manner from
the architecture of the topic network. We per-
formed community detection using a Louvain-
like locally greedy algorithm to maximize a com-
Figure 1: Architecture of the topic network. Nodes (N = 100) reflect research topics and edges (E = 969) reflect the degree
of co-occurrence in abstracts and keyword sections. (A) The adjacency matrix sorted by topics' community affiliations, with
communities defined by their dominant topic category. (B) Visualization of the topic network using the Fruchterman-Reingold
layout 18, where node color represents community affiliation and node size represents prevalence in the literature.
mon modularity quality function 11. The mod-
ularity value of a network intuitively represents
the degree of separation between nodes in differ-
ent groups 12,13.
It quantifies how well the net-
work can be separated into non-overlapping com-
munities, with many within-group connections and
few between-group connections. Using this tech-
nique, we identified five communities, character-
ized by topics related to structural magnetic reso-
nance imaging (MRI), functional MRI, brain struc-
tures, Alzheimer's disease, and electroencephalog-
raphy (EEG), respectively (Figure 1, SI Interac-
tive).
From the community structure of this network,
we were able to identify familiar subfields. Specifi-
cally, broad divisions appeared based on imaging
modality, with structural MRI, functional MRI,
and EEG forming the bases of three separate com-
munities. Additionally, data collection and analysis
techniques that are commonly utilized within spe-
cific modalities tended to cluster within the modal-
ity's community. This was true of the terms seg-
mentation, tractography, and voxel-based morphom-
etry within the structural community. Similarly, it
was true of the terms resting state, motion, and
independent component analysis within the func-
tional community. And finally, it was also true of
the terms oscillations, event-related potential, and
synchronization within the EEG community. Intu-
itively, papers that bridge these communities might
combine imaging modalities, or might use the same
analysis technique on data acquired in two different
imaging modalities.
While these three communities separated from
one another along boundaries of the imaging modal-
ity used, the other two communities were more
characterized by the content of the neuroscientific
question being asked and answered. For exam-
ple, the largest community, instead of being clus-
tered around a modality, was instead focused on
physical structures and associated research topics.
This community contained various brain regions,
including the cortex, insula, cerebellum, thalamus,
and amygdala, as well as topics that tend to be
considered alongside specific regions, such as emo-
tion, depression, reward, and pain.
Interestingly,
the remaining community appeared to be heavily
focused on Alzheimer's disease research, including
topics like cognition, hippocampus, aging, atrophy,
and mild cognitive impairment. Perhaps unsurpris-
ingly, the closest neighbors of this community were
the structural MRI community, and the brain struc-
5
different subfields, yielding weak connections to a
wide range of other topics. Topics exemplary of
this pattern were brain, thalamus, and somatosen-
sory cortex. Topics on the other end of the spec-
trum, which had high values for average strength
per edge, included white matter, diffusion tensor
imaging, and fractional anisotropy.
To understand the trade-off between tight con-
nections within a subfield and broad use connec-
tions across the field, we investigated the rela-
tionship between topics' clustering coefficient and
participation coefficient. Somewhat unsurprisingly,
we observed a significant negative relationship be-
tween clustering coefficient and participation coef-
ficient (ρ = −0.66, p < 0.001), suggesting that
topics with highly related neighbors tend not to
have many inter-community connections. Highly
clustered topics included multiple sclerosis, cor-
pus collosum, and white matter, while highly par-
ticipatory topics included learning, hippocampus,
and schizophrenia (Table 1). The high cluster-
ing coefficient throughout the structural MRI com-
munity possibly reflects relative isolation of these
modalities, methods, and neuroscientific applica-
tions within the field.
Figure 3: Relationships between degree, betweenness
centrality, and average edge weight. Points represent
individual topics, and are scaled by topic prevalence and
colored by the topic's strength per edge.
6
Figure 2: Strength of cross-community connections.
The distributions of non-zero edge weights for every pair of
topic communities. The colors of each boxplot show the pair
of communities being represented.
tures community (Figure 2).
Structural roles of individual topics
Overall structural roles
To investigate the roles of individual topics in
shaping the overall structure of the network, we ex-
amined the topics' general connectivity (degree and
strength), their role in creating efficient pathways
between clusters (betweenness centrality), their
level of local clustering (clustering coefficient), and
the degree to which they have relationships with
topics outside of their own community (participa-
tion). See SI Interactive to explore the values of
these metrics for each node.
Interestingly, we found that betweenness central-
ity and degree were significantly related (ρ = 0.49,
p < 0.001) but betweenness centrality and strength
were not (ρ = 0.18, p = 0.08). These relation-
ships suggest that topics that serve as bridges con-
necting disparate communities tended to have many
somewhat weak connections. To explore further, we
calculated each topic's average strength per edge.
This value was significantly negatively related to
betweenness centrality (ρ = −0.37, p < 0.001),
further supporting the previous finding (Figure 3).
These results are consistent with the presence of
broad topics that are covered often and in many
Rank Prevalence
Degree
Betweenness
Clustering
Participation
1
2
3
4
5
6
7
8
9
10
DTI
Brain
fMRI
Cortex
Human
MRI
BOLD
EEG
Development
White matter Dorso. pf cortex
Memory
Cortex
fMRI
Prefrontal cortex Thalamus
MRI
Brain
Hippocampus
Gray matter
Thalamus
Brain
Somato. cortex Multiple sclerosis
Corpus callosum
White matter
Frac. anisotropy
Myelin
Diffusion
DWI
Emotion
fMRI
Motion
Cortex
Plasticity
Func. connec.
Depression
Dorso. pf cortex Brain development DM network
Schizophrenia
Learning
Hippocampus
Rat
Stroke
Plasticity
Epilepsy
Medial temp. lobe
Memory
Insula
Table 1: Rankings of topics' overall structural measures.
Rank ∆ Prevalence
∆ Degree
∆ Betweenness
∆ Clustering
∆ Participation
1
2
3
4
5
6
7
8
9
10
Dyn. caus. modeling
Basal ganglia
Speech
Inf. front. gyrus
Reading
DM network
Resting state
DWI
Func. connec.
Oscillations
Brain development Reliability
Plasticity
TMS
Auditory cortex
Motion
Brain development
Cerebellum
Anxiety
Alzheimer's disease
Plasticity
Cerebral cortex
Somato. cortex
CBF
Children
DWI
Synchronization
Speech
Longitudinal
EEG
Reading
Coherence
Corpus callosum Development
Auditory cortex
ICA
Myelin
DTI
Myelin
Emotion
Depression
Pain
Orbito. cortex
Anxiety
Ant. cing. cortex
Auditory
Multiple sclerosis Amygdala
Segmentation
Hemo. response
Table 2: Rankings of topics' increases in structural measures over time.
Temporal changes in structural roles
Though the contributions of individual nodes to
the topic network demonstrate the manner in which
topics relate to the field as a whole, these metrics
only capture a static snapshot of highly dynamic
relationships. As such, it was of interest to inves-
tigate the dynamic properties of the topic features
described in the previous section, in order to better
understand how changes in the field may emerge
over time. To do so, we created a dynamic network
using a ±6-month sliding window that captured the
network structure at each central month between
July, 2008 and June, 2017. With the ±6-month
window, data between January, 2008 and Decem-
ber, 2017 were incorporated into the network.
Dynamic properties of topics were examined by
obtaining the slope of each graph metric, and stan-
dardizing by the overall metric obtained in the pre-
vious section. This calculation yields an estimate of
a topic's percent increase or decrease in each mea-
sure month-over-month, and can reveal whether
topics' roles within the field have been changing
over time. The term connectome was removed for
the following analyses because it was not mentioned
in the literature until 2010, making its trajectories
strong outliers for almost all measures. Since the
metrics that accompanied this topic's entry into the
field are still of qualitative interest, the data can be
examined in SI Interactive.
As with their absolute magnitudes, we fount that
topics' temporal slopes of betweenness centrality
and degree were significantly related (ρ = 0.58,
p < 0.001). However, unlike their absolute magni-
tudes, slopes of betweenness centrality and strength
were also significantly related (ρ = 0.29, p < 0.01).
This distinction suggests that although topics with
the highest betweenness centrality tended to have
many weak connections, topics' changes in between-
ness centrality were positively related to both the
number and strength of their connections. Top-
ics showing increases in betweenness, degree, and
strength over time included speech,
longitudinal,
and reading. Topics that showed decreases in these
metrics included dopamine, cerebral blood flow, and
vision.
While the trade-off between static clustering co-
efficient and participation coefficient reflects over-
all isolation or integration in the past ten years,
7
the changes in these measures over time may bet-
ter reflect how a topic will relate to the field going
forward. Here, the slopes of the clustering coeffi-
cient and participation coefficient were negatively
related (ρ = −0.64, p < 0.001), suggesting that as
topics' become more integrated into a subfield, the
strength of their relationships with topics outside of
that subfield tends to fade. Topics that have shown
increasing clustering over time included plasticity,
development, and multiple sclerosis, while topics
with increasing participation included DTI, emo-
tion, and depression (Table 2). For this measure,
structural MRI topics, while generally high in over-
all clustering, were found to be moving in a variety
of directions. Specifically, topics related to tractog-
raphy (e.g., DTI, myelin) showed increasing partic-
ipation, suggesting increasing integration into the
field, while more traditional structural topics (e.g.,
segmentation, multiple sclerosis) showed increasing
clustering, suggesting further isolation.
Structural foundations of topic prevalence
Figure 4: Illustration of the relationships between
topics' prevalence and the prevalence of their neigh-
bors. Node size represents prevalence, reflecting the finding
that topics do not tend to be more strongly connected to
topics with similar overall prevalence. Dotted lines repre-
sent changes in prevalence over time, reflecting the finding
that topics tend to be more strongly connected to topics with
similar prevalence change.
Overall topic prevalence
Temporal changes in topic prevalence
Of particular interest was the relationship be-
tween graph measures and topics' popularity in the
literature, operationalized by the proportion of arti-
cles in which they appeared. In addition to consid-
ering the structural features described in the pre-
vious section, for this analysis we defined a new
variable, ξ, which measured the degree to which a
topic was a member of a "rich club" of commonly
discussed topics. As opposed to the typical rich
club coefficient that measures the edge strengths
of each node's neighbors, this metric measured the
prevalence of each node's neighbors. We then re-
gressed the log of topic prevalence on betweenness
centrality, degree, strength per edge, clustering co-
efficient, participation coefficient, and ξ. We found
that degree (t93 = 5.29, p < 0.001), strength per
edge (t93 = 4.27, p < 0.001), and clustering co-
efficient (t93 = −3.45, p < 0.001) were associ-
ated with topic prevalence. These relationships
suggest that, accounting for the other variables,
topic prevalence tends to be associated with hav-
ing more, stronger, and more diverse connections.
Interestingly, ξ was not associated with prevalence
(t93 = 0.72, p = 0.47), indicating that topics do not
tend to be preferably connected to similarly popu-
lar topics.
We next sought to investigate whether changes in
topics' structural roles were associated with changes
in their prevalence in the literature. Similar to the
"prevalence-rich club" measure just described, for
this analysis we defined a new variable, Ω, that
measured the degree to which a topic tended to
be related to topics with increasing or decreasing
prevalence in the literature. We then regressed the
slope of topic prevalence on Ω and the slopes of
betweenness centrality, degree, strength per edge,
clustering coefficient, and participation coefficient.
We found that slopes of degree (t92 = 3.30, p =
0.001) and participation coefficient (t93 = −2.28,
p = 0.03) were significantly associated with the
slope of topic prevalence. These relationships sug-
gest that topics tend to gain more connections as
they become more commonly discussed in the liter-
ature, but these connections tend to be limited to
the topic's own subfield.
Interestingly, Ω was strongly associated with
changes in topic prevalence (t93 = 7.61, p < 0.001),
indicating that although a topic's overall prevalence
is not related to the prevalence of its neighbors,
changes in a topic's prevalence are highly related
to changes in the prevalence of its neighbors (Fig-
ure 4). This pattern is best exemplified by the
8
Figure 5: Changing prevalence of neuroimaging topics. (A) The relationship between topics' changes in prevalence,
along the y-axis, and the changes in prevalence of their neighbors, along the x-axis. (B) Examples of prevalence trajectories
for five exemplary topics with notable increases or decreases in prevalence over the course of the study.
trio of topics, functional connectivity, resting state,
and default mode network. Certain topics' deviance
from the model fit also suggests that – based on
their role in the network – they might be currently
undervalued in the literature. Two such topics, in-
dependent component analysis and synchronization,
were predicted to show greater increases in preva-
lence than was actually observed (Figure 5).
Discussion
Neuroimaging is an exciting, broad, and rapidly
changing field. These features make it a rich terri-
tory for new ideas and innovative connections be-
tween existing topics, but also contribute to a com-
plex and dynamic landscape of research.
In this
study, we set out to examine the structure of neu-
roimaging research over the last ten years, and to
describe the changing roles of specific areas of study.
Structure of the topic network
A network of research topics was constructed us-
ing ten years of NeuroImage articles, and was found
to have features uncharacteristic of a random net-
work. Specifically, the network had higher levels
of clustering and higher path length than a random
network. As a result of the large increase in cluster-
ing and moderate increase in path length compared
to a random network, the neuroimaging landscape
was found to show a high degree of small-worldness.
This feature signifies local clustering within distinct
subfields, potentially facilitating iteration and ad-
vancement within existing topic relationships, and
sparse connections between subfields, potentially
facilitating innovation and the creation of new con-
nections 21,22,20. This small-world structure is con-
sistent with the networks described in studies of
co-authorship and citation 4,5 at larger scales of sci-
entific research, and interestingly also resembles the
structure found in many brain networks 23.
Topic communities
While examinations of the network structure of
scientific research at a larger scale have revealed in-
terdisciplinary communities of research scientists 24
and topics 20, it remains of interest to gain a bet-
ter understanding of topic communities at the scale
of individual fields. At the smaller scale of the
neuroimaging topic network, communities appear
to largely agree with the subfields that might be
expected by a scientist, in that they are divided
along the major lines of structural MRI, functional
MRI, and EEG/MEG research (Figure 1, SI In-
teractive). Yet while potentially unsurprising, the
strong divisions across imaging modalities suggest
9
that there might be opportunities for further in-
sight and innovation through the joint investiga-
tion of several modalities within studies.
Indeed,
researchers in the field have recently argued that
while some specialization is beneficial, experience
across modalities is important both professionally
and scientifically 25. In some ways, this trade-off re-
flects a small-scale version of the debate surround-
ing interdisciplinarity across scientific fields 26,27, in
which some believe better science arises from spe-
cialization 28 and others believe cross-disciplinary
work is vital for innovation 29.
One additional and perhaps surprising finding
was the presence of a community that was almost
exclusively related to research on Alzheimer's dis-
ease. The existence of this community is potentially
a reflection of the growing burden of Alzheimer's
disease 30, which has been met with increases in
research efforts 31 and neuroimaging resources 32.
While the prevalence of these topics within neu-
roimaging appears to indicate a strong response
within the field to the pressing need for research
in this area, future work could investigate how the
characteristics of this sub-field influence the trans-
lation of neuroimaging findings to clinical research
and practice. This question could potentially be
pursued by quantifying the ways in which topic re-
lationships relate to future citation patterns.
Structural roles of individual topics
In addition to quantifying the overall landscape
of neuroimaging, we sought to gain a better un-
derstanding of how individual topics contributed to
its structure. The degree to which topics bridged
gaps between distinct clusters (betweenness central-
ity) was significantly associated with the number of
connections they had to other topics (degree). This
pattern of relations is consistent with the presence
of "hub nodes," which have many diverse connec-
tions across the network. Yet, interestingly, be-
tweenness centrality was not associated with the
strength of these connections, suggesting that hub
nodes tended to have relatively weak relationships
with the topics that they were connected to. Topics
that fit this pattern tended to be very broad, such
as brain and cortex, but some more specific topics
also served to connect seemingly distant subfields,
like functional connectivity, plasticity, and motion
(Table 1).
While patterns in overall betweenness centrality
seem to be strongly related to the breadth or spe-
cialization of topics, similarly interesting relation-
10
ships between degree, betweenness centrality, and
strength held when looking at their percent change
over time within nodes. For these measures, both
change in degree and change in strength were posi-
tively associated with change in betweenness cen-
trality, suggesting that the associations observed
between the overall measures may not be strictly
reflective of the inherent nature of the topics, but
may instead be tapping into the way topics' struc-
tural roles develop and change over time. Addition-
ally, topics that followed this patterns of increas-
ing betweenness centrality and degree over time did
not show much overlap with the broad topics that
had high overall levels in these measures, and were
instead more specific applications like speech and
reading (Table 2).
In terms of the relationships that topics formed
with other topics, there seemed to be a trade-off be-
tween strong integration in a specific subfield (clus-
tering) and having diverse connections across com-
munities (participation), as evidenced by a signif-
icant negative association between the two mea-
sures. Topics related to structural MRI tended
to be highly clustered, relating very strongly to
other topics in that area and rarely forming asso-
ciations with topics from other subfields. In fact,
seven of the ten most clustered topics were directly
related to white matter tracts or diffusion imag-
ing. Topics that had diverse connections across
subfields were more variable, but tended to be re-
search applications, as opposed to modalities, re-
gions, or methods. Highly participatory topics in-
cluded schizophrenia, learning, stroke, epilepsy, and
memory (Table 1).
The negative association between clustering and
participation held for topics' changes in clustering
and changes in participation, again suggesting that
the overall associations may tap into the manner
in which structural roles change alongside topics'
changing roles in the literature.
Interestingly, al-
though topics related to structural MRI were some
of the most highly clustered overall, different topics
within this subfield seem to be moving in different
directions over time. Multiple sclerosis and segmen-
tation, for example, showed increasing clustering,
while myelin and DTI showed increasing participa-
tion. Applications related to psychiatry also seem
to be developing more diverse associations across
the neuroimaging landscape, with emotion, depres-
sion, and anxiety all showing relative increases in
participation (Table 2).
Structural foundations of topic prevalence
Although the structural roles of topics within the
network can provide valuable information about
how ideas and subfields interact and change, the
aspect that is potentially the most relevant to re-
searchers in the field is the frequency with which
topics are discussed in the literature. As such, we
sought to understand how a topic's structural fea-
tures in the neuroimaging network might be asso-
ciated with its overall prevalence in the literature,
and how changes in those features might correspond
to changes in its prevalence.
Over the past ten years, we found that a topic's
overall prevalence in the literature, defined as the
proportion of keyword sections and abstracts in
which it was mentioned, was positively associated
with its total number of connections and the aver-
age strength of its connections, and negatively as-
sociated with the degree of local clustering within
its neighboring topics. These results suggest that
common topics tend to have many relatively strong
connections to other topics, and that these neigh-
boring topics tend not to be highly related to each
other.
Interestingly, highly prevalent topics were
not more likely to be connected to other prevalent
topics, and therefore little evidence was found for a
prevalence-based rich club.
Potentially more interesting than the structural
foundations of overall prevalence are the structural
foundations of changes in topic prevalence. In other
words, we were curious what changes in network
features might be associated with changes in how
commonly a topic was discussed in the literature.
Here, we again found that degree was relevant, with
changes in degree showing a positive association
with changes in prevalence. Importantly, this find-
ing demonstrates that not only are popular topics
also well-connected, but that becoming more well-
connected is associated with becoming more pop-
ular. Additionally, changes in participation were
negatively associated with changes in prevalence,
suggesting that as a topic becomes more prevalent,
its connections tend to become more localized to
the topic's own community.
Interestingly, the degree to which a topic's neigh-
bors increased or decreased in prevalence was
strongly associated with the degree to which that
topic itself increased or decreased in prevalence.
This pattern of relations is perhaps unsurprising, as
one might expect the fortunes of related topics to be
linked. Yet the pattern is also potentially quite use-
ful, as it provides a method for determining which
11
topics are out of sync with their neighbors, and
therefore might have recently been superseded by
other similar topics or might be ripe areas for fur-
ther research. One example of this phenomenon
is independent component analysis, which has not
seen an increase in prevalence in recent years de-
spite the rise in popularity of many topics with
which it is strongly connected (Figure 5).
Conclusion
As science advances, collaboration grows, and the
boundaries between research areas blur, it will be
increasingly difficult to form and maintain a com-
plete picture of the landscape of any given field.
As these changes occur, formal quantitative stud-
ies of scientific research offer an opportunity to
better synthesize and understand relationships be-
tween existing and new domains of inquiry. Here,
we used network science to gain insight into the
landscape of neuroimaging research in a ten-year
span between 2008 and 2017, and revealed pre-
viously unknown structural features that emerge
from published literature. We found the network
to have small-world properties, with communities
centered largely around distinct imaging modali-
ties, and bridges between them made up of broadly
relevant applications and methods.
We additionally quantified the structural contri-
butions of individual nodes, finding high clustering
among topics related to structural MRI and increas-
ing participation among topics related to psychia-
try. Finally, we discovered that the degree to which
topics see increasing or decreasing prevalence in the
literature is strongly associated with increases or
decreases in the prevalence of their neighbors in the
network – a relationship that may help reveal top-
ics that are currently undervalued or recently super-
seded. Overall, this work sought to characterize the
landscape of neuroimaging research at the current
moment, and to inform researchers of the structural
and literary trends that form the foundations of the
field.
Acknowledgements
The authors would like to thank Lili Dworkin
and Ipek Oguz for advice on data collection and
analysis. RTS would like to acknowledge support
from the National Institute of Neurological Disor-
ders and Stroke (R01 NS085211 & R01 NS060910).
DSB would like to acknowledge support from the
John D. and Catherine T. MacArthur Founda-
tion, the Alfred P. Sloan Foundation, the ISI
Foundation, the Paul Allen Foundation, the Army
Research Office (DCIST-W911NF-17-2-0181), and
the National Science Foundation CAREER (PHY-
1554488). The content is solely the responsibility of
the authors and does not necessarily represent the
official views of any of the funding agencies.
Supporting Information
SI Interactive
A fully interactive version of
the network
described in this paper can be accessed at
https://jdwor.shinyapps.io/NeuroimagingLandscape/
using the password: NeuroIm10.
References
[1] M. E. J. Newman. Clustering and preferential at-
tachment in growing networks. Physical Review E, 64
(2), July 2001. ISSN 1063-651X, 1095-3787. doi: 10.
1103/PhysRevE.64.025102. URL https://link.aps.
org/doi/10.1103/PhysRevE.64.025102.
The
[2] Stuart R. Borrett, James Moody, and Achim Edel-
mann.
rise of Network Ecology: Maps
of the topic diversity and scientific collaboration.
Ecological Modelling, 293:111–127, December 2014.
ISSN 03043800.
10.1016/j.ecolmodel.2014.
02.019.
URL http://linkinghub.elsevier.com/
retrieve/pii/S0304380014001136.
doi:
[3] C. Chen. Searching for intellectual turning points: Pro-
gressive knowledge domain visualization. Proceedings of
the National Academy of Sciences, 101(Supplement 1):
5303–5310, April 2004. ISSN 0027-8424, 1091-6490. doi:
10.1073/pnas.0307513100. URL http://www.pnas.org/
cgi/doi/10.1073/pnas.0307513100.
[4] M. E. J. Newman. The structure of scientific collabora-
tion networks. Proceedings of the National Academy of
Sciences, 98(2):404–409, January 2001. ISSN 00278424.
doi: 10.1073/pnas.021544898. URL \left(.
[5] Matthew L. Wallace, Vincent Larivire, and Yves Gin-
gras. A small world of citations? The influence of
collaboration networks on citation practices. PLoS
ONE, 7(3):e33339, March 2012. ISSN 1932-6203. doi:
10.1371/journal.pone.0033339. URL http://dx.plos.
org/10.1371/journal.pone.0033339.
[6] Ernest C. Davenport and Nader A. El-Sanhurry.
Phi/Phimax: Review and synthesis. Educational and
Psychological Measurement, 51(4):821–828, December
1991.
10.1177/
001316449105100403. URL http://journals.sagepub.
com/doi/10.1177/001316449105100403.
ISSN 0013-1644, 1552-3888.
doi:
[7] A. Barrat, M. Barthelemy, R. Pastor-Satorras,
The architecture of complex
and A. Vespignani.
weighted networks.
Proceedings of
the National
Academy of Sciences, 101(11):3747–3752, March 2004.
ISSN 0027-8424, 1091-6490.
10.1073/pnas.
doi:
12
0400087101. URL http://www.pnas.org/cgi/doi/10.
1073/pnas.0400087101.
[8] Mikail Rubinov and Olaf Sporns. Complex network
measures of brain connectivity: Uses and interpre-
NeuroImage, 52(3):1059–1069, September
tations.
2010.
doi: 10.1016/j.neuroimage.
2009.10.003. URL http://linkinghub.elsevier.com/
retrieve/pii/S105381190901074X.
ISSN 10538119.
[9] D. J. Watts and S. H. Strogatz. Collective dynamics
of 'small-world' networks. Nature, 393(6684):440–442,
June 1998. ISSN 0028-0836. doi: 10.1038/30918.
[10] Sarah Feldt Muldoon, Eric W. Bridgeford, and
Small-world propensity and
Danielle S. Bassett.
weighted brain networks. Scientific Reports, 6(1), April
2016. ISSN 2045-2322. doi: 10.1038/srep22057. URL
http://www.nature.com/articles/srep22057.
[11] L.G.S. Jeub, M. Bazzi, I.S. Jutla, and P.J. Mucha.
A generalized Louvain method for community detec-
tion implemented in MATLAB, 2011. URL http:
//netwiki.amath.unc.edu/GenLouvain.
[12] M. E. J. Newman and M. Girvan. Finding and evalu-
ating community structure in networks. Physical Re-
view E, 69(2), February 2004. ISSN 1539-3755, 1550-
2376. doi: 10.1103/PhysRevE.69.026113. URL https:
//link.aps.org/doi/10.1103/PhysRevE.69.026113.
[13] M. E. J. Newman. Modularity and community
structure in networks. Proceedings of the National
Academy of Sciences, 103(23):8577–8582, June 2006.
ISSN 0027-8424, 1091-6490.
10.1073/pnas.
0601602103. URL http://www.pnas.org/cgi/doi/10.
1073/pnas.0601602103.
doi:
[14] Benjamin H. Good, Yves-Alexandre de Montjoye, and
Aaron Clauset. Performance of modularity maximiza-
tion in practical contexts. Physical Review E, 81(4),
April 2010.
doi: 10.
1103/PhysRevE.81.046106. URL https://link.aps.
org/doi/10.1103/PhysRevE.81.046106.
ISSN 1539-3755, 1550-2376.
[15] Andrea Lancichinetti and Santo Fortunato. Consensus
clustering in complex networks. Scientific Reports, 2
(1), December 2012.
ISSN 2045-2322. doi: 10.1038/
srep00336. URL http://www.nature.com/articles/
srep00336.
[16] Linton C. Freeman. Centrality in social networks
conceptual clarification.
Social Networks, 1(3):215–
239, January 1978.
10.
1016/0378-8733(78)90021-7. URL http://linkinghub.
elsevier.com/retrieve/pii/0378873378900217.
ISSN 03788733.
doi:
[17] Roger Guimer and Lus A. Nunes Amaral. Functional
cartography of complex metabolic networks. Nature,
433(7028):895–900, February 2005.
ISSN 0028-0836,
1476-4687.
doi: 10.1038/nature03288. URL http:
//www.nature.com/articles/nature03288.
[18] Thomas M. J. Fruchterman and Edward M. Reingold.
Graph drawing by force-directed placement. Software:
Practice and Experience, 21(11):1129–1164, November
1991.
ISSN 00380644, 1097024X. doi: 10.1002/spe.
4380211102. URL http://doi.wiley.com/10.1002/
spe.4380211102.
[19] Mikail Rubinov and Olaf Sporns. Weight-conserving
characterization of complex functional brain net-
works.
NeuroImage, 56(4):2068–2079, June 2011.
ISSN 10538119.
10.1016/j.neuroimage.2011.
03.069.
URL http://linkinghub.elsevier.com/
retrieve/pii/S105381191100348X.
doi:
[20] J. D. Dworkin, R. T. Shinohara, and D. S. Bassett.
roimaging Initiative, 2004 to 2014. Alzheimer's & De-
mentia, 11(7):865–884, July 2015. ISSN 15525260. doi:
10.1016/j.jalz.2015.04.005. URL http://linkinghub.
elsevier.com/retrieve/pii/S1552526015001715.
The emergent integrated network structure of scientific
research. ArXiv e-prints, April 2018.
[21] M. E. J. Newman. Coauthorship networks and pat-
terns of scientific collaboration. Proceedings of the Na-
tional Academy of Sciences, 101(Supplement 1):5200–
5205, April 2004.
ISSN 0027-8424, 1091-6490. doi:
10.1073/pnas.0307545100. URL http://www.pnas.org/
cgi/doi/10.1073/pnas.0307545100.
[22] Caroline S. Wagner and Loet Leydesdorff. Network
structure, self-organization, and the growth of interna-
tional collaboration in science. Research Policy, 34(10):
1608–1618, December 2005. ISSN 00487333. doi: 10.
1016/j.respol.2005.08.002. URL http://linkinghub.
elsevier.com/retrieve/pii/S0048733305001745.
[23] Danielle Smith Bassett and Ed Bullmore.
Small-
world brain networks. The Neuroscientist, 12(6):512–
523, 2006.
doi: 10.1177/1073858406293182. URL
https://doi.org/10.1177/1073858406293182. PMID:
17079517.
[24] Borut Luar, Zoran Levnaji, Janez Povh, and Matja
Perc. Community structure and the evolution of inter-
disciplinarity in Slovenia's scientific collaboration net-
work. PLoS ONE, 9(4):e94429, April 2014.
ISSN
1932-6203. doi: 10.1371/journal.pone.0094429. URL
http://dx.plos.org/10.1371/journal.pone.0094429.
Neuroscience: A head start for
brain imaging. Nature, 503(7474):153–155, Novem-
ber 2013.
10.
URL http://www.nature.com/
1038/nj7474-153a.
doifinder/10.1038/nj7474-153a.
ISSN 0028-0836, 1476-4687.
[25] Virginia Gewin.
doi:
[26] D. Rhoten. Risks and rewards of an interdisciplinary
research path. Science, 306(5704):2046–2046, December
2004. ISSN 0036-8075, 1095-9203. doi: 10.1126/science.
1103628. URL http://www.sciencemag.org/cgi/doi/
10.1126/science.1103628.
[27] Jerry A. Jacobs and Scott Frickel. Interdisciplinarity:
Annual Review of Sociol-
A critical assessment.
ogy, 35(1):43–65, August 2009.
ISSN 0360-0572,
1545-2115. doi: 10.1146/annurev-soc-070308-115954.
URL
http://www.annualreviews.org/doi/10.1146/
annurev-soc-070308-115954.
[28] Lennard J Davis. A grand unified theory of interdisci-
plinarity. Chronicles of Higher Education, 53(40):B9,
2007.
[29] Facilitating
interdisciplinary research.
National
Academies Press, Washington, D.C., April 2004.
ISBN 978-0-309-09435-1. URL http://www.nap.edu/
catalog/11153. DOI: 10.17226/11153.
[30] Oscar L. Lopez. The growing burden of Alzheimer's
disease. The American Journal of Managed Care, 17
Suppl 13:S339–345, November 2011. ISSN 1936-2692.
[31] Michael E. Hughes, John Peeler, John B. Hogenesch,
and John Q. Trojanowski. The Growth and Impact
of Alzheimer Disease Centers as Measured by Social
Network Analysis. JAMA Neurology, 71(4):412, April
2014.
10.1001/jamaneurol.
2013.6225. URL http://archneur.jamanetwork.com/
article.aspx?doi=10.1001/jamaneurol.2013.6225.
ISSN 2168-6149.
doi:
[32] Michael W. Weiner, Dallas P. Veitch, Paul S. Aisen,
Laurel A. Beckett, Nigel J. Cairns, Jesse Cedarbaum,
Michael C. Donohue, Robert C. Green, Danielle Har-
vey, Clifford R. Jack, William Jagust, John C. Morris,
Ronald C. Petersen, Andrew J. Saykin, Leslie Shaw,
Paul M. Thompson, Arthur W. Toga, and John Q.
Trojanowski. Impact of the Alzheimer's Disease Neu-
13
|
1904.04558 | 1 | 1904 | 2019-04-09T09:23:33 | Enabling the Social Internet of Things and Social Cloud | [
"cs.SI"
] | Social Internet of Things are changing what social patterns can be, and will bring unprecedented online and offline social experiences. Social cloud is an improvement over social network in order to cooperatively provide computing facilities through social interactions. Both of these two field needs more research efforts to have a generic or unified supporting architecture, in order to integrate with various involved technologies. These two paradigms are both related to Social Networks, Cloud Computing, and Internet of Things. Therefore, we have reasons to believe that they have many potentials to support each other, and we predict that the two will be merged in one way or another. | cs.SI | cs | I
Enabling Social Internet of Things and
Social Cloud
Weishan Zhang 1, Qun Jin 2, Didier El Baz 3
1 Department of Software Engineering, China University of Petroleum
No.66 Changjiang West Road, Qingdao, China. 266580
2 Department of Human Informatics and Cognitive Sciences, Waseda University, Japan
3 LAAS-CNRS, 7 avenue du Colonel Roche 31077, Toulouse Cedex 4, France
Abstract -- Social Internet of Things are changing what social patterns can be, and will bring unprecedented
online and offline social experiences. Social cloud is an improvement over social network in order to
cooperatively provide computing facilities through social interactions. Both of these two field needs more
research efforts to have a generic or unified supporting architecture, in order to integrate with various involved
technologies. These two paradigms are both related to Social Networks, Cloud Computing, and Internet of
Things. Therefore, we have reasons to believe that they have many potentials to support each other, and we
predict that the two will be merged in one way or another.
Index Terms -- Social Internet of Things, Social Cloud, Social network, Cloud computing
1 INTRODUCTION
With the development of Internet of Things (IoT), people begin to live in a cyber-physical-social
hyper space. The Internet of Things are changing dramatically what it means to be social. The very
obvious examples are smart phones, tablets, laptops and all other wearable devices are connecting
people directly or indirectly through different applications, like Twitter1, Facebook2, WeChat3, and
other social network applications. Everyday objects and people are connected with each other to
establish social relationships and form a social network, which is called Social Internet of Things
(SIoT) [1]. SIoT will bring unprecedented online and offline social experiences. SIoT is the
interconnection of different services, objects and people where participants can benefit from involving
in this network. For example, smart transportations that involving vehicle networks, drivers, smart
phones, and other devices may make traffic congestion as less as possible where traffic information
are timely disseminated at real time. As the next evolutionary step of the internet of things, SIoT is
expected to enhance performance of object discovery, service composition, and evaluation of
trustworthiness of objects [2]. However, even there are some projects that are dedicated to provide
SIoT platforms (e.g the project Social- IoT 4 and INPUT5), it is noted that SIoT enabling technologies
need more efforts in different directions including [2]:
- Definition of inter-object relationships, like semanticrepresentational models for social
relationships, solutions to autonomously sense other objects and exchange information.
- Network analysis algorithms tailored for SIoT after the establishment of a social network.
- Architecture tailored for SIoT that allows for establishment and exploitation of social
relationships, resources and services.
A closely related field with respect to SIoT is the "Social Cloud (SoC)" [3] [4], which is an
improvement over social network in order to cooperatively provide computing facilitiesthrough social
interactions. SoC is playing important roles in different areas, e.g. serving as shared infrastructure
for software crowdsourcing [5]. Another interesting example is a SoC supported approach for helping
to alleviate communication breakdowns led by asymmetries in media and time preferences among
different ages of family members [6]. SoC and SIoT can be integrated together to make use of
advantages of both paradigms. Novel data fusion algorithms, artificial intelligence techniques can be
used to realize automated decision making in SoC in order to support better communication and
collaboration among people and things in SIoT. The combination of SoC and SIoT can realize
ubiquitous sensing and computing beyond the capability of individual of people or things, and
stimulate innovations in various fields.
2 WHAT DO WE COVER IN THIS SPECIAL ISSUE?
This special issue presents most recent research on SoC and SIoT. We have three papers on various
research issues of SIoT in which one paper presents their work for integrating SoC with SIoT. There is
one paper that presents a review of SoC research. SIoT can be used to enable the integration of a
variety of devices into people daily life, being empowered by the interconnectivity and the FOAF
(Friend of a Friend) feature offered by Social Networking Services (SNS). As a promising paradigm,
SIoT can provide an infrastructure to study and integrate the intelligence mechanisms required to
enhance services adaptability and user-friendliness. In their article "Social Cloud-based Cognitive
Reasoning for Task-oriented Recommendation in the Social Internet of Things", Dina Hussein, Son N.
Han, Gyu Myoung Lee and Noel Crespi from Institut Mines-Telecom and Liverpool John Moores
University describe their approach to the integration of cognitive reasoning into SIoT for providing
recommendation ofquotidian tasks in smart homes, in which reasoning about both physical and social
aspects of context is required to achieve situation characterization. They propose and developan
intelligent recommendation framework as a service built on top of SoC, by utilizing the reasoning
mechanism on context elements represented by ontologies. ThingsChat, a proof-of-concept prototype,
is built and explained with experiment results, which demonstrates improvement in adaptability of
recommendation results to users situations. Implementations of the SIoT model envision cyber
counterparts of physical objects are called social virtual objects (SVOs), virtualized in the cloud.
However, most of the IoT devices do not have the processing and communication capabilities required
to create and manage social relationships. The paper "Social Virtual Objects in the Edge Cloud: a key
component for distributed IoT applications" by I. Farris, R. Girau, L. Militano, M. Nitti, L. Atzori, A.
Iera and G. Morabito, investigates how to address this issue by exploiting computing resources in the
edge of a network to hostSVOs of the SIoT. Edge cloud technologies is used for the implementation of
their SIoT platform, which is expected to reduce latency, to increase scalability, and to ease
management of physical node mobility. Through experimental simulations, they investigate the
frequency of each type of message exchanged under different inter-cloud migrations of processes
associated to virtual objects, and assess the latency reduction w.r.t. conventional cloud solutions.
There have been three types of efforts to enable SoC since it was proposed in 2010 [3], namely Social
Compute Cloud supports sharing of compute resources between friends, Social Storage Cloud
supports storage resource sharing, allowing users to store data on friends resources, Social Content
Delivery Network (S-CDN) provides a fabric for replicating and sharing data, using friends resources
as intermediate content delivery nodes, as summarized in the paper titled "Social Clouds: A
Retrospective" by Kyle Chard, Simon Caton, Omer Rana, Kris Bubendorfer. Based on their previous
implementations, the authors propose a general social cloud architecture to facilitate heterogeneous
bilateral resource sharing. Interoperability and cloud federation standards thus will be important to
ensure seamless resource usage. Similar to SIoT research, suitable algorithms and metrics are needed
to analyze social clouds. In Social Internet of Things (SIoT), devices are usually divided to groups
with different relationship in social networks. However, radio access network (RAN) used for
connecting IoT devices is short of supporting SIoT groups. For this, network virtualization with
software defined network (SDN) structure is a scalable solution. But this solution is hard to support
enough groups due to rule space limitation of existing SDN enabled devices. In their work titled
"Cloud Radio Access Network Virtualization for Social Internet of Things" by He Li, Mianxiong
Dong, and Kaoru Ota, a SDN based RAN virtualization framework is proposed to maximize the
number of SIoT groups with limited SDN rule space. Extensive simulations show that the proposed
solution provides more SIoT groups compared with some other allocation methods, with better
performance at thesame time.
3 CONCLUSION
Both SIoT and SoC are at infant stage, and more research efforts are need to have a better, and
probably unified supporting architecture, in order to integrate with heterogeneous technologies
involved in SIoT and SoC. Security and trust issues are still there and obviously need more attentions,
especially in social environments. And clearly, SIoT and SoC have more potentials to go ahead hand
by hand, and to support each other. We would like to say that the two have very good potentials to
merge as a unified paradigm.
ACKNOWLEDGMENTS
This special issue would not have been possible without the support of Mazin Yousif, editor in chief of
IEEE Cloud Computing, colleagues from the IEEE Computer Society office, and all reviewers
involved the review process.
REFERENCES
[1] L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The social internet
of things (siot) -- when social networks meet the internet of things:
Concept, architecture and network characterization," Computer Networks,
vol. 56, no. 16, pp. 3594 -- 3608, 2012.
[2] L. Atzori, A. Iera, and G. Morabito, "From" smart objects" to"
social objects": The next evolutionary step of the internet of things,"
Communications Magazine, IEEE, vol. 52, no. 1, pp. 97 -- 105, 2014.
[3] K. Chard, S. Caton, O. Rana, and K. Bubendorfer, "Social
cloud: Cloud computing in social networks," in Cloud Computing
(CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010,
pp. 99 -- 106.
[4] K. Chard, K. Bubendorfer, S. Caton, and O. F. Rana, "Social cloud
computing: A vision for socially motivated resource sharing," Services
Computing, IEEE Transactions on, vol. 5, no. 4, pp. 551 -- 563,
2012.
[5] K. Chard and S. Caton, "Social clouds: Crowdsourcing cloud
infrastructure," in Crowdsourcing, ser. Progress in IS, W. Li,
M. N. Huhns, W.-T. Tsai, and W. Wu, Eds. Springer
Berlin Heidelberg, 2015, pp. 191 -- 217. [Online]. Available:
http://dx.doi.org/10.1007/978-3-662-47011-4 11
[6] D. Muoz, R. Cornejo, F. J. Gutierrez, J. Favela, S. F. Ochoa,
and M. Tentori, "A social cloud-based tool to deal with time
and media mismatch of intergenerational family communication,"
Future Generation Computer Systems, vol. 53, pp. 140 -- 151,
2015. [Online]. Available: http://www.sciencedirect.com/science/
article/pii/S0167739X14001356
Weishan Zhang Weishan Zhang is a full professor, deputy head for research of Department of
Software Engineering, School of Computer and Communication Engineering, China University of
Petroleum (UPC). He is the director of 'Big Data Intelligent Processing Innovation Team of Huangdao
District', director of 'Big Data Processing for Petroleum Engineering of UPC', and founding director
of the Autonomous Service Systems Lab. He was a Research Associate Professor/Senior Researcher at
Computer Science Department, University of Aarhus (til Dec. 2010). He was a visiting scholar of
Department of Systems and Computer Engineering, Carleton University, Canada (Jan. 2006 - Jan.
2007). He was an Associate Professor at School of Software Engineering, Tongji University,
Shanghai, China (Aug. 2003- June 2007). He was a NSTB post-doctoral research fellow at
Department of Computer Science, National University of Singapore (Sept. 2001 to Aug. 2003). His
current h-index according to google schoolar is 14 and the numberof total citations is around 540 in
Dec. 2015.
Qun Jin un Jin is a professor and the chair of the Department of Human Informatics and Cognitive
Sciences, Waseda University, Japan. His recent research interests cover human-centric ubiquitous
computing, behavior and cognitive informatics, big data, personal analytics and individual modeling,
e-learning, e-health, and computing for wellbeing.Jin received a PhD in computer science and
electrical engineering from Nihon University. He is a member of IEEE. Contact him at [email protected].
Didier El Baz Dr. Didier El Baz is a CNRS research scientist at LAAS-CNRS since 1985. He is head
and founder of the Distributed Computing and Asynchronism team (CDA). His H index is 21 and I10
index is 30. He has broad research interests including Parallel computing, distributed computing, Peer
to peer computing, Applied Mathematics and Optimal Control.
|
1510.02583 | 1 | 1510 | 2015-10-09T07:20:06 | Community Detection Using Slow Mixing Markov Models | [
"cs.SI"
] | The task of \emph{community detection} in a graph formalizes the intuitive task of grouping together subsets of vertices such that vertices within clusters are connected tighter than those in disparate clusters. This paper approaches community detection in graphs by constructing Markov random walks on the graphs. The mixing properties of the random walk are then used to identify communities. We use coupling from the past as an algorithmic primitive to translate the mixing properties of the walk into revealing the community structure of the graph. We analyze the performance of our algorithms on specific graph structures, including the stochastic block models (SBM) and LFR random graphs. | cs.SI | cs | Community Detection Using Slow Mixing Markov
1
Models
Ramezan Paravi Torghabeh Member, IEEE, and Narayana Prasad Santhanam Member, IEEE
5
1
0
2
t
c
O
9
]
I
S
.
s
c
[
1
v
3
8
5
2
0
.
0
1
5
1
:
v
i
X
r
a
Abstract
The task of community detection in a graph formalizes the intuitive task of grouping together subsets of vertices
such that vertices within clusters are connected tighter than those in disparate clusters. This paper approaches
community detection in graphs by constructing Markov random walks on the graphs. The mixing properties of
the random walk are then used to identify communities. We use coupling from the past as an algorithmic primitive
to translate the mixing properties of the walk into revealing the community structure of the graph. We analyze the
performance of our algorithms on specific graph structures, including the stochastic block models (SBM) and LFR
random graphs.
Random Walk, Slow Mixing Markov Processes, Graph Partitioning, Community Detection, Correlation Clustering,
Coupling From the Past.
Index Terms
I. INTRODUCTION
Applications in biology [1]–[3], social sciences [4] and recommendation systems [5], [6] can be abstracted into
community detection problems, where one attempts to find subsets of nodes that share common properties [7].
Typically, one constructs a graph with vertices corresponding to the objects to be organized together, while the
graph edges represent connections between them. In the simplest setting for the community detection problem, one
would partition the vertices into clusters that are strongly connected within themselves, while the cross- cluster
connections are weak. One could consider more nuanced extensions as well, where vertices could belong to multiple
clusters, or where edges may be weighted.
To evaluate community detection algorithms, several variants of random graph models play an important role in
generating test graphs that capture properties of real networks [8]–[10] in some way. One widely used model is the
Stochastic Block Models (SBM). In this case, information theoretic limits for exact and partial recovery has been
addressed as well in [11]–[14]. For community detection in SBMs, the approaches that have been widely considered
are the maximum likelihood approach, semidefinite programming and belief propagation methods [15]–[17].
Many approaches for community detection implicitly require that the true number of clusters be known a-priori.
An alternate approach is taken in Correlation Clustering where an objective function is designed so optimizing the
objective function cost will automatically capture the underlying partition [18]. The correlation clustering problem
is often formalized as an integer linear program. In [19], a randomized expected 3-approximation algorithm for
correlation clustering was provided.
In biological networks, one of the core algorithms used traces back to [2], [20] and is based on what is called
centrality indices. The idea is to remove cross-cluster edges–if there are a few tight communities connected sparsely
by inter-cluster edges, most cross-community shortest paths will go through the cross-cluster edges. The algorithm
formalizes this insight and removes what it thinks are cross-cluster edges, leaving behind the communities.
The authors are with the Department of Electrical Engineering, University of Hawai‘i, M¯anoa (Email:{paravi, nsanthan}@hawaii.edu).
The closest other line of work to our approach is spectral clustering [21]–[24]. This method uses a given pairwise
similarity between nodes in a network to assign weights to the edges, and uses the eigenvectors of the (symmetric,
normalized) graph Laplacian to assign nodes to clusters. For two clusters, the Fiedler eigenvector can be partitioned
around the median to yield clusters and for more than two clusters, similar extensions can be used involving
k eigenvectors. While the implementation is simple, a couple of drawbacks need to be addressed—the pairwise
similarity is often not automatically given in community detection problems, the Laplacian could be ill conditioned
and the number of clusters need to be known in advance, see e.g., [25], [26].
2
Markov Processes
Let p be an irreducible and aperiodic first-order Markov process {Yi}∞
i=−∞ taking values in a finite alphabet
S with S = r. Let Q = [p(ss(cid:48))] with s, s(cid:48) ∈ S denote the transition probability matrix of the process. Here,
p(ss(cid:48)) (cid:44) p(Y1 = sY0 = s(cid:48)) denotes the transition probability from s(cid:48) to s. Furthermore, let π denote the unique
stationary distribution of p, the unique solution of πQ = π. Namely, π is the unique solution to
π(s(cid:48))p(ss(cid:48)),
(1)
(cid:88)
s(cid:48)∈S
π(s) =
for all s ∈ S. Clearly p(Y1 = s) = π(s).
Core idea
Empirical properties of finite sized samples from Markov processes need not reflect staionary properties—e.g., the
number of occurances of a string w in a finite sized sample from a Markov process p need to yield a good estimate
of p(w). Roughly speaking, when the empirics of the sample eventually reflect the stationary properties, we say that
the process has mixed. The core idea in this paper revolves around interpretation of the random walk before mixing
has occured. Naturally then, to build clustering and community detection algorithms on graphs, we build Markov
random walks such that the restriction of the random walk to within any one cluster mixes much faster than the
overall walk itself. Once we obtain a walk like that, a careful interpretation of samples from the random walk along
the lines of the theorems we obtain in [27] should reveal the community structure of the graph.
II. COMMUNITY DETECTION USING SLOW MIXING MARKOV PROCESSES
In order to identify communities in the graph, we define random walk on the graph, such that the mixing properties
of the walk reveal the clusters. To do so, we use Coupling From The Past (CFTP) [28] to sample appropriately
from the constructed random walk. CFTP was devised by Prop and Wilson and allows to obtain samples distributed
according to the exact stationary distribution of a Markov process. In CFTP, the idea is to simulate different copies of
a given Markov chain, each starting from a different initial state, but in a way that is often described as “backwards”
in time—details will be outlined in Section II-B. While each chain is marginally faithful to the same Markov law,
different copies are not independent from each other. Rather, the joint evolution is set up so that chains coalesce—
once chains hit the same state at the same time, their future evolution is identical. When all copies of the chain
coalesce at time 0, the obtained sample is distributed perfectly according to stationary distribution.
Rather than sampling from the stationary distribution, we adapt the CFTP approach to identify clusters before the
chains coalesce. To achieve this, we will identify subsets of state space which coalesce together faster. In following
section, we introduce the notion of restriction of a Markov process to a subset G ⊆ S which will be translated into
algorithmic rules for community detection in graphs.
A. Restriction of a Markov Process to G
Let G be an arbitrary nonempty subset of the state space S of the Markov process p with G = r(cid:48). Let { Yj} =
{··· , Y−1, Y0, Y1,···} be the restriction of p to G. Note that Yj ∈ G, for all j. We will refer to restricted process
at p. By the strong Markov property, p is also a Markov process over G. Furthermore, if p is aperiodic, then it has
a stationary distribution which will be denoted by π. Let π(G) denote the stationary distribution of G, i.e.
3
(cid:88)
w∈G
π(G) =
π(w).
(cid:32)
(cid:33)
Q =
QGG QGB
QBG QBB
The transition probability matrix of the process, Q, can be written as
,
(2)
where B = S\G. Note that QGG and QBB are square matrices of size r(cid:48) × r(cid:48) and (r − r(cid:48)) × (r − r(cid:48)), respectively.
Before proceeding further, we prove following useful lemma.
Lemma 1.
λi < 1 where λi’s are the eigenvalues of A. Then,
Let A be an m × m matrix with max
1≤i≤m
(I − A)−1 = I + A + A2 + A3 + ···
Proof The condition max
1≤i≤m
equality follows by direct multiplication.
Theorem 2.
λi < 1 insures that the infinite series I + A + A2 + A3 + ···
is convergent. The
2
The transition probability matrix of the Markov process p is given by
where I is the identity matrix with size r − r(cid:48). Furthermore, p has a unique stationary distribution π given by
Q = QGG + QGB(I − QBB)−1QBG,
for all w ∈ G.
B. Partial CFTP
π(w) =
π(w)
π(G)
,
(3)
(4)
2
In this section, we first briefly review CFTP algorithm and then introduce the notion of partial coupling which is
the core idea to identify clusters in our proposed community detection algorithm. Recall that S is the state space of
the Markov process p with S = r. In CFTP algorithm, we run coupled copies of p, a different copy from every
state in S. We use Dobrushin coupling [29] to couple the different chains.
To run the CFTP for 1 step, we start all coupled copies from time -1, and run them for one step. To run it for the
second step, we start coupled copies of the Markov process from every state in S at time -2, and run the chains for
one step. Now we reuse the evolution from step -1 to 0. See [28] for why we choose this peculiar way of running
the chains backward in time.
initial state. Note Y (s,−n)
Definition 1. We say that the CFTP algorithm has coalesced in the regular sense in n steps if n is the smallest
number such that for all s, s(cid:48) ∈ S
We represent the samples of p starting from time −n with state s by {Y (s,−n)
} where superscript s denotes the
= s.
−n
−i
Y (s,−n)
0
= Y (s(cid:48),−n)
.
0
Let Y0 denote the element that all chains have coalesced to, namely Y0 = Y (s−n)
does not imply that time 0 is the point at which the chains Y (s,−n)
first coalesce.
0
0
4
, s ∈ S. Note also that the definition
2
2
(5)
We will refer to Y0 in Definition 1 as the output of CFTP algorithm.
Theorem 3.
[From [28]] Let Y0 be the output of the CFTP algorithm. Then, for all s ∈ S
P(Y0 = s) = π(s),
where P and π denote the coupling distribution and the stationary distribution of p, respectively.
Let G ⊆ S. For a fixed n and w ∈ G, we define
n−1(cid:88)
i=0
(cid:44)
N w−n
1(Y (w,−n)
−i
∈ G),
which denotes the number of occurrences of elements in G along the realization of the copy of p starting from w.
Definition 2. We say that the CFTP algorithm at time −n is partially coalesced with respect to G if −n is the
smallest time index such that for all w, w(cid:48) ∈ G
Y (w,−n)
= Y (w(cid:48),−n)
, and N w−n = N w(cid:48)
−n.
(6)
0
0
for all w ∈ G. We refer to Y0 as the output of the algorithm.
Let Y0 = Y (w,−n)
0
Let p be a Markov process over state space S and let G be an arbitrary nonempty subset of S.
Theorem 4.
Assume that the CFTP algorithm at time −n has partially coalesced w.r.t. G with Y0 ∈ S as the output of the CFTP
algorithm per Definition 2. Suppose we further continue the simulation of the chain (starting from comt), and let j
be the first time Yj ∈ G for some j ≥ 1. Let Y = Yj. Then, for all w ∈ G, we have
2
where π denotes the stationary distribution of p, respectively.
2
Pr( Y = w) =
π(w)
π(G)
,
C. Algorithm for Community Detection
i=1 Ci = S. We will refer to individual Ci as a cluster.
for all i and Ci ∩ Cj = ∅ for i (cid:54)= j with(cid:83)m
The mixing properties of the process can be used to identify communities in the set of states of the process. To
this end, we need to consider finding a partition C = {C1,··· Cm} of the state space S such that Ci ⊆ S, Ci (cid:54)= ∅
Note that we can associate to every partition C, a cost function J(C) depending on the application. For instance,
in the context of random walks on graphs, one convenient choice can be cluster editing cost as we will discuss in
section III-A. The other parameter is the number of clusters m. In our approach, in contrast to traditional methods
such as k-means, m need not to be known a a-priori. In the Algorithm 1, the number of clusters will automatically
will be determined by the algorithm and its value depend on the cost function J we consider. The algorithm is based
on Theorem 4 which essentially describes how to identify a subset of states which have been partially coalesced.
In essence, the algorithm identifies communities which have coalesced together during one sample run of CFTP
algorithm.
Description of the Algorithm: We consider one run of the CFTP algorithm and our setup is the same as original
CFTP. We emphasize that the chains are simulated backward in time and the the random variables used during
execution are reused. Recall that S = r. Initially, we have a partition of state space which consists of all singletons,
i.e., C0 = {C1,··· , Cr} such that Ci = {s} for some s ∈ S. As we proceed backward in time to obtain a sample
from stationary distribution, we will identify a set of critical times denoted by T , which are the times which some
clusters have been coalesced.
Definition 3. During execution of CFTP algorithm, we say that a time index n is a critical time if there exist at
least two clusters C1 and C2 such that for all w, w(cid:48) ∈ C1 ∪ C2
5
where
Y (w,−n)
0
N w−n =
(cid:18)
n−1(cid:88)
= Y (w(cid:48),−n)
0
and N w−n = N w(cid:48)
−n,
(cid:19)
Y (w,−n)
−i
∈ C1 ∪ C2
1
.
2
i=0
Note that above definition can naturally be extended to more that two clusters. As a consequence, we can identify
clusters which have been merged in critical times. Observe that when all the chains coalesce, we have a single
partition consisting of all states. In other terms, we start off with all-singleton partition up to the point where we
have a single partition. However, during this process, at critical times, we can identify clusters which merge together
to yield a coarser partition. We can compute the cost associated to the particular partition that the sampling process
yields and find the optimal partition C∗ with respect to the cost function J.
In following pseudo-code, we represent all-singleton partition by C0 and CFlag denotes the coalescence flag. Here,
we assume that we are minimizing a cost function J. A container T is used to store the critical times.
Algorithm 1 DETECTING COMMUNITIES IN A MARKOV PROCESS
Input: A Markov process p over S.
Output: A partition C∗ of S.
Initialize: k ← 1, C = C0, C∗ = C0, T = [0], CF lag = F alse.
while CF lag = F alse do
Simulate r copies of the chain starting at time −k.
if k is a critical time then
Update C by merging clusters which are coalesced;
T = T.Append{k};
if J(C) ≤ J(C∗) then
C∗ = C;
end
end
if All r chains reach to some common state at time 0 then
CF lag = T rue;
else
k ← k + 1
end
end
return C∗
Remark
We need to carefully define the Markov process depending on the application on hand to exploit mixing
properties of the process for revealing the underlying community structure. Furthermore, the choice of cost function
depends on how the Markov process is defined.
2
Remark
Note that in general, the algorithm can stop at any critical time and still yields a partition (though
perhaps not optimal). A criteria which empirically seems to be effective is to record the difference ∆Ti (cid:44) Ti − Ti−1
6
between consecutive critical times. If the difference exceeds a prescribed threshold, the algorithm will stop. As we
discuss simulation results in next chapter, we will see that if the process is slow mixing, then the resulted clusters
usually coincide with ground truth communities.
2
III. SIMULATION RESULTS
Our algorithm creates a random walk on the nodes of the graph. We start different, coupled random walks from
different nodes. We then adapt the coupling from the past approach to to identify clusters before the chain mixes
(rather than sample from the stationary distribution).
Construction of Random Walk:
In order to use Algorithm 1 for graph partitioning problem, first we define a
non-uniform random walk on the graph as follows:
Given an undirected graph G = (V, E) and v ∈ V , let N (v) be the set of neighbors of v in G. We assign a
weight to every edge e = (v, w) ∈ E(G) given by
where f (x) = xr for some r ∈ Z+. Then, for all u ∈ N (v), the transition probability of the walk is given by
w(e) (cid:44) w(v, u) = f
P(uv) =
(cid:18)(cid:12)(cid:12)N (v) ∩ N (u)(cid:12)(cid:12)(cid:19)
(cid:80)
w(v, u)
,
w(v, u(cid:48))
.
u(cid:48)∈N (v)
(7)
(8)
The above scaling can be interpreted how different similar neighbor nodes vote on transition probabilities. A similar
scaling method (with exponential function) was used in [23] for image segmentation applications. This reflects the
fact that cross-cluster edges have smaller weight compare to in-cluster edges.
To evaluate the performance of the algorithm we considered random graph generative models including the (i)
Stochastic Block Models (SBM), (ii) LFR models (random graphs with power law degree distribution having well
defined community structure [30]), and (iii) real world networks with known community structure are used to
test the algorithm. The number of communities is not known to our algorithm in advance, nor is any generative
model we may have used. Where relevant, we used cluster edit distance (number of addition and deletion of edges
needed to turn a graph into disjoint cliques) and compared the results with the state-of-the-art Correlation Clustering
(CC-PIVOT) [19] algorithm.
A. Stochastic Block Model
the set of the nodes in G. Assume that there exists an underlying true partition V =(cid:83)k
Let G(n, p, q, k) be the random graph model which will has following properties. Let V = {1,··· , n} (cid:44) [n] be
(cid:80)k
i=1 Vi of the nodes such that
i=1 Vi = n. In this generative model, for all w, v ∈ V , if v ∈ Vi and w ∈ Vj for some i (cid:54)= j, then w is connected
to v with probability q. If v, w ∈ Vi for some i, then w is connected to v with probability p. All choices of edges
are independent from each other and E(G) denote the set of edges in the G.
For SBM random graphs G(n, p, q, k), we tested the performance of algorithm by varying model parameters n,
p and q and number of communities in the graph. Note that given a partition of graph a G, we can associate a cost
to that partition. One convenient choice is the number of edge addition and deletion in order to turn the graph into
disjoint clusters. This measure is known as cluster editing cost [31]. This is in the spirit of correlation clustering
setting in which one tries to transform a given graph into disjoint cliques by using minimum number of edge deletion
or edge addition [18].
In order to evaluate the quality of the recovered communities in the SBM, we first consider the average cluster
editing cost. For random graphs with roughly equal size ground truth communities, we computed and compared
TABLE I: Comparison of average cost of our algorithm and CC-PIVOT on 10 samples taken uniformly at random
from G(n, p, q). All cluster have the same size while the number of clusters in the graph varies.
7
Cluster-Size Num-Cluster
5
5
5
10
10
10
20
20
20
20
20
20
30
60
60
60
60
60
75
75
75
75
75
75
100
100
100
100
100
100
60
60
60
30
30
30
15
15
30
30
30
30
20
10
10
10
10
10
8
8
8
8
8
8
6
6
6
6
6
6
p
0.95
0.95
0.8
0.95
0.95
0.8
0.85
0.8
0.9
0.9
0.8
0.7
0.8
0.9
0.8
0.8
0.7
0.7
0.9
0.9
0.8
0.8
0.7
0.7
0.9
0.9
0.8
0.8
0.7
0.7
q
0.05
0.2
0.1
0.05
0.2
0.1
0.05
0.1
0.05
0.2
0.2
0.2
0.1
0.05
0.1
0.2
0.1
0.2
0.1
0.2
0.1
0.2
0.1
0.2
0.1
0.2
0.1
0.2
0.1
0.2
13977.6
41432
41042.9
40594
24626.5
22302.9
29711.2
47510.2
28827.9
47028
33773.6
51431.9
32683.4
49895.8
31452.8
48284.7
38898.6
55986.7
37517.8
53975.2
35612.8
51948.8
Our-Cost CCPivot-Cost
3020.3
9803.4
5249.1
3382.5
10425.2
5748.9
4059.8
6646
3572.3
11992.4
6518.6
4243.4
12725.3
7023.4
5030.6
8119.2
17569.8
51590.5
51225.3
50626.8
31612.9
22466.3
36251.1
57262.2
35849.5
55923.3
37830.4
59096
38469.7
58606
38101.2
57460.1
39732.2
61159.9
40637.8
61695.5
41015
60161
the average cost of partitions obtained by our algorithm and CC-PIVOT. The simulation results are summarized in
TABLE I. The result show that the partitions found by our method are usually have smaller cluster editing cost.
Remark
The values of p and q are designed such that the resulting random graphs have well-knit clusters. Here,
the emphasize is to only compare cluster editing cost obtained by our method with those obtained by CC-PIVOT.
2
The actual performance for recovering communities is depicted in Fig. 1 where matrix representation of the
adjacency matrix of a realization of a SBM is used to visualize community structure. As it can be seen from the
figure, almost all identities are recovered correctly.
B. LFR Random Graphs
Stochastic block models are not realistic in the sense that they usually have communities with approximately
the same size and furthermore, all vertices have the same degree. In realistic networks, the degree distributions are
usually skewed and size of communities varies. We consider another class of random graphs introduced in [30]
which is known as LFR benchmark graphs. In these models, the distributions of both node degrees and number of
communities admit power laws.
The construction is as follows: Let n be the number of nodes. First a sequence of community sizes distributed
by power law with exponent τ1 is generated. The degree of each node is distributed by power law with exponent
τ2. Each node within a community of size k, shares a fraction 1 − µ of his corresponding edges with the members
of his community and a fraction µ of his edges with other communities. The connection of edges is done similar to
Configuration Model in such a way that the degree sequence is maintained.
8
(a)
(b)
(c)
(d)
Fig. 1: (a) Matrix representation of a realization of an SBM with n = 300, k = 5, p = 0.55, q = 0.07. (b) Same
graph with random relabeling of nodes which serves as is the input to the algorithm. (c) Communities recovered by
our algorithm. (d) Communities recovered by CC-PIVOT algorithm.
Fig. 2 shows a realization of LFR graph with n = 200 nodes and 6 communities and parameters τ1 = 2, τ2 = 3
and µ = 0.25 with average degree equals 30. The communities are showed with different colors in circular layout for
convenience. As it can be seen, the CC-PIVOT tends to create lots of singletons compared to ours. Observe that in
our algorithm if we wait and track the clusters up before coalescence happens, we actually can recover communities
as depicted in Fig. 2 (d).
C. Real World Network
We tested the performance of the algorithm on a real world benchmark network of American football games
between Division IA colleges during regular season Fall 2000 [2]. There are in total 115 teams and 615 edges in the
graph. Every edge represents a game between corresponding end nodes. As depicted in Fig. 3, almost all nodes in
the graph are assigned to their corresponding community correctly. The nodes with same color belong to the same
cluster (note that the identity of nodes is not revealed to the algorithm).
0501001502002500501001502002509
(a)
(b)
(c)
(d)
Fig. 2: (a) An LFR random graph with 200 nodes and 6 communities. (b) Communities recovered by our algorithm.
(c) Communities recovered by CC-PIVOT algorithm. (d) Communities recovered by our algorithm with fine tuning
of algorithm parameters.
10
(a)
(b)
Fig. 3: (a) American Football College benchmark network with 115 nodes. (b) Communities recovered by our
algorithm. (c) Communities recovered by CC-PIVOT algorithm.
(c)
11
REFERENCES
[1] A. Ben-Dor, R. Shamir, and Z. Yakhini, “Clustering gene expression patterns,” Journal of computational biology, vol. 6, no. 3-4, pp.
281–297, 1999.
[2] M. Girvan and M. E. Newman, “Community structure in social and biological networks,” Proceedings of the national academy of
sciences, vol. 99, no. 12, pp. 7821–7826, 2002.
[3] P. F. Jonsson, T. Cavanna, D. Zicha, and P. A. Bates, “Cluster analysis of networks generated through homology: automatic identification
of important protein communities involved in cancer metastasis,” BMC bioinformatics, vol. 7, no. 1, p. 2, 2006.
[4] M. S. Handcock, A. E. Raftery, and J. M. Tantrum, “Model-based clustering for social networks,” Journal of the Royal Statistical Society:
Series A (Statistics in Society), vol. 170, no. 2, pp. 301–354, 2007.
[5] B. J. Mirza, B. J. Keller, and N. Ramakrishnan, “Studying recommendation algorithms by graph analysis,” Journal of Intelligent
Information Systems, vol. 20, no. 2, pp. 131–160, 2003.
[6] A. Shepitsen, J. Gemmell, B. Mobasher, and R. Burke, “Personalized recommendation in social tagging systems using hierarchical
clustering,” in Proceedings of the 2008 ACM conference on Recommender systems. ACM, 2008, pp. 259–266.
[7] S. Fortunato, “Community detection in graphs,” Physics Reports, vol. 486, no. 3, pp. 75–174, 2010.
[8] P. Erdos and A. R´enyi, “On random graphs I,” Publ. Math. Debrecen, vol. 6, pp. 290–297, 1959.
[9] ——, “On the evolution of random graphs,” Publ. Math. Inst. Hung. Acad. Sci, vol. 5, pp. 17–61, 1960.
[10] M. E. Newman, D. J. Watts, and S. H. Strogatz, “Random graph models of social networks,” Proceedings of the National Academy of
Sciences, vol. 99, no. suppl 1, pp. 2566–2572, 2002.
[11] E. Abbe, A. S. Bandeira, and G. Hall, “Exact recovery in the stochastic block model,” arXiv preprint arXiv:1405.3267, 2014.
[12] E. Mossel, J. Neeman, and A. Sly, “Reconstruction and estimation in the planted partition model,” Probability Theory and Related
Fields, pp. 1–31, 2014.
[13] E. Abbe and C. Sandon, “Community detection in general stochastic block models: fundamental limits and efficient recovery algorithms,”
arXiv preprint arXiv:1503.00609, 2015.
[14] L. Massouli´e, “Community detection thresholds and the weak ramanujan property,” in Proceedings of the 46th Annual ACM Symposium
on Theory of Computing. ACM, 2014, pp. 694–703.
[15] B. Hajek, Y. Wu, and J. Xu, “Achieving exact cluster recovery threshold via semidefinite programming,” arXiv preprint arXiv:1412.6156,
2014.
[16] ——, “Achieving exact cluster recovery threshold via semidefinite programming: Extensions,” arXiv preprint arXiv:1502.07738, 2015.
[17] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, “Asymptotic analysis of the stochastic block model for modular networks and its
algorithmic applications,” Physical Review E, vol. 84, no. 6, p. 066106, 2011.
[18] N. Bansal, A. Blum, and S. Chawla, “Correlation clustering,” Machine Learning, vol. 56, pp. 89–113, 2004.
[19] N. Ailon, M. Charikar, and A. Newman, “Aggregating inconsistent information: ranking and clustering,” in Proceedings of the 37th
Annual ACM Symposium on Theory of Computing, Baltimore, MD, USA, May 2005, pp. 684–693.
[20] M. E. Newman and M. Girvan, “Finding and evaluating community structure in networks,” Physical review E, vol. 69, no. 2, p. 026113,
2004.
[21] M. E. Newman, “Finding community structure in networks using the eigenvectors of matrices,” Physical review E, vol. 74, no. 3, p.
036104, 2006.
[22] S. White and P. Smyth, “A spectral clustering approach to finding communities in graph.” in SDM, vol. 5. SIAM, 2005, pp. 76–84.
[23] M. Meila and J. Shi, “Learning segmentation by random walks,” in Neural Information Processing Systems, 2001.
[24] R. Kannan, S. Vempala, and A. Vetta, “On clusterings: Good, bad and spectral,” Journal of the ACM (JACM), vol. 51, no. 3, pp. 497–515,
2004.
[25] U. Von Luxburg, “A tutorial on spectral clustering,” Statistics and computing, vol. 17, no. 4, pp. 395–416, 2007.
[26] A. Y. Ng, M. I. Jordan, and Y. Weiss, “On spectral clustering: Analysis and an algorithm,” Advances in neural information processing
systems, vol. 2, pp. 849–856, 2002.
[27] M. Asadi, R. P. Torghabeh, and N. P. Santhanam, “Stationary and transition probabilities in slow mixing, long memory markov processes,”
Information Theory, IEEE Transactions on, vol. 60, no. 9, pp. 5682–5701, 2014.
[28] J. G. Propp and D. B. Wilson, “Exact sampling with coupled markov chains and applications to statistical mechanics,” Random structures
and Algorithms, vol. 9, no. 1-2, pp. 223–252, 1996.
[29] A. Galves, V. Maume-Deschamps, and B. Schmitt, “Exponential inequalities for vlmc empirical trees,” ESAIM: Probability and Statistics,
vol. 12, pp. 219–229, 2008.
[30] A. Lancichinetti, S. Fortunato, and F. Radicchi, “Benchmark graphs for testing community detection algorithms,” Physical review E,
vol. 78, no. 4, p. 046110, 2008.
[31] R. Shamir, R. Sharan, and D. Tsur, “Cluster graph modification problems,” Discrete Applied Mathematics, vol. 144, no. 1, pp. 173–182,
2004.
|
1603.07445 | 2 | 1603 | 2016-08-25T05:48:36 | Time Is of the Essence: Analyzing the Effect of Vertex-Joining Time on Complex Network Evolution | [
"cs.SI",
"physics.soc-ph"
] | Complex networks have non-trivial characteristics and appear in many real-world systems. Such networks are vitally important, but their full underlying dynamics are not completely understood. Utilizing new data sources, however, can unveil the evolution process of these networks.
This study uses the recently published Reddit dataset, containing over 1.65 billion comments, to construct the largest publicly available social network corpus to date. We used this dataset to deeply examine the network evolution process, which resulted in two key observations: First, links are more likely to be created among users who join a network at a similar time. Second, the rate in which new users join a network is a central factor in molding a network's topology; i.e., different user-join patterns create different topological properties.
Based on these observations, we developed the \textit{Temporal Preferential Attachment} random network generation model. This model produces not only scale-free networks that have relative high clustering coefficients, but also networks that are sensitive to both the rate and the time in which users join the network. This results in a more accurate and flexible model of how complex networks evolve, one which more closely represents real-world data. | cs.SI | cs |
Time Is of the Essence: Analyzing the Effect of
Vertex-Joining Time on Complex Network Evolution
Michael Fire1,2 and Carlos Guestrin1
1Department of Computer Science & Engineering, University of Washington
2The eScience Institute, University of Washington
September 27, 2018
Abstract
Complex networks have non-trivial characteristics and appear in many real-world systems. Such
networks are vitally important, but their full underlying dynamics are not completely understood.
Utilizing new data sources, however, can unveil the evolution process of these networks.
This study uses the recently published Reddit dataset, containing over 1.65 billion comments,
to construct the largest publicly available social network corpus to date. We used this dataset to
deeply examine the network evolution process, which resulted in two key observations: First, links
are more likely to be created among users who join a network at a similar time. Second, the rate in
which new users join a network is a central factor in molding a network's topology; i.e., different
user-join patterns create different topological properties.
Based on these observations, we developed the Temporal Preferential Attachment random network
generation model. This model produces not only scale-free networks that have relative high
clustering coefficients, but also networks that are sensitive to both the rate and the time in which
users join the network. This results in a more accurate and flexible model of how complex
networks evolve, one which more closely represents real-world data.
Project Links: (cid:73) Website (cid:73) Data (cid:73) Code
Keywords: Complex Network Models; Online Social Networks; Reddit
1.
Introduction
of data.
Complex networks are loosely defined as
networks with non-trivial structure and
dynamics, appearing in social, molecu-
lar, biological, ecological, and economical real-
world complex systems [8]. Many studies have
provided models and algorithms to explain
how complex networks evolve [4, 22, 10, 19].
However, scores of questions remain unan-
swered [1].
With the recent rapid advances in the field of
data science, new algorithms, infrastructures,
and techniques for data mining, data storage,
data prediction, and data visualization have
emerged [3, 7, 14, 24]. These tools make it fea-
sible to gain new insights from large quantities
In this study, we utilize data science tools
to thoroughly examine the evolution process
of online social networks. Our study focuses
on Reddit,1 a huge collection of online com-
munities that discuss what is new and pop-
ular on the Internet. Namely, we utilize the
recently published Reddit dataset, which con-
tains over a terabyte of uncompressed data and
consists of over 13.2 million users2 who posted
over 1.65 billion comments published over a
7-year time period. This vast dataset contains
information on the evolution process of more
than 239,000 online communities and the con-
1http://www.reddit.com
2The dataset contains 13,213,173 unique usernames.
However, many Reddit users have several usernames.
1
Analyzing the Effect of Vertex-Joining Time • August 2016
nections among the community members (see
Section 3). We used the Reddit dataset to con-
struct a large corpus of 11,965 directed social
networks, which contain over 97% of all the
posted comments in the dataset (see Section 3).
We assembled an unprecedented corpus of so-
cial networks with diverse topologies, ranging
from social networks with 11 vertices up to so-
cial networks with over 4 million vertices (see
Table 1).
By closely examining the social networks'
evolution process, we observed that users tend
to connect to those users having similar join-
ing times. For example, we discovered that
the median join-time difference between two
connected users was 350.79 days. Moreover,
we observed that the likelihood of a link be-
ing established between two users decreases
sharply as the join-time difference increases
(see Section 5.2). For instance, only 3.2% of
the examined edges were between two users
with a join-time difference over 4 years (see Fig-
ure 3). Furthermore, we identified six common
patterns in which users joined the network (see
Section 5.1.3 and Figure 1). Moreover, we ob-
served that different user-join patterns influ-
ence the structures of the social networks. For
example, networks with sigmoidal-like growth
usually have denser and higher average cluster-
ing coefficients than networks with polynomial
growth (see Section 5). The majority of ran-
dom network generation models do not take
into account either the time or the rate that
new vertices join the network (see Section 2
and Sallaberry et al. [19]).
Inspired by the above observations, we de-
veloped the Temporal Preferential Attachment
random network generation model (denoted
TPA model). This model generalizes the well-
known Barabási-Albert network generation
model (denoted BA model) [4] by adding to
the model the rate in which vertices join the
network, as well as storing each vertex's ar-
rival time. Moreover, the model takes as input
the probability that each vertex will connect to
other vertices with the same or with a different
join-time (see Section 6).
We demonstrate that the presented TPA
2
model is able to produce arbitrary-sized ran-
dom scale-free networks with relative high clus-
tering coefficients, which are sensitive to ver-
tex arrival times and rates (see Section 6.2).
This model mimics realistic social networks
and should help to better understand the evo-
lution process of complex networks.
The remainder of the paper is organized as
follows: In Section 2, we provide an overview
of various related studies. In Section 3, we give
details on the Reddit dataset and present our
methodology to clean the dataset. Section 4
describes how we constructed the subreddit so-
cial networks and outlines the social network
topological features we utilized in this study.
Next, in Section 5, we analyze the networks'
temporal dynamics. Subsequently, in Section 6,
we introduce the TPA model. Then, in Sec-
tion 7, we discuss the obtained results. Lastly,
in Section 8, we present our conclusions and
also offer future research directions.
2. Related Work
The study of complex networks began over
half a century ago, in 1965. While studying a
network of citations among scientific papers,
Price observed a network in which the degree
distribution followed a power law [17]. Later,
in 1976, Price provided an explanation of the
creation of these types of networks: "Success
seems to breed success. A paper which has
been cited many times is more likely to be cited
again than one which has been little cited" [18].
Price subsequently offered a method for the
creation of networks in which the degree dis-
tribution follows a power law.
Several decades later, in 1998, Watts and
Strogatz [22] presented a model for generating
small-world networks. Typically, small-world
networks have a relatively high clustering co-
efficient, and the distance between any two
vertices scales as the logarithm of the number
of vertices [19]. In the following year, Barabási
and Albert observed that degree distributions
that follow power laws exist in a variety of
networks, including the World Wide Web [4].
Barabási and Albert coined the term "scale-free
Analyzing the Effect of Vertex-Joining Time • August 2016
Figure 1: Common User-Join Curves of the following subreddits: Blogging, 90s, AskComputerScience,
Learnmusic, Eagle-Scouts, and BlackFriday.
networks" for describing such networks. Sim-
ilar to Price's method [18],3 Barabási and Al-
bert [4] suggested a simple and elegant model
for creating random complex networks based
on the rule that the rich are getting richer. In
the BA model, a network starts with m con-
nected vertices. Each new vertex that is added
(one at a time) has a greater probability of con-
necting to pre-existing vertices with higher de-
gree, where the probability of connecting to an
existing v is proportional to v's degree [4]. Con-
sequently, "rich" vertices with high degrees
tend to become even "richer" due to their con-
nections with new vertices that join the graph.
Many real-world complex networks have a
community structure in which "the division of
network nodes into groups within which the
network connections are dense, but between
which they are sparser" [16]. In 2004, Newman
and Girvan proposed a community detection
algorithm and offered a simple method to cre-
ate networks with community structure [16].
Even though the models described above
can explain some of the characteristics of real-
world complex networks, the random networks
3A detailed explanation of the differences between
Price's method and the Barabási-Albert model for con-
structing complex networks can be found in [15].
created by these models were lacking in other
properties that were observed in real-world
complex networks. Therefore, in recent years,
other models have been suggested which have
additional characteristics [4, 10, 19, 22].
A similar study to ours was conducted by
Leskovec et al. [13]. They performed edge-
by-edge analysis of four large-scale networks
- Flickr, Delicious, LinkedIn, and Yahoo An-
swers - with time spans ranging from four
months to almost four years. By studying a
wide variety of network formation strategies,
they observed that edge locality plays a critical
role in the evolution of networks, and they of-
fered a model which focused on microscopic
vertex behavior. In their proposed model, ver-
tices arrive at a pre-specified rate and choose
their lifetimes. Afterwards, each vertex "inde-
pendently initiates edges according to a 'gap'
process, selecting a destination for each edge
according to a simple triangle-closing model
free of any parameters" [13]. They showed that
their model could closely mimic the macro-
scopic characteristics of real social networks.
Additionally, Leskovec et al., similar to our
study, observed the arrival patterns of vari-
ous vertices. Namely, they observed that (a)
Flickr's network data has grown exponentially;
3
0501001502002503003504000.00.20.40.60.81.0Users Join PercentagePolynomial (Blogging)0501001502002500.00.20.40.60.81.0Sublinear (90s)0501001502002500.00.20.40.60.81.0Linear (AskComputerScience)050100150200250300Number of Weeks0.00.20.40.60.81.0Users Join PercentageSuperlinear (Learnmusic)050100150200Number of Weeks0.00.20.40.60.81.0Sigmoidal (Eagle_Scouts)050100150200250Number of Weeks0.00.20.40.60.81.0Events Oriented (BlackFriday)Analyzing the Effect of Vertex-Joining Time • August 2016
(b) Delicious has grown slightly superlinearly;
(c) LinkedIn has grown quadratically; and (d)
Yahoo Answers has grown sublinearly. Due
to these observations, they concluded that ver-
tex arrival functions needed to be part of their
proposed model. However, their study did
not analyze the implications of using different
arrival functions.
In this study, we extend the BA model. Our
presented TPA model is able to generate small-
world, scale-free networks, with relatively high
clustering-coefficient values. Moreover, our
model takes into consideration the time and
rate in which vertices join the network.
the current comment replied.
For this study, we cleaned the dataset by
removing nonessential comments, specifically
those that were marked as deleted and those
that did not include the information of the user
who posted them. Additionally, we removed
posts by users who with high probability were
bots. Namely, we removed all the users who
posted more than 100,000 comments each, and
we removed 897 redditors whose comments
appeared in the bots list published in the Bot-
Watchman subreddit.5 After the removal of
these posts, we were left with over 1.42 billion
comments.
3. The Reddit Dataset
4. Subreddit Social Networks
Reddit is a news aggregation website and on-
line social platform, which was launched in
2005 by Steve Huffman and Alexis Ohanian [6].
Reddit users (also known as "redditors") can
submit content on the website, which is then
commented upon, and upvoted or downvoted
by other users in order to increase or decrease
the submission visibility. Redditors can also
create their own subreddit on a topic of their
choosing, make it public or private, and let
other redditors join it. This makes Reddit a col-
lection of online communities, centered around
a variety of topics such as books, gaming, sci-
ence, and asking questions.4
In this study, we utilized the Reddit dataset
which was recently made public by Jason
Michael Baumgartner (see Section 9). The
Reddit dataset contains over 1.65 billion com-
ments that were posted from October 2007
through May 2015. These posts were created
by 13,213,173 users, with unique usernames,
in 239,772 different subreddits. The dataset
contains information on the exact time and
date each comment was posted. Moreover, the
dataset contains each comment's ID, as well as
information on the user who posted it and the
ID of the parent comment, i.e., the ID to which
4Each subreddit web page can be accessed at the follow-
ing URL: https://www.reddit.com/r/<SubredditName>
/, by replacing <Subreddit Name> with the subreddit's
name.
4
In the following subsections, we give a detailed
description of the methods that we used to
construct and analyze the subreddit social net-
works. In Section 4.1, we introduce the meth-
ods we used to construct each subreddit's so-
cial network. Then, in Section 4.2, we present
the topological features we extracted from each
network. Additionally, we provide a statistical
overview of each topological feature across all
social networks.
4.1. Social Network Construction
To perform the analysis of the subreddits' un-
derlying social networks, we first needed to
construct these social networks. However,
many of the subreddits did not contain enough
users or were not active for a long enough time
to extract meaningful insights on the user-join
patterns. For example, the median number of
redditors in a subreddit was 3, while only 5%
of the subreddits consisted of 371 redditors or
more. Therefore, for all subreddits in the clean
dataset of over 1.42 billion comments, we se-
lected only those subreddits that had at least 10
users, consisted of at least 1,000 comments, and
were active6 for at least 1 year. Out of all the
5We downloaded the bots list from the BotWatchman
https://www.reddit.com/r/BotWatchman/
subreddit
during December 2015.
6Throughout this study, we considered the time in
which a subreddit was active as the time difference be-
Analyzing the Effect of Vertex-Joining Time • August 2016
subreddits, 11,965 subreddits with over 1.38
billion posts (referred to as selected subreddits)
fulfilled this criteria.
Next, for each selected subreddit, similar to
the construction method used by Kairam et
al. [12], we created the subreddit's social net-
work directed graph by connecting users who
posted comments as replies to other posted
comments. Namely, for a subreddit, we define
the subreddit's directed graph to be: G :=<
V, E > where V is the set of vertices, repre-
senting all the subreddit's users who posted at
least a single comment in the subreddit, and
e := (u, v) ∈ E is the list of all edges between
the subreddit's users u ∈ V and v ∈ V. We
define an edge between u and v to exist if there
exists a comment on the subreddit posted by
u to which v posted a reply on the same sub-
reddit. Lastly, we used the Powerlaw Python
package [2] and observed that most of the so-
cial networks' vertex connection distributions
matched power law distributions with various
exponent values. It important to notice that the
constructed directed graph also includes single
vertices of redditors who posted comments and
did not receive any reply, as well as self-loop
edges of redditors who posted a comment and
then posted a comment as a reply to their own
comment.
4.2. Calculating Topological Features
For each selected subreddit constructed social
network graph, G :=< V, E >, we calculated
the following topological features:
• Vertices number - the number of vertices in
• Edges number - the number of edges in the
• Density - the graph density, defined as
the graph, defined as V.
graph, defined as E.
E
D :=
V·(V−1) .
• Number of self-loops - the number of self-
loops in the graph, defined as Loops :=
{(v, v) ∈ Ev ∈ V}.
• Number of triangles - the number of trian-
gles (denoted by T) in the graph [21].
tween the first and last comments published in the subred-
dit.
• Average clustering coefficient - the graph's
average clustering coefficient (denoted by
CC) [20].
• Degree-based features - for a vertex v ∈ V,
we defined the in-degree, out-degree, and
total-degree of v to be:
-- din(v) := {u ∈ V∃(u, v) ∈ E}
-- dout(v) := {u ∈ V∃(v, u) ∈ E}
-- dtot(v) := {u ∈ V∃(u, v) ∈ E or
∃(v, u) ∈ E}.
Using the vertex degree definitions, we
can define the following four degree fea-
tures:
∑v∈V dtot(v)
V
∑v∈V din(v)
-- Avg-deg :=
-- Avg-in-deg :=
-- Max-in-deg := maxv∈V(din(v));
-- Max-out-deg := maxv∈V(dout(v)),
V
[23],
where the Max function returns the maxi-
mum value in a set.
• Connected components-based features - we
separated the graph into a set of
weakly connected components (denoted
by WCC)
in which WCC :=
{H ≤ GH is subgraph of G} and G =
(cid:116)H∈WCCH. Using the WCC, we can also
define the graph's largest component (re-
ferred to as LC) GLC :=< VLC, ELC >,
where GLC ≤ G, and ∀H :=< V(cid:48), E(cid:48) >∈
WCC,VLC ≥ V(cid:48). Using the above defi-
nitions, we can define the following five
features:
-- Number of connected components - the
number of weakly connected compo-
nents, defined as WCC
-- Largest component vertices number - the
number of vertices in LC, defined as
VLC
-- Largest component edges number - the
number of edges in LC, defined as
ELC
-- Largest component ratio - the ratio be-
tween the number of users in the
largest component and all users in
the subreddit, defined as LC-Ratio :=
VLC
V
-- The number of single components -
the number of components in WCC
5
Analyzing the Effect of Vertex-Joining Time • August 2016
that consist of only a single vertex
(denoted by Single), defined as
{H :=< V(cid:48)(cid:48), E(cid:48)(cid:48) >∈ WCCV(cid:48)(cid:48) =
1}.
Additionally, for v ∈ V, we defined vjoin
as the time v was first active in the network.
We then used this feature to calculate a Days
feature, defined as
Days(G) := maxv∈Vvjoin − minv∈Vvjoin.
The Days feature is the number of days that
had passed between the post times of the first
and last comments. Moreover, for each edge in
the complete Reddit social network with links,
we calculated each edge time difference by
etimedi f f = ujoin − vjoin,∀e = (u, v) ∈ E
Table 1 presents an overview of the various
calculated topology features. Notice that the
full set of topological features of all 11,965 se-
lected subreddits is available online (see Sec-
tion 9).
5. Analyzing Temporal Dynamics
of Networks
5.1. Network User-Join Curves
In the following subsections, we describe in de-
tail the methods which were used to construct
and analyze user-join curves (denoted UJC). In
Section 5.1.1, we define the UJC function and
explain how we constructed the selected sub-
reddit UJCs. Next, in Section 5.1.2, we describe
the process we utilized to match each UJC and
its corresponding function. Afterwards, in Sec-
tion 5.1.3, we present the methods used to cat-
egorize the different UJCs. Lastly, Section 5.1.4
gives details on the methods used to predict
the UJC categories based on the subreddits'
topologies.
5.1.1 User-Join Curve Construction
For all the selected subreddits, we constructed
the UJCs using the following methodology:
First, for each subreddit S, using the cleaned
Reddit dataset, we calculated the number of
6
weeks (denoted as tS
end) between the first com-
ment and the last comment that were posted
on the subreddit. Afterwards, we defined
Users-NumberS(t) for t ∈ [0, tS
end] to be the
number of users who joined the subreddit in
t weeks since the first comments were posted
on the subreddit. We also defined the overall
number of users who joined the subreddit after
tS
end weeks to be Total-UsersS. Then, using the
above definitions, we defined UJC : [0, tS
→ [0, 1] as UJCS(t) = Users-NumberS(t)
, where
UJCS(0) and UJCS(tS
end) are always equal to 0
and 1, respectively. Lastly, to create the UJCs
for a network S, we calculated the UJCS values
in 4-week intervals.7 By using this interval, the
number of samples of the UJCs for each sub-
reddit ranged from 15 to 101, with a median
value of 47.
Total-UsersS
end]
5.1.2 User-Join Curve Regression Analysis
To better understand the 11,965 UJCs that we
created, we utilized CurveExpert software [11]
to match several selected UJCs with their best-
fit functions using regression analysis. In most
cases, the best fit was a high-degree polyno-
mial function. To avoid over-fitting, we used
the python-fit package8 to find the polynomial
function that was a best-fit for the majority
of UJCs and still had a relatively low degree.
We discovered that 11,273 (94.2%) and 9,199
(76.9%) of the UJCs matched a quartic func-
tion (q(x) := a + bX + cX2 + dX3 + eX4) with
R2 ≥ 0.95 and R2 ≥ 0.99, respectively.
Additionally, we performed regression anal-
yses of the 692 UJCs that did not match quartic
functions. Out of these UJCs, we observed that
274 matched the MMF model [11], ab+cxd
b+xd , with
R2 ≥ 0.95. The other 418 UJCs (referred to
as anomalous UJCs) presented a wide range of
patterns.
7In case tS
end did not divide evenly by 4, the time interval
between the next-to-last and last UJC values was less than
4 weeks.
8https://pypi.python.org/pypi/python-fit/1.0.
0
Analyzing the Effect of Vertex-Joining Time • August 2016
Table 1: Subreddits Social Network Features Overview
Feature
Avg-deg
Avg-in-deg
CC
D
Days
LC-Ratio
Loops
Max-in-deg
Max-out-deg
ELC
E
Single
T
VLC
V
WCC
Min
0.0
0.0
0.0
0.0
365.69
0.002
0.0
0.0
0.0
0.0
0.0
0.0
0.0
1.0
11.0
1.0
Max
53.343
26.672
0.941
0.936
2,785.48
1
73,791
24,469
24,113
42,973,517
42,980,043
1,643,749
73,148,002
2,391,502
4,043,528
1,647,816
Median
1.893
0.947
0.025
0.001
1,271.79
0.416
7
39
40
768
860
626
92
341
1,110
663
Mean
2.889
1.444
0.047
0.003
1,312.68
0.389
88.058
151.107
162.092
Std
3.4
1.7
0.067
0.017
570.68
0.189
931.786
466.91
484.83
30,118.416
30,287.708
4,037.163
70,057.296
4,345.554
8,605.852
4,132.8
484,602.04
484,771.67
31,026.64
1,289,299.62
39,425.02
70,357.23
31,247.4
5.1.3 User-Join Curve Categorization
(cid:82) tS
0
end
qS(x)dx
tS
end
After matching the UJCs with their best-fit
quartic functions, we could now categorize the
different UJCs. For each matched quartic func-
tion qS(x) of subreddit S, we defined the nor-
malized area function norm-area : qS → [0, 1]
as:
norm-area(qS) := narea(qS) :=
In considering the 11,273 subreddit norm-areas,
we observed that the norm-area distributions
were skewed to the right, with a minimal value
of 0.065, a maximal value of 0.935, and a me-
dian value of 0.4, with a standard deviation of
0.159 (see Figure 2).
As a rule of thumb, we can foresee that fast
growing subreddits, such as the Blogging sub-
reddit (see Figure 1), will have a relatively
small norm-area value of close to 0. On the
other hand, subreddits that had their growth
halted for a relatively long time, such as the
Eagle-Scouts subreddit (see Figure 1), will have
a norm-area of about 1, and subreddits with
constant growth rates will have a norm-area
of about 0.5. Keeping this in mind, we di-
vided the matched polynomials into five sets,
according to their norm-area values: Set 1,
{qSnarea(qS) ∈ [0, 0.24)} (with 905 UJCs);
Figure 2: Normalized matched quartic functions'
area distributions.
Set 2, {qSnarea(qS) ∈ [0.24, 0.4)} (with 4,733
UJCs); Set 3, {qSnarea(qS) ∈ [0.4, 0.56)} (with
3,435 UJCs); Set 4, {qSnarea(qS) ∈ [0.56, 0.72)}
(with 1,483 UJCs); and Set 5, {qSnarea(qS) ∈
[0.72, 1)} (with 717 UJCs). For the five sets
of matched polynomials, we calculated the
various coefficient distributions and manually
viewed the UJC graph visualizations for each
set,9 and we observed the following:
1. The majority of the UJCs with narea ∈
[0, 0.24) (Set 1) have positive d and e co-
efficients. Therefore, these UJCs typically
have a cubic or quartic growth rate (referred
to as polynomial growth).
9The UJC graphs are available for download; see Sec-
tion 9.
7
0.00.20.40.60.81.0Normalized AreaAnalyzing the Effect of Vertex-Joining Time • August 2016
2. The majority of the UJCs with narea ∈
[0.24, 0.4) (Set 2) have a negative e co-
efficient. Additionally, by manually re-
viewing the UJCs, we observed that in
most cases these UJCs have a sublinear
growth rate. The growth typically starts
relatively slowly and then changes into
linear growth.
3. The majority of the UJCs with narea ∈
[0.4, 0.56) (Set 3) have relatively large c
coefficients. However, in most cases the
d and e coefficients have opposite signs;
one is positive and the other is negative.
This indicates that most of the UJCs do not
grow at a fast rate. By manually reviewing
the UJCs in this set, we observed that these
UJCs have a nearly linear growth rate.
4. The majority of the UJCs with narea ∈
[0.56, 0.72) (Set 4) have a relatively high
positive b coefficient. However, in most
cases the d and e coefficients have oppo-
site signs, indicating that most of the UJCs
do not grow at a polynomial rate. Indeed,
by manually examining the UJCs, we ob-
served that most UJCs in this set have a
superlinear growth rate. Many of the UJCs
in this set started with a faster than linear
growth rate and then dropped to a linear
growth rate.
5. The majority of the UJCs with narea ∈
[0.72, 1) (Set 5) have relatively high pos-
itive b and d coefficients, and low nega-
tive c and e coefficients. This indicates
that the UJCs grew very fast and then
slowed down until the growth stopped.
Indeed, we observed a growth pattern in
these UJCs which is similar to the sigmoidal
growth rate.
Additionally, we inspected the growth pat-
terns of the 692 UJCs that did not match quartic
functions. As mentioned in Section 5.1.2, 274
of these UJCs matched the MMF model, which
has a sigmoidal growth rate. A closer look at the
remaining 418 anomalous UJCs revealed that
external events often affected the growth, such
as the launch of a new season of TV shows. We
refer to this growth pattern as events-oriented
growth.
8
5.1.4 User-Join Curve Prediction
One of this study's goals was to understand
how various UJC growth rates affect networks'
topologies. To achieve this goal, using the
11,965 selected subreddits, we first calculated
the Pearson correlations between the subred-
dit topological features (see Section 4.2) and
the subreddit normalized-area values (see Sec-
tion 5.1.3). Then, we used regression algo-
rithms to construct models which could predict
a subreddit's normalized-area values. Lastly,
we used different classification algorithms to
construct classifiers that could predict UJC cat-
egories based on their topologies. In the rest
of this subsection, we provide an overview of
each method we used and the obtained results.
Correlations. We calculated the Pearson cor-
relations between the 11,965 subreddit social
network topological features and their normal-
ized areas. The obtained results indicate that
there is a weak positive correlation between
norm-area and the network's average cluster-
ing coefficient (r = 0.23), and also between the
norm-area and the network's density (r = 0.21).
Additionally, there is a negligible negative cor-
relation between the norm-area and the net-
work's maximal in-degree (r = −0.12), as well
as between the norm-area and the maximal
out-degree (r = −0.14). Moreover, there is
a moderate negative correlation between the
norm-area and the Days feature (r = −0.47).
Regression Analysis. We constructed re-
gression prediction models, which can pre-
dict a subreddit's UJC normalized area using
GraphLab Create [14]. We evaluated three re-
gression models:
linear regression, Boosted
Trees regression, and Random Forest regres-
sion. We created these models twice, one time
using all the topological features described in
Section 4.2 and the second time with all the
features plus the Days feature. We evaluated
the models using 10-fold cross validation and
measuring the models' average value of (a)
mean absolute error (MAE), (b) mean square
error (MSE), and (c) root mean squared error
(RMSE).
Out of these regression models, the Boosted
Analyzing the Effect of Vertex-Joining Time • August 2016
Trees regression presented the best results,
which were slightly better than the linear and
Random Forest models, with MAE = 0.125,
MSE = 0.027, and RMSE = 0.163, using only
the topological features; and MAE = 0.114,
MSE = 0.232, and RMSE = 0.152, using the
topological features plus the Days feature. Ad-
ditionally, the linear regression model created
using the 11,965 subreddits' topology features
presented an R2 value of 0.125, using only the
topological features, and an R2 value of 0.262,
using all the topological features plus the Days
feature. Moreover, in the linear regression
model constructed with all the features, the CC,
T, and
D,
WCC had positive coefficients. The Avg-deg,
E, LC-Ratio, Max-out-deg, Single, V, and
Days had negative coefficients.
ELC,VLC, Max-in-deg, Loops,
Supervised Learning. We constructed su-
pervised learning classifiers which can classify
the category of the subreddit's UJC, based on
only the 11,965 selected subreddits' topological
features, in the following way: First, we created
a labeled dataset with the six growth categories
we defined in Section 5.1.3. Next, using the
labeled dataset, we used WEKA [9] and con-
structed various classifiers using the following
algorithms: OneR, J48 decision tree, Logistic,
K-Nearest-Neighbors (KNN) with K = 1, Ro-
tation Forest, and Random Forest. Then, we
evaluated each classifier using the 10-fold cross
validation method and calculated the classi-
fier's AUC (area under the ROC curve) values.
Lastly, we repeated the construction and eval-
uation process, only this time with only two
growth categories -- polynomial growth and
sigmoidal growth.
Out of all the trained classifiers, the Logistic
classifier obtained the best results, in terms of
AUC, on both datasets. On the first dataset,
with six categories, the Logistic classifier ob-
tained the highest weighted average AUC and
the highest correct classification percentage of
0.64 and 41.2%, respectively. These results were
considerably better than the simple OneR and
KNN classifiers that obtained weighted aver-
age AUCs of 0.52 and 0.53, and correct classifi-
cation percentages of 37.4% and 31.7%, respec-
tively. On the second dataset, which consisted
of subreddits with only polynomial growth
and sigmoidal growth, the Logistic classifier
obtained the highest AUC and highest true pos-
itive rate of 0.82 and 0.81, respectively. These
results were considerably better than the sim-
ple OneR and KNN classifiers that obtained
AUCs of 0.67 and 0.64, respectively.
5.2. Vertices' Join-Time Difference
Similar to Price's observation [17] that new pa-
pers tend to be cited more than older papers,
we noticed that redditors tend to be more en-
gaged with other redditors who joined the net-
work at a similar time, and less engaged with
redditors who became active either a long time
before or after they did. To validate our obser-
vation, for each edge e in 362,230,386 links in
the full Reddit network, we calculated the join-
time difference in days (etimedi f f ) between each
edge's vertices (see Section 4.2). Afterwards,
we calculated the probability of each time dif-
ference value. Moreover, we utilized regression
analysis to match a function that estimated the
probability of two redditors connecting, based
on the join-time difference.
The analysis results are presented in Figure 3.
Additionally, using regression analysis, we dis-
covered that the probability of two redditors
with join-time difference t to be linked can be
estimated to be:
link-probability(t) ≈ 0.002e−0.0019t
According to these results, we can observe
that the probability of two redditors to be
linked decreases sharply as the join-time dif-
ference between them increases. For example,
while over 51% of edges are between users
with a join-time difference of less than a year,
only 1% of edges are between redditors with a
join-time difference of over 5 years.
6. The Temporal Preferential
Attachment Model
Inspired by the above results in which the ver-
tex join-rate changes over time and edges tend
9
Analyzing the Effect of Vertex-Joining Time • August 2016
g ← empty undirected graph
TimeGroupsList ← empty list
for i = 0 to l.length do
NewVerticesList ← list of l[i] new vertices
AddNewVerticesTimeGroup(NewVList,i)
AddVerticesToGraph(g NewVList)
AddToList(TimeGroupsList, i)
for v in NewVerticesList do
Algorithm 1 The Temporal Preferential Attach-
ment Model Algorithm Overview
1: procedure GenerateRandomGraph
Require: m, l, f
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12: procedure AddRandomEdges
Require: g,v,m,f
13:
14:
15:
16:
17:
18:
r ← SelectFromList(TimeGroupsList,f)
u ← GetVertexInGroupByDegree(g,r)
AddRandomEdges(g,v,m,f)
for j = 0 to m do
repeat
until (v, u) /∈ g
AddEdge(g,v,u)
: N → R) that given
a function (denoted f
a time difference value, returns the relative
probability of an edge existing across two time
groups. The algorithm starts by creating an
empty undirected graph (line 1) and an empty
time group list (line 2). Then, for each pos-
itive integer l[i] in l, the algorithm does the
following: (1) creates new l[i] vertices with the
time group set to i (lines 5-6); (2) adds the new
vertices to the graph (line 7); (3) adds i to the
TimeGroupsList (line 8); and (4) connects each
new added vertex to the other m vertices using
the AddRandomEdges procedure (line 10).
The AddRandomEdges procedure (lines 12-
18) is the core of the model. The procedure
receives as input five parameters: a graph
(g), a vertex (v), the number of edges (m), a
probability time difference function ( f ), and a
list of existing time groups (TimeGroupsList).
The AddRandomEdges procedure connects v
to m other vertices in the graph using the
following routine. First, it randomly selects
from TimeGroupsList a time group (denoted
r) where the probability of selecting each time
group is given by f (line 1).10 Then, similar to
the BA model, the procedure selects one vertex
10Given t1, t2, .., tn time groups, the actual probability of
an edge being created between two time groups with a
Figure 3: Edge time difference distribution. It can
be observed that as the join-time difference between
two redditors increases, the probability of a link
between them decreases sharply.
to be formed among vertices with similar join
times, we developed the TPA model for gener-
ating undirected random networks. The model
is a generalization of the well-known BA model
[4], with two main extensions: (a) instead of
adding one vertex in each iteration to the net-
work, the TPA model inserts a set of vertices in
each iteration, where the set's size can be modi-
fied in each iteration; and (b) the probability of
an edge forming between two vertices is neg-
atively correlated with the time gap between
the two vertices' join times.
In the rest of this section, we first formally
define the TPA model. Subsequently, we evalu-
ate the model by using it to generate various
random networks of different sizes, and we
compare the constructed networks' properties
to the properties of real-world networks as well
as to random networks created by other mod-
els.
6.1. The TPA Model Algorithm
An overview of the TPA model algorithm is
presented in Algorithm 1. The TPA model
receives as input three parameters: first, the
number of edges (denoted m) to attach a new
vertex to existing vertices; second, an integers
list (denoted l) with the number of vertices to
add to the graph in each iteration; and third,
10
05001000150020002500Days Difference0.00000.00050.00100.00150.00200.0025Analyzing the Effect of Vertex-Joining Time • August 2016
(u) among all the vertices that are in the se-
lected time group r, where vertices with higher
degree have higher likelihood of being selected
(line 16). In case the edge (u, v) already exists
in the graph, then the selection process of u
is repeated until a new u in the graph is cre-
ated.11 A detailed implemented TPA model
in Python can be found in the paper's website
(see Section 9).
To illustrate our TPA model algorithm, we
can create a random graph using the following
input parameters: m = 3, l = [100, 200, 400],
and f (t) = 2−1−t. We start running the model
with an empty graph. In the first iteration, we
add 100 (l[0]) new vertices to the graph, and
each new vertex has a time group value of 0.
In this iteration there are not any other time
groups. Therefore, the 100 new vertices will
only create 300 (100 · 3) edges among them-
selves in the following manner: each vertex
will select 3 other vertices in the group, and
similar to the BA model, vertices with higher
degree will have higher probability of being
selected, and the "richer" vertices will have a
higher probability of becoming "richer."
In the second iteration, the model will in-
sert 200 (l[1]) new vertices which will form 600
(200 · 3) new edges. However, this time we
have two time groups: (a) a time group of 1
(with time difference 0), which contains all the
200 new vertices, and according to the time
difference probability function, the probability
of each new vertex establishing a connection
to this group is f (0) = 2−1−0 = 0.5; and (b)
a time group of 0 (with time difference of 1),
which contains the previous 100 vertices, with a
probability of f (0) = 2−1−1 = 0.25 of connect-
ing to vertices in this time group. According
to these parameters, we can observe that the
probability ratio of the two time groups is 2 to
1. Therefore, we can use this ratio to estimate
that out of the 600 edges of the second iteration,
about 400 edges will be formed among the ver-
time difference of d ≤ n is equal to
11In the Python implementation of the TPA model, to
prevent cases where it is impossible to add new edges to v,
we limited the number of repeats and moved on to connect
the next vertex.
f (d)
∑i∈[1,n] f (ti) .
tices of time group 1, and about 200 edges will
be formed among the vertices of time group
1 and time group 0, where each edge has a
higher probability of connecting vertices with
higher degree.
Lastly, in the third iteration, our model will
insert an additional 400 (l[2]) new vertices to
the graph with a time group value of 2. These
vertices will formulate 1200 (400 · 3) edges, of
which about 686 will be among the vertices of
time group 2; about 343 edges will be among
the vertices of time groups 2 and 1 (time differ-
ence of 1), and about 171 edges will be among
the vertices of time groups 2 and 0 (time differ-
ence of 2). Overall, the TPA model will have
constructed a graph with 700 vertices and 2,100
edges.
6.2. TPA Model Evaluation
To empirically evaluate the TPA model, we
created various random networks by using var-
ious input parameters:
1. The vertices number was set to three differ-
ent sizes: 700, 6,200, and 12,350.
2. The edge number, parameter m, was set to 3,
creating networks with about 2,100, 18,600,
and 37,050 edges.
3. We used linear, polynomial, and sigmoidal
vertices growth rates. For the linear growth
rate, we added 10 new vertices in each it-
eration. For the polynomial growth rate,
we used the sequence of 5, 20, 45, ..., 5 · x2,
with a maximal x value of 8, 16, and 20
for creating networks with 2,100, 18,600,
37,050 edges, respectively. For the sig-
moidal growth rate, we used the same
growth sequence as used in polynomial
growth only in reverse order.
4. We used f (t) = 2−1−t and f (t) = 0.8 · 0.2t
functions as time difference functions ( f ),
where the f (t) = 0.8 · 0.2t will create con-
siderably more edges among all the ver-
tices in the same time group than f (t) =
2−1−t.
Overall, we assembled 18 different parame-
ter settings for generating random networks.
For each parameter setting, we utilized the TPA
11
Analyzing the Effect of Vertex-Joining Time • August 2016
Table 2: Random Networks' Topological Properties
Model
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
TPA
BA
BA
BA
WS
WS
WS
V
700
700
700
700
700
700
6200
6200
6200
6200
6200
6200
12350
12350
12350
12350
12350
12350
700
6200
12350
700
6200
12350
Rate
Linear
Poly.
Sig.
E
2100
2095
2100
2100
2095
2100
18600 Linear
Poly.
18595
18600
Sig.
18600 Linear
Poly.
18595
18600
Sig.
37050 Linear
Poly.
37045
37050
Sig.
37050 Linear
Poly.
37045
37050
Sig.
2091
18591
37041
2100
18600
37050
Linear
Poly.
Sig.
-
-
-
-
-
-
f
2−1−t
2−1−t
2−1−t
0.8 · 0.2t
0.8 · 0.2t
0.8 · 0.2t
2−1−t
2−1−t
2−1−t
0.8 · 0.2t
0.8 · 0.2t
0.8 · 0.2t
2−1−t
2−1−t
2−1−t
0.8 · 0.2t
0.8 · 0.2t
0.8 · 0.2t
-
-
-
-
-
-
CC
0.063
0.03
0.053
0.15
0.07
0.094
0.045
0.007
0.012
0.141
0.025
0.029
0.044
0.004
0.007
0.139
0.017
0.02
0.04
0.008
0.005
0.444
0.442
0.443
dmax Avg. SP
28.4
37.2
58.1
28.0
43.8
54.0
32.8
61.1
119.5
31.6
97.4
113.2
33.1
81.7
155.4
33.0
116.0
163.6
82.9
234.4
362.2
8.9
9.8
10.1
4.23
3.7
3.73
5.78
3.96
4.19
13.62
4.89
4.92
31.03
5.59
5.79
24.23
5.3
5.36
60.69
6.27
6.51
3.36
4.12
4.36
5.76
8.11
8.85
k−γ
k4.41
k4.13
k3.7
k3.81
k3.53
k3.32
k6.95
k4.07
k3.62
k3.18
k3.37
k3.26
k7.14
k4.3
k3.72
k7.15
k3.35
k3.34
k3.13
k3.07
k3.04
-
-
-
model to create 18 random networks. Subse-
quently, for each network, we calculated the
network's average clustering coefficient (de-
noted CC), the maximal degree of vertex in the
network (denoted dmax), the network's average
shortest paths value (denoted Avg. SP), and
the power law function (k−γ) that matched the
degree distribution of the network. To reduce
variance of the calculated features, we repeated
the network construction process and feature
calculations 10 times for each parameter setting
and calculated the average value of each fea-
ture. The results of these calculations are pre-
sented in Table 2. Furthermore, for comparing
the TPA model to other models, we used both
the BA model and the Watts-Strogatz model to
generate random networks of similar sizes (see
Table 2).12
7. Discussion
By analyzing the results presented in Sec-
tions 4, 5, and 6, the following can be noted:
First, from the construction process results
presented in Section 4.1, we can observe that
most of Reddit's online communities have an
activity period of less than a year. Moreover,
12The p parameter in the Watts-Strogatz model was set
to 0.1.
12
we can observe that the 11,965 selected subred-
dits, which are about 5% of all the subreddits
in the dataset, contain 1.38 billion posts; these
are 97.7% of all the posts in the constructed
clean Reddit dataset. This indicates that most
communities are short-lived and contain sig-
nificantly less content than what can be found
in other more active communities. Therefore,
studies aiming to analyze online communities
need to carefully select the communities they
choose to study.
Second, from Table 1 we can observe that
the Reddit dataset contains many types of com-
munities with a wide range of size scales and
with various topologies. However, from the
results presented in Section 5.1.2, we can sur-
prisingly observe that even though there are
many different social networks and the reasons
people join these communities are varied and
complex, in most online communities the UJCs
match quartic functions.
Third, according the correlation results pre-
sented in Section 5.1.4, we can observe that,
in general, UJCs with higher normalized ar-
eas typically have higher CC values. This ob-
servation aligns with the networks generated
by the TPA model, in which networks created
by sigmoidal growth usually presented higher
CC values than same-size networks created by
polynomial growth (see Table 2).
Fourth, by observing the regression results in
Section 5.1.4, which presented models with rel-
atively low RMSE values, and the classification
results presented in Section 5.1.4, which pre-
sented promising results with AUC of 0.82, we
can infer that analyzing a social network topol-
ogy can, in many cases, predict the normalized
area size of the UJC that created the network.
Therefore, in many cases, we can predict the
general pattern in which users joined the social
network. Moreover, according to the classifi-
cation results, the difference is noticeable be-
tween networks created by polynomial growth
and networks created by sigmoidal growth.
Lastly, according to the results presented in
Table 2, it can be noted that the TPA model
generates scale-free networks with similar de-
gree distribution to networks created by the BA
Analyzing the Effect of Vertex-Joining Time • August 2016
model, and with small average shortest path
values. Additionally, the TPA model can gen-
erate networks with much higher CC values
than the BA model. However, in most cases
networks created by the TPA model presented
much lower dmax values than networks of the
same size created by the BA model. Never-
theless, in the BA model most vertices with
high degree are likely vertices that join the
network in the first iterations. By setting the
TPA model's vertices join rate and time dif-
ference functions, it is possible to create ver-
tices with relatively high degree that join the
network in later iterations. This can more ac-
curately mimic a network's evolution process
and provide additional insight on how a newly
added vertex suddenly becomes popular, such
as when a post becomes viral in social net-
works.
8. Conclusions
Over a half century ago, Price estimated that
half of papers' citations contained new papers
while the other half were to "immortal" pa-
pers [17]. In the last decades, much of the focus
of network generation models was on connect-
ing new vertices in the graph to the "immortal"
vertices.
In this study, we demonstrate the
importance of time as part of the network evo-
lution process. We achieved this by analyzing a
large-scale dataset containing over 1.65 billion
comments. We analyzed 11,965 social networks
created from the dataset and showed that the
network UJCs have a high impact on the net-
works' structure (see Section 5). Moreover, we
showed that most edges are created between
users who joined the network in a time differ-
ence of less than a year (see Section 5.2).
Taking into account these observations, we
developed the TPA model, which incorporates
both the rate and time that vertices join the
network (see Section 6). Moreover, we demon-
strated that the TPA model can generate scale-
free networks with relatively high CC val-
ues and relatively small average shortest path
values (see Table 2). Even though the TPA
model is fairly simple, we believe it presents a
more accurate model of the evolution process
of complex networks than other preferential
attachment-based models. Moreover, the TPA
model will help in better understanding the
role of time in the network evolution process.
In the future, we hope to analytically ana-
lyze the TPA model and create a similar model
for creating directed and weighted networks.
Additionally, we plan to explore how different
input parameters influence the created network
topology. Another research direction we hope
to pursue is to analyze the effect of different
UJCs on the topologies of various complex net-
works, such as biological networks. Moreover,
the large corpus of social networks created and
released as a result of this study can greatly
contribute to better understanding online com-
munities and complex networks. According
Albert-László Barabási, "If data of similar de-
tail capturing the dynamics of processes taking
place on networks were to emerge in the com-
ing years, our imagination will be the only
limitation to progress" [5].
9. Data and Code Availability
Instructions on how to download the raw Red-
dit dataset are available in the following Reddit
post. Additionally, the dataset can be down-
loaded from this link. This study is repro-
ducible research. Therefore, the social network
datasets and a considerable part of the study's
code, including implementation of the TPA
model, are available at the project's website,
which also gives researchers the ability to in-
teractively explore and better understand the
social networks in this study's dataset.
10. Acknowledgments
First and foremost, we would like to thank
Jason Michael Baumgartner for making the
Reddit dataset available online. We would
like to thank Carol Teegarden for editing and
proofreading this article to completion. We
also want to thank Stephen Spencer for his
IT expertise, which greatly assisted us during
this research. Additionally, we thank the AWS
13
Analyzing the Effect of Vertex-Joining Time • August 2016
Cloud Credits for Research. We also thank
the Washington Research Foundation Fund for
Innovation in Data-Intensive Discovery, and
the Moore/Sloan Data Science Environments
Project at the University of Washington for sup-
porting this study.
References
[1] R. Albert and A.-L. Barabási. Statistical
mechanics of complex networks. Reviews
of modern physics, 74(1):47, 2002.
[2] J. Alstott, E. Bullmore, and D. Plenz. pow-
erlaw: a python package for analysis
of heavy-tailed distributions. PloS one,
9(1):e85777, 2014.
[3] M. Armbrust, A. Fox, R. Griffith, A. D.
Joseph, R. Katz, A. Konwinski, G. Lee,
D. Patterson, A. Rabkin, I. Stoica, et al. A
view of cloud computing. Communications
of the ACM, 53(4):50 -- 58, 2010.
[4] A.-L. Barabási and R. Albert. Emergence
of scaling in random networks. science,
286(5439):509 -- 512, 1999.
[5] A.-L. Barabási et al. Scale-free networks: a
decade and beyond. science, 325(5939):412,
2009.
[6] K. Bergstrom. "don't feed the troll": Shut-
ting down debate about community ex-
pectations on reddit. com. First Monday,
16(8), 2011.
[7] M. Bostock, V. Ogievetsky, and J. Heer. D3
data-driven documents. Visualization and
Computer Graphics, IEEE Transactions on,
17(12):2301 -- 2309, 2011.
[8] E. Estrada. Journal of complex networks:
Quo vadis? Journal of Complex Networks,
1(1):1 -- 2, 2013.
[9] M. Hall,
E.
Frank, G. Holmes,
B. Pfahringer, P. Reutemann,
and
I. H. Witten. The weka data mining
software: an update. ACM SIGKDD
explorations newsletter, 11(1):10 -- 18, 2009.
14
[10] P. Holme and B. J. Kim. Growing scale-
free networks with tunable clustering.
Physical review E, 65(2):026107, 2002.
[11] D. Hyams. Curveexpert software. http:
// www. curveexpert. net , 2010.
[12] S. R. Kairam, D. J. Wang, and J. Leskovec.
The life and death of online groups: Pre-
dicting group growth and longevity. In
Proceedings of the fifth ACM international
conference on Web search and data mining,
pages 673 -- 682. ACM, 2012.
[13] J. Leskovec, L. Backstrom, R. Kumar, and
A. Tomkins. Microscopic evolution of so-
In Proceedings of the 14th
cial networks.
ACM SIGKDD international conference on
Knowledge discovery and data mining, pages
462 -- 470. ACM, 2008.
[14] Y. Low, J. E. Gonzalez, A. Kyrola, D. Bick-
son, C. E. Guestrin, and J. Hellerstein.
Graphlab: A new framework for par-
arXiv preprint
allel machine learning.
arXiv:1408.2041, 2014.
[15] M. E. Newman. The structure and func-
tion of complex networks. SIAM review,
45(2):167 -- 256, 2003.
[16] M. E. Newman and M. Girvan. Finding
and evaluating community structure in
networks. Physical review E, 69(2):026113,
2004.
[17] D. Price. Statistical studies of networks
of scientific papers. In Statistical Associa-
tion Methods for Mechanized Documentation:
Symposium Proceedings, volume 269, page
187. US Government Printing Office, 1965.
[18] D. Price de Solla. A general theory of bib-
liometric and other cumulative advantage
process. Journal of the American Society of
Information Science, 27:292 -- 306, 1976.
[19] A. Sallaberry, F. Zaidi, and G. Melançon.
Model for generating artificial social net-
works having community structures with
small-world and scale-free properties. So-
cial Network Analysis and Mining, 3(3):597 --
609, 2013.
Analyzing the Effect of Vertex-Joining Time • August 2016
[20] J. Saramäki, M. Kivelä,
J.-P. Onnela,
K. Kaski, and J. Kertesz. Generalizations
of the clustering coefficient to weighted
complex networks. Physical Review E,
75(2):027105, 2007.
[21] T. Schank. Algorithmic aspects of triangle-
based network analysis. Phd in computer
science, University Karlsruhe, 3, 2007.
[22] D.
J. Watts
of
and S. H.
Strogatz.
â AŸsmall-
Collective
worldâ A ´Znetworks. nature, 393(6684):440 --
442, 1998.
dynamics
[23] E. W. Weisstein. Weakly connected com-
ponent.
[24] M. Zaharia, M. Chowdhury, M. J. Franklin,
S. Shenker, and I. Stoica. Spark: clus-
ter computing with working sets. In Pro-
ceedings of the 2nd USENIX conference on
Hot topics in cloud computing, volume 10,
page 10, 2010.
15
|
1305.4760 | 1 | 1305 | 2013-05-21T09:17:16 | How modular structure can simplify tasks on networks | [
"cs.SI",
"cs.DS",
"physics.soc-ph",
"q-bio.QM"
] | By considering the task of finding the shortest walk through a network we find an algorithm for which the run time is not as O(2^n), with n being the number of nodes, but instead scales with the number of nodes in a coarsened network. This coarsened network has a number of nodes related to the number of dense regions in the original graph. Since we exploit a form of local community detection as a preprocessing, this work gives support to the project of developing heuristic algorithms for detecting dense regions in networks: preprocessing of this kind can accelerate optimization tasks on networks. Our work also suggests a class of empirical conjectures for how structural features of efficient networked systems might scale with system size. | cs.SI | cs |
How modular structure can simplify tasks on networks
Binh-Minh Bui-Xuan and Nick S. Jones
CNRS -- APR, LIP6, UPMC and
Department of Mathematics, Imperial College London
By considering the task of finding the shortest walk through a network we find an algorithm for
which the run time is not as O(2n), with n being the number of nodes, but instead scales with the
number of nodes in a coarsened network. This coarsened network has a number of nodes related
to the number of dense regions in the original graph. Since we exploit a form of local community
detection as a preprocessing, this work gives support to the project of developing heuristic algorithms
for detecting dense regions in networks: preprocessing of this kind can accelerate optimization tasks
on networks. Our work also suggests a class of empirical conjectures for how structural features of
efficient networked systems might scale with system size.
The last decade has seen a widespread appreciation that networks in Nature have a structure which makes them
poorly modeled as samples from the more traditional random graph ensembles [1, 2]. A feature of many real networks is
that a marked modular (or community) structure is present [3 -- 6] where a network community is a subset of nodes with
relatively dense connections within the subset but sparse connections to the rest of the network. Though algorithms
for detecting communities are actively constructed in physics, mathematics, engineering and computer science, the
reason for detecting these dense regions is not always articulated. Studies of empirical graphs suggest that nodes
in the same community tend to have similar properties in the world and thus community detection can help us, for
example, assign functional labels to uncharacterized nodes [3]. In this paper we investigate how community detection
can also help simplify problems on graphs.
Even though community detection tasks can be hard [8, 9] experience with greedy algorithms suggests that plausible
solutions can be found quickly for networks with a pronounced community structure (though, of course, sub-optimal
solutions need to be treated with care [10]) [3]. Recent theoretical work in network physics and computer science also
suggests that for certain types of graphs, community detection need not be costly [11 -- 13]. It is also the case that a
marked community structure is present in many empirical networks and that networks with similar functions appear
to have similar community structure [4 -- 6].
It is possible that this similarity occurs because community structure
constrains dynamics on the graphs. Indeed it has been found that particular choices of dynamics on networks can
in turn correspond to particular methods for detecting communities in graphs [14]. The literature asking why the
networks we observe in the world are modular is substantial [15]: one might speculate that assembly rules for real
networks are such as to simplify either optimization tasks or dynamics on them and so in turn this leads to a pronounced
community structure. The notion that networks in nature are often optimized for transport is an established part of
theoretical biological physics (e.g. [16]).
Parameterized Complexity: Weakly coupled to the stream of empirically motivated networks literature is recent
work in computational complexity called parameterized complexity, or fixed parameter tractability [17]. The concerns
of this vibrant field are common to the empirical interests of the network research community: how do (parameterized)
constraints on graph structure simplify problems on graphs? Researchers in empirical studies of networks ask: how
are real world networks simple? Asking whether some hard problems are simple on empirical graphs is thus natural.
In the following, though we use recent work from parameterized complexity, we will not be providing algorithms that
have computational cost scaling in polynomial time with network size; instead we will show that a problem scaling
like 2n (n is the number of nodes in the graph) can be converted into one which scales like ≤ 2n but where we can
suggest n ≪ n by relating n to (a local version of) the number of communities in the graph.
Hamiltonian Walk and Communities Motivated by the above observations, we ask whether a particular problem,
Hamiltonian Walk, HAMWALK (an NP-hard task [18]) is simpler on networks with pronounced community structure.
We define a Hamiltonian Walk as a shortest closed walk on a graph which visits every node at least once [20, 21]. The
study of self avoiding walks on lattices and fractals is an established area of probability and statistical physics and
modifications which allow limited self crossings have been considered [22]; problems of this kind are of broad relevance
to understanding percolation and polymer phenomena. We note, of course, that the interface between problems in
computational complexity and statistical physics is now a lively one [23].
We hypothesize that partitioning graphs into communities, coarsening the graphs to yield smaller graphs with
nodes representing entire communities [24], and then solving problems on the coarsened graph and on the individual
communities of the full graph in combination, might lead to significant computational speed-ups for some real graphs
and appropriately chosen optimization tasks (see Fig 1). We hope to exploit the fact, noted above, that empirical
networks often have pronounced community structure and finding this structure need not be hard.
2
FIG. 1: Community detection can be fast if pronounced communities are present [11, 12]. Solutions to optimization problems
on the coarsened graph can sometimes be converted into solutions for the full graph.
For real networks this hypothesis could be converted into a class of heuristic algorithms for solving optimization
problems. It thus seems desirable to see whether the preceding intuition can be expressed mathematically: is there a
class of (crudely) realistic graphs for which HAMWALK has a runtime scaling which is provably less than the O(2n)
bound that can currently be achieved [18]? We believe this both motivates further work in providing tighter runtime
bounds for more realistic graphs, justifies the development of appropriate heuristic optimization algorithms and makes
a connection between parameterized complexity and network empirics: making explicit the notion that the modular
network structure we observe in Nature could help simplify tasks for networked systems.
In Ref.
A local clustering algorithm:
[11] the authors study the runtime of finding partitions of networks into
clusters (disjoint sets of nodes) where each cluster, Ci (for all i), has (i) a total number of links connected to nodes
not in Ci that is ≤ δ (call this the degree of Ci) and (ii) the number of pairs of nodes in Ci between which there is no
link is ≤ µ. This bears some resemblance to the local community detection in Ref. [25] and seeks to identify sets of
densely connected nodes (µ small) which are isolated from other such sets (δ small). If δ is treated as a fixed input
then, remarkably, this problem can be solved in randomized time 2O(µ)nO(1). Similarly if µ is held fixed then the run
time is 2O(δ)nO(1) [11].
Special cases: We first run an algorithm that detects all clusters in graph, G, with degree ≤ δ and ≤ µ missing
links [11]. In the simple case when δ = 2 and µ = 0 a naive solution is as follows. Define a coarsened version of
G, G′, in which, for each cluster taken consecutively (the order is irrelevant), all nodes of the cluster are removed
and substituted for a single node, called a cluster-node, which is connected to the nodes (≤ 2 nodes) to which the
cluster was previously connected. We then solve HAMWALK on G′ using the Held-Karp algorithm a [18, 19] and
obtain a walk (in G′) as result. We finally expand this walk to become a walk in G simply by a replacement of every
cluster-node by its original cluster of G and quickly computing an appropriate paths through the clique (note that
µ = 0 so this task is simple). It is a standard exercise to check the obtained walk is indeed a Hamiltonian walk of
G. The intuition behind is that sets of nodes which are strongly isolated from the rest of the graph (like in the case
of δ = 2) allow marked simplifications of problems on the graph. This provokes the question that we consider in the
following: does this intuition hold for richer classes of graphs, with more general δ and µ?
Unfortunately, unlike the previous case, not all solutions to HAMWALK(G′) can be easily modified to make
solutions to HAMWALK(G). Consider the graph G and its coarsened graph G′ in Fig. 2 A) and B). Both W ′
1 =
(a, x, f, g, h, x, i, j, a) and W ′
1 can be expandable to
a Hamiltonian walk of G just by replacing the first occurrence of x with b and the second occurrence of x with
c, d, e, namely to obtain W1 = (a, b, f, g, h, c, d, e, i, j, a) (a cycle, hence optimal in size). However, applying such local
expansions on W ′
2 will not be as successful (not a cycle, because of multiple occurrence of j, hence, longer walk than
before).
2 = (a, j, f, g, h, j, i, x, a) are Hamiltonian walks of G′. Here, W ′
Given the above one might conclude that if we carefully count the number of times that each cluster-node is
visited, that will help us extend, simply, our walks on G′ to walks on G.
1 visits x
twice, whereas W ′
2 visits x only once, so it could be that the number of visits to the cluster-node x is important.
However, graphs exist which allow two solutions to HAMWALK(G′) which visit cluster-nodes the same number of
times but which do not both allow a simple expansion to a solution for G e.g., Fig. 2 C) and D). In G′ (Fig. 2D),
In the preceding example W ′
1 = (a, b, c, d, x, i, j, k, l, a, m, n, p, x, a) and W ′
2 = (a, b, c, d, x, i, j, k, l, i, x, p, n, m, a) are walks of G′ visiting
both W ′
cluster-node x twice. W ′
1 can be locally expanded to a Hamiltonian walk of G by replacing the first occurrence of
x with e, h and the second occurrence of x with f, g: W1 = (a, b, c, d, e, h, i, j, k, l, a, m, n, p, f, g, a) is a Hamiltonian
walk of G. One can check that W ′
2 cannot be expanded to a Hamiltonian walk of G only by replacing occurrences of
x with vertices from {e, f, g, h}, by exhaustive case analysis for instance (the edge (h, i) must be traversed twice).
3
A)
B)
d
b
e
c
a
f
g
j
h
i
a
f
x
g
j
h
i
C)
a
l
k
b
c
d
g
m
n
p
h
e
f
i
j
D)
b
c
d
m
n
p
a
l
k
x
i
j
FIG. 2: A) Graph G, where {b, c, d, e} is a clique. B ) Coarsened graph G′ where clique {b, c, d, e} is replaced by cluster-node
x. C ) and D) a further example of original graph G and coarsened graph G′.
Solving HAMWALK with parameters δ and µ We now consider the case when δ and µ are unspecified positive
integers, we proceed as follows. Each ith cluster, Ci, will contain a set of shell nodes, Si, which are defined as being
in Ci and either have a link to a node which is not in Ci, or lack a link to a node which is in Ci. When Ci > 2 · Si,
we define another set of nodes, called second shell nodes, Ti, which are taken randomly from Ci \ Si so that Si = Ti
(Si ≤ δ + 2µ). We call nodes which are in each detected cluster but which are neither shell nodes nor second shell
nodes, good bulk nodes, GBi = Ci \ Si \ Ti. GBi is thus a clique; it is this simple structure we will exploit in the
following. The set Ti is a device which will help simplify our proof.
We now define a coarsened version of G, G′, in which, for each cluster with degree ≤ δ, and at most µ missing links
and Ci > 2 · Si, all nodes in the good bulk are removed and substituted for a single node, called the coarsened
good bulk node, bi, which is connected to all of the shell and second shell nodes in the cluster. We will later discuss
coarsened walks: a walk on G is coarsened to a walk on G′ by identifying consecutive (or single) walker visits to nodes
in GBi and substituting them for single visits to the coarsened good bulk node bi.
The outline of our proof is as follows: we create a coarsened graph, G′, in which all nodes in each clique GBi are
represented as single node bi and all other nodes are left untouched. We solve HAMWALK by a standard method on
the coarsened graph. We show that, because of the simplicity of the cliques GBi and, noting the properties of the
shell and second shell, that this walk can be converted into a solution to HAMWALK on the original graph in a time
polynomial in n. The use of the two shells will allow us to avoid problems identified in the examples above.
Claim 1: any Hamiltonian walk of G′ can, with resources polynomial in network size, be converted to a Hamiltonian
walk of G′ that visits every coarsened good bulk node once and only once.
Proof of Claim 1: It is easy to check whether a Hamiltonian walk of G′ visits every coarsened good bulk node
once and only once. If this is not the case, we can repeatedly perform the following substitutions. Call b one of the
coarsened good bulk nodes which is visited more than once. Consider any walk with a visit to b: it is either of the
form a) sibsi or sibsj i 6= j, where si and sj are nodes in the shell of the cluster to which b belongs, or b) tibti or
tibtj i 6= j, where ti and tj are second shell nodes, or c) sibtj (or tibsj), where si is a shell node and tj a second shell
node. Now we can obtain another closed walk that still visits every node of G′ at least once, b included, as follows:
a) replace sibsi by si, or replace sibsj by sitsj, where t is any node from the second shell; b) replace tibti by ti, or
replace tibtj by titj; c) replace sibtj by sitj. In all cases, the length of the modified walk is not increased, that is, if
the original is a Hamiltonian walk then the modified walk is still a Hamiltonian walk of G′. (cid:3)
Given any Hamiltonian walk of G′ we can thus obtain a Hamiltonian walk of G′ having the property described
in Claim 1. Denote its length by wG′. We can un-coarsen the walk into a closed walk on G by locally extending
using a greedy approach at every good bulk node. What Claim 1 implies is that the extended walk has length
wG′ + Pi(GBi − 1) (by exploiting the clique structure of GBi). Clearly, wG′ + Pi(GBi − 1) ≥ wG, where wG is
4
the length of Hamiltonian walks of G. Now, if this were an equality, we would have shown the following.
Main claim: any solution to HAMWALK(G′) can, with resources polynomial in network size, be converted into
solutions of HAMWALK(G).
Claim 2: there is always a Hamiltonian walk of G which, when coarsened to a walk on G′, visits coarsened good
bulk nodes once and only once.
The Main claim is true provided that Claim 2 is true. This is because it would imply that wG′ + Pi(GBi − 1)
is equal to wG (pick the Hamiltonian walk given by Claim 2 ; consider its coarsening on G′ whose length has to be
wG − Pi(GBi − 1); but this is also a closed walk of G′ that visits every node of G′ at least once and thus is of length
≥ wG′. We know from Claim 1 that wG′ + Pi(GBi − 1) ≥ wG and hence the Main claim follows).
Proof of Claim 2: Clusters are pairwise independent, so that we will only give a proof for Claim 2 with respect to
a particular cluster C, with set of shell nodes S, set of second shell nodes T , and set of good bulk nodes GB. Among
the Hamiltonian walks of G, consider one that makes distinct visits to nodes in GB the least number of times (a
distinct visit to GB is a part of a walk containing a contiguous sequence of nodes in GB immediately preceded and
followed by a visit to nodes not in GB). By contradiction suppose this walk contains repeated distinct visits to GB.
Consider visits to T ∪ GB: because nodes outside C can connect to T ∪ GB only via the shell S, such a visit has to
be of the form siwsj , where si and sj are shell nodes and w a walk in T ∪ GB. Denote by p the number of times
T ∪ GB is visited: some thought shows that p is no greater than S and hence not greater than T . Now replace the
first p − 1 visits to T ∪ GB keeping the same shell nodes but the walk in T ∪ GB is substituted for a random (chosen
without reuse) second shell node: for instance, siwsj is substituted for sitksj with some tk ∈ T . Denote the last visit
to T ∪ GB by skusl (this includes the p = 1 case) and substitute it for skvsl where v contains all nodes in T ∪ GB
(except for those of T that have been used for the p − 1 previous visits) and v visits all nodes of GB contiguously. We
now consider the result of these substitutions: clearly, this is still a closed walk that visits every node of G at least
once, furthermore, its has the same length (or less) as the original walk before substitutions. In other words, we have
obtained a Hamiltonian walk of G, but one that visits nodes in GB only once: a contradiction. (cid:3)
Algorithm solving HAMWALK: given µ and δ (where either µ or δ, but not both, might be a function of n) take
In the case that µ is fixed this takes a time nO(1)2O(δ) [11].
G on n nodes and create the graph G′ using [11].
Calculate the matrix of shortest paths for G′, and use the Held-Karp algorithm to find a solution to HAMWALK(G′)
[18, 19]. Convert it into one having the property described in Claim 1. Locally extend this to a walk in G using a
greedy substitution at every coarsened good bulk node. Return the latter as a solution to HAMWALK(G). Runtime:
2(2δ+4µ+1)nc+n′
+ nO(1)2O(δ) where nc is the number of clusters with degree ≤ δ, at most µ missing links, and
GB > 2 · S and n′ is the number of nodes which are not in clusters with GB > 2 · S (note S ≤ δ + 2µ). (cid:3)
A note on Clique-width: Clique-width is a quantity which has proved very popular in the area of parameterized
complexity:
it is related to a natural approach to assembling a graph [26]. We first define clique-width and then
note some implications of our work (thereby illustrating its relevance in parameterized complexity). We suppose a
k-graph has nodes with labels from the set {1, 2, ..., k}. We define a seed k-graph with one node and a label from this
set. The clique-width of a graph G is the smallest integer k such that G can be composed by repeated use of four
simple operations: a) generate: make a seed k-graph labeled by i, b) disjoint union: two distinct graphs are treated as
disconnected components of the same graph, c) combine: linking all nodes with label j with nodes labeled i, d) relabel:
all indices i replaced with j. This protocol can generate graphs which contain cliques. In this paper, clique-width
can be connected to the case where there are no missing links inside the cliques identified (µ = 0). In this case, it
can be proved fairly easily that the clique-width of the graph is ≤ k = (δnc + n′) and a corresponding protocol for
constructing the graph using the above four operations can be provided (this witness protocol, demonstrating that the
bound can be met, is called a k-expression). Given this protocol a number of Monadic Second Order Logic (MSOL)
problems can be solved (see [27] and the numerous MSOL problems therein) including the classic problem 'Minimum
Dominating Set' [28] in a time 2O(δnc+n′). This last follows from the recent observation that, given a k-expression for
clique-width k, Minimum Dominating Set can be solved in a time 22k [29]. Thus our result for HAMWALK can be
extended to other problems.
Discussion and Conclusions: We have proved that it is possible to solve HAMWALK in time 2(2δ+4µ+1)nc+n′
+
nO(1)2O(δ). Some care is required in the interpretation of this runtime. While δ and µ are parameters of the algorithm
(with forms which can be specified independent of the graph) by contrast nc is a feature of the graph for a given δ
and µ. Despite this, one can hope to construct graphs which have a given, nc, n′, δ and µ. To help the interpretation
5
of this result we thus consider the following graph family: all nodes are inside one and only one of nc clusters such
that for each cluster, µ is constant, 2O(δ) = nO(1), ncδ ≤ O(1) log n (for this family n′ = 0) and each cluster is of
size C > 2(δ + 2µ). This is a graph family composed of dense clusters in which links between the clusters and
missing links inside the clusters are proportionately rare (an equivalent family with the roles of µ and δ reversed could
also be considered): as graphs increase in size the number of clusters is relatively slow growing. HAMWALK can be
solved on this family in time nO(1) (if the values of µ and δ are not known in advance, finding appropriate choices
only yields a polynomial time overhead). In the intuitive case with µ and δ both constant, the number of clusters
increases as the logarithm of the number of nodes. Our abstract complexity based argument can be used to inspire a
class of empirical conjectures about optimal growing networks in Nature. Suppose that, in order to thrive, a network
in the world has to solve HAMWALK on itself efficiently for larger and larger system sizes. Given the above, we
might thus hypothesize that, if we have observations of the system at a variety of network sizes, we will find that
the number of communities would increase like the logarithm of the number of nodes. While few natural systems
are likely optimized to solve HAMWALK, this form of reasoning might allow us to relate the system-size scaling of
structural features to the tasks networked-systems are optimized to solve. Why natural networks might show modular
structure is a canonical question; beyond conjectured roles for communities like helping networked systems to control
their dynamics, or to be more evolvable [15], we have provided a concrete setting in which community structure helps
simplify optimization tasks.
The family specified above was selected to share some similarities with real networks, while remaining mathemat-
ically tractable: many real networks do have sets of densely connected nodes which are relatively isolated from the
rest of the network. The bound, δ, gives some indication of the modular nature of the graph: for graphs with appro-
priately small δ the clusters are more isolated from each other and it is easier to solve HAMWALK; for appropriately
small µ again HAMWALK is easier to solve. If n′ ≪ n, indicating a graph with many nodes inside clusters, then
again it is much easier to solve HAMWALK. The bound we proved is by construction: it might be possible to solve
HAMWALK in faster time. We obtained our bound on HAMWALK by coarsening the graph on n nodes and solving
problems on the reduced version. It is known that empirical networks have hierarchical community structure: dense
regions embedded inside others. Authors have considered renormalization approaches to such networks [24]. How
this hierarchical structure simplifies problems on graphs, and how repeated coarsenings of the full graph might help is
open. In this setting, not only does modular structure constrain dynamics on graphs but it can also simplify problems
on graphs. Many practical optimization problems are posed on real graphs with modular structure. The preceding
gives a hint that some of the optimization problems we are interested in might allow heuristics which run in time
scaling with the number of communities (and parameterizations of their isolation) rather than the number of nodes:
this gives a strong justification for the exercise of developing community detection algorithms.
Thanks to: Sumeet Agarwal and also to Sam Johnson, Iain Johnston and Simone Severini
[1] P. Erdos and A. R´enyi, Publ. Math. Debrecen 6, 290 (1959); E.N. Gilbert, Ann. Math. Stat. 30, 1141 (1959)
[2] M.E.J. Newman, Networks: An Introduction, (OUP, Oxford, 2010).
[3] M.A. Porter, J.P. Onnela, P.J. Mucha, Not. Am. Math. Soc., 56, 1164 (2009); S. Fortunato Physics Reports 486, 75
(2010).
[4] A. Lancichinetti, M. Kivela, J. Saramaki, Santo Fortunato PLoS ONE 5(8): e11976 (2010).
[5] J. P. Onnela, et al, Phys. Rev. E, 86, 036104 (2012).
[6] S. Agarwal, Ph.D. thesis, Oxford University, (2012).
[7] I. Der´enyi, G. Palla, and T. Vicsek, Phys. Rev. Lett. 94, 160202 (2005); J. Reichardt and S. Bornholdt, Phys. Rev. Lett.,
93, 218701 (2004); E.A. Leicht and M.E.J. Newman, Phys. Rev. Lett. 100, 118703 (2008).
[8] U. Brandes, et al. IEEE Trans. KDE 20 172 (2008).
[9] M. E. J. Newman, M. Girvan, Phys. Rev. E, 69, 026113 (2004).
[10] B. H. Good, Y.-A. de Montjoye and A. Clauset Phys. Rev. E 81, 046106 (2010).
[11] D. Lokshtanov and D. Marx, Inf. Comput. 222, 278 (2013).
[12] A. Decelle, F. Krzakala, C. Moore, L. Zdeborova, Phys. Rev. Lett. 107, 065701 (2011); A. Decelle, F. Krzakala, C. Moore,
L. Zdeborova Phys. Rev. E 84, 066106 (2011).
[13] R.R. Nadakuditi, M.E.J. Newman, Phys. Rev. Lett. 108, 188701 (2012).
[14] R. Lambiotte, J.-C. Delvenne and M. Barahona, arXiv:0812.1770
[15] H.A. Simon, Proc. Amer. Phil. Soc., 106, 467 (1962); D. Meunier, R. Lambiotte and E.T. Bullmore, Front. in Neurosci.,
4 200 (2010).
[16] G.B. West, J.H. Brown, B.J. Enquist, Science 276, 122 (1997); E. Katifori, G.J. Szollosi, M.O. Magnasco, Phys. Rev. Lett.
104, 048704 (2010).
[17] R. G. Downey and M. R. Fellows Parameterized Complexity (Springer, New York 1999); R. Niedermeier, Invitation to
6
Fixed-Parameter Algorithms, (Oxford University Press, Oxford, 2006).
[18] It is straightforward to recast HAMWALK as a travelling salesman problem which can be solved in time O(2n) [19].
[19] M. Held and R.M. Karp, J. Soc. Indust. Appl. Math. 10, 196 (1962).
[20] A Hamiltonian Walk sometimes also means a covering walk which is strictly self avoiding.
[21] S.E. Goodman, S.T. Hedetniemi. SIAM J. Comp. 3, 214 (1974).
[22] N. Madras, G. Slade, The Self-Avoiding Walk (Birkhauser, Boston, 1996); R. van der Hofstad and W. Konig, J. Stat.
Phys., 103 (2001).
[23] M. M´ezard, A. Montanari Information, Physics, and Computation, (OUP, Oxford, 2009); C. Moore, S. Mertens Nature of
Computation, (OUP, Oxford, 2011).
[24] F. Radicchi, J. J. Ramasco, A. Barrat, S. Fortunato, Phys. Rev. Lett. 101, 148701 (2008).
[25] A. Clauset, Phys. Rev. E 72, 026132 (2005).
[26] B. Courcelle, S. Olariu, Discrete Appl. Math., 101, 77 (2000).
[27] B. Courcelle, J. Engelfriet, Graph structure and monadic second-order logic, a language theoretic approach (CUP, Cam-
bridge, 2012).
[28] M.R. Garey, D.S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, (W. H. Freeman,
New York, 1979)
[29] H.L. Bodlaender et al. Mathematical Foundations of Computer Science, LNCS 6281, 174 (2010).
|
1901.09691 | 1 | 1901 | 2019-01-22T13:37:58 | EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction | [
"cs.SI"
] | In this paper we present EvalNE, a Python toolbox for evaluating network embedding methods on link prediction tasks. Link prediction is one of the most popular choices for evaluating the quality of network embeddings. However, the complexity of this task requires a carefully designed evaluation pipeline in order to provide consistent, reproducible and comparable results. EvalNE simplifies this process by providing automation and abstraction of tasks such as hyper-parameter tuning and model validation, edge sampling and negative edge sampling, computation of edge embeddings from node embeddings, and evaluation metrics. The toolbox allows for the evaluation of any off-the-shelf embedding method without the need to write extra code. Moreover, it can also be used for evaluating any other link prediction method, and integrates several link prediction heuristics as baselines. | cs.SI | cs |
EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction
EvalNE: A Framework for Evaluating
Network Embeddings on Link Prediction
Alexandru Mara
Jefrey Lijffijt
Tijl De Bie
IDLab, Dept. of Electronics and Information Systems
Ghent University
9000 Ghent, Belgium
Editor: Unknown
alexandru.mara(at)ugent.be
jefrey.lijffijt(at)ugent.be
tijl.debie(at)ugent.be
Abstract
In this paper we present EvalNE, a Python toolbox for evaluating network embedding
methods on link prediction tasks. Link prediction is one of the most popular choices for
evaluating the quality of network embeddings. However, the complexity of this task requires
a carefully designed evaluation pipeline in order to provide consistent, reproducible and
comparable results. EvalNE simplifies this process by providing automation and abstraction
of tasks such as hyper-parameter tuning and model validation, edge sampling and negative
edge sampling, computation of edge embeddings from node embeddings, and evaluation
metrics. The toolbox allows for the evaluation of any off-the-shelf embedding method
without the need to write extra code. Moreover, it can also be used for evaluating any
other link prediction method, and integrates several link prediction heuristics as baselines.
Keywords: Network Embedding, Link Prediction, Evaluation, Edge Sampling, Graphs
1. Introduction
Network Embedding (NE) methods aim at learning low-dimensional representations of net-
work nodes as vectors, typically in Euclidean space. The quality of the resulting represen-
tations is assessed through a variety of downstream prediction tasks, with link prediction
(LP) one of the most common choices (e.g., Grover and Leskovec, 2016; Lai et al., 2017; Gao
et al., 2018; Kang et al., 2019). LP amounts to estimating the likelihood of the existence
of edges between pairs of nodes that are not connected in the input network. Such edges
may be missing from the input network because of incomplete information, or sometimes
because the input network is an earlier snapshot of an evolving network.
The evaluation of LP methods is particularly challenging as it requires a number of
additional steps and design choices which can confound the results, are prone to errors, and
can harm reproducibility. First, one needs an (incomplete) training network along with a
(more) complete version of that network for testing. It is relatively straightforward to define
such training and testing networks whenever different snapshots of a dynamic network are
available. For static networks, however, much research has been devoted to determining the
best approach to generate these training networks (Lichtenwalter and Chawla, 2012; Yang
et al., 2015; Garcia-Gasulla et al., 2015). In addition to train and test edges, also sets of
1
Mara, Lijffijt and De Bie
train and test non-edges (also referred to as negative samples) are required for evaluating
LP. Non-edges are pairs of nodes that are not connected in the input network. The relative
sizes of these train and test edge sets as well as the sizes of the non-edge sets are user-
defined parameters which vary between scientific works. Moreover, a challenge specific for
NE-based methods for LP is that they usually only provide node embeddings, while the
binary classifiers used to predict links require edge embeddings as their input. There are
several approaches for deriving edge embeddings from node embeddings (Chen et al., 2018),
the choice of which has a strong impact on the performance of different NE methods (Grover
and Leskovec, 2016). Also the metrics used to report the accuracy of different methods vary
substantially, from AUC-ROC (Kang et al., 2019) to precision and recall (Wei et al., 2017)
or precision@k (Wang et al., 2016). Finally, it is not uncommon in recent literature to
use recommended default settings for existing methods used as baselines, while tuning the
hyper-parameters for the method being introduced.
In this paper we propose EvalNE, a Python toolbox that addresses one of the critical
issues in the evaluation of NE methods and in the field of machine learning in general: the
reproducibility of results. The library can be used to replicate the experimental sections
of the majority of papers evaluating NE methods on LP for both directed and undirected
networks. A command line interface in combination with a configuration file allows users
to evaluate any NE method on the LP task, without the need of new software code. This
simplifies their model evaluation pipeline, and thus minimizes the risk of errors. Alterna-
tively, EvalNE can be used as an API that provides implementations of most of the building
blocks required for LP evaluation, from generating train/test splits to computing evaluation
metrics.
We note that, while a significant part of the functionality of EvalNE is geared towards
NE methods, it is capable of evaluating also other kinds of LP methods.
2. Architecture
EvalNE has been designed as a pipeline of interconnected and interchangeable building
blocks. This modular structure, presented in Figure 1, allows for the evaluation of different
types of methods and simplifies code maintenance and addition of new features. An evalu-
ator class integrates all the building blocks and is the main object the user interacts with.
The library also provides different levels of data encapsulation in order to reduce the risk
of incorrect model evaluation. Next, we describe the core building blocks of EvalNE.
Preprocessing The toolbox offers a variery of functions to load and store networks, to
prune nodes based on their degrees, remove self-loops, relabel nodes, obtain sets of specific
types of edges, restrict networks to their main connected components and obtain common
network statistics. These functions can be used in combination with other methods provided
by libraries such as NetworkX.
Data Split
In order to perform LP, sets of train and test edges need to be selected from
the input networks. The training set is generally required to span all nodes in the network
and induce a training network with a single connected component. EvalNE provides an
edge set selection algorithm which satisfies these requirements, can generate edge sets of
2
EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction
Figure 1: Diagram showing the types of methods that can be evaluated using EvalNE. The
gray blocks represent modules provided by the library while the remaining ones
are the methods to be evaluated and thus user-specified. The library allows for the
evaluation of end-to-end prediction methods (several LP heuristics are included
as baselines here), edge embedding methods, and node embedding methods.
different sizes and is orders of magnitude faster than the naive approach currently used in
practice (included in EvalNE for comparison).
The library also offers choice of sampling the sets of non-edges required for LP under
either the open world or the closed world assumption. This determines if the set of train
non-edges does not overlap with the set of train edges (open world) or with both the sets
of train and test edges (closed world). The sizes of these sets are tunable parameters.
LP Heuristics EvalNE contains a set of heuristics which can be used as baselines for
the LP task. These methods are: common neighbours, Jaccard coefficient, Adamic-Adar
index, resource allocation index, preferential attachment and Katz. Additionally, the library
includes a random prediction method. These baselines are also defined for directed networks
by constraining the analysis to the in or out node neighborhoods.
In order to perform LP, however, edge embeddings are required.
Node to Edge embeddings Many NE methods only provide embeddings of the network
nodes.
In EvalNE we
include several methods to compute edge embeddings from node embeddings. The user
can select any, or a combination of, the following binary operators: average, hadamard,
weighted L1 and weighted L2 (Grover and Leskovec, 2016).
Binary Classification To predict the existence or absence of a link from a set of given
edge embeddings, EvalNE uses, by default, regularized logistic regression with L2 penalty
and 10-fold cross validation of the regularization parameter. The library, however, is flexible
and allows for any other binary classifier (e.g. from Sklearn) to be used.
Evaluation metrics EvalNE can evaluate the scalability and accuracy of embedding
methods. The scalability is measured trough wall clock time and the LP accuracy using
two types of metrics: fixed-threshold metrics and threshold curves.
Fixed-threshold metrics summarize method performance to single values. The frame-
work implements the following: confusion matrix (TP, FN, FP, TN), precision, recall, fall-
out, miss, accuracy, F-score and AUC-ROC. Threshold curves present the performance of
methods for a range of threshold values. EvalNE provides precision-recall curves (Licht-
enwalter and Chawla, 2012) and ROC curves (Fawcett, 2004). The most suitable metrics
based on the evaluation setup are recommended to the user.
3
Mara, Lijffijt and De Bie
3. Relation to other software
To the best of our knowledge only two libraries for the evaluation of NE methods currently
exist. OpenNE (github.com/thunlp/OpenNE) is a recently proposed Python toolbox which
provides implementations of state-of-the-art embedding methods and evaluation on multi-
label classification tasks. GEM (Chen et al., 2017) is a similar Python framework which
also implements several embedding methods and includes basic functionality for evaluating
multi-label classification, visualization, and LP.
However, both these libraries require Python implementations of the NE methods eval-
uated that comply with pre-defined interfaces. As these implementations are not always
feasible or practical, we have designed EvalNE to evaluate any NE method written in any
language by delegating the method execution to the system command line interface. More-
over, EvalNE is the only currently available library which provides full automation of the
method evaluation pipeline, parameter tuning, and edge sampling capabilities. Finally,
no other open-source libraries include implementations of similar LP heuristics for both
directed and undirected networks.
4. Source Code and Documentation
The source code and documentation of EvalNE are available on Bitbucket1 and GitHub2 and
are provided under the MIT free software license. The abovementioned platforms provide
different mechanisms for the community to contribute to the project such as bug tracking,
feedback submission and pull requests for adding new features. The code style complies
with PEP 8 and the documentation follows the numpy docstring format. The toolbox is
compatible with Python 2 and Python 3 and can be easily installed using pip. Supported
platforms include Linux, Mac OS X, and Microsoft Windows. EvalNE only depends on a
small number of popular open-source Python packages, and follows their coding guidelines:
NumPy, SciPy, NetworkX, Scikit-learn and Matplotlib. Other packages such as OpenNE
or GEM are recommended as they provide implementations of different NE methods.
The toolbox documentation includes instructions on the installation and use both as
an API and as a command line tool. Simple examples of the high-level use of the library
are also included as well as more advanced examples of the low-level use and integration
with existing Python code. Finally, the library contains pre-filled configuration files which
reproduce the experimental sections of several influential papers on NE.
Acknowledgements
The research leading to these results has received funding from the European Research
Council under the European Union's Seventh Framework Programme (FP7/2007-2013) /
ERC Grant Agreement no. 615517, from the FWO (project no. G091017N, G0F9816N),
and from the European Union's Horizon 2020 research and innovation programme and the
FWO under the Marie Sklodowska-Curie Grant Agreement no. 665501.
1. EvalNE Bitbucket repository https://bitbucket.org/ghentdatascience/evalne/src/master/
2. EvalNE GitHub repository https://github.com/Dru-Mara/EvalNE
4
EvalNE: A Framework for Evaluating Network Embeddings on Link Prediction
References
Haochen Chen, Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. A tutorial on network
embeddings, 2018.
Siheng Chen, Sufeng Niu, Leman Akoglu, Jelena Kovacevic, and Christos Faloutsos. Fast,
warped graph embedding: Unifying framework and one-click algorithm, 2017.
Tom Fawcett. Roc graphs: Notes and practical considerations for researchers. Technical
report, 2004.
Ming Gao, Leihui Chen, Xiangnan He, and Aoying Zhou. BiNE: Bipartite network embed-
ding. In Proc. of SIGIR, pages 715 -- 724, 2018.
Dario Garcia-Gasulla, Claudio Ulises Cortes, Eduard Ayguade, and Jes´us Jos´e Labarta.
Evaluating link prediction on large graphs. In Proc. of CAAI, pages 90 -- 99, 2015.
Aditya Grover and Jure Leskovec. node2vec: Scalable feature learning for networks. In
Proc. of KDD, pages 855 -- 864, 2016.
Bo Kang, Jefrey Lijffijt, and Tijl De Bie. Conditional network embeddings. To appear in
Proc. of ICLR, 2019.
Yi-An Lai, Chin-Chi Hsu, Wen Hao Chen, Mi-Yen Yeh, and Shou-De Lin. Prune: Preserving
proximity and global ranking for network embedding. In Proc. of NIPS, pages 5257 -- 5266.
2017.
Ryan N. Lichtenwalter and N. V. Chawla. Link prediction: Fair and effective evaluation.
In Proc. of ASONAM, pages 376 -- 383, 2012.
Daixin Wang, Peng Cui, and Wenwu Zhu. Structural deep network embedding. In Proc. of
KDD, pages 1225 -- 1234, 2016.
Xiaokai Wei, Linchuan Xu, Bokai Cao, and Philip S. Yu. Cross view link prediction by
learning noise-resilient representation consensus. In Proc. of WWW, pages 1611 -- 1619,
2017.
Yang Yang, Ryan N. Lichtenwalter, and Nitesh V. Chawla. Evaluating link prediction
methods. KAIS, 45(3):751 -- 782, 2015.
5
|
1708.03850 | 1 | 1708 | 2017-08-13T04:19:42 | Structure in scientific networks: towards predictions of research dynamism | [
"cs.SI",
"physics.soc-ph"
] | Certain areas of scientific research flourish while others lose advocates and attention. We are interested in whether structural patterns within citation networks correspond to the growth or decline of the research areas to which those networks belong. We focus on three topic areas within optical physics as a set of cases; those areas have developed along different trajectories: one continues to expand rapidly; another is on the wane after an earlier peak; the final area has re-emerged after a short waning period. These three areas have substantial overlaps in the types of equipment they use and general methodology; at the same time, their citation networks are largely independent of each other. For each of our three areas, we map the citation networks of the top-100 most-cited papers, published pre-1999. In order to quantify the structures of the selected articles' citation networks, we use a modified version of weak tie theory in tandem with entropy measures. Although the fortunes of a given research area are most obviously the result of accumulated innovations and impasses, our preliminary study provides evidence that these citation networks' emergent structures reflect those developments and may shape evolving conversations in the scholarly literature. | cs.SI | cs |
1
Structure in scientific networks: towards predictions of
research dynamism
Benjamin W. Stewart1, Andy Rivas2, Luat T. Vuong3,4,
1 Expository Writing Program, New York University, New York, NY, USA
2 Conductor, Inc. New York, NY, USA
3 Department of Physics, Queens College of the City University of New York, Flushing,
NY, USA
4 Department of Physics, The Graduate Center of the City University of New York,
New York, NY, USA
* [email protected] (LTV), [email protected] (BWS), [email protected]
(AR)
Abstract
Certain areas of scientific research flourish while others lose advocates and attention.
We are interested in whether structural patterns within citation networks correspond to
the growth or decline of the research areas to which those networks belong. We focus on
three topic areas within optical physics as a set of cases; those areas have developed
along different trajectories: one continues to expand rapidly; another is on the wane
after an earlier peak; the final area has re-emerged after a short waning period. These
three areas have substantial overlaps in the types of equipment they use and general
methodology; at the same time, their citation networks are largely independent of each
other. For each of our three areas, we map the citation networks of the top-100
most-cited papers, published pre-1999. In order to quantify the structures of the
selected articles' citation networks, we use a modified version of weak tie theory in
tandem with entropy measures. Although the fortunes of a given research area are most
obviously the result of accumulated innovations and impasses, our preliminary study
provides evidence that these citation networks' emergent structures reflect those
developments and may shape evolving conversations in the scholarly literature.
Introduction
Sociologists, geographers, and systems theorists have long analyzed how network
structures shape the forces that pass across them [1–5]. Much of this work traces its
roots back to the "strength of weak ties" theory, which Mark Granovetter developed as
a way of linking "micro-level interactions to macro-level patterns" [3]. This theory
asserts that weak social ties (friends-of-friends rather than close friends) are more likely
to provide access to novel information than strong ties. Ronald Burt's structural hole
theory [2] builds on Granovetter's work via its assertion that the strength of a tie is less
important than its position in the structure. Burt places emphasis on the importance of
non-redundant ties, which exist in cases where a social actor (ego) connects two other
people who would otherwise have no tie (alters). Within that structure, ego has powerful
brokerage opportunities. The insight of Burt's theory is that those opportunities emerge
from a structural feature of social networks: nonredundant ties are tantamount to social
2
power; the egos that connect such ties together play an outsized role in the processes
through which information and resources pass across those links in the social network.
The question we ask of citation networks concerns the emergence and evolution of
research areas: are there relations between an area's development and the shape of its
citation network structures? As noted above, scholars in fields other than sociology have
borrowed network theory's structural insights. For instance, Arbesman ,-in their work
on innovation in cities-cite Granovetter to help them explain why larger cities tend to
produce more innovations per capita than smaller ones [6]. Similarly, Peter Csermely, in
looking at the importance of bridging structures in complex systems, identifies nodes
that he refers to as "creative elements" [7]. Such nodes, Csermely argues, "seem[] to be
a widespread feature of evolving systems" and he speculates that they "enable the
survival of unprecedented challenges and play a key part in the development and
evolvability of complex systems" [7]. Though Csermely's scientific research examines
protein-protein interaction networks, he draws on structural hole theory to explain
isomorphic phenomena in a range of situations: in "protein interaction networks,
signaling networks, social networks and ecosystems, we can also identify highly similar
creative elements" [7]. Burt has also linked structural holes to creativity, arguing that
"good ideas are disproportionately in the hands of people whose networks span structural
holes" [8]; this assertion squares with recent findings that scholarly performance
strongly correlates with access to structural holes [9, 10].
However, citation networks are strikingly different from social networks. Whereas a
scholar may actively broker ideas between peers who otherwise lack ties to each other,
beyond the initial act of referencing, relations among articles are inert: citation
networks only evolve as scholars add references to them. In what ways then, do the
insights of social network theory still apply to citation networks? Co-citation analysis
has long understood citations as representations of concepts [11–14]. To the extent that
this is so, innovative development of scientific literature-guided by disciplinary
training-can be understood as brokerage between concepts (or aspects of theories) that
have yet to be connected to each other. Our study looks at the structural features that
are the precipitates of such combination and asks whether citation networks exhibit
structural patterns that correspond to the dynamism of the research areas to which
those networks belong. Of the citation networks of particular articles, we ask about the
relations between two properties: the number of articles connected to the network via a
single link (i.e., nodes that, relative to a large percentage of the other nodes in the
network, are weak ties), and the variety of pathways that tie the network's other nodes
together (network entropy). In combination, these properties enable us to characterize
both the breadth and diversity of networks as they emerge over time. We refer to the
precipitates of that emergence as a citation ecology-i.e., a pattern of relations among
references. Such patterns are important to our study in that they allow us to draw new
connections between network theory and citation analysis.
To see how this is so-and also to get a sense of the conceptual motivations behind
our approach-it will help to understand a problem that emerged in the 1980s and 90's
in citation analysis. Several scholars have presented excellent overviews of attempts, in
those years, to establish what Wouters [15] describes, retrospectively, as a desire for "a
definitive citation theory" [15–19]. Depending on who was calling for such a theory, it
would have provided a framework with which to either a) coherently assess the value of
citations as quantitative performance measures (the position affiliated with the
Mertonian [20, 21], normative model of science [22–24]), or b) question the validity of
the normative model's assumptions (the position most strongly associated with
constructivist sociology, and Science and Technology Studies [25–27]). During this
period, attempts to establish a normative theory of citation failed due both to the wide
variety of citer motivations [22, 28–30], and to the disparate methodological approaches
3
to accounting for that variety, a problem well-summarized by Bornmann and Daniel [18].
Although the constructivist sociologists of science tended to see those problems as
endemic to the project of using qualitative measures as assessments of scientific quality,
scientometricians responded with approaches that justified normative science on
grounds in line with what Van Raan characterizes as "bibliometric chemistry". This
approach, rather than focusing on the idiosyncratic referencing behaviors of individual
scholars, focuses on the statistical distributions that emerge within fields and
sub-fields [17]. Wouters [15] characterizes such strategies as generating formalized rather
than paradigmatic representations of science; he notes that the former have become the
dominant mode of citation analysis.
Our study constructs formalized representations of citation network structures in
order to approach the citation behavior question from a different angle. We ask whether
the patterns that emerge from aggregations of citation behaviors signal dynamics
operating within the paradigmatic dimension of particular research areas. As such, we
are interested in citation networks not for what they tell us about the articles they
reference; rather, we use those cited articles as focal points through which to access and
analyze the structural character of the networks connected to them. Those networks
represent ongoing, scholarly conversations that establish avenues that scientists may add
to as part of their future scholarship. Our methods characterize the structure of those
conversations, an approach distinct from co-citation and co-word analysis [11, 31–34],
and from those co-authorship analyses that have employed network theory in order to
understand the kinds of positions and relations that are most advantageous to scholarly
production and recognition [9, 10]. Whereas those studies seek to either, (a) isolate the
significant networks of concepts that have emerged from scholarly conversations, or (b)
focus on the advantages of particular structural positions within the social network, we
look at citation network structure to see if patterns of referencing behavior correlate
with the dynamism of areas of scientific research.
We build and study citation networks of the leading papers in three research areas.
In order to characterize those networks' citation ecologies, we focus on the relationships
between two properties whose mutual growth-on multi-year time horizons-appears to
be vital to continued network growth. Those two qualities are, first, the network's
friends-of-friends (in this case, references to papers not already in the local citation
network), and second, the diversity of network pathways as measured by Shannon
entropy and normalized Shannon entropy. We see these properties as being particularly
important components of our networks' citation ecologies due to their potential to move
in opposite directions-i.e., spikes in the intensity of one property lead to drops in the
normalized measure of the other. On the other hand, when these properties increase or
decrease at more gradual rates, they often move in the same direction. By focusing on
these measures, we begin to explore the extent to which patterns within a citation
network correspond to the more general dynamics of the research area to which it
belongs.
Constructing citation networks in three areas of
research
We focus on three topic areas within optics: plasmonics1 (topic search: 'plasmon*'), the
photorefractive effect2 (topic search: 'photorefractiv* NOT keratect*'3, and Brillouin
1Plasmons are coherent excitation of electrons on a surface or interface, generally a metal.
2Photorefractive effect: self-induced changes in refractive index due to photon-photon interaction in
a material.
3Refractive keratectomy is unrelated to the physics principle of the photorefractive effect, the
innovation channel isolated in this study.
4
Fig 1. Three topics within the field of optics that exhibit separate dynamics in
research activity. The numbers of papers published per year from 1975 through 2015
show topics (A) 'plasmon*', an area that is growing (B) 'photorefract* NOT keratect*',
whose topic association is waning, and (C) and 'Brillouin scatter*', whose topic is
re-emerging. Venn diagrams with the number of papers published in the 'plasmon*'
(green), 'photorefract* NOT keratect*' (brown), and 'Brillouin scatter*' (blue) fields (D)
before and (E) after 1998. Note that the scale of the plasmon topic area shown in (A) is
approximately an order of magnitude larger than the other two areas.
scattering4 (topic search: 'brillouin scatter*'). Fig. 1 shows each topic's popularity since
1975: plasmonics continues to grow at a striking rate, with over 11,000 journal articles
published within 2015; on the opposite trajectory, photorefractives are on the wane;
finally, research related to Brillouin scattering, the smallest field surveyed here,
re-emerged after having slowed in the late-1980s and early-90s. As of 2015, plasmon is
the largest topic area (with over 62,000 papers) and its articles have attracted the most
citations. Photorefractive is the second largest area, with about 8,000 papers. Brillouin
scattering is the smallest area with approximately 6,000 papers. We refer to the three
fields as plasmon (growing), Brillouin scattering (re-emerging) and photorefractive
(waning).
In the 1970s these three topic areas emerged out of the widespread availability of
laboratory lasers. As such, there is substantial overlap in terms of the equipment and
laboratory setup necessary to conduct research. All three topics involve both theorists
and experimentalists; prior to 1998, all three were dominated by optical physicists.
Research operates on a moderate scale for facilities-i.e., experiments typically do not
require large collaborative networks or large accelerator facilities (e.g., those at CERN);
while all are highly dependent on the development of materials (as the basis for
4Brillouin scattering refers to the photon response to self-induced distortions in atomic lattice.
0 2000 4000 6000 8000 10000 1975 1985 1995 2005 Thriving: Plasmon* 0 200 400 600 800 1975 1985 1995 2005 Waning: Photorefractive* -Kerat* 0 200 400 600 800 1975 1985 1995 2005 Re-emerging: Brillouin Scatter* (A) (B) (C) (D) 0 32 1 8 0 26 8 (E) Intersection until 1998 Intersection since 1998 7506 5,320 3,828 62,188 5,937 7,671 59 2015 2015 2015 5
experiments), the ease of production and the costs of the technologies vary widely;
results from all three areas have led to the development of commercial technologies,
although those applications lie in different domains. Among the three, there is almost
no overlap in research interests or citation networks; as of 2014, only 60 papers
connected photorefractives to plasmons, only 30 papers connected Brillouin Scattering
to plasmons, and only 8 papers connected photorefractives to Brillouin scattering. The
separation between these areas allows us to compare their network structures and also
to consider the dynamics of each one in relative isolation from the others.
For each topic area, we identify the 100-most cited articles with publication dates
before 1999. Although 1998 is a somewhat arbitrary endpoint, it marks a time during
which the use of scholarly databases-as well as the development of online, often
open-source, scholarly publishing-was expanding [35]. Limiting the publication period
of top-cited articles to pre-1999 allows us to reduce the effects of any catalyzation of
publicity stemming from immediate online notification and access. Given their
citational significance, we refer to each of our top-cited papers as a parent and create a
database of each parent's family. Each of the 300 network families range in size from
800 to 20000 members and includes grandparents (papers referenced by the parent),
descendants (papers that reference the parent), and the descendants' other references,
some of which may already exist within the network as primary ties to the parent. We
refer to those articles that cite the parent directly as endogenous nodes; by contrast, we
refer to those articles that are two steps removed from the parent as exogenous nodes
(i.e., nodes that, to a parent, are friends of friends). Although exogenous nodes have a
range of potential relations to the scholarly conversation established by the parent, they
don't explicitly participate in it.
Our scraping process sweeps the citation network in three passes in order to produce
a citation network. It gathers, first, the references for each parent (the grandparents);
then the papers that cite the parents (descendants); finally, for each of these
descendants, we collect their references to other papers (thus, no paper is located more
than two vertices away from the parent). With this data, we construct a directed
network for each parent wherein each node represents a paper and each edge a reference
link between two nodes u → v indicates that paper u references paper v. Although we
construct the networks out of directed pathways, we analyze them as undirected
networks. Primarily, this approach stems from our disinterest in the citational capital
with which citation networks endow significant articles5. We focus on how the
commitments of a given parent network are structured, particularly in terms of the
relations between its exogenous and endogenous nodes; structurally, the direction of
commitment is not relevant.
High citation reach and entropy marks growing and
re-emerging research
As each parent network grows, its shape emerges in part as a function of the
descendants' reference distribution-i.e., the number of those descendant references that
are endogenous and the number that are exogenous, as illustrated in Fig. 2. As
discussed above, exogenous nodes are analogous to the social network model of
friends-of-friends. One of our observations is that the parent papers of the growing
[plasmon] and re-emerging [Brillouin] fields both exhibit network structures that more
closely resemble Figs. 2(B) and (D) rather than structures of Figs. 2(A) and (C), even
5Another reason for this approach has to do with the way that citation indices are constructed in
the direction opposite to the scholarly literature's emergence: references look backwards; citations look
forward in time [15].
6
though the re-emerging field is an order of magnitude smaller than the growing area.
Figures 2(B,D) each have a larger network than (A,C) for the same number of citations;
for (B,D), the new descendants (new nodes) that enter the network by citing the parent
also cite endogenous rather than exogenous nodes. The networks of the parent papers in
the growing and re-emerging areas have networks that exhibit higher entropy per
citation (entropy grows quickly in a network whose new citations add large numbers of
exogenous nodes). The growing and re-emerging areas' networks also have larger
numbers of nodes per citation than the waning network; we refer to the
nodes-per-citation measure as citation reach.
Fig 2. The structure of parent-paper citation networks exhibit structural changes
based on the citation practices of its descendants.6(A) represents a parent-paper
network containing the basic network of 3 grandparents and 3 descendants; that
network's structure changes significantly when (B) a new descendant introduces a
cluster of 11 exogenous nodes. A subsequent descendant may cite the network's
exogenous nodes, as in (C), or, alternatively and by contrast, add exogenous nodes to
the parent citation network, as in (D).
To measure of the number of nonredundant ties in the parent networks, we calculate
those networks' citation reach. This concept is related to, though less precise than,
reach efficiency, which measures "how much (nonredundant) secondary contact" a given
6Note that, in reality, it would be rare to have a citation network as small and as insular as Fig. 2
(A); that network is an ideal type designed to contrast with the other three networks. Likewise, (C) and
(D) highlight extremes of network potential.
(A)(D)(C)(B)012Citation Reach2345Entropy1.251.31.35Normalized Entropy(E)(F)(G)Citation ReachEntropyNormalized EntropyCitations Citations Citations (A)(B)(C)(D)(A)(B)(C)(D)(A)(B)(D)(C)7
node has "for each unit of primary contact" [36]. In a similar manner, the citation reach,
R, quantifies the number of exogenous nodes in the network per parent and descendant:
R =
N − C − G − 1
C + G + 1
(1)
where N is the number of nodes in the network, C is the number of citations of the
parent, G is the number of references by the parent or grandparents. As suggested
above, this measure should not be understood as a property of the parent paper; rather,
it's a property of the ecology of the network tied to the parent. While there exist other
formulations for calculating the embedded relationship between players in a
network [37], this study draws uses more basic measures to characterize simpler
networks. Here, entropy and citation reach describe the parent citation networks that,
containing only four levels, are not complex but can already be shown to be quite
distinct. In fact, it is remarkable that such basic measures can differentiate structural
patterns within these citation networks.
In Figure 3(A), we show the citation reach R of each field's leading parent papers as
a function of the parent-paper's year of publication. The radius of each circle is scaled
to the number of citations of the parent paper. We observe that the growing and
re-emerging fields [plasmon and Brillouin] exhibit higher R than the waning field
[photorefractives]. The majority of the more highly-cited parent papers chosen for this
study from each field were published between 1990 and 1998; however, the R for the
growing and re-emerging areas is relatively uniform over time in spite of this
nonuniform temporal introduction of parent papers.
Whereas R measures the number of exogenous nodes per descendant, it does not
describe the integration of those, and other, nodes into the network. Thus, in addition
to R, we characterize another aspect of the parent papers' network ecologies, namely
their Shannon entropy S = −(cid:80)N
i pi log(pi) and normalized Shannon entropy
H = S
log N , where N is the number of papers or nodes in the secondary network, and pi
is the fraction of citations related to paper i. The values of S and H provide measures
of network growth and interconnectedness-characterizations of the diversity of the
path structures of a given citation network.
Within citation analysis, we are unaware of projects that use Shannon entropy in this
way, though Leydesdorff [38] has used Shannon entropy to examine citation dynamics
among scientific journals, and Li et al., [39] have used it to detect communities within
citation networks. Outside of citation analysis, several studies have employed Shannon
entropy with motivations similar to ours: in Balch's examination of robot behavior,
entropy "provides a continuous, quantitative measure of robot team diversity" [40]; in
Eagle's comparison of the entropy a population's communication behavior, higher
communicative entropy exhibits positive correlations with higher socioeconomic
rankings [41]; in Demetrius's comparison of the structure of a variety of network models,
"network entropy is positively correlated with robustness" [42]. In our study, entropy
characterizes the distribution of pathways among papers in a citation network.
We observe that, as measured by Shannon entropy S, the three topic areas are
structurally different from each other. In Fig. 3 (B), each marker (color-coded by topic
area) indicates a parent paper's network entropy relative to its citations in 2015. That
there is a positive correlation between these two variables is not surprising, since S rises
when more nodes are added to a network. What is notable, though, is that parent
networks in the growing and re-emerging fields exhibit more entropy per citation than
the waning field. The distinction between the waning [photorefractive] topic area and
the two other areas is distinctive. The inset charts the increase in individual
paper-networks' entropy measures over time. Similar to those paper-networks' states in
2015, each topic area occupies relatively distinct portions of the graph.
8
Fig 3. The structure of the citation networks of the leading parent papers in each field
may indicate the dynamics of the field. (A) Citation reach as a function of the year of
publication for each of the 300 citation networks represented in this study, where the
circle radius indicates the number of parent-paper citations. Parent-paper networks in
the growing [plasmon] (green) and re-emerging [Brillouin] (blue) fields exhibit higher
citation reach than those in the waning [photorefractive] (brown) field. (B)
Parent-paper network entropy as a function of parent-paper citation at the end of 2015.
Parent-paper networks in the growing [plasmon] (green) and re-emerging [Brillouin]
(blue) fields exhibit higher entropy per citation than those in the waning
[photorefractive] (brown) field. The three selected topics occupy relatively distinct areas
of the figures. No obvious differences are observed between parent papers that are
research articles (X's) and those that are review papers (circles). Inset: the evolution of
each parent paper's network entropy is drawn as a function of its citations over time.
Whereas Fig. 3 shows that citation reach and entropy per citation are higher in both
growing [plasmon] and re-emerging [Brillouin] fields, Fig. 4 illustrates that citation
reach and normalized entropy can move in opposite directions: often, as part of these
citation networks' growth, citation reach increases sharply along with concomitant
drops in normalized entropy; many of these punctuations are followed by a gradual rise
in normalized entropy (with a correlate decrease in citation reach). A contrary
mathematical relationship can be deduced by assuming a linear relationship between
entropy and the logarithm of citations, which is visible in Fig. 3(B): a jump in the
parent-paper network's nodes-per-citation value denotes a large introduction of
exogenous nodes, a phenomenon that is associated with increased citation reach and a
decrease in normalized entropy. Although they are pervasive in all three areas, these
mirrored punctuations are most clearly visible in the growing (A and D) and re-emerging
(C and F) areas. This phenomenon may have implications for further research.
Reflections on the approach and future directions
In this study, we have begun to analyze citation ecologies in relation to the dynamism of
selected research areas; we have centered our analysis on simple measures that
succinctly identify patterns of variation that lead to divergent outcomes. Our initial
observations indicate that leading-paper citation networks carry signatures that
correlate with the dynamism of the research areas to which they belong: network
(2015) Growing [Plasmon] Article Growing [Plasmon] Review Waning [Photorefractive] Article Waning [Photorefractive] Review Re-emerging [Brillouin] Article Re-emerging [Brillouin] Review (Evolution) Citations Citations Year Published (A) (B) 9
Fig 4. Punctuated drops of citation network (A)-(C) Normalized Entropy accompany
punctuated jumps in (D)-(F) Citation Reach, drawn as a function of year for growing
[plasmon] (green), waning [photorefractive] (brown), and re-emerging [Brillouin] (blue)
fields, respectively. The black dotted lines show the average values from each field's 100
parent paper networks.
qualities, independent of the size of the citation network, correlate with the growth or
waning of the field. These results are easily observed, though their significance is
limited by our focus on only three areas within optics. Nevertheless, our results offer a
place to begin to ask questions beyond those areas. Are correlations between network
structure and dynamism visible across other topics of research? If so, are the
correlations present in a manner analogous to our observations here, or do those
properties' measures vary in different ways, perhaps depending on the type of research,
or relative to the scholarly cultures conducting that research?
Even within the case study conducted here, the variations may stem from a range of
factors: the social conventions that cultivate or undermine scientific norms [43]; the
material costs of research (a factor tied both to technological history and to funders'
interest); advancements or deadlocks within research lines that open up or close down
future paths for exploration. Of these factors, research developments are easiest to
identify and they offer ready explanations for our areas' divergent trajectories. In the
growing [plasmon] area, advances in surface-enhanced Raman scattering [44–46] and
demonstrations of single-molecule detection [47] resulted in an explosion of biomedical
applications that significantly expanded the area's interdisciplinarity. Similarly, in the
90s, work in the re-emergent area [Brillouin scattering] on stimulated Brillouin
scattering dynamics [48–50] may have contributed to the renewed interest and a range
of optical applications [51–53]. By contrast, the inflection point of the waning
[photorefractive] area coincided with the disruptive development of organic
photorefractive materials [54–57], which may have shifted the attention from physics to
chemistry and materials science7.
While our network measures retrospectively mark the divergences among our three
areas, a question for future research is whether or not these methods can be adapted to
capture research dynamics as they emerge. If so, focusing on citation ecologies could fill
7It should be noted that the photorefractive effect describes materials that are used in holography,
but few papers in holography today use the word "photorefractive"-an interesting subject in topic
identification in itself.
(A) (E) (D) (B) (C) (F) 10
a gap between assessments that focus on individual scholars' publication records [58–61],
and those concerned with the research programs of larger-scale entities-such as
institutions [60, 62], innovation networks [63], or nations [64–66]. That is, by clustering
together measures of the structures of individual networks, projects that characterize
citation ecologies have the potential to clarify the links between the micro level of
individual papers, and their relations to the larger, macro-structures to which they
contribute.
Currently, there is a trend towards employing enormous data sets and sophisticated
machine learning methods that, with a similar objective, seek to draw predictions from
network structures. Our efforts aim to discern patterns of citation networks rather than
social networks, and to identify research trends; we believe we are among the first to
successfully correlate the structure of citation networks with the dynamics of research
topics by strategic selection of comparable data sets. This initial effort, with three
disjoint research areas, does not yet provide broad statistical claims about the utility of
our approach. However, this case study is novel in the way that it introduces an
ecological perspective to the project of using leading papers in a field to embody the
trends of the whole. Our results may indicate that, over the long term, diversity within
citation networks is vital to the continued growth of topic areas.
There are similarities between this ecological focus and some work in patent
analysts-studies that may be instructive for future research. For instance, Wang et
al., [67] have shown that strong brokerage positions in patent networks predict for
patent renewal. In a slightly different vein, Yoon et al., have used subject-action-object
(SAO) analysis to bring together multiple variables in the production of dynamic patent
maps that point to "hotspots" and "vacuums" in the patent landscape [68]. Yet though
this work is closely related to ours, the conventions of academic scholarship are different
from those of patent citation (which are driven by potential profit). Indeed, there is
increasing evidence that the scholarly, scientific inputs that culminate in innovative
patents do not necessarily correlate with successful scholarship-to such an extent that
the most prominent scientific papers are negatively correlated with patent
innovations [69].
In future work, one could use this approach to studying leaders in a field, but move
the theory forward by refining the citation ecology concept, particularly as it relates to
the importance of novelty in research to citation networks. Novelty, as we mean it here,
refers not to the emergence of a new idea, but to citations that are new to a particular
network. Given their frequency, the punctuations exhibited in Fig. 4 may suggest that
periodic infusions of exogenous nodes, as well as those nodes' later integration, are vital
to the dynamism of citation networks. Understood in this way, those punctuations show
a compelling similarity to the results of Tria et al., [70], in which the emergence of
novelty corresponds to similar drops in system entropy. In between drops, normalized
entropy grows as gaps in the network are filled. In citation networks, those
punctuations may signal different kinds of network growth: on one hand, they may
represent new contributions to the parent article's line of research; on the other hand,
they may represent an emerging interdisciplinarity related to the parent article's
conceptual concerns. As markers of such developments, those punctuations–in
combination with analyses that account for the roles of exogenous nodes–may offer a
ground for predicting the future developments in the growth and decline of topic areas.
Methods and author contributions
The data for this citation study have been obtained from Thomson Reuters' Web of
Science. For each entry, we compile a list containing authors, source, volume, issue, title,
11
pages, and publisher in order to merge duplicate entries8. After unique entries are
identified, we increase the scraping efficiency and remove bias by assigning a unique
parent ID to each publication. This ID is separately stored: all data analyses are carried
out in a manner that is blind to the publication-specific information such as author,
title, year of publication, and journal name.
AR collected, compiled, and organized all data. BWS provided research context and
motivation. LTV analyzed data, made figures, and managed project. BWS and LTV
both wrote the manuscript.
Acknowledgments
LTV graciously acknowledges NSF DMR 115-1783 for broader-impact support and Prof.
Alex Gaeta, who seeded discussions on the informal processes of scientific research
among his students more than a decade ago. The authors are also grateful for helpful
discussions with Prof. Larry Liebovitch and Dana Weinburg.
References
1. Bettencourt LMA, Lobo J, Helbing D, Kuehnert C, West GB. Growth,
innovation, scaling, and the pace of life in cities. Proceedings of the National
Academy of Sciences of the United States of America. 2007 APR
24;104(17):7301–7306.
2. Burt RS. Structural Holes. Harvard University Press; 1995.
3. Granovetter MS. The Strength of Weak Ties. American Journal of Sociology.
1973;78(6):1360–1380.
4. Putnam RD. Bowling Alone: The Collapse and Revival of American Community.
Simon and Schuster; 2001.
5. Weng L, Flammini A, Vespignani A, Menczer F. Competition among memes in a
world with limited attention. Scientific Reports. 2012;2:335.
6. Arbesman S, Kleinberg JM, Strogatz SH. Superlinear scaling for innovation in
cities. Physical Review E. 2009;79(1):016115.
7. Csermely P. Creative elements: network-based predictions of active centres in
proteins and cellular and social networks. Trends in Biochemical Sciences.
2008;33(12):569–576.
8. Burt RS. Structural holes and good ideas 1. 2004;110(2):349–399.
9. Thieme J. Perspective: The world's top innovation management scholars and
their social capital. Journal of Product Innovation Management.
2007;24(3):214–229.
10. Abbasi A, Chung KSK, Hossain L. Egocentric analysis of co-authorship network
structure, position and performance. Information Processing & Management.
2012;48(4):671–679.
8Even at this time, all citation indices contain some typos or inconsistencies, which are corrected on
a case-by-case basis. We observe that, month-to-month, the number of papers pinned to a topic shifts
within a percent. This results in significant data cleaning being necessary, which is the reason for the
limited case study.
12
11. Small HG. Cited documents as concept symbols. Social studies of science.
1978;8(3):327–340.
12. Small H. Co-citation context analysis and the structure of paradigms. Journal of
Documentation. 1980;36(3):183–196.
13. Braam RR, Moed HF, Van Raan AF. Mapping of science by combined
co-citation and word analysis. I. Structural aspects. Journal of the American
Society for Information Science. 1991;42(4):233.
14. Small H. Visualizing science by citation mapping. Journal of the Association for
Information Science and Technology. 1999;50(9):799.
15. Wouters P. The Citation Culture. University of Amsterdam, Amsterdam; 1999.
16. Leydesdorff L. Theories of citation? Scientometrics. 1998 SEP;43(1):5–25.
17. Van Raan AF. In matters of quantitative studies of science the fault of theorists
is offering too little and asking too much. Scientometrics. 1998;43(1):129–139.
18. Bornmann L, Daniel HD. What do citation counts measure? A review of studies
on citing behavior. Journal of Documentation. 2008;64(1):45–80.
19. Moed HF. Citation Analysis in Research Evaluation. vol. 9. Springer Science &
Business Media; 2006.
20. Merton RK. A Note on Science and Democracy. Journal of Legal and Political
Sociology. 1942;1:115–126.
21. Merton RK. The Matthew Effect in Science, II: Cumulative advantage and the
symbolism of intellectual property. Isis. 1988;p. 606–623.
22. Cronin B. Agreement and divergence on referencing practice. Journal of
Information Science. 1981;3(1):27–33.
23. Cronin B. The need for a theory of citing. Journal of Documentation.
1981;37(1):16–24.
24. Cole JR, Cole S. Social stratification in science. Chicago: The University of
Chicago Press; 1973.
25. Cozzens SE. What do citations count? The rhetoric-first model. Scientometrics.
1989;15(5-6):437–447.
26. Edge D. Why I am not a co-citationist. Society for Social Studies of Science
Newsletter. 1977;2:13–19.
27. Edge D. Quantitative measures of communication in science: A critical review.
History of Science. 1979;17(2):102–134.
28. Cronin B. The Hand of Science: Academic Writing and Its Rewards. Scarecrow
Press; 2005.
29. Moravcsik MJ, Murugesan P. Citation patterns in scientific revolutions.
Scientometrics. 1979;1(2):161–169.
30. Krampen G, Becker R, Wahner U, Montada L. On the validity of citation
counting in science evaluation: Content analyses of references and citations in
psychological publications. Scientometrics. 2007;71(2):191–202.
13
31. Small H, Griffith BC. The structure of scientific literatures I: Identifying and
graphing specialties. Science studies. 1974;4(1):17–40.
32. Osareh F. Bibliometrics, citation analysis and co-citation analysis: A review of
literature I. Libri. 1996;46(3):149–158.
33. He Y, Hui SC. Mining a web citation database for author co-citation analysis.
Information Processing & Management. 2002;38(4):491–508.
34. Bertin M, Atanassova I, Sugimoto CR, Lariviere V. The linguistic patterns and
rhetorical structure of citation context: an approach using n-grams.
Scientometrics. 2016;109(3):1417–1434.
35. de Sompel HV, Lagoze C. The Santa Fe Convention of the Open Archives
Initiative. D-Lib Magazine. 2000 feb;6(2). Available from:
http://dx.doi.org/10.1045/february2000-vandesompel-oai.
36. Scott J, Carrington PJ. The Sage Handbook of Social Network Analysis. Sage
Publications; 2011.
37. Backstrom L, Kleinberg J. Romantic partnerships and the dispersion of social
ties: a network analysis of relationship status on facebook. In: Proceedings of the
17th ACM conference on Computer supported cooperative work & social
computing. ACM; 2014. p. 831–841.
38. Leydesdorff L. Indicators of structural change in the dynamics of science:
Entropy statistics of the SCI Journal Citation Reports. Scientometrics.
2002;53(1):131–159.
39. Li Y, Zhang G, Feng Y, Wu C. An entropy-based social network community
detecting method and its application to scientometrics. Scientometrics.
2015;102(1):1003–1017.
40. Balch T. Hierarchic social entropy: An information theoretic measure of robot
group diversity. Autonomous robots. 2000;8(3):209–238.
41. Eagle N, Macy M, Claxton R. Network diversity and economic development.
Science. 2010;328(5981):1029–1031.
42. Demetrius L, Manke T. Robustness and network evolution-an entropic principle.
Physica A: Statistical Mechanics and its Applications. 2005;346(3):682–696.
43. Smaldino PE, McElreath R. The natural selection of bad science. Royal Society
Open Science. 2016;3(9). Available from:
http://rsos.royalsocietypublishing.org/content/3/9/160384.
44. Jeanmaire DL, Van Duyne RP. Surface Raman spectroelectrochemistry: Part I.
Heterocyclic, aromatic, and aliphatic amines adsorbed on the anodized silver
electrode. Journal of Electroanalytical Chemistry and Interfacial
Electrochemistry. 1977;84(1):1–20.
45. Moskovits M, Suh J. Surface selection rules for surface-enhanced Raman
spectroscopy: calculations and application to the surface-enhanced Raman
spectrum of phthalazine on silver. Journal of Physical Chemistry.
1984;88(23):5526–5530.
46. Otto A, Mrozek I, Grabhorn H, Akemann W. Surface-enhanced Raman
scattering. Journal of Physics: Condensed Matter. 1992;4(5):1143–1212.
14
47. Kneipp K, Wang Y, Kneipp H, Perelman L, Itzkan I, Dasari R, et al. Single
molecule detection using surface-enhanced Raman scattering (SERS). Physical
Review Letters. 1997 MAR 3;78(9):1667–1670.
48. Boyd RW, Rzaewski K, Narum P. Noise initiation of stimulated Brillouin
scattering. Physical Review A. 1990;42(9):5514–5521.
49. Kurashima T, Horiguchi T, Tateda M. Distributed-temperature sensing using
stimulated Brillouin scattering in optical silica fibers. Optics Letters.
1990;15(18):1038–1040.
50. Smith S, Zarinetchi F, Ezekiel S. Narrow-linewidth stimulated Brillouin fiber
laser and applications. Optics Letters. 1991;16:393–395.
51. Okawachi Y, Bigelow MS, Sharping JE, Zhu Z, Schweinsberg A, Gauthier DJ,
et al. Tunable all-optical delays via Brillouin slow light in an optical fiber.
Physical Review Letters. 2005;94(15):153902.
52. Li J, Lee H, Chen T, Vahala KJ. Characterization of a high coherence, Brillouin
microcavity laser on silicon. Opt Express. 2012 Aug;20(18):20170–20180.
Available from:
http://www.opticsexpress.org/abstract.cfm?URI=oe-20-18-20170.
53. Grattan K, Sun T. Fiber optic sensor technology: an overview. Sensors and
Actuators A: Physical. 2000;82(1):40–61.
54. Wang Q, Wang L, Yu L. Development of fully functionalized photorefractive
polymers. Macromolecular Rapid Communications. 2000;21(11):723–745.
55. Ducharme S, Scott J, Twieg R, Moerner W. Observation of the photorefractive
effect in a polymer. Physical Review Letters. 1991;66:1846–1849.
56. Moerner W, Silence SM. Polymeric photorefractive materials. Chemical Reviews.
1994;94(1):127–155.
57. Marder S, Kippelen B, Jen A, Peyghambarian N. Design and synthesis of
chromophores and polymers for electro-optic and photorefractive applications
[Review]. Nature. 1997 AUG 28;388(6645):845–851.
58. Hirsch J. An index to quantify an individual's scientific research output. In:
Proceedings of the National Academy of Science. vol. 102; 2005. p. 16569–16572.
59. Sidiropoulos A, Katsaros D, Manolopoulos Y. Generalized Hirsch h-index for
disclosing latent facts in citation networks. Scientometrics. 2007;72(2):253–280.
60. Moed HF. New developments in the use of citation analysis in research
evaluation. Archivum Immunologiae et Therapiae Experimentalis. 2009;57(1):13.
61. Yao L, Wei T, Zeng A, Fan Y, Di Z. Ranking scientific publications: the effect of
nonlinearity. Scientific Reports. 2014;4:6663.
62. Narin F. Evaluative Bibliometrics: The Use of Publication and Citation Analysis
in the Evaluation of Scientific Activity. Computer Horizons Washington, D.C;
1976.
63. Acemoglu D, Akcigit U, Kerr WR. Innovation network. Proceedings of the
National Academy of Sciences of the United States of America. 2016 OCT
11;113(41):11483–11488.
15
64. Leydesdorff L. The science citation index and the measurement of national
performance in terms of numbers of scientific publications. Scientometrics.
1989;17(1-2):111–120.
65. Moed H, De Bruin R, Van Leeuwen TN. New bibliometric tools for the
assessment of national research performance: Database description, overview of
indicators and first applications. Scientometrics. 1995;33(3):381–422.
66. Guan J, Ma N. China's emerging presence in nanoscience and nanotechnology: A
comparative bibliometric study of several nanoscience 'giants'. Research Policy.
2007;36(6):880–886.
67. Wang JC, Chiang Ch, Lin SW. Network structure of innovation: can brokerage
or closure predict patent quality? Scientometrics. 2010 SEP;84(3):735–748.
68. Yoon J, Park H, Kim K. Identifying technological competition trends for R&D
planning using dynamic patent maps: SAO-based content analysis.
Scientometrics. 2013 JAN;94(1):313–331.
69. Gittelman M, Kogut B. Does good science lead to valuable knowledge?
Biotechnology firms and the evolutionary logic of citation patterns. Management
Science. 2003 APR;49(4):366–382.
70. Tria F, Loreto V, Servedio V, Strogatz S. The dynamics of correlated novelties.
Scientific Reports. 2014;4:5890.
|
1210.4860 | 1 | 1210 | 2012-10-16T17:38:22 | Spectral Estimation of Conditional Random Graph Models for Large-Scale Network Data | [
"cs.SI",
"cs.LG",
"physics.soc-ph",
"stat.ML"
] | Generative models for graphs have been typically committed to strong prior assumptions concerning the form of the modeled distributions. Moreover, the vast majority of currently available models are either only suitable for characterizing some particular network properties (such as degree distribution or clustering coefficient), or they are aimed at estimating joint probability distributions, which is often intractable in large-scale networks. In this paper, we first propose a novel network statistic, based on the Laplacian spectrum of graphs, which allows to dispense with any parametric assumption concerning the modeled network properties. Second, we use the defined statistic to develop the Fiedler random graph model, switching the focus from the estimation of joint probability distributions to a more tractable conditional estimation setting. After analyzing the dependence structure characterizing Fiedler random graphs, we evaluate them experimentally in edge prediction over several real-world networks, showing that they allow to reach a much higher prediction accuracy than various alternative statistical models. | cs.SI | cs | Spectral Estimation of Conditional Random Graph Models
for Large-Scale Network Data
Mikaela Keller∗
Marc Tommasi∗
Antonino Freno
Gemma C. Garriga
INRIA Lille – Nord Europe, Villeneuve d’Ascq (France)
{antonino.freno, mikaela.keller, gemma.garriga, marc.tommasi}@inria.fr
Abstract
Generative models for graphs have been typ-
ically committed to strong prior assumptions
concerning the form of the modeled distribu-
tions. Moreover, the vast ma jority of cur-
rently available models are either only suit-
able for characterizing some particular net-
work properties (such as degree distribution
or clustering coefficient), or they are aimed
at estimating joint probability distributions,
which is often intractable in large-scale net-
works.
In this paper, we first propose a
novel network statistic, based on the Lapla-
cian spectrum of graphs, which allows to dis-
pense with any parametric assumption con-
cerning the modeled network properties. Sec-
ond, we use the defined statistic to develop
the Fied ler random graph model, switching
the focus from the estimation of joint prob-
ability distributions to a more tractable con-
ditional estimation setting. After analyz-
ing the dependence structure characterizing
Fiedler random graphs, we evaluate them ex-
perimentally in edge prediction over several
real-world networks, showing that they allow
to reach a much higher prediction accuracy
than various alternative statistical models.
1
INTRODUCTION
Arising from domains as diverse as bioinformatics and
web mining, large-scale data exhibiting network struc-
ture are becoming increasingly available. Network
models are commonly used to represent the relations
among data units and their structural interactions.
Recent studies, especially targeted at social network
modeling, have focused on random graph models of
∗ Universit´e Charles de Gaulle – Lille 3, Villeneuve
d’Ascq (France).
those networks.
In the simplest form, a social net-
work is a configuration of binary random variables
Xuv such that the value of Xuv stands for the pres-
ence or absence of a link between nodes u and v in the
network. The general idea underlying random graph
modeling is that network configurations are generated
by a stochastic process governed by specific probability
laws, so that different models correspond to different
families of distributions over graphs.
The simplest random graph model is the Erdos-R´enyi
(ER) model [Erdos and R´enyi, 1959], which assumes
that the probability of observing a link between two
nodes in a given graph is constant for any pair of nodes
in that graph, and it is independent of which other
edges are being observed. In preferential attachment
models [Barab´asi and Albert, 1999], the probability
of linking to any specified node is proportional to the
degree of the node in the graph, leading to “rich get
richer” effects. Small-world models [Watts and Stro-
gatz, 1998] try to capture instead some phenomena
often observed in real networks such as high clustering
coefficients and small diameters [Newman, 2010]. A
sophisticated attempt to model complex dependences
between edges in the form of Gibbs-Boltzmann distri-
butions is made by exponential random graph (ERG)
models [Snijders et al., 2006], which subsume the ER
model as a special case. Finally, a recent attempt at
modeling real networks through a stochastic genera-
tive process is made by Kronecker graphs [Leskovec
et al., 2010], which try to capture phenomena such as
heavy-tailed degree distributions and shrinking diam-
eter properties while paying attention to the temporal
dynamics of network growth.
While some of these models behave better than oth-
ers in terms of computational tractability, one basic
limitation affecting all of them is what we may call a
parametric assumption concerning the probability laws
underlying the observed network properties. In other
words, currently available models of network struc-
ture assume that the probability distribution gener-
ating the network can be expressed through a partic-
ular parametric form P (G θ ), where G is the observed
graph and θ is a parameter vector. For example, typ-
ical formulations of exponential random graph mod-
els assume that the building blocks of real networks
are given by such structures as k -stars and k -triangles,
with different weights assigned to different structures,
whereas Kronecker graphs assume that the number of
edges and the number of nodes in a given network
are related by a densification power law with a suit-
able densification parameter. In such frameworks, es-
timating the model from data reduces to fitting the
model parameters, whereas the model structure re-
mains fixed from the very beginning. The problem
is that, in order for a parametric model to deliver an
accurate estimate of the distribution at hand, its prior
assumption concerning the form of the modeled distri-
bution must be satisfied by the given data, which is
something that we can rarely assess a priori. To date,
the knowledge we have concerning real-world network
phenomena does not allow to assume that any particu-
lar parametric assumption is really capturing in depth
any network-generating law, although some observed
properties may happen to be modeled fairly well.
The aim of this paper is twofold. On the one hand,
we take a first step toward nonparametric modeling
of random networks by developing a novel network
statistic, which we call the Fied ler delta statistic. The
Fiedler delta function allows to model different graph
properties at once in an extremely compact form. This
statistic is based on the spectral analysis of the graph
Laplacian. In particular, it is based on the smallest
non-zero eigenvalue of the Laplacian matrix, which is
known as Fiedler value [Fiedler, 1973, Mohar, 1991].
On the other hand, we systematically adopt a con-
ditional approach to random graph modeling, i.e. we
focus on the conditional distribution of edges given
some neighboring portion of the network, while set-
ting aside the problem of estimating joint distribu-
tions. The resulting conditional random graph model
is what we call Fied ler random graph (FRG). Roughly
speaking, to model the conditional distribution of an
edge variable Xuv with respect to its neighborhood, we
compute the difference in Fiedler values for the vicin-
ity subgraph including or excluding the edge {u, v}.
The underlying intuition is that the variations encap-
sulated in the Fiedler delta for each particular edge
will give a measure of the role of that edge in deter-
mining the algebraic connectivity of its neighborhood.
As part of our contributions, we theoretically prove
that FRGs capture edge dependencies at any distance
within a given neighborhood, hence defining a fairly
general class of conditional probability distributions
over graphs.
Experiments on the estimation of (conditional) link
distributions in large-scale networks show that FRGs
are well suited for estimation problems on very large
networks, especially small-world and scale-free net-
works. Our results reveal that the FRG model su-
persedes other approaches in terms of edge prediction
accuracy, while allowing for efficient computation in
the large-scale setting. In particular, it is known that
the computation of the Fiedler delta scales polynomi-
ally in the size of the analyzed neighborhood [Bai et al.,
2000]. And the experiments show that even for small
sizes of neighborhoods (which allow for extremely fast
computation), our model regularly outperforms the al-
ternative ones—which we reformulate here in terms of
conditional models so as to allow for transparent com-
parison.
The paper is organized as follows. Sec. 2 reviews some
preliminary notions concerning the Laplacian spec-
trum of graphs. The FRG model is presented in Sec. 3,
where we also show how to estimate FRGs from data,
and we analyze the dependence structures involved in
FRGs. In Sec. 4 we review (and to some extent de-
velop) a few alternative conditional approaches to ran-
dom graph estimation, starting from some well-known
generative models. All considered models are then
evaluated experimentally in Sec. 5, while Sec. 6 draws
some conclusions and sketches a few directions for fur-
ther work.
2 GRAPHS, LAPLACIANS, AND
EIGENVALUES
Let G = (V , E ) be an undirected graph with n nodes.
In the following we assume that the graph is un-
weighted with adjacency matrix A. For each (un-
ordered) pair of nodes {u, v} such that u 6= v , we
take Xuv to denote a binary random variable such that
Xuv = 1 if {u, v} ∈ E , and Xuv = 0 otherwise. Since
the graph is undirected, Xuv = Xvu .
The degree du of a node u ∈ V is defined as the
number of connections of u to other nodes, that is
du = {v : {u, v} ∈ E }. Accordingly, the degree ma-
trix D of a graph G corresponds to the diagonal ma-
trix with the vertex degrees d1 , . . . , dn on the diago-
nal. The main tools exploited by the random graph
model proposed here are the graph Laplacian matri-
ces. Different graph Laplacians have been identified
in the literature [von Luxburg, 2007]. In this paper,
we use consistently the unnormalized graph Laplacian,
defined as L = D − A. The basic facts related to the
unnormalized Laplacian matrix can be summarized as
follows:
Proposition 1 (Mohar [1991]). The unnormalized
graph Laplacian L of an undirected graph G with n
nodes has the fol lowing properties: (i) L is symmetric
and positive semi-definite; (ii) L has n non-negative,
real-valued eigenvalues 0 = λ1 (G ) ≤ . . . ≤ λn (G ); (iii)
the multiplicity of the eigenvalue 0 of L equals the
number of connected components in the graph, that is,
λ2 (G ) > 0 if and only if G is connected.
In the following, the (algebraic) multiplicity of an
eigenvalue λ will be denoted by M (λ, G ). If the graph
has one single connected component, then M (0, G ) =
1, and the second smallest eigenvalue λ2 (G ) > 0 is
called Fied ler eigenvalue. The Fiedler eigenvalue pro-
vides insight into several graph properties: when there
is a nontrivial spectral gap, i.e. λ2 (G ) is clearly sepa-
rated from 0, the graph has good expansion proper-
ties, stronger connectivity, and rapid convergence of
random walks in the graph [Mohar, 1991]. For ex-
ample, it is known that λ2 (G ) ≤ µ(G ), where µ(G ) is
the edge connectivity of the graph (i.e. the size of the
smallest edge cut whose removal makes the graph dis-
connected). Notice that if the graph has more than one
connected component, then λ2 (G ) will be also equal to
zero, thus implying that the graph is not connected.
Without loss of generality, we abuse the term Fiedler
eigenvalue to denote the smallest eigenvalue different
from zero, regardless of the number of connected com-
ponents. In this paper, by Fiedler value we will mean
the eigenvalue λk+1 (G ), where k = M (0, G ).
For any pair of nodes u and v in a graph G = (V , E ),
we define two corresponding graphs G+ and G− in the
following way: G+ = (V , E ∪ {{u, v}}), and G− =
(V , E \ {{u, v}}). Clearly, we have that either G+ = G
or G− = G . A basic property concerning the Lapla-
cian eigenvalues of G+ and G− is the following [Mohar,
1991, Anderson and Morley, 1985, Cvetkovi´c et al.,
1979]:
Lemma 1. If G+ and G− are two graphs with n nodes,
such that {u, v} ⊆ V , G+ = (V , E ∪ {{u, v}}), and
G− = (V , E \ {{u, v}}), then we have that:
1. Pn
i=1 λi (G+ ) − λi (G− ) = 2;
2. λi (G+ ) ≤ λi (G− ) for any i such that 1 ≤ i ≤ n.
3 FIEDLER RANDOM GRAPHS
Fiedler random graphs are defined in Sec. 3.1, while in
Secs. 3.2 and 3.3 we deal with the problems of estimat-
ing them from data and characterizing their statistical
dependence structure respectively.
3.1 CONDITIONAL DISTRIBUTIONS
Given the notions reviewed above, we introduce the
Fiedler delta function ∆λ2 , which is defined as follows.
(1)
Let k = M (0, G+ ). Then,
∆λ2 (u, v , G ) = λk+1 (G+ ) − λk+1 (G− )
In other words, for any pair of nodes u and v in graph
G , the Fiedler delta value of the pair {u, v} in G is
the (absolute) variation in the Fiedler eigenvalue of
the graph Laplacian that would result from removing
edge {u, v} from G+ .
Lemma 1 immediately implies the following proposi-
tion:
Proposition 2. For any graph G = (V , E ) and any
pair of nodes u and v such that {u, v} ∈ E , we have
that 0 ≤ ∆λ2 (u, v , G ) ≤ 2.
Proof. Let G− = (V , E \ {{u, v}}) and k = M (0, G ).
The theorem follows straightforwardly from Lemma 1,
given that ∆λ2 (u, v , G ) = λk+1 (G ) − λk+1 (G− ).
Using the Fiedler delta statistic, we can proceed to
define a Fiedler random graph. Given G = (V , E ), let
X (G ) denote the set of random variables defined on G ,
that is X (G ) = {Xuv : u 6= v ∧ {u, v} ⊆ V }. Then:
Definition 1. Given a graph G = (V , E ), suppose we
associate a subgraph Guv of G to each variable Xuv ∈
X (G ). We say that G is a Fiedler random graph if,
for any Xuv ∈ X (G ), we have that P (Xuv X (Guv ) \
{Xuv }) = P (Xuv ∆λ2 (u, v , Guv )).
Concerning Definition 1, we stress the importance of
two points. First, the key intuition motivating FRGs is
to treat the Fiedler delta function as a real-valued ran-
dom variable defined over graph configurations, and to
exploit this random variable as a compact representa-
tion of those configurations. Second, FRGs are condi-
tional models, i.e. they only define conditional distri-
butions of edges in a random graph given the possible
configurations of other edges. The model definition
does not specify whether and how the considered con-
ditional distributions can be combined to obtain a con-
sistent factorization of the joint distribution of X (G ).
In order to obtain that result, the model should take
into account the global dependence structure of X (G ),
but this goal is not pursued by FRG modeling. Two
interesting questions that can be raised on the nature
of the FRG model are then the following. First, how
does the Fiedler delta statistic behave with respect to
the Markov dependence property [Besag, 1974, Frank
and Strauss, 1986]? Second, how useful can be the
information enclosed in the Fiedler delta statistic for
learning and mining applications over large-scale net-
works? One basic result related to the first question is
presented in Sec. 3.3, whereas Sec. 5 will address the
second point.
3.2 MODEL ESTIMATION
The goal of estimating a FRG from data is to
obtain an estimate of the conditional distribution
P (Xuv X (Guv ) \ {Xuv }), defined over subgraphs Guv
of G . Starting from Definition 1, this quantity can be
manipulated as follows:
=
P (Xuv X (Guv ) \ {Xuv }) = P (Xuv ∆λ2 (u, v , Guv ))
p(∆λ2 (u, v , Guv ) Xuv )P (Xuv )
=
p(∆λ2 (u, v , Guv ))
p(∆λ2 (u, v , Guv ) Xuv )P (Xuv )
Pxuv
p(∆λ2 (u, v , Guv ) xuv )P (xuv )
(2)
In Eq. 2, P (Xuv ) is the prior probability of observ-
ing an edge between any two nodes u and v , whereas
p(∆λ2 (u, v , Guv ) Xuv ) is the conditional density of
the Fiedler delta ∆λ2 (u, v , Guv ) given the value of
Xuv . Suppose we have a network G = (V , E ), and
that our training sample is a dataset D, defined as
D = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xun vn , Gun vn )(cid:9).
In other
words, the training data are n observations of node
pairs {ui , vi } such that, for each one of them, we know
both the value of Xui vi and the configuration of Gui vi
in G . A simple estimate for P (Xuv ) can then be ob-
tained by computing the proportion of linked/unlinked
node pairs {ui , vi } in D. Let Dxuv denote the set
(cid:8){ui , vi }: (xui vi , Gui vi ) ∈ D ∧ xui vi = xuv (cid:9). Then,
n (cid:12)(cid:12)Dxuv (cid:12)(cid:12). On the other hand,
bP (xuv ) = 1
in order
to estimate p(∆λ2 (u, v , Guv ) Xuv ), we need to make
a choice concerning the form of the modeled density
function.
In the lack of prior knowledge concerning
the form of the density, a reasonable choice is to adopt
a nonparametric estimation technique. In particular,
we use a kernel density estimator [Rosenblatt, 1956,
Parzen, 1962], defined as follows:
p(∆λ2 (u, v , Guv ) xuv ) =
Dxuv X{ui ,vi }∈Dxuv
K∆λ2 (cid:0){u, v}, {ui , vi }(cid:1)
1
(3)
=
11 (t), where 1y (x) = 1 if x ≤ y ,
where
and 1y (x) = 0 otherwise. The Epanechnikov kernel
K∆λ2 (cid:0){u, v}, {ui, vi }(cid:1) =
(cid:19) (4)
K (cid:18) ∆λ2 (u, v , Guv ) − ∆λ2 (ui , vi , Gui vi )
1
=
h
h
and K is a kernel function with bandwidth h [Silver-
man, 1986]. In our implementation of FRGs, we use
the Epanechnikov kernel [Epanechnikov, 1969], namely
4 (cid:0)1 − t2 (cid:1)
K (t) = 3
is more appealing than other possible functions (such
as the Gaussian kernel) because of its computational
convenience. At the same time, it displays analogous
properties in terms of statistical consistency [Silver-
man, 1986].
3.3 DEPENDENCE STRUCTURE
In order to illustrate the behavior of FRGs with re-
spect to conditional independence, we first recall the
definition of Markov dependence for random graph
models [Frank and Strauss, 1986]. Let N (Xuv ) de-
note the set {Xwz : {w, z } ∈ E ∧ {w, z } ∩ {u, v} = 1}.
A Markov random graph is then defined as follows:
Definition 2. A random graph G is said to be a
Markov graph (or to have a Markov dependence
structure) if, for any pair of variables Xuv and Xwz
in G such that {u, v} ∩ {w, z } = ∅, we have that
P (Xuv Xwz , N (Xuv )) = P (Xuv N (Xuv )).
Based on Definition 2, we say that the dependence
structure of a random graph G is non-Markovian
for disjoint pairs of nodes {u, v} and {w, z },
if,
it does not imply that P (Xuv Xwz , N (Xuv )) =
P (Xuv N (Xuv )), i.e. if it is consistent with the in-
equality P (Xuv Xwz , N (Xuv )) 6= P (Xuv N (Xuv )).
We can then prove the following proposition:
Proposition 3. There exist Fied ler random graphs
with non-Markovian dependence structure.
Proof. To prove the proposition, we make use of
the following equalities [Fiedler, 1973]:
if graphs
G1 and G2 are,
respectively, a path and a cir-
then λ2 (G1 ) = 2 (1 − cos(π/n))
cuit of size n,
and λ2 (G2 ) = 2 (1 − cos(2π/n)).
Consider a
graph G = (V , E ) such that V = {u, v , w, z } and
E = {{u, v}, {v , w}, {w, z }, {u, z }}, and let Guv =
(Vuv , Euv ) be the subgraph of G incident to Euv =
E \{{w, z }}. If G is a Markov graph, it must be the case
that P (Xuv Xwz , Xvw , Xuz ) = P (Xuv Xvw , Xuz ).
Now, suppose that G is a FRG. In this case, we have
that
P (Xuv Xwz , Xvw , Xuz ) = P (Xuv X (G ) \ {Xuv })
p(∆λ2 (u, v , G ) Xuv )P (Xuv )
=
p(∆λ2 (u, v , G ))
(5)
and, similarly,
P (Xuv Xvw , Xuz ) =
p(∆λ2 (u, v , Guv ) Xuv )P (Xuv )
p(∆λ2 (u, v , Guv ))
(6)
Eqs. 5–6 imply that, if the dependence structure of G
is Markovian, then the following equality must hold:
p(∆λ2 (u, v , G ) Xuv )
p(∆λ2 (u, v , G ))
=
p(∆λ2 (u, v , Guv ) Xuv )
p(∆λ2 (u, v , Guv ))
(7)
Since the configuration of G and Guv is given by a cir-
cuit and a path respectively, where both have size 4,
we know that λ2 (G ) = 2 (1 − cos(π/2)) and λ2 (Guv ) =
2 (1 − cos(π/4)). Also, if G− = (V , E \ {{u, v}}) and
G−
uv = (Vuv , Euv \ {{u, v}}), notice that λ2 (G− ) =
λ2 (Guv ), since G− is also a path of size 4, and that
M (0, G−
uv ) = M (0, Guv ) + 1, since G−
uv has one more
connected component than Guv . Therefore, we have
that ∆λ2 (u, v , G ) = 2 cos(π/4) and ∆λ2 (u, v , Guv ) =
2 (1−cos(π/4)), i.e. ∆λ2 (u, v , G ) 6= ∆λ2 (u, v , Guv ). Be-
cause of this inequality, there will exist parameteriza-
tions of p which do not satisfy Eq. 7, which means that
the dependence structure of G is non-Markovian.
Note that the proof of Proposition 3 can be straight-
forwardly generalized to the dependence between Xuv
and Xwz in circuits/paths of arbitrary size n, since
the expression used for the Fiedler eigenvalues of such
graphs holds for any n.
In fact, suppose that the
4-nodes circuit G used in the proof is replaced with
a circuit G ∗ = (V ∗ , E ∗ ) of size n, where V ∗ = V ∪
{s1 , . . . , s1 , . . . , sm , t1 , . . . , tm} and E ∗ is obtained from
E by replacing {u, z } and {v , w}, respectively, with
a path from u to z going through s1 , . . . , sm and a
path from v to w going through t1 , . . . , tm , so that
In this case, if G ∗
n = 2m + 4.
uv is the subgraph of
uv = E ∗ \ {{w, z }}, we have again
G ∗ incident to E ∗
that ∆λ2 (u, v , G ∗ ) 6= ∆λ2 (u, v , G ∗
uv ), which means
that there exist FRGs such that p(∆λ2 (u,v,G∗ ) Xuv )
6=
p(∆λ2 (u,v,G∗ ))
p(∆λ2 (u,v,G∗
uv ) Xuv )
.
p(∆λ2 (u,v,G∗
uv ))
4 OTHER CONDITIONAL
RANDOM NETWORKS
In this section, we adapt three families of ran-
dom graph models—namely the ERG, Watts-
Strogatz (WS), and Barab´asi-Albert (BA) models
respectively—to the task of conditional estimation of
edge distributions, and we also review the entailed
dependence structures. This will allow for a clear
comparison of such models to FRGs in Sec. 5. Kro-
necker graphs are not considered here because it is not
straightforward how they could be turned into condi-
tional estimators.
4.1 EXPONENTIAL RANDOM GRAPH
MODELS
Let G(V ) be the set of all possible (undirected) graphs
G with fixed vertex set V , where G(V ) = √2V 2−V .
Suppose that Φ denotes a collection of potential func-
tions ϕi over graphs, where each ϕi (G ) is a graph
statistic such as the number of edges or the number
of triangles in G . Then, an ERG with parameter vec-
1
Z (θ )
tor θ = (θ1 , . . . , θΦ ) defines the following Boltzmann
distribution [Robins et al., 2007]:
θiϕi (G ))
exp ( ΦXi=1
P (X (G ) θ ) =
where each θi is a real-valued parameter associated to
the potential function ϕi , and Z (θ ) denotes the par-
tition function [Koller and Friedman, 2009], given by
i=1 θiϕi (Gj )(cid:9). Computing
Z (θ ) = PGj ∈G(V ) exp (cid:8) PΦ
the partition function exactly is clearly intractable for
graphs with more than a few nodes, which makes it
quite expensive to compute joint probabilities in large
networks using ERGs.
(8)
P (Xuv X (G ) \ {Xuv }; θ ) =
ERGs entail a simple form for the conditional distri-
bution of edges given the remainder of the graph:
exp (cid:26) ΦPi=1
θiϕi (G )(cid:27)
exp (cid:26) ΦPi=1
θiϕi (Gxuv )(cid:27)
Pxuv
(9)
where Gxuv denotes the configuration of G that we ob-
tain by clamping the value of Xuv to xuv . Therefore,
if we want to estimate the parameters of an ERG so as
to maximize the model log-likelihood with respect to a
data sample D = (cid:8)(xu1 v1 , GS1 ), . . . , (xun vn , GSn )(cid:9), we
can optimize each parameter θi by taking the deriva-
∂ θi Pn
tive ∂
j=1 log P (xuj vj X (GSj ) \ {Xuv }; θ ) and ap-
plying any gradient-based optimization technique.
4.1.1 Markov Random Graphs
Given a graph G = (V , E ), define a k -star (for k ≥
2) as a set ESk ⊆ E such that ESk = k and,
for any {u, v} and {w, z } in ESk , {u, v} ∩ {w, z } =
let a k -triangle (for k ≥ 1) be a set
1. Also,
ETk ⊆ E of size 2k + 1 such that the elements of ETk
are edges {u, v}, {u, w1}, {v , w1}, . . . , {u, wk }, {v , wk },
where wi 6= wj for any i and j such that 1 ≤ i, j ≤ k .
If we use E (G ), Sk (G ), and Tk (G ) to denote, respec-
tively, the number of edges, the number of k -stars, and
the number of k -triangles in G , then an exponential
Markov random graph (MRG) model with parameter
vector θ is defined by the following probability distri-
bution [Frank and Strauss, 1986]:
σk Sk (G ) + τ T (G ))
exp (η E (G ) +
KXk=2
(10)
where K is the maximum value that we want
to consider for k in the k -star statistics, θ =
(η , σ2 , . . . , σK , τ ), and T (G ) = T1 (G ) is simply the
number of triangles in G . That is to say, a MRG de-
fines a Boltzmann distribution over graphs, with pa-
rameters corresponding to edge, k -star, and triangle
P (G θ ) =
1
Z
statistics. Interestingly, the ER model can be charac-
terized as a special case of MRG, where all the param-
eters except for η are set to zero.
MRGs are known to satisfy Definition 2 [Robins et al.,
2007]. Therefore, under the probability model defined
by Eq. 10, we have that, for any pair of nodes {u, v}
and any subgraph sample GS from G , P (Xuv X (GS ) \
{Xuv }; θ ) = P (Xuv NS (Xuv ); θ ), where NS (Xuv ) is
the set of all variables Xwz from GS such that {w, z } ∩
{u, v} = 1. Note that while Definition 2 specifies a
general class of random graph models, MRGs in the
strict sense refer to the class of ERGs defined above.
4.1.2 Higher-Order Models
Higher-order ERG models (HRGs) are readily ob-
tained from MRGs by adding k -triangle counts (for
k ≥ 1) to the Boltzmann distribution of Eq. 10 [Robins
et al., 2007]. Moreover, in order to avoid fixing in ad-
vance the maximum value of the k parameter, a gen-
eral formulation has been proposed for HRGs through
the alternating k-star and the alternating k-triangle
statistics [Snijders et al., 2006], obtaining the follow-
ing probability model:
1
Z
exp {η E (G ) + σ S ∗ (G ) + τ T ∗(G )} (11)
P (G θ ) =
where, if n is the number of nodes in G and Sk and Tk
are the usual k -stars and k -triangle counts, S ∗ (G ) and
T ∗(G ) are defined as S ∗(G ) = Pn−1
k=2 (−1)k Sk
ρk−2 and
T ∗(G ) = Pn−2
k=2 (−1)k Tk
ρk−2 (with ρ ≥ 1 acting as a sort
of regularization parameter).
It
is
known
that,
under
the
distribution
given by Eq. 11, P (Xuv X (GS ) \ {Xuv }; θ ) =
P (Xuv N ∗
S (Xuv ); θ )
[Robins et al., 2007], where
N ∗
S (Xuv ) is the set containing any Xwz from G such
that Xwz 6= Xuv and, for at least one edge {s, t}, we
have that {s, t} ∩ {u, v} = 1 and {s, t} ∩ {w, z } 6= ∅.
Clearly, NS (Xuv ) ⊆ N ∗
S (Xuv ), which is why HRGs
are ‘higher-order’ than MRGs.
4.2 WATTS-STROGATZ MODEL
The WS network model [Watts and Strogatz, 1998]
defines a random network as a regular ring lattice
which is randomly ‘rewired’ so as to introduce a cer-
tain amount of disorder, which typically leads to small-
world phenomena. Given nodes u1 , . . . , un , a WS net-
work is generated by constructing a regular ring lattice
such that each node is connected to exactly 2 δ other
nodes. Network edges are then scanned sequentially,
and each one of them is rewired with probability β ,
where, if i < j , rewiring an edge {ui , uj } means to
replace it with another edge {ui , uk } such that k 6= i
and uk is chosen uniformly at random from the set of
all nodes that are not already linked to ui .
P (k) =
Interestingly, the degree distribution corresponding to
a WS network G with parameters δ and β takes the
following form [Barrat and Weigt, 2000], for any degree
k ≥ δ :
IXi=0 (cid:18)δ
i(cid:19) (1 − β )i β δ−i (δ β )k−δ−i
exp(−β δ)
(k − δ − i)!
(12)
where I = min{k − δ, δ}. Given Eq. 12, we model the
conditional distribution of a variable Xuv given the
remainder of G through the following quantity:
P (du (G )) P (dv (G ))
Pxuv
P (du (Gxuv )) P (dv (Gxuv ))
(13)
where du (G ) denotes the degree of node u in G , and
each P is implicitly conditional on the values of δ and
β . We refer to the conditional random graph model
specified in Eq. 13 as the conditional Watts-Strogatz
(CWS) model.
P (Xuv X (G ) \ {Xuv }) =
For the CWS model, the following proposition follows
straightforwardly from Eq. 13:
Proposition 4. The dependence structure of CWS
models is Markovian.
A simple estimate of the δ parameter for a data sample
D = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xun vn , Gun vn )(cid:9) is the follow-
ing:
nXi=1
1
δ =
dui (GSi ) + dvi (Gui vi )
(14)
2 n
On the other hand, a simple strategy for estimating
the rewiring probability by a maximum likelihood ap-
proach consists in parameterizing it as a sigmoid func-
1
1+exp(−θβ ) , where θβ can be optimized by ex-
tion β =
∂ θβ Pn
ploiting the derivative ∂
i=1 log P (xui vi X (Gui vi )\
{Xuv }; δ, θβ ).
4.3 BARAB ´ASI-ALBERT MODEL
The BA model was originally proposed for explain-
ing the scale-free degree distributions often observed
in real-world networks [Barab´asi and Albert, 1999].
In the BA model, the probability P (u) of linking to
any particular node u in a network G = (V , E ) takes
du (G )α
Pv∈V dv (G )α [Albert and Barab´asi,
the form P (u) =
2002], where α is a real-valued parameter affecting the
shape of the degree distribution. Given P (u), we can
use the following expression to characterize the con-
ditional probability of observing edge {u, v} given the
P (Xuv = 1 X (G ) \ {Xuv }; α) =
remainder of G [Newman, 2001, Barab´asi et al., 2002]:
du (G )α dv (G )α
(cid:0)Pw∈V dw (G )α (cid:1)2
(15)
We refer to the random graph model of Eq. 15 as
the conditional Barab´asi-Albert (CBA) model. The
α parameter can be optimized straightforwardly by
gradient-based methods, so as to maximize the ob-
jective Pn
i=1 log P (xui vi X (Gui vi ) \ {Xuv }; α) over an
observed sample of size n.
The following property holds for CBA networks:
Proposition 5. The dependence structure of CBA
models is non-Markovian.
Proof. Consider a CBA network G = (V , E ), where
{u, v} and {w, z } are edges in E such that {u, v} ∩
{w, z } = ∅.
G is a Markov graph if and only
if P (Xuv Xwz , N (Xuv )) = P (Xuv N (Xuv )).
Let
G1 and G2 be the same as defined in the proof
of Proposition 4. Although du (G2 ) = du (G1 ) and
dv (G2 ) = dv (G1 ), we have that Pw∈V dw (G2 )α >
Pw∈V dw (G1 )α . Therefore,
P (Xuv Xwz , N (Xuv )) = P (Xuv X (G2 ) \ {Xuv })
du (G1 )α dv (G1 )α
du (G2 )α dv (G2 )α
(cid:0)Pw∈V dw (G2 )α (cid:1)2 6=
=
(cid:0)Pw∈V dw (G1 )α (cid:1)2
= P (Xuv X (G1 ) \ {Xuv }) = P (Xuv N (Xuv ))
(16)
5 EXPERIMENTAL EVALUATION
In order to assess experimentally the accuracy of FRGs
as models of conditional edge distributions in large-
scale networks, we test them in the following link pre-
diction setting. First, we take a network G = (V , E ),
with a number of nodes ranging from a few thousands
to a couple of millions, and a number of edges going up
to several millions. We then sample n training pairs
{ui , vi} uniformly at random from V , with ui 6= vi .
For each sampled pair of nodes {ui , vi }, we recover the
subgraph Gui vi induced on G by the vertex set Vui vi =
{ui , vi}∪{wi : {ui , wi } ∈ E ∨{vi , wi } ∈ E }, so as to get a
training set D = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xun vn , Gun vn )(cid:9).
We then estimate from D each one of the condi-
tional random graph models described in the previ-
ous sections, using the respective learning techniques.
Given the estimated models, we sample a test set
T = (cid:8)(xu1 v1 , Gu1 v1 ), . . . , (xum vm , Gum vm )(cid:9) from G such
that T ∩ D = ∅, where each element of T is sampled
through the same technique used for D. For each es-
timated model, we assess its accuracy by first using
it to compute the conditional probability of observ-
ing a link for each pair of nodes {uj , vj } in T , and
then calculating the area under the ROC curve (AUC)
for the predictions delivered on T . Since the problem
of predicting the presence of edges in real-world net-
2 (cid:0)V 2 − V (cid:1),
works is severely unbalanced, i.e. E ≪ 1
the ROC curve is a particularly appropriate evalua-
tion measure [Fawcett, 2006]. Also, in order to as-
sess the sensitivity of each model to the size of the
training sample, we ran some preliminary experiments
with several different values of D. The result of this
preliminary investigation was that, provided that the
training sample contains at least a few pairs of linked
nodes (in the order of ten or twenty), then the behav-
ior of the different models is not significantly affected
by increasing sample sizes.
Table 1: General statistics for the network datasets
used in the experiments. CCG and DG denote the
average clustering coefficient and the network diameter
respectively.
V
Network
18,772
AstroPh
5,242
GrQc
12,008
HepPh
9,877
HepTh
Enron
36,692
RoadCA 1,965,206
RoadTX 1,379,917
E CCG
DG
14
0.63
396,160
17
28,980
0.52
13
0.61
237,010
17
0.47
51,971
12
0.49
367,662
0.04
5,533,214
850
0.04 1,049
3,843,320
We compare the performance of the MRG, HRG,
CWS, CBA, and FRG models on seven different net-
works, drawn from the arXiv e-print repository, the
Enron email corpus, and the US road network respec-
tively [Leskovec et al., 2007, 2009]. The ER model is
not considered in these experiments, since the involved
independence assumption makes that model simply
unusable for conditional estimation tasks. Some rep-
resentative network statistics for the used datasets
are summarized in Table 1. For the arXiv datasets
(i.e.
the AstroPh, GrQc, HepPh, and HepTh net-
works), we report results for a choice of 10, 000 node
pairs both for the training and the test set, whereas
for the Enron and US road (RoadCA and RoadTX)
networks we have D = T = 100, 000 and D =
T = 10, 000, 000 respectively. However, notice that
nearly identical results can be obtained in each case
after reducing the number of training samples down
to even 20%–40% of the indicated size (as discovered
through preliminary analysis). ROC curves for the de-
scribed datasets are plotted in Figs. 1–3, whereas the
corresponding AUC values are given in Table 2. As
a general remark, we point out that AUC values less
1
0.8
0.6
0.4
0.2
CBA
CWS
FRG
HRG
MRG
1
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
CBA
CWS
FRG
HRG
MRG
0
0
0.2
0.4
0.6
False positive rate
(a)
0.8
1
0
0
0.2
0.4
0.6
False positive rate
(b)
0.8
1
1
0.8
0.6
0.4
0.2
CBA
CWS
FRG
HRG
MRG
1
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
CBA
CWS
FRG
HRG
MRG
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0
0
0.2
0.4
0.6
False positive rate
(c)
0.8
1
0
0
0.2
0.4
0.6
False positive rate
(d)
0.8
1
Figure 1: ROC curves for the AstroPh (a), GrQc (b), HepPh (c), and HepTh (d) networks.
than 0.5 (as recorded for some models) do not necessar-
ily mean that prediction accuracy is being worse than
random guessing.
In fact, recent studies show that,
depending on signal strength and stratification errors
between training and test sets, random guessing can
drop to AUC values even lower than 0.3 [Parker et al.,
2007]. Therefore, AUC values less than 0.5 should be
considered simply as no better than random guessing,
rather than worse than random.
FRGs significantly outperform all other models both in
the arXiv and in the Enron networks. Such networks
are generally characterized by power law degree distri-
butions, contrary to the road networks, which exhibit
instead a regular topology, with degree distribution
peaked around its mean. This explains the better be-
havior of the CBA model with respect to the remaining
options in most of the scale-free networks.
Interest-
ingly, this trend is reverted for the HepPh data, where
not only CWS outperforms CBA, but we also observe
that HRG behaves much better than it does on the
Table 2: AUC values for the ROC curves plotted in
Figs. 1–3. CCG and DG denote the average clustering
coefficient and the network diameter respectively.
AUC (%)
Network CBA CWS FRG HRG MRG
AstroPh 46.04 32.39 91.66 28.69
14.78
22.32
66.22 50.86 94.90 27.10
GrQc
15.02
40.04 50.84 92.73 65.62
HepPh
32.36
53.21 42.47 79.34 32.82
HepTh
Enron
48.45 49.03 85.92 19.94
11.23
81.12
RoadCA 30.84 91.21 66.70 77.90
RoadTX 34.67 93.01 63.75 62.51
68.36
other scale-free networks. The fact that, in this partic-
ular case, FRGs remain the best available option pro-
vides evidence for their higher stability (i.e. robustness
to variation in the underlying network properties) with
1
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
CBA
CWS
FRG
HRG
MRG
1
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
0
0
0.2
0.4
0.6
False positive rate
0.8
1
0
0
0.2
CBA
CWS
FRG
HRG
MRG
0.4
0.6
False positive rate
(a)
0.8
1
CBA
CWS
FRG
HRG
MRG
1
0.8
0.6
0.4
0.2
e
t
a
r
e
v
i
t
i
s
o
p
e
u
r
T
Figure 2: ROC curves for the Enron network.
respect to the other models. On the other hand, for
the US road networks we observe a completely differ-
ent pattern of results. This time, the FRG model per-
forms worse than the CWS model or the two variants
of ERG. The reason is related to the lattice-shaped
regularity exhibited by such graphs. This is not sur-
prising, as the WS model subsumes regular lattices as
special case scenarios. A natural explanation for the
superiority of the CWS model on the road networks
lies in the fact that their parametric assumption con-
cerning the observed degree distribution happens to be
satisfied for such data, while it is clearly violated by
the scale-free networks, which is exactly the opposite
of what happens for the CBA model. It is worth not-
ing, however, that FRGs are again performing signifi-
cantly better than the CBA model. Therefore, FRGs
appear to be a more stable class of conditional ran-
dom network models, since their predictions ensure a
regularly accurate behavior across networks displaying
significantly different statistical properties. Overall,
the presented results encourage the hypothesis that a
genuinely nonparametric approach to conditional ran-
dom graph modeling can offer dramatic advantages
over parametric approaches.
6 CONCLUSION
The work presented in this paper started from two mo-
tivations. On the one hand, we remarked that statisti-
cal modeling of networks cries for nonparametric esti-
mation, because of the inaccuracy often resulting from
fallacious parametric assumptions. In this respect, we
showed that statistics derived from the Laplacian spec-
trum of graphs (such as the Fiedler delta function)
offer practical ways of developing nonparametric esti-
mators. On the other hand, we suggested that a condi-
tional approach to random graph modeling can be very
0
0
0.2
0.4
0.6
False positive rate
(b)
0.8
1
Figure 3: ROC curves for the RoadCA (a) and
RoadTX (b) networks.
effective in the large-scale setting, since it allows e.g. to
dispense with the intractable partition functions often
involved in joint distributions. With respect to this
point, we showed how FRGs allow us to tackle very
large datasets, processing effectively even millions of
queries over networks with millions of nodes and edges.
Interesting options for future work consist in analyz-
ing the effect of the subgraph sampling mechanism in
determining the distribution of the Fiedler delta, as
well as investigating alternative ways of exploiting the
information enclosed in the graph spectrum.
Acknowledgements
This work has been supported by the French National
Research Agency (ANR-09-EMER-007). The authors
are grateful to Romaric Gaudel, R´emi Gilleron, and
Michal Valko for their suggestions and comments con-
cerning this work.
Absence of Large Well-Defined Clusters.
Mathematics, 6(1):29–123, 2009.
Internet
Jure Leskovec, Deepayan Chakrabarti, Jon Klein-
berg, Christos Faloutsos, and Zoubin Ghahramani.
Kronecker graphs: An approach to modeling net-
works. Journal of Machine Learning Research, 11:
985–1042, 2010.
Bo jan Mohar. The Laplacian Spectrum of Graphs. In
Y. Alavi, G. Chartrand, O. R. Oellermann, and A. J.
Schwenk, editors, Graph Theory, Combinatorics,
and Applications, pages 871–898. Wiley, 1991.
Mark E.J. Newman. Clustering and preferential at-
tachment in growing networks. Physical Review E,
64:025102, 2001.
Mark E.J. Newman. Networks. An Introduction. Ox-
ford University Press, New York (NY), 2010.
Brian J. Parker, Simon Gunter, and Justin Bedo.
Stratification bias in low signal microarray studies.
BMC Bioinformatics, 8, 2007.
Emanuel Parzen. On Estimation of a Probability Den-
sity Function and Mode. Annals of Mathematical
Statistics, 33:1065–1076, 1962.
Garry L. Robins, Tom Snijders, Peng Wang, Mark S.
Handcock, and Philippa E. Pattison. Recent devel-
opments in exponential random graph (p∗ ) models
for social networks. Social Networks, 29:192–215,
2007.
Murray Rosenblatt. Remarks on Some Nonparametric
Estimates of a Density Function. The Annals of
Mathematical Statistics, 27(3):832–837, 1956.
Bernard W. Silverman. Density Estimation for Statis-
tics and Data Analysis. Chapman and Hall, 1986.
Tom A. B. Snijders, Philippa E. Pattison, Garry L.
Robins, and Mark S. Handcock. New Specifications
for Exponential Random Graph Models. Sociological
Methodology, 36:99–153, 2006.
Ulrike von Luxburg. A tutorial on spectral clustering.
Statistics and Computing, 17:395–416, 2007.
Duncan J. Watts and Steven H. Strogatz. Collective
dynamics of ‘small-world’ networks. Nature, 393:
440–442, 1998.
References
R´eka Albert and Albert-L´aszl´o Barab´asi. Statistical
mechanics of complex networks. Reviews of Modern
Physics, 74:47–97, 2002.
William N. Anderson and Thomas D. Morley. Eigen-
values of the Laplacian of a graph. Linear and Mul-
tilinear Algebra, 18:141–145, 1985.
Zhao jun Bai, James Demmel, Jack Dongarra, Axel
Ruhe, and Henk van der Vorst, editors. Templates
for the Solution of Algebraic Eigenvalue Problems:
A Practical Guide. SIAM, Philadelphia (PA), 2000.
A.L. Barab´asi, H. Jeong, Z. N´eda, E. Ravasz, A. Schu-
bert, and T. Vicsek. Evolution of the social network
of scientic collaborations. Physica A, 311:590–614,
2002.
Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence
of scaling in random networks. Science, 286:509–
512, 1999.
A. Barrat and M. Weigt. On the properties of small-
world network models. The European Physical Jour-
nal B, 13:547–560, 2000.
Julian Besag. Spatial Interaction and the Statistical
Analysis of Lattice Systems. Journal of the Royal
Statistical Society. Series B, 36:192–236, 1974.
Dragos M. Cvetkovi´c, Michael Doob, and Horst Sachs,
editors. Spectra of Graphs: Theory and Application.
Academic Press, New York (NY), 1979.
V.A. Epanechnikov. Nonparametric Estimation of a
Multidimensional Probability Density. Theory of
Probability and its Applications, 14:153–158, 1969.
P. Erdos and A. R´enyi. On Random Graphs, I. Pub-
licationes Mathematicae Debrecen, 6:290–297, 1959.
Tom Fawcett. An introduction to ROC analaysis. Pat-
tern Recognition Letters, 27:861–874, 2006.
Miroslav Fiedler. Algebraic connectivity of graphs.
Czechoslovak Mathematical Journal, 23:298–305,
1973.
Ove Frank and David Strauss. Markov Graphs. Jour-
nal of the American Statistical Association, 81:832–
842, 1986.
Daphne Koller and Nir Friedman. Probabilistic Graph-
ical Models: Principles and Techniques. MIT Press,
Cambridge (MA), 2009.
Jure Leskovec, Jon M. Kleinberg, and Christos Falout-
sos. Graph evolution: Densification and shrinking
diameters. Transactions on Know ledge Discovery
from Data, 1(1), 2007.
Jure Leskovec, Kevin J. Lang, Anirban Dasgupta,
and Michael W. Mahoney. Community Structure
in Large Networks: Natural Cluster Sizes and the
|
1809.08523 | 1 | 1809 | 2018-09-23T03:45:02 | Evolution of Threats in the Global Risk Network | [
"cs.SI",
"physics.soc-ph"
] | With a steadily growing population and rapid advancements in technology, the global economy is increasing in size and complexity. This growth exacerbates global vulnerabilities and may lead to unforeseen consequences such as global pandemics fueled by air travel, cyberspace attacks, and cascading failures caused by the weakest link in a supply chain. Hence, a quantitative understanding of the mechanisms driving global network vulnerabilities is urgently needed. Developing methods for efficiently monitoring evolution of the global economy is essential to such understanding. Each year the World Economic Forum publishes an authoritative report on the state of the global economy and identifies risks that are likely to be active, impactful or contagious. Using a Cascading Alternating Renewal Process approach to model the dynamics of the global risk network, we are able to answer critical questions regarding the evolution of this network. To fully trace the evolution of the network we analyze the asymptotic state of risks (risk levels which would be reached in the long term if the risks were left unabated) given a snapshot in time, this elucidates the various challenges faced by the world community at each point in time. We also investigate the influence exerted by each risk on others. Results presented here are obtained through either quantitative analysis or computational simulations. | cs.SI | cs | Evolution of Threats in the Global Risk Network
Xiang Niu1,2+ · Alaa Moussawi1,3 · Gyorgy
Korniss1,3 · Boleslaw K. Szymanski1,2+∗
8
1
0
2
p
e
S
3
2
]
I
S
.
s
c
[
1
v
3
2
5
8
0
.
9
0
8
1
:
v
i
X
r
a
Abstract With a steadily growing population and rapid advancements in technology,
the global economy is increasing in size and complexity. This growth exacerbates
global vulnerabilities and may lead to unforeseen consequences such as global pan-
demics fueled by air travel, cyberspace attacks, and cascading failures caused by the
weakest link in a supply chain. Hence, a quantitative understanding of the mecha-
nisms driving global network vulnerabilities is urgently needed. Developing methods
for efficiently monitoring evolution of the global economy is essential to such un-
derstanding. Each year the World Economic Forum publishes an authoritative report
on the state of the global economy and identifies risks that are likely to be active,
impactful or contagious. Using a Cascading Alternating Renewal Process approach
to model the dynamics of the global risk network, we are able to answer critical
questions regarding the evolution of this network. To fully trace the evolution of the
network we analyze the asymptotic state of risks (risk levels which would be reached
in the long term if the risks were left unabated) given a snapshot in time; this eluci-
dates the various challenges faced by the world community at each point in time. We
also investigate the influence exerted by each risk on others. Results presented here
are obtained through either quantitative analysis or computational simulations.
Keywords Global Risk Network · Cascading Failures · Cascades Alternating
Renewal Processes · Network Evolution · Mean-field Steady State
Introduction
Recently, cascading failures have been extensively studied, with most studies on in-
frastructure systems [1, 2], financial institutions [3, 4, 5], and the Internet [6, 7]. In [1],
the authors analyze cascading failures in power grid networks. In real and synthetic
Boleslaw K. Szymanski
1Network Science and Technology Center, Rensselaer Polytechnic Institute (RPI), Troy, NY 12180, USA.
∗Correspondence: [email protected]
+Equal contributors
2
Xiang Niu1,2+ et al.
spatial systems, they study properties of failures and strategies to reduce the corre-
sponding damages. In either single-node or multi-nodes cases, the damage caused by
attacks is weakly correlated with network properties, such as node degree or initial
state load. They also test different mitigation strategies and various combinations of
node failures. Knowing in advance a set of failing nodes and damage incurred by
every single-node failure, they are able to predict the damage caused by sets of multi-
node failures. That is because, in the multi-node failure, the node with the highest
damage dominates the entire multi-node cascading failure. Authors in [2] also focus
on blackout cascading failure mechanisms. Studying the real blackouts from a few
countries, they find that frequencies of blackouts exhibit a power-law distribution
in agreement with the scale-free property of complex networks. The authors' power
system model suggests that the real power system gradually reaches a critical point.
In the area of financial institutions, authors in [3] discuss the failures of banking
ecosystems. Inspired by models from food webs and disease networks, the authors
apply an analogous model in financial networks to reduce risks. In [4], the authors
study the contagion in the financial market. They mainly focus on the robustness of
asset market liquidity. With a novel model based on the Poisson random graph in the
banking system, they find that high average degree of nodes increases both the prob-
ability of transmission and the speed of contagion. Using the feedback-centrality, the
authors in [5] propose a DebtRank to find the critical nodes that play the most impor-
tant role in the systemic failure of financial networks. They studied a real dataset from
Fed emergency loans program and detected 22 institutions that were critical to 2008-
2010 crises. They also find that some small institutions can be important because of
their high centralities in the network. Unlike here, the authors do not even attempt to
match the model with historical data. In [8, 9, 10, 11], the authors observe historical
correlations between stock prices and build stock dependency networks. They also
consider events that may affect the stock market such as "tsunami in Japan". In their
node failure analysis, they mainly focus on the failure of one industry and test the
system tolerance of such failure. In summary, the research in the above papers targets
the cascade failures in the global financial market.
Some other analyses are related to the cascade failure of the Internet. In [6], the
authors analyze the fault-tolerance of Internet service. They establish that Internet
failures are mainly caused by operator errors and suggest the use of extensive online
testing to reduce the failure rates. In [7], the authors find that the latent errors are
likely to accumulate within the Internet services and cause chain reaction cascades.
In [12], the authors analyze spontaneous recovery from cascading failures of econ-
omy. In their model, a node can fail independently or by external causes. All nodes
have the same internal failure probability so the authors can solve the model using
mean-field equation.
Only a few of studies discussed above focus on the cascades of global risks [13,
14]. Yet, the global risks impact highly global economy and lives of countless people.
Hence, there is an urgent need to study and understand global risk network. Here, we
model such network using a Cascading Alternating Renewal Processes (CARP) [13,
14, 15]. In the model, a system alternates between active and passive states, denoted
by 1 and 0 respectively. An active risk represents a failed node, while a passive risk
corresponds to a fully operational node. State transitions are instantaneous. They are
Evolution of Threats in the Global Risk Network
3
triggered by non-homogeneous Poisson processes [13]. Given the complexity of real-
world network interactions and node specific dynamics, the processes causing state
transitions may be observable, or latent. The latent processes are not directly ob-
servable, only their combined effect, a state transition, is. In the global risk model,
the latent processes are categorized as endogenous (caused internally at the node) or
exogenous (caused by neighboring active risk node) Poisson processes. Their param-
eters are recovered by maximum likelihood estimation from the records of historical
events.
The risks listed in the WEF Global Risk Reports [16, 17, 18, 19, 20] constantly
change; new risks arise and are added to the network, while existing active risks
either continue to be a threat and remain in the network, or, thanks to the response of
threatened governments and industry, decline in importance and are removed. This
evolution causes continuous changes in the global risks and their probabilities, and
leads to an annual revision of the list of risks present in the network. However, if left
unabated, the global risk network would approach the steady state, in which some
risk will be active much more frequently making their threats much more pronounced
than in the initial state. These considerations motivate us not to compare the states
of the global risk network at fixed points in time. Instead, we compare the steady
states to which these initial states would evolve if no changes to the system had been
introduced. Looking at the steady states accentuates the different challenges that the
well-being and stability of the global risks network has faced at each reported point
in the time.
The CARP model has been successfully applied to analyze cascading failures of
global risks in [13] by taking into account the interconnectivity and interdependence
among risks. This model is also used here to analyze the evolution of the global risk
network. Furthermore, in [14], the authors investigate the asymptotic normality of
the MLE procedure used to find the most likely model parameters in CARP. They
demonstrate that this property is preserved in the presence of latent processes caus-
ing state transitions. We use this property here to bind the error of model parameter
recovery in the global risk network.
In the following sections of the paper we analyze evolution of risks over the years
2013-2017. Some of these results were presented in [21] but they were limited to two
points in time, year 2013 and year 2017. Hence, the number of the results and points
of evolution presented here more than doubled. Consequently, all the analyses and
evaluations were expanded accordingly. In particular, we first present the annual evo-
lution of the risk network itself from 2013 to 2017. We also show how the definitions
of risks themselves change and how we deal with these changes. Finally, we present
and discuss how steady states of risks evolve annually.
Models
CARP
The CARP model for the global risk network contains two primary types of Poisson
processes: two latent passive risk activation processes and a directly observable active
4
Xiang Niu1,2+ et al.
risk continuation process. Here, we further subdivide the passive risk activation type
into internal activation and external activation. We assume that the active risk contin-
uation process is always triggered internally. The corresponding Poisson processes
are defined as follows [13].
-- Passive risk with internal activation: a passive risk i is activated internally with
i =
. The Poisson probability of transition over one time unit is pint
i
intensity λint
1 − e−λint
.
i
-- Passive risk with external activation: a passive risk i is activated externally by the
. The corresponding Poisson proba-
neighboring active risk j with intensity λext
ji
bility is pext
ji = 1 − e−λext
ji .
-- Active risk continuation: an active risk i continues its activity for the next time
i =
denotes probability of recovery in a time unit
. The corresponding Poisson probability is pcon
unit internally with intensity λcon
1 − e−λcon
, where prec
i = 1 − prec
i
from an active risk i.
i
i
Using the likelihood li for each risk i provided by experts in the WEF Global Risk
Reports [16, 17, 18, 19, 20], we obtain a normalized likelihood Li, which indicates how
likely a risk i is to be active by logarithmic transformation λint
i = −αln(1 − Li),
λext
i = −γln(1 − Li) [13] getting:
ji = −β ln(1 − Li), λcon
i = 1 − (1 − Li)α
pint
ji = 1 − (1 − Li)β
pext
i = 1 − (1 − Li)γ.
pcon
(1)
The advantage of Eq. 1 is that the probabilities of the three Poisson processes are
defined only by a normalized likelihood Li and model parameters α,β,γ. These pa-
rameters are needed because while humans can often adequately estimate relative
probabilities by crowd sourcing, they usually are less precise in predicting absolute
probabilities. By providing a mapping from likelihood to probabilities based on the
most likely values of the model parameters obtained through MLE procedure [22]
they model over historical data, we account for expert biases that may render the ab-
solute probabilities inaccurate, while extracting relevant information from the relative
estimations of the likelihoods.
After combining the probabilities of all possible transitions of the Poisson pro-
cesses in the risk network, we obtain the state transition probabilities [13] as
Pi(t)0→1 = 1 − (1 − pint
i ) ∏
j∈Ni
(1 − pext
ji )
Pi(t)1→0 = prec
i
.
(2)
where Pi(t)s1→s2 represents the probability of a state transition from state s1 to state
s2 for risk i at time t, while Ni represents the set of neighbors of risk i that were active
at time t − 1.
The specific state transition probability of all risks over one time unit is
−−→
S(t) =
i=1 Pi(t)si(t)→si(t+1), where we sum over all R risks. The likelihood of the sequence
i=1 Pi(t)si(t)→si(t+1),
∏R
of state transition of all risks is L(
−−→
S(T )) = ∏T −1
−−→
S(2), ...,
−−→
S(1),
t=1 ∏R
Evolution of Threats in the Global Risk Network
5
where T represents the number of time steps during the entire observed or predicted
evolution [13]. The corresponding log-likelihood is
−−→
S(1),
ln L(
−−→
S(2), ...,
−−→
S(T )) =
T −1
∑
t=1
R
∑
i=1
ln Pi(t)si(t)→si(t+1).
(3)
We compute the most likely values of model parameters α,β, and γ by maxi-
mizing the log-likelihood (Eq. 3) of the observed state transitions over the historical
data [23, 22]. With these most likely values, we simulate the system evolution to iden-
tify the mean-field steady state evolution of the global risk network at any particular
point in time. Given the state of the global risk network at time t we ask to what state
the network will evolve as t → ∞ if it is not further influenced by external actors.
We simulate the system evolution as t → ∞ training on historical data till time t, and
relying only on learned model dynamics past time t. We approximate the asymptotic
state at a finite time at which activity frequencies for all risks stabilize.
Related Works
The CARP model for global risk network was first proposed and analyzed in detail
in [13]. Through the study of 2013 network, the authors calculate the contagion po-
tentials of risks, risk persistence and risk failure cascade survival probability caused
by a single risk failure. The risk persistence is calculated as the fraction of time steps
during which a risk is active. The contagion potential is not positively correlated with
internal activation probability, but is mainly defined by external activation and re-
covery probabilities. Ranked by their contagion potentials, the top three risks are:
"Severe income disparity", "Chronic fiscal imbalances", and "Rising greenhouse gas
emissions". The results show that about 80% of the time, the number of active risks is
between 8 and 19. By setting internal activation probabilities of risks to zero, the au-
thors found cascade survival probability initiated by a single risk decreases exponen-
tially with time. To validate the choice of the model, the authors compared it with 60
alternative models, including disconnected model (β = 0, so only internal activation
is acting), expert data based model (α = 1,β = 0, internal activation is equal to like-
lihood Li), uniform model (likelihood Li is ignored), weighted network model (edges
are assigned different weights depending on the number of experts listing them) and
combinations of them. The CARP model outperforms all other models with at least
95% statistical confidence interval because it takes into account the interconnectivity
and interdependence among risks.
The precision of predictability is likely to depend on the quality and amount of
historical ground truth data. Thus, in [14], the authors proposed an artificial model
of fire propagation among houses to establish the limits of model predictability. The
authors use simulations of CARP model to generate data with arbitrary lengths (from
100 to 6400 time steps) and arbitrary number of variants of model execution. The
authors use these variants as alternative historical ground truth data. They measure the
prediction precision between variants at different length of alternative historical data,
and study how the prediction precision changes over time. The authors conclude that
6
Xiang Niu1,2+ et al.
Table 1 Indices and descriptions of global risks from the year 2013 to 2017. To compare related risks in
different years, we give them same numerical code but different alphabetical indices here. In the World
Economic Forum (WEF) Global Risk Reports, experts define risks in 5 categories: economic (blue), envi-
ronmental (green), geopolitical (orange), societal (red) and technological (purple).
Risk
index
01
02
03
04
05a
05b
06a
06b
07a
07b
07c
07d
08
09
10
11
12
13
14a
14b
14c
15a
15b
15c
15d
16
17
18
19
20
21a
21b
21c
22a
22b
23
24
25
26
27
28
29a
29b
29c
30
31
32
33
34
35
36
37
38
39
40a
40b
40c
40d
40e
40f
41
42
Risk description
Fiscal crises in key economies
High structural unemployment
or underemployment
Failure of a major financial mechanism
or institution
Failure/shortfall of critical infrastructure
Severe energy price shock
Extreme volatility in energy and agriculture prices
Asset bubble in a major economy
Liquidity crises
Deflation in a major economy
Unmanageable inflation
Unmanageable inflation or deflation
Decline of importance of the US dollar
as a major currency
Severe income disparity
Unforeseen negative consequences of regulation
Hard landing of an emerging economy
Extreme weather events
Failure of climate-change mitigation
and adaptation
Major biodiversity loss and ecosystem collapse
Major natural catastrophes
Unprecedented geophysical destruction
Vulnerability to geomagnetic storms
Man-made environmental catastrophes
Irremediable pollution
Land and waterway use mismanagement
Rising greenhouse gas emissions
Antibiotic-resistant bacteria
State collapse or crisis
Weapons of mass destruction
Interstate conflict with regional consequences
Large-scale terrorist attacks
Illicit trade
Entrenched organized crime
Major escalation in organized crime
and illicit trade
Failure of national governance
Pervasive entrenched corruption
Failure of global governance
Unilateral resource nationalization
Militarization of space
Failure of urban planning
Food crises
Water crises
Rapid and massive spread of infectious diseases
Rising rates of chronic disease
Vulnerability to pandemics
Large-scale involuntary migration
Profound political and social instability
Backlash against globalization
Ineffective illicit drug policies
Mismanagement of population aging
Rising religious fanaticism
Unsustainable population growth
Breakdown of critical information infrastructure
and networks
Large-scale cyberattacks
Massive incident of data fraud/theft
Adverse consequences of technological advances
Massive digital misinformation
Proliferation of orbital debris
Unforeseen consequences of climate change
mitigation
Unforeseen consequences of nanotechnology
Unforeseen consequences of new life science
technologies
Failure of intellectual property regime
Mineral resource supply vulnerability
2013
index
01
02
05
06
-
03
-
07
-
-
10
-
08
09
04
16
12
18
-
19
20
-
13
14
17
11
21
22
24
28
30
23
-
-
27
25
29
26
15
32
40
-
35
39
37
-
31
33
34
36
38
41
42
45
-
44
47
48
49
50
43
46
2014
index
2015
index
2016
index
01
04
02
06
05
-
-
03
-
-
-
07
25
-
-
08
13
11
09
-
-
10
-
-
-
26
15
19
20
18
-
-
17
-
16
14
21
-
27
22
12
-
24
23
-
28
-
-
-
-
-
29
30
31
-
-
-
-
-
-
-
-
06
07
04
05
03
-
01
-
02
08
-
-
-
-
-
09
10
11
12
-
-
13
-
-
-
-
17
18
15
16
-
-
-
14
-
-
-
-
19
20
24
23
-
-
21
22
-
-
-
-
-
25
26
27
28
-
-
-
-
-
-
-
05
06
03
04
08
-
01
-
02
09
-
-
-
-
-
10
11
12
13
-
-
14
-
-
-
-
18
19
16
17
07
-
-
15
-
-
-
-
20
21
25
24
-
-
22
23
-
-
-
-
-
27
28
29
26
-
-
-
-
-
-
-
2017
index
05
06
03
04
08
-
01
-
02
09
-
-
-
-
-
10
11
12
13
-
-
14
-
-
-
-
19
20
17
18
07
-
-
15
-
16
-
-
21
22
26
25
-
-
23
24
-
-
-
-
-
28
29
30
27
-
-
-
-
-
-
-
Evolution of Threats in the Global Risk Network
7
the average relative error of parameter recovery decays according to the power law
of the size of historical data and ultimately tends to zero when the length of historical
data tends to infinity. These results demonstrate that the asymptotic normality of MLE
holds also in the presence of latent Poisson processes.
There are some similarities between the CARP model [15] and epidemic models,
such as SIS [24], if we consider risks as a population undergoing infection with the
activation pathogen. Yet deeper comparison reveals that the CARP model is more
complex by including latent exogenous (becoming sick by infection) and directly
observable endogenous (becoming sick without or not through contact with infected
nodes) activation. Thus, finding model parameters matching historical data is more
complex in CARP model than in epidemic model. Another significant difference is
the evolution of transition probabilities and risk population, as new threats arise, old
ones die, and some existing risks change their probability to activate as a result of
the increasing resilience developed by threatened governments, organizations, and
people.
Risk Network Evolution
In the World Economic Forum (WEF) Global Risk Reports [16, 17, 18, 19, 20], ex-
perts define risks in five categories: economic, environmental, geopolitical, societal
and technological. The list of risks is shown in Table 1. We use five different colors
to differentiate between risk categories and to aid the understanding of the WEF net-
work, because each year the risks are categorized slightly differently. To track related
risks, we give them identical numerical codes. The categories of risks vary over the
years as well. For example, risk 21a "Illicit trade" is in the geopolitical category in
2013 and 2014 when experts felt illicit activity and crime were probable risks. In
2016 and 2017 this risk is categorized as economic, considering that such trade im-
pacts more the global economy than geopolitical factors. In the 2013 risk network,
the risks are uniformly distributed over the five categories. From 2014 to 2017, the
economic risks category is the largest and contains around eight risks; the environ-
mental, geopolitical and societal categories contain approximately six risks, and the
technological category is the smallest with mostly four risks.
Fig. 1 and 2 show how the global risk network and it's properties have changed
over time. In Fig. 1, each node represents different risk from Table 1. Each undirected
unweighted link of two endpoints represents that the two risks are related in opinion
of some WEF experts. For the WEF report, each of the experts was asked to answer
the question: "Global risks are not isolated and it is important to assess their intercon-
nections. In your view, which are the most strongly connected global risks? Please
select three to six pairs of global risks." Then the interconnection wi j between risks i
and j is calculated as:
wi j =s ∑N
n=1 pairi j,n
pairmax
N
∑
pairmax = max
(
n=1
i j
pairi j,n)
(4)
8
Xiang Niu1,2+ et al.
20
18
17
19
24
25
23
22b
21a
21b
12
11
16
14b
13
14c
15b
15c
15d
18
17
19
20
24
22b
23
21c
2013:
04
02
01
03
06b
08
10
09
05b
07c
2014:
02
01
03
04
08
06b
05a
07d
14a
16
15a
12
11
13
31
27
26
28
29b
29c
2015:
02
01
06a
04
03
05a
07a
07b
2016:
02
01
06a
04
03
05a
07a
07b
2017:
02
01
06a
04
03
05a
07a
07b
22a
20
18
17
19
12
11
14a
15a
13
27
26
28
31
29a
30
18
17
22a
20
19
21a
12
11
14a
15a
13
27
26
28
31
29a
30
18
17
22a
20
19
23
21a
12
11
14a
15a
13
27
26
28
31
29a
30
42
38
37
40b
39
40c
41
40d
40e
40f
27
26
28
29b
29c
30
33
35
36
34
32
38
37
39
40a
38
37
39
40a
38
37
39
40a
38
37
39
Fig. 1 The evolution of risk networks over five years from 2013 to 2017. Although the number of risks
vary over the years, the five groups of risk remain unchanged. We use the same layout for each year
network and fix the relative positions of risks with the same index over the years. The risks are in five
color groups and five location groups. A color group is the category of a risk in a certain year labeled by
experts, while locations of the groups are labeled by us and remain unchanged over the years. The groups
are as follows: economic, with mostly blue nodes placed leftmost of the network and including risks 01-10;
environmental, with mostly green nodes placed the second to the left and at the bottom part of the figure
with risk 11-16; geopolitical, with mostly orange nodes placed the middle and at the top of the figure with
risk 17-25; societal, with mostly red nodes placed the second to the right and at the bottom of the figure
with risk 26-36; technological, with purple nodes placed at the rightmost of the figure with risk 37-42.
Evolution of Threats in the Global Risk Network
9
number of nodes
number of edges
density
60
50
40
30
20
10
0
25
20
15
10
5
0
5
4
3
2
1
0
13
14
15
Year
16
17
average degree
13
14
15
Year
16
17
diameter
13
14
15
Year
16
17
600
500
400
300
200
100
0
-0.5
-0.4
-0.3
-0.2
-0.1
0
2
1.5
1
0.5
0
13
14
15
Year
16
17
degree assortativity
coefficient
13
14
15
Year
16
17
average shortest
path length
13
14
15
Year
16
17
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
20
15
10
5
0
13
14
15
Year
16
17
average clustering
coefficient
13
14
15
Year
16
17
max clique size
13
14
15
Year
16
17
Fig. 2 The evolving risk network properties over five years from 2013 to 2017. The 2013 network is
the largest and also contains most edges. However, it is not the one with the highest density, since 2015
and 2017 networks are much smaller and with a large number of edges. Generally, 2013, 2015 and 2017
networks have relatively high average degrees, degree assortativity coefficients, average clustering coeffi-
cients, and max clique sizes and relatively low diameters and average shortest path lengths.
where pairi j,n is 1 if the risks i and j are interconnected from the perspective of
expert n, otherwise it is 0 [20]. In paper [13], the authors report on testing whether
the model with weighted edges outperforms the one used here which has unweighted
edges and current model was statistically significantly better than the weighted edge
alternative. By definition, these edges represent risk relationships, thus they act as
transmission channels for risk propagation through the external activation process.
The 2013 risk network is the largest, with the greatest average degree. Despite this,
due to the smaller size of the 2017 network, its risks have greater interconnectivity, a
larger mean clustering coefficient, and a smaller diameter. Most subfigures in Fig. 2
show that the 2013, 2015, and 2017 networks are denser than the 2014 and 2016
networks.
Historical Events
We utilize and update the event dataset created for [13], which included news, aca-
demic articles, Wikipedia entries, etc. from Jan. 2000 to Dec. 2012, and from which
we collected 13x12x50=7,800 data points for the 2013 risk network. For the 2014 to
the 2017 risk networks, we relabel prior events and collect new events dated from Jan.
2013 to Dec. 2016. Thus the total number of data points is now 17x12x62=12,648,
10
Xiang Niu1,2+ et al.
for 62 risks in Table 1. Each data point indicates if a risk is active or passive in a cer-
tain month. By maximizing the log-likelihood defined by Eq. 3 for the observed state
transitions [23, 22], we obtain the most likely values of model parameters α,β,γ for
each year.
Fig. 3 shows the timeline of historical events. Among economic risks, activation
of some events is recorded directly based on the corresponding Wikipedia articles,
such as "European debt crisis", "Subprime mortgage crisis" and "Air travel disrup-
tion after the 2010 Eyjafjallajokull eruption". Activation of other events is identified
through human processing of the online statistical data. "U.S. high unemployment
rate" is recorded when the United States (U.S.) unemployment rate is above 7.5%,
"EU high unemployment rate" is recognized when the European Union (EU) unem-
ployment rate is above 9.5%. The "Oil price shock" is recognized when the yearly
change of oil price per barrel exceeds $40 which happened during 2008 and 2009,
and during 2011 and 2012. "U.S. housing bubble burst" is recorded when the average
new house purchase price in the U.S., reaches above $280,000. "EU deflation" is rec-
ognized when the inflation rate is below 0% in the EU, "Global inflation" is recorded
when major economic regions such as the U.S. and the EU have the inflation rate
above 2%. "U.S. severe income disparity" is recognized when U.S. top 1% of U.S.
richest people own more than 20% of total incomes. Most of the economic risk events
activated at around 2008 but then became passive after 2014. There is also a chain re-
action among them, "U.S. housing bubble" caused "Subprime mortgage crisis", then
led to "U.S. and EU high unemployment rate" and "European debt crisis".
Among environmental risks, "Hurricane seasons" is identified according to the
yearly Atlantic and Pacific hurricane seasons, which happen regularly every year,
starting from May and ending in December. Risk 12 "Failure of climate-change mit-
igation and adaptation" is recognized when there are tremendous damages caused
by climate change such as hurricanes Allison, Dean, and Alex. We consider damage
as tremendous when the cost is above $1 billion. Risk 13 "loss of biodiversity" is
recognized when common bird index drops below 100. Risk 14 "Major natural catas-
trophes" are identified by deadliest earthquakes, avalanches, wildfires, heat waves,
solar storms, etc. Those events also happen naturally, but last shorter than extreme
weather events. "Deforestation of the Amazon Rainforest" is recorded when yearly
deforestation rate is above 15,000 km2 which happened from 2000 to 2005. "Deepwa-
ter Horizon oil spill" happened in 2010, "Beijing air pollution soars to hazard level"
was observed in 2012. Unlike economic risk events, those events usually last up to a
year. "Rising greenhouse gas emissions" is recorded when Annual Greenhouse Gas
Index (AGGI) exceeds 1.2.
Among geopolitical risks, Risk 17 "State collapse or crisis" is recognized by all
coups d'´etat and coup attempts. Most of them ends within a month. Among few
events related to Risk 18 "Weapons of mass destruction", we list "Destruction of
Syria's chemical weapons" in 2013 and several "North Korean nuclear test" started
in 2006. Risk 19 "Interstate conflict" activation list includes major global conflicts
from 2000: "War on Terror", "Second Congo War", "Syrian Civil War", "Iraqi Civil
War", and "Cold War II". The "War on Terror" was triggered by "911 attack" in 2001
and includes the wars in Afghanistan, Iraqi, Syria, etc. We consider it ended in 2007
when British government abandoned the use of the term. But the conflicts between
Evolution of Threats in the Global Risk Network
11
2000s recession
European debt crisis
U.S. and EU high unemployment rate
Subprime mortgage crisis
Travel disruption after Eyjafjallajokull eruption
The 2008 oil price shock
U.S. housing bubble burst
EU inflation rate below 0%
Global inflation rate above 2%
U.S. top 1% riches have
20% income shares
Hurricane seasons, floods, storms, etc
Allison
Dean
Biodiversity loss
Alex
Earthquakes
Deforestation of the Amazon Rainforest
Oil leak
Coups detat and coup attempts
Greenhouse Gas
911
Nuclear tests
Organized crime
Conflicts
Illicide trade
Failure
of global governance
National corruption
Export bans
Urbanization
World food price crisis
SARS
Water conflicts
H1N1
Ebola
U.S. and EU migration burst
Protests
Religious
mania
Ageing population
Submarine cable disruption
Cyber attacks
Data breaches
Egypt
blackout
Dyn cyberattack
PRISM
01
02
03
04
05a
05b
06a
06b
07a
07b
07c
07d
08
09
10
11
12
13
14a
14b
14c
15a
15b
15c
15d
16
17
18
19
20
21a
21b
21c
22a
22b
23
24
25
26
27
28
29a
29b
29c
30
31
32
33
34
35
36
37
38
39
40a
40b
40c
40d
40e
40f
41
42
Dec
99
Dec
00
Dec
01
Dec
02
Dec
03
Dec
04
Dec
05
Dec
06
Dec
07
Dec
08
Dec
09
Dec
10
Dec
11
Dec
12
Dec
13
Dec
14
Dec
15
Dec
16
Dec
17
Fig. 3 The historical risk events from 2000 to 2017. We searched thousands of events online over 18 years
and selected hundreds from them as risk-related events. We label the events based on the description of
risks in each year WEF Global Risk Report. The events are also grouped into five categories.
12
Xiang Niu1,2+ et al.
nations and terrorists continue to happen. The "Second Congo War" from 1998 to
2003 involved nine nations and often is referred to as "Africa's World War". The
"Syrian Civil War" from 2011 and the "Iraqi Civil War" from 2014 are sometimes
described as "proto-world war". "Cold War II" refers to the political tension between
two opposing geopolitical sides, with one led by Russia and China, and the other
led by the United States and NATO. It starts at the same time with the "Ukraine
crisis" event activation in 2013. The events related to Risk 20 "Large-scale terrorist
attack" are selected from the worldwide worst terrorist strikes each of which caused at
least 300 injuries, 100 fatalities or 20 fatalities among children. Illicit financial flows
from developing countries are above $1 trillion per year from 2011. We consider
activation of Risk 22b "Pervasive entrenched corruption" occurs when there is at
least one country in the world with the Corruption Perceptions Index below 10%
(small index represents high corruption). The scope of Risk 23 "Failure of global
governance" is close to Risk 19 "Interstate conflict", since it includes the inability to
resolve issues of terrorism, wars, political and economic tensions between countries.
The geopolitical risks are closely related and share similar activity scope: 2001-2006
and 2012-2016. We can see correlation between events related to those risks. These
events started with "911" followed by the increase of the number and damages of
terrorist attacks.
Among the societal risks, there were two major world food price crises during
2007-2008 and 2010-2014, flagged by the rise of the FAO deflated food price index
above 150. The peak of the number of "water conflicts" was reached during 2012-
2014 (above 15 conflicts per year) in the Middle East, which is most likely caused
by the geopolitical risks. Risk 29a "Rapid and massive spread of infectious diseases"
includes infectious diseases that cause more than thousands death and had worldwide
impact, such as "SARS", "H1N1" and "Ebola". The new disease occurs every several
years and it also last takes several years before it stops spreading. Risk 30 "Large-
scale involuntary migration" includes migration crises in the U.S. and the EU. In
"U.S. migration crisis", tens of thousands of women and children from El Salvador,
Guatemala, and Honduras migrated to the United States in 2014. In "EU migration
crisis", more than 50,000 refugees were arriving in EU each month in 2015. The
refugees mainly come from Eritrea, Nigeria, Somalia, Syria, and Afghanistan. Risk
31 "Profound political and social instability" includes major global protests. Risk
34 "Mismanagement of population ageing" mostly activates in developing countries
such as China and India. Risk 35 "Rising religious fanaticism" mostly materializes
in the Middle East.
Among technological risks, Risk 37 "Breakdown of critical information infras-
tructure and networks" materializes every several years. But each time it lasts a
short period. The source of the risk could be natural or human-made incidents, such
as "Submarine cable disruption", government control or social instability, such as
"Egypt blackout" during the Egyptian revolution, or cyberattacks, such as "Dyn cy-
berattack". Risk 38 "Large-scale cyberattacks" includes "Indiscriminate attacks",
"Destructive attacks", "Cyberwarfare", "Government espionage", "Corporate espi-
onage", "Stolen e-mail addresses and login credentials", "Stolen credit card and fi-
nancial data", and "Stolen medical-related data". Some of the cyberattacks are caused
by geopolitical risks, such as "Cyberattacks during the Russo-Georgian War". Some
Evolution of Threats in the Global Risk Network
13
are related to social instabilities. Some are possibly caused by economic risks, such
as "2014 JPMorgan Chase data breach". It is also part of Risk 39 "Massive inci-
dent of data fraud/theft", which includes major incidents of data breaches. One of the
most significant data theft events is "Global surveillance disclosure" in 2013. Cyber-
attack and Data theft become significant during 2013 and 2014. Most of the other
technological risks are unforeseen consequences of technological advances and may
materialize in the future.
For a particular month, there are four different reasons to label a risk as being
active. One is monthly statistical data, such as "unemployment rate", "oil price",
"housing price", "deflation rate", and "food price index". They are recorded month
by month, which can be directly used to label a risk. Another reason is yearly statisti-
cal data, such as "yearly deforestation rate", "annual greenhouse gas index", "corrup-
tion perceptions index", and "number of water conflicts per year". They are recorded
year by year. Thus, we use one years single data point to estimate a risk status for
twelve months. The third one is the record of daily events, such as "air travel disrup-
tion", "oil spill", "nuclear test", "terrorist attack", "blackout", and "cyber attacks".
Within a certain month, if at least predefined number of events occurs, we consider
the corresponding risk as active for the whole month. The last reason is the record of
continuous events, such as "European debt crisis", "subprime mortgage crisis", "hur-
ricane seasons", "civil war", "spread of disease", "migration", and "data breaches".
Since those events usually last several months, we consider corresponding risks as
active from the beginning to the end of the event.
Of the five categories, economic and geopolitical risks have strong intra-dependence,
environmental risks happens quite regularly and are relatively independent from each
other, while societal and technological risks are affected by and have strong inter-
dependence with geopolitical and economic risks.
Mean-field Steady State Points
Simulation
With the fitted parameters α,β,γ, and the activation and recovery probabilities, we
can perform Monte Carlo simulations of the cascades of global risks. Fig. 4 shows
the frequency of a risk being active at each time step t during the simulation of the
2017 risk network with all risks initially inactive. With different initial states, the risk
trajectories differ but eventually reach the same steady state. The frequency of risk i
being active at time t is the ratio of the number of simulation months during which
risk i is active to the total number of simulation months t. The frequency distributions
of risks being active mainly change from 10 to 1000 steps, and generally saturate
afterward. In the steady state, the frequencies of risks being active varies a lot even
for risks in the same category. By denoting the probability of risk i being active at
time t as pi(t), we define such frequencies to be stable when pi(t) ≈ pi(t + 1). By
plugging in the state transition probabilities from Eq. 2, we have
[1 − pi(t)]Pi(t)0→1 + pi(t)[1 − Pi(t)1→0] = pi(t + 1) = pi(t).
(5)
14
Xiang Niu1,2+ et al.
(a) Economic
(b) Environmental
(c) Geopolitical
y
c
n
e
u
q
e
r
f
1
0.8
0.6
0.4
0.2
0
1
2
3
4
5
6
7
8
9
0 1 10 102103104105 inf
time step
y
c
n
e
u
q
e
r
f
1
0.8
0.6
0.4
0.2
0
10
11
12
13
14
0 1 10 102103104105 inf
time step
y
c
n
e
u
q
e
r
f
1
0.8
0.6
0.4
0.2
0
15
16
17
18
19
20
0 1 10 102103104105 inf
time step
(d) Societal
(e) Technological
y
c
n
e
u
q
e
r
f
1
0.8
0.6
0.4
0.2
0
21
22
23
24
25
26
0 1 10 102103104105 inf
time step
y
c
n
e
u
q
e
r
f
1
0.8
0.6
0.4
0.2
0
27
28
29
30
0 1 10 102103104105 inf
time step
Fig. 4 Asymptotic mean-field steady state frequencies of selected risks being active are shown for the
2017 risk network. Each frequency value is averaged over 1000 runs. For time denoted on the x-axis as
"inf", the frequencies are calculated by Eq. 6. The environmental group of risks is most frequently active
in this year, but the general level of risk activities is quite low.
Thus,
pi =
P0→1
i
+ P1→0
i
P0→1
i
=
1 − (1 − Li)α+β ∑ j∈Ni
p j
1 − (1 − Li)α+β∑ j∈Ni
p j + (1 − Li)γ
,
(6)
where pi is the steady state probability of risk i being active, computed with a suc-
cessive approximation method. The results are plotted in Fig. 5.
Risk Evolution
Fig. 5 shows the evolution of the global risks networks and their mean-field steady
state points. To see the changes in risks, we display related risks and their indices
in the five networks side by side. In Table 1 from 2013 to 2017 five risk categories
remain the same, while around 20 risks vanish or merge into other risks. Risk 05b
"Extreme volatility in energy and agriculture prices" is changed to Risk 05a "Severe
energy price shock" after 2014. The extreme volatility in agriculture prices is merged
into Risk 27 "Food crises". Risk 07c "Unmanageable inflation or deflation" splits into
risk 07a "Deflation in a major economy" and 07b "Unmanageable inflation". Risk 08
"Severe income disparity", 09 "Unforeseen negative consequences of regulation",
and 10 "Hard landing of an emerging economy" are not discussed since/after 2014,
because of the recovery of the global economy. Risk 14b "Unprecedented geophysi-
cal destruction" and 14c "Vulnerability to geomagnetic storms" are merged into 14a
Evolution of Threats in the Global Risk Network
15
2013
2014
2015
2016
2017
.2 .4 .6 .8 1
.2 .4 .6 .8 1
.2 .4 .6 .8 1
.2 .4 .6 .8 1
.2 .4 .6 .8 1
01.Fiscal crises
02.Unemployment
05.Financial system failure
06.Infrastructure failure
03.Energy & Agri. price
01.Fiscal crises
04.Unemployment
02.Financial system failure
06.Infrastructure failure
05.Oil price shock
06.Fiscal crises
07.Unemployment
04.Financial system failure
05.Infrastructure failure
03.Energy price shock
05.Fiscal crises
06.Unemployment
03.Financial system failure
04.Infrastructure failure
08.Energy price shock
05.Fiscal crises
06.Unemployment
03.Financial system failure
04.Infrastructure failure
08.Energy price shock
07.Liquidity crises
03.Liquidity crises
01.Asset bubbles
01.Asset bubbles
01.Asset bubbles
02.Deflation in major economy
08.Unmanageable inflation
02.Deflation in major economy
09.Unmanageable inflation
02.Deflation in major economy
09.Unmanageable inflation
07.Decline of Impt. of US dollar
25.Income Ineq.
08.Weather
13.Climate Adpt.
11.Ecosystem
09.Nature catastrophes
09.Weather
10.Climate Adpt.
11.Ecosystem collapse
12.Natural catastrophes
10.Weather
11.Climate adaptation
12.Ecosystem collapse
13.Nature Disasters
10.Weather
11.Climate adaptation
12.Ecosystem collapse
13.Nature Disasters
10.Manmade damage
13.Manmade damage
14.Manmade damage
14.Manmade damage
26.Antibiotic−Resis. bacteria
15.Nation collapse
19.Weapons of mass destruction
20.Interstate conflict
18.Terrorist attacks
17.State collapse
18.Weapons of mass destruction
15.Conflict
16.Terrorist attacks
18.State collapse
19.Weapons of mass destruction
16.Interstate conflict
17.Terrorist attacks
07.Illicit trade
19.State collapse
20.Weapons of mass destruction
17.Interstate conflict
18.Terrorism
07.Illicit trade
17.Crime and illicit trade
16.Corruption
14.Global governance
21.Resource nationalization
27.Urbanization
22.Food crises
12.Water crises
24.Chronic diseases
23.Pandemic outbreak
28.Social instability
14.National Gov.
15.National Gov.
15.National Gov.
16.Global Governance
19.Urban planning
20.Food crises
24.Water crises
23.Infectious diseases
20.Urban planning
21.Food crises
25.Water crises
24.Infectious diseases
21.Urban planning
22.Food crises
26.Water crises
25.Infectious diseases
21.Involuntary migration
22.Social instability
22.Migration
23.Social instability
23.Migration
24.Social instability
10.Inflation or deflation
8.Income Ineq.
09.Cons. of Regulation
04.Hard landing of Econ.
16.Extreme weather
12.Climate Adpt.
18.Species overexploitation
19.Geophysical destruction
20.Geomagnetic storms
13.Pollution
14.Land and waterway
17.Greenhouse
11.Antibiotic−Resis. bacteria
21.Fragile states
22.Weapons of mass Destr.
24.Interstate conflict
28.Terrorism
30.Illicit trade
23.Organized crime
27.Corruption
25.Global Gov.
29.Resource nationalization
26.Militarization of space
15.Urbanization
32.Food crises
40.Water crises
35.Chronic disease
39.Pandemics
37.Unmanaged migration
31.Backlash to globalization
33.Illicit drug
34.Population aging
36.Religious fanaticism
38.Population growth
41.Information systems failure
42.Cyber attacks
45.Data fraud
29.Information systems failure
30.Cyberattacks
31.Data fraud
25.Information systems failure
26.Cyberattacks
27.Incident of data fraud
28.Misuse of technologies
27.Information systems failure
28.Cyberattacks
29.Incident of data fraud
26.Cons. of Teth. advances
28.Information systems failure
29.Cyberattacks
30.Data fraud
27.Cons. of Teth. advances
44.Digital misinformation
47.Orbital debris
48.Cons. of geoengineering
49.Cons. of nanotechnology
50.Cons. of new life science
43.Intellectual property regime
46.Mineral resource supply
Fig. 5 The mean-field steady state probabilities of risks being active for each network from 2013 to 2017.
To see the changes in risks, we display related risks and their indices in the five networks side by side. In
Table 1 from 2013 to 2017 five risk categories remain the same, while around 20 risks vanish or merge
into other risks. Visual inspection reveals that in 2013 the dominant risk was economical. It continued its
dominance to 2014 but in that year the environmental group became also more active than the other groups.
In year 2015 and in the following years, the economic risks drop their activity level, while environmental
risk maintain significant level of activity in this period. In years 2016 social risks increase their activity
levels, but weakened them in the following year.
16
Xiang Niu1,2+ et al.
Fiscal Crisis
Unemployment
Energy Price Shock
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Failure of Financial Institution
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Failure of Infrastructure
13 14 15 16 17
Year
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Asset Bubbles
13 14 15 16 17
Year
Fig. 6 The mean-field steady state probabilities of economic risks being active for each of the networks
from 2013 to 2017. Fiscal crisis significantly decreases from 2014, unemployment risk peaks in 2014,
energy price shock peaks in 2013, while other risks vary minimally over the five years.
"Major natural catastrophes". Risk 15b "Irremediable pollution", 15c "Land and wa-
terway use mismanagement" and 15d "Rising greenhouse gas emissions" are merged
into 15a "Man-made environmental catastrophes". Risk 16 "Antibiotic-resistant bac-
teria" is not discussed after 2014. Risk 21a "Illicit trade" is changed from geopolitical
to economic and not described in 2015. Risk 26 "Failure of urban planning" changes
from an environmental to a geopolitical. Risk 30 "Large-scale involuntary migration"
is not described in 2014. Risk 31 "Profound social instability" is newly proposed in
2014 while risks 32-36 are removed because of their low likelihoods and impacts.
Finally, risks 40b-42 are excluded because most of them describe unforeseen conse-
quences of advanced technologies and have not yet occurred.
Comparing the mean-field steady state probabilities of risks from 2013 to 2017
in Fig. 6, 7, 8, 9, 10, 11, we find that the probabilities of economic risks widely de-
creased, reflecting a gradual global recovery from the 2008 economic crisis. Only
"State collapse", "Large-scale terrorist attacks", "Illicit trade" and "Large-scale in-
voluntary migration" significantly increased in the category of geopolitical and soci-
etal risks, respectively. This reveals the downside of "Failure of global governance".
Considering environmental risks, we find that man-made risks decreased, while only
natural risks "Extreme weather events" and "Major natural disasters" increased. The
ability of the public to prevent environmental degradation improved. In the techno-
logical risks category, "Massive incident of data fraud/theft" increases due to the
boom of private data in the Internet era. The global risks transfer from economic to
geopolitical and societal, as technological risks become heightened.
Evolution of Threats in the Global Risk Network
17
Failure of Climate Adaptation
1
y
t
i
l
i
b
a
b
o
r
P
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
Manmade Damage
Ecosystem Collapse
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
13 14 15 16 17
Year
Extream Weather
Nature Catastrophes
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Fig. 7 The mean-field steady state probabilities of environmental risks being active for each of the net-
works from 2013 to 2017. Man-made problems ("Failure of climate adaptation", "Ecosystem collapse")
gradually decrease from 2013 to 2017, while natural disasters ("Extreme weather", "Natural catastrophes")
gradually increase from 2013 to 2017.
State Collapse
Weapons of Mass Destruction
1
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
Interstate Conflict
13 14 15 16 17
Year
Illicit Trade
13 14 15 16 17
Year
1
0.8
0.6
0.4
0.2
0
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Terrorist Attacks
13 14 15 16 17
Year
13 14 15 16 17
Year
Failure of National Governance
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Fig. 8 The mean-field steady state probabilities of geopolitical risks being active for each of the networks
from 2013 to 2017. "State collapse" and "Failure of national governance" have very similar behavior,
since both of them describe risks inside nations and reflect the instability of their governments. Together
with interstate conflicts, those risks significantly increase in 2015, and gradually decrease afterward. They
may be caused by ISIS and the Ukraine crisis in 2014. Terrorist attacks happen more frequently in 2017,
while growing illicit trade elevated levels of risk starting in 2016. This may be an affect of high risks
of "State collapse", "Interstate conflict" and "National governance failure" during 2015. Risks associated
with weapons of mass destruction remain low over the 5 year span.
18
Xiang Niu1,2+ et al.
Urbanization
Food Crises
Migration
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Infectious Diseases
13 14 15 16 17
Year
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Water Crises
13 14 15 16 17
Year
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Social Instability
13 14 15 16 17
Year
Fig. 9 The mean-field steady state probabilities of societal risks being active for each network from 2013
to 2017. "Failure of urban planning" greatly decreases after 2014. Food and water crises gradually decrease
with the global effort to address them. "Large-scale involuntary migration" drastically increases in 2016,
due to the 2015 European Union migration crisis. It is largely affected by high risk of "State collapse",
"Interstate conflict" and "National governance failure" in 2015. "Profound political and social instability"
gradually increases from 2014 to 2016 as a consequence of rising "Interstate conflict", while "Rapid and
massive spread of infectious diseases" maintains a steady and low risk level.
Breakdown of Information Infrastructure
Cyberattack
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Data Fraud
13 14 15 16 17
Year
y
t
i
l
i
b
a
b
o
r
P
y
t
i
l
i
b
a
b
o
r
P
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
13 14 15 16 17
Year
Misuse of Technologies
13 14 15 16 17
Year
Fig. 10 The mean-field steady state probabilities of technological risks being active for each network from
2013 to 2017. The peak of "Large-scale cyberattacks" and "Massive incident of data fraud/theft" in 2014
might be triggered by "Global surveillance disclosures" in the latter half of 2013. "Breakdown of critical
information infrastructure and networks" and "Adverse consequences of technological advances" pose
very little risk. Moreover, with fast-paced advancements in technology, all risks in this category gradually
rise.
Evolution of Threats in the Global Risk Network
19
l
e
u
a
v
e
g
a
r
e
v
A
l
e
u
a
v
m
u
m
x
a
M
i
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
0
Economic
Environmental
Geopolitical
Societal
Technological
13 14 15 16 17
13 14 15 16 17
13 14 15 16 17
13 14 15 16 17
13 14 15 16 17
Year
13 14 15 16 17
13 14 15 16 17
13 14 15 16 17
13 14 15 16 17
13 14 15 16 17
Year
Fig. 11 The mean-field steady state probabilities of risk activity in all categories for each of the networks
from 2013 to 2017. In agreement with the results presented earlier, the economic risks drastically decrease
from 2014 and maintain a low level afterward. Environmental risks occur regularly, with the exception
of "Extreme weather" during 2014. The geopolitical risks have a small increase in 2015, during which
interstate conflicts increase. The average values of societal risks experience a steady rise, but the maximum
values have a high variance. That is because the Risk 08 "Severe income disparity" is put into societal risks
in 2014, and because "Large-scale involuntary migration" drastically increases in 2016. Technological
risks gradually increase with an anomalous spike encountered during 2014.
Analytic Probabilities and Empirical Observations
Fig. 5 shows the analytic probabilities of risk being active at steady state over years.
Fig. 3 depicts the time periods at which specific risk activities were observed and
recorded. The analytic probabilities are smoother than the observations because they
provide a real numbers instead of a binary signal. Empirical observations contain
more detailed information than analytic probabilities. Although there are some dif-
ferences, their main results are very consistent. Both results show the economic risks
becoming inactive after year 2014. The environmental risks happen regularly every
year. The geopolitical risks are highly interconnected. The risks "State collapse",
"Interstate conflict" and "Failure of national governance" have similar activity time
scope. "Terrorist attacks" and "Illicit trade" are becoming important recently. The
risk "Migration" had active start from year 2016. The activity of technological risks
gradually increases over years.
Model Validations
Parameter Recovery Precision
To test the accuracy of parameter recovery process for each year, we first take the
learned α,β,γ as ground truth parameters, then use them to generate 125 test datasets
with the same time steps of the historical data. From 125 test dataset, we learned
20
Xiang Niu1,2+ et al.
Table 2 Relative error bounds of activation and recovery parameters of global risks from the year 2013
to 2017. Clearly activation bounds are higher, up to 2.5 times higher than corresponding recovery bounds.
The former peak at 20% in 2016, while the latter peak at 12% in 2015.
activation bound
recovery bound
2013
0.181
0.087
2014
0.125
0.104
2015
0.174
0.119
2016
0.200
0.077
2017
0.188
0.071
125 sets of new parameters that we use as sets of as test parameters. We consider
activation parameter as aα + bβ, where a, b is the average fraction of internal and
external activation in a dataset. The recovery parameter equals to γ. From 125 sets
test parameters, we first filter out 33.3% outliers with the largest KS distance, defined
by Eq. 7, to the ground truth parameters, then determine the relative activation bound
and recovery bound in the rest 66.6% of the sets. We call those sets validation dataset
and we refer to the corresponding parameters as validation parameters.
KS(v1, v2) = max
(v1[i]/v2[i] − 1)
i
(7)
In this experiment, v1 of Eq. 7 is a vector of validation parameters, while v2 is a vector
of ground truth parameters. Each vector contains two variables, activation parameter
and recovery parameter. Table 2 shows the bounds of activation and recovery param-
eters for each year network. In 2013, recovery bound 0.087 represents that within
the validation parameters, the largest absolute relative error of recovery parameter to
the ground truth recovery parameter is 0.087. For all risk networks, the relative error
bound of activation parameter is less than 20%, the relative error bound of recovery
parameter is around 10%.
Furthermore, we use the set of ground truth parameters and each set of validation
parameters to generate another 12 months of data after the end of ground truth his-
torical data. In this test, we run 100 realizations and calculate the average frequency
of risk being active and risk activation for each set of parameters and the results are
plotted in Fig. 12. The average frequencies of risk being active are the sum of number
of risks being active in each month averaged over R risks and 12 months. The average
frequencies of risk activation are the number of times of any of the risks was activated
over the entire simulation averaged over R risks. In both tests of all risk networks, the
average results of ground truth and validation data are very close. The absolute rela-
tive error of results in the worst simulation in validation data to the average results in
ground truth data is around 20%.
Network Effects
We compare the simulation results by CARP model with and without network ef-
fect in Fig. 13. This test is based on 2013 network and dataset from [13]. The net-
work model is the simulation of the 2013 network in Fig. 1, while the independent
model ignores network effects by disregarding all edges. In general, compared with
the independent model, the accuracy of the network model is significantly higher as
evidenced by having the mean simulated activity closer to historical data than in-
dependent model does and by requiring 47% smaller multiple of standard deviation
Evolution of Threats in the Global Risk Network
21
risk active
y
c
n
e
u
q
e
r
f
e
g
a
r
e
v
a
y
c
n
e
u
q
e
r
f
e
g
a
r
e
v
a
0.5
0.4
0.3
0.2
0.1
0
2013
0.05
0.04
0.03
0.02
0.01
0
2013
2014
2015
2016
2017
network (year)
risk activation
2014
2015
2016
2017
network (year)
average real
average simulation
worst simulation +
worst simulation -
average real
average simulation
worst simulation +
worst simulation -
Fig. 12 Error bounds of average frequencies of risk being active and of risk activation from the year 2013
to 2017. Average real represents the average results in the test of ground truth dataset. Average simulation
represents the average results in the test of validation dataset. Worst simulation represents the maximum
or minimum results in the test of validation dataset.
bound to cover all historical data than the independent model needs. Some other net-
work effect analyses were presented in [21]. The results show that the isolated risks
(nodes with low degrees) have extremely low external activation fractions and thus
are unlikely to be influenced by other risks in the network.
Sensitivity Tests
In this subsection, we consider another two important factors: likelihood and histor-
ical data. Fig. 14 shows the sensitivity test by changing the likelihood or historical
data of single or all risks. The probability of a risk being active at steady state is sen-
sitive to both likelihood and historical data. In the likelihood test, a risk is sensitive to
the change of its single likelihood but tolerant to the change of all risks likelihoods.
In the historical data test, on the contrary, a risk is tolerant to the change of its single
historical activity but sensitive to the change of all risks historical activity.
22
Xiang Niu1,2+ et al.
Data
Mean activity from network model
Mean activity from independent model
Activity boundaries from network model
Activity boundaries from independent model
μ+2.67 σ
μ +1.82 σ
μ -1.82 σ
μ -2.67 σ
Fig. 13 The average number of risk activations at each time step, measured over 100 runs, plotted as a
function of time for the models with (red line) and without network effects (blue line). For comparison,
the black curve represents the number of times risk activation was observed in the historical data. The
purple and orange curves demonstrate what multiple of standard deviation is needed to get curves above
and below the mean so the cover all points of historical data, for network model and independent model,
respectively. This multiple is significantly lower, 1.82, for network model than for independent model
(2.67). Thus, the extreme historical data point among 156 such points has probability of 3.4% to appear
in network model, which is highly likely, but only 0.38% for the independent model, which in contrast is
unlikely to appear with this number of historical data, demonstrating poor match between historical data
and the independent model.
External Activation
Transition Fractions
With the steady state probability of a risk being active, we can compute the probabil-
ity of three different transition processes:
-- internal activation: Aint
i = (1 − pi)pint
i
being triggered internally pint
.
i
is the probability of inactive risk i (1 − pi)
-- external activation: Aext
i = (1 − pi)[1 − (1 − pext
ji )∑ j∈Ni
p j ] is the probability of in-
active risk i (1 − pi) being triggered externally 1 − (1 − pext
ji )∑ j∈Ni
p j .
is the probability of active risk i ( pi) recovering
-- internal recovery: Arec
i = pi prec
i
prec
i
.
For simplicity, we ignore the probability of a risk being activated both internally and
p j ] (the value is negligible).
externally with probability (1 − pi)pint
i
Thus, the three transition processes can be treated as independent variables. With
the probabilities of transition processes, we can get the fraction of one transition
process to all possible transitions for each risk by setting aint
i =
[1 − (1 − pext
ji )∑ j∈Ni
i =
, aext
Aint
i
Aint
i +Aext
i +Arec
i
Aext
i
Aint
i +Aext
i +Arec
i
, arec
i =
Arec
i
Aint
i +Aext
i +Arec
i
.
Evolution of Threats in the Global Risk Network
23
no change
change the likelihood of single target risk
change the historical data of single target risk
change the likelihoods of all risks
change the historical data of all risks
2013
2014
2015
2016
2017
11
2013
21
2013
31
2013
41
2013
1
2014
11
2014
21
2014
1
2015
11
2015
risks
21
2015
1
2016
11
2016
21
2016
1
2017
11
2017
21
2017
y
t
i
l
i
b
a
b
o
r
p
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
1
2013
Fig. 14 The comparison of the probability of risks being active at steady state by changing risk likelihood
and historical data. The horizontal axis is the list of all risks grouped by different year and sorted by
their probability. The baseline is the probability of risks without any change. The four other tests include
reducing only: 1. the normalized likelihood of the single target risk by 10%; 2. the frequency of the single
target risk being active in the historical data by 10%; 3. the normalized likelihoods of all risks by 10%; 4.
the frequencies of all risks being active in the historical data by 10%.
Risk Influence
In this section, we calculate the influence exerted by one risk on others. In the exper-
iments, we first disable a risk i by setting its normalized likelihood Li = 0, and then
calculate the new external activation frequency of risk j as aext
j−i ( j 6= i). We obtain
Ii→ j = aext
j − aext
j−i,
(8)
where Ii→ j is an indicator of the influence that risk i exerts on risk j, quantifying the
external activation effects of risk i onto risk j.
Fig. 15 shows the influence of a category of risks on other categories, which dis-
cerns between cause and correlation of risks. From 2013 to 2017, the most significant
changes in risk influence categories are observed for economic and technological
risks. The economic risks used to be the most influential risks and had the highest
impact on other risks. However, as of 2017 their influence decreased. Instead, the in-
fluence of geopolitical and societal risks increased. In 2013, technological risks were
the least vulnerable risks and had very limited influence on others. Although they are
still the least influential risks in 2017, we can see an increasing trend in their influ-
ence. As shown in Fig. 1 and 2, the 2014 and 2016 risk networks are sparser than
the others. In a sparse risk network, risks have a higher tendency to connect with
24
Xiang Niu1,2+ et al.
e
c
r
u
o
S
e
c
r
u
o
S
e
c
r
u
o
S
e
c
r
u
o
S
e
c
r
u
o
S
Economic
0.63
Environmental
0.43
Geopolitical
0.49
Societal
0.43
Technological
0.04
(a) 2013 network
0.61
0.39
0.61
0.45
0.16
0.62
0.49
0.50
0.47
0.08
0.62
0.58
0.49
0.48
0.12
0.64
0.57
0.59
0.59
0.29
Economic
Environmental
Geopolitical
Societal
Technological
Economic
0.84
Environmental
0.35
Geopolitical
0.58
Societal
0.52
Technological
0.62
Target
(b) 2014 network
0.64
0.47
0.71
0.65
0.60
0.54
0.61
0.45
0.76
0.23
0.25
0.99
0.46
0.58
0.07
0.71
0.28
0.68
0.46
1.00
Economic
Environmental
Geopolitical
Societal
Technological
Economic
0.56
Environmental
0.38
Geopolitical
0.66
Societal
0.47
Technological
0.22
Target
(c) 2015 network
0.42
0.32
0.74
0.55
0.45
0.33
0.68
0.66
0.63
0.15
0.20
0.74
0.43
0.65
0.06
0.20
0.30
0.66
0.34
0.64
Economic
Environmental
Geopolitical
Societal
Technological
Economic
0.53
Environmental
0.30
Geopolitical
0.47
Societal
0.46
Technological
0.27
Target
(d) 2016 network
0.37
0.19
0.68
0.56
0.36
0.29
0.66
0.50
0.67
0.14
0.17
0.74
0.25
0.64
0.00
0.30
0.32
0.43
0.36
0.63
Economic
Environmental
Geopolitical
Societal
Technological
Economic
0.31
Environmental
0.26
Geopolitical
0.39
Societal
0.30
Technological
0.27
Target
(e) 2017 network
0.30
0.28
0.45
0.38
0.38
0.21
0.52
0.38
0.41
0.07
0.12
0.55
0.24
0.42
0.08
0.24
0.25
0.42
0.10
0.46
Economic
Environmental
Geopolitical
Societal
Technological
Target
e
c
n
e
u
l
f
n
I
d
e
z
i
l
a
m
r
o
N
1
0.8
0.6
0.4
0.2
0
1
0.8
0.6
0.4
0.2
e
c
n
e
u
l
f
n
I
d
e
z
i
l
a
m
r
o
N
0
1
0.8
0.6
0.4
0.2
e
c
n
e
u
l
f
n
I
d
e
z
i
l
a
m
r
o
N
0
1
0.8
0.6
0.4
0.2
e
c
n
e
u
l
f
n
I
d
e
z
i
l
a
m
r
o
N
0
1
0.8
0.6
0.4
0.2
0
e
c
n
e
u
l
f
n
I
d
e
z
i
l
a
m
r
o
N
Fig. 15 Influence among risk categories, normalized using a logarithmic scale. With the unity-based nor-
malization of the influences, we find that most categories have large self-influence (diagonal elements).
Evolution of Threats in the Global Risk Network
25
ones in the same category. Thus, the risk categories in 2014 and 2016 have largest
self-influence in Fig. 15.
Conclusions
Here, we use the CARP model to simulate cascades in the global risk networks. With
the most likely model parameters obtained through MLE (maximum likelihood esti-
mation) and applied to a real event dataset, we compute the mean-field steady state
probabilities of risks being active for each year from 2013 to 2017. The results ob-
tained for the annual risk networks from 2013 to 2017 show significant changes in
the asymptotic mean-field probabilities of risk activation. Applying the approach to
finding bounds on recovery in CARP model presented in [14] to the global risk net-
work, we measure the error of model parameter recovery and find that it is bounded
by ±20% of the values obtained with historical data for years from 2013 to 2017. The
corresponding error of the risk activity is smaller but of similar magnitude. Since the
range of values for critical risks reported above was much larger, we can conclude
that we have enough historical data to support the conclusions of our paper. Finally,
by computing the difference of external activation frequencies of risk j with enabled
and disabled risk i, we define the influence Ii→ j that risk i exerts on risk j. The results
for the annual risk networks from 2013 to 2017 demonstrate that the influence among
risks changes significantly over the years.
With the CARP model, we first compare yearly risks and then measure the quan-
titative changes of risks that provide an interesting view on evolution of the global
economy and its risks. The activation probabilities and influences of economic risks
are dramatically reduced as a result of economic recovery since 2014. The increase
in activation probability of state collapse, terrorist attacks, illicit trade and migration
show the negative effects of the failure of global governance, especially inaction of
certain international bodies, like the Security Council of the United Nations. Tech-
nological risks are becoming more influential as well due to the increase of private
data leaks. In each year from 2013 to 2017, the significance of economic threats de-
creases, while geopolitical and societal risks become more detrimental. All those an-
alytic results are consistent with empirical observations. The quantitative analysis of
our method creates a basis for developing tools for predictions of future risk network
evolution and for guidance how to reduce damages caused by future risk cascades.
Abbreviations
AGGI: Annual greenhouse gas index, CARP: Cascading alternating renewal pro-
cesses, CTA: Collaborative Technology Alliance, DTRA: Defense Threat Reduction
Agency, EU: European Union, FAO: Food and Agriculture Organization, ISIS: Is-
lamic State in Iraq and Syria, KS: Kolmogorov-Smirnov, MLE: Maximum likelihood
estimation, NATO: North Atlantic Treaty Organization, RPI: Rensselaer Polytech-
nic Institute, SIS: Susceptible-Infectious-Susceptible, U.S.: the United States, WEF:
World Economic Forum
26
Xiang Niu1,2+ et al.
Availability of data and material
Data are available online via WEF website, see bibliography.
Funding
This work was supported in part by the Army Research Laboratory under Cooperative
Agreement Number W911NF-09-2-0053 (the Network Science CTA), by the Army
Research Office grant no. W911NF-16-1-0524, and by DTRA Award No. HDTRA1-
09-1-0049. The views and conclusions contained in this document are those of the
authors.
Competing interests
The authors declare that they have no competing interests.
Author's contributions
Designed research: X.N., B.K.S., G.K., A.M.; Performed research: X.N., B.K.S.; An-
alyzed data: X.N., B.K.S., G.K., A.M.; Wrote and edited the paper: X.N., A.M., G.K.,
B.K.S.
Acknowledgments
The authors thank Dr. Noemi Derzsy for helpful discussion of this work in its prelim-
inary stages.
Author details
1Network Science and Technology Center, Rensselaer Polytechnic Institute (RPI),
110 Eighth Street, NY 12180 Troy, USA. 2Department of Computer Science, Rensse-
laer Polytechnic Institute (RPI), 110 Eighth Street, NY 12180 Troy, USA. 3Department
of Physics, Rensselaer Polytechnic Institute (RPI), 110 Eighth Street, NY 12180
Troy, USA.
References
1. Moussawi, A., Derzsy, N., Lin, X., Szymanski, B.K., Korniss, G.: Limits of predictability of cascading
overload failures in spatially-embedded networks with distributed flows. Sci. Rep. 7(11729) (2017)
2. Dobson, I., Carreras, B.A., Lynch, V.E., Newman, D.E.: Complex systems analysis of series of black-
outs: Cascading failure, critical points, and self-organization. Chaos 17(2), 026103 (2007)
3. Haldane, A.G., May, R.M.: Systemic risk in banking ecosystems. Nature 469(7330), 351 (2011)
Evolution of Threats in the Global Risk Network
27
4. Gai, P., Kapadia, S.: Contagion in financial networks. In: P. R. Soc. A, vol. 466. London, United
Kingdom, pp. 2401 -- 2423 (2010). The Royal Society
5. Battiston, S., Puliga, M., Kaushik, R., Tasca, P., Caldarelli, G.: Debtrank: Too central to fail? financial
networks, the fed and systemic risk. Sci. Rep. 2(541) (2012)
6. Oppenheimer, D., Ganapathi, A., Patterson, D.A.: Why do internet services fail, and what can be
done about it? In: USENIX Symposium on Internet Technologies and Systems, vol. 67. Berkeley,
CA. (2003). USENIX
7. Brown, A., Patterson, D.A.: Embracing failure: A case for recovery-oriented computing (ROC).
In: High Performance Transaction Processing Symposium, vol. 10. Berkeley, CA, pp. 3 -- 8 (2001).
USENIX
8. Kenett, D.Y., Huang, X., Vodenska, I., Havlin, S., Stanley, H.E.: Partial correlation analysis: Applica-
tions for financial markets. Quan. Fin. 15(4), 569 -- 578 (2015)
9. Kenett, D.Y., Preis, T., Gur-Gershgoren, G., Ben-Jacob, E.: Dependency network and node influence:
Application to the study of financial markets. Int. J. Bifurcation Chaos 22(07), 1250181 (2012)
10. Raddant, M., Kenett, D.Y.: Interconnectedness in the global financial market (16-09), 1 -- 37 (2016).
Office of Financial Research
11. Havlin, S., Kenett, D.Y.: Cascading failures in interdependent economic networks. In: Proceedings
of the International Conference on Social Modeling and Simulation, Plus Econophysics Colloquium
2014, Berlin, Germany, pp. 87 -- 97 (2015). Springer
12. Majdandzic, A., Podobnik, B., Buldyrev, S.V., Kenett, D.Y., Havlin, S., Stanley, H.E.: Spontaneous
recovery in dynamical networks. Nat. Phys. 10(1), 34 (2014)
13. Szymanski, B.K., Lin, X., Asztalos, A., Sreenivasan, S.: Failure dynamics of the global risk network.
Sci. Rep. 5(10998) (2015)
14. Lin, X., Moussawi, A., Korniss, G., Bakdash, J.Z., Szymanski, B.K.: Limits of risk predictability in a
cascading alternating renewal process model. Sci. Rep. 7(6699) (2017)
15. Cox, D.R., Miller, H.D.: The Theory of Stochastic Processes. CRC Press, Florida (1977)
16. World Economic Forum Global Risks Report. (2013). Accessed: 2018-07-23
17. World Economic Forum Global Risks Report. (2014). Accessed: 2018-07-23
18. World Economic Forum Global Risks Report. (2015). Accessed: 2018-07-23
19. World Economic Forum Global Risks Report. (2016). Accessed: 2018-07-23
20. World Economic Forum Global Risks Report. (2017). Accessed: 2018-07-23
21. Niu, X., Moussawi, A., Derzsy, N., Lin, X., Korniss, G., Szymanski, B.K.: Evolution of the global
risk network mean-field stability point. In: International Workshop on Complex Networks and Their
Applications, pp. 1124 -- 1134 (2017). Springer
22. Pawitan, Y.: In All Likelihood: Statistical Modelling and Inference Using Likelihood. Oxford Univer-
sity Press, Oxford (2001)
23. Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the EM
Algorithm. J. R. Stat. Soc. B 39(1), 1 -- 38 (1977)
24. R., P.-S., C., C., P., M., A., V.: Epidemic processes in complex networks. Rev. Mod. Phys. 87(925),
141 -- 153 (2015)
|
1706.01143 | 1 | 1706 | 2017-06-04T20:30:31 | Graphons: A Nonparametric Method to Model, Estimate, and Design Algorithms for Massive Networks | [
"cs.SI",
"physics.soc-ph"
] | Many social and economic systems are naturally represented as networks, from off-line and on-line social networks, to bipartite networks, like Netflix and Amazon, between consumers and products. Graphons, developed as limits of graphs, form a natural, nonparametric method to describe and estimate large networks like Facebook and LinkedIn. Here we describe the development of the theory of graphons, for both dense and sparse networks, over the last decade. We also review theorems showing that we can consistently estimate graphons from massive networks in a wide variety of models. Finally, we show how to use graphons to estimate missing links in a sparse network, which has applications from estimating social and information networks in development economics, to rigorously and efficiently doing collaborative filtering with applications to movie recommendations in Netflix and product suggestions in Amazon. | cs.SI | cs |
Graphons: A Nonparametric Method to Model, Estimate, and
Design Algorithms for Massive Networks∗
CHRISTIAN BORGS, Microso(cid:137) Research
JENNIFER CHAYES, Microso(cid:137) Research
Many social and economic systems are naturally represented as networks, from o(cid:130)-line and on-line social
networks, to bipartite networks, like Net(cid:131)ix and Amazon, between consumers and products. Graphons,
developed as limits of graphs, form a natural, nonparametric method to describe and estimate large networks
like Facebook and LinkedIn. Here we describe the development of the theory of graphons, for both dense and
sparse networks, over the last decade. We also review theorems showing that we can consistently estimate
graphons from massive networks in a wide variety of models. Finally, we show how to use graphons to estimate
missing links in a sparse network, which has applications from estimating social and information networks in
development economics, to rigorously and e(cid:129)ciently doing collaborative (cid:128)ltering with applications to movie
recommendations in Net(cid:131)ix and product suggestions in Amazon.
Additional Key Words and Phrases: Networks; graphons; graph convergence; nonparametric estimation;
collaborative (cid:128)ltering; network completion
Networks are the natural framework to describe social and economic systems with pairwise
interactions. (cid:140)is includes not only social networks among individuals, like Facebook and LinkedIn,
but also bipartite networks between di(cid:130)erent types of entities, like the Net(cid:131)ix movie-user network
and the Amazon consumer-product network. Graphons, developed as limits of sequences of graphs,
form a natural, non-parametric method to model and estimate large networks. Here we informally
describe some of the development of the theory of graphons over the last dozen years, and provide
an application of graphons to the completion of noisily, sparsely sampled massive networks.
1 GRAPH LIMITS
(cid:140)e theory of limits of sequences of dense graphs (i.e., graphs in which the number of edges scale
as the square of the number of vertices) was developed over roughly a decade starting around 2006
[19–21, 37]. Of course, it is always possible to a de(cid:128)ne a limit of a graph sequence – if we make
the notion too weak, then every sequence trivially converges to the same point; if we make it too
strong, each sequence could converge to a di(cid:130)erent point. (cid:140)e key was to (cid:128)nd a notion that was
"just right." (cid:140)is was done in a series of papers with Lov´asz, Sos and Vestergombi [20, 21].
In [19] we de(cid:128)ne a metric to allow us to compare graphs of di(cid:130)erent sizes. For this, we rescale
two graphs to be of the same size by creating copies of each vertex so that the two graphs then have
the same number of vertices. Speci(cid:128)cally, if the two graphs have n1 and n2 vertices, and k1 and k2
are the smallest numbers such that k1n1 = k2n2, we "blow up" each vertex in the (cid:128)rst graph by k1,
∗(cid:140)is extended abstract summarizes the content of an invited keynote talk delivered by Jennifer Chayes at the eighteenth
ACM Conference on Economics and Computation (ACM EC'17).
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee
provided that copies are not made or distributed for pro(cid:128)t or commercial advantage and that copies bear this notice and the
full citation on the (cid:128)rst page. Copyrights for components of this work owned by others than the author(s) must be honored.
Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior speci(cid:128)c permission and/or a fee. Request permissions from [email protected].
© 2017 Copyright held by the owner/author(s). Publication rights licensed to ACM. XXXX-XXXX/2017/1-ART1 $15.00
DOI: h(cid:138)p://dx.doi.org/10.1145/3033274.3084097
Christian Borgs and Jennifer Chayes
Fig. 1. The half-graph and a random graph, their empirical graphons, and their limits.
and each one in the second by k2. We then replace each edge in the original graphs by complete
bipartite graphs between the blown-up vertices. We look at the Frieze-Kannan cut distance [29] of
the di(cid:130)erence between the two blown-up graphs, where the cut distance is basically the value of
the cut between a set and its complement, taking the sup over all sets. Finally, since vertex labels
should not ma(cid:138)er, we take the minimum over all relabelings of the vertices. (cid:140)e resulting metric is
called the cut metric.
Our (cid:128)rst notion of convergence [19, 20] is what we call metric convergence, which means simply
that the sequence of graphs is Cauchy in the cut metric. (cid:140)e fact that a limit exists was established
by Lov´asz and Szegedy [37] using a weak version of the Szemer´edi Regularity Lemma [29] and
a martingale argument. (cid:140)e limit is a two-variable symmetric function, called a graphon, o(cid:137)en
denoted by W (x, y), which is basically a continuous version of the adjacency matrix of a graph on
[0, 1]2. In [12], we show that the limit is unique up to measure-preserving transformations of the
underlying feature space.
Note that a graph on n vertices can be represented as a piecewise constant graphon by dividing
the unit square [0, 1]2 into n
2 small squares of side length 1/n, and representing the presence of
an edge between vertices i and j by a 1 on the squares ij and ji, and its absence by a 0. (cid:140)is
representation is called the empirical graphon of the graph. If we visualize a 0 in the empirical
graphon as a small white square, and a 1 as a small black square, graph convergence can be seen as
convergence of the these black and white empirical graphons to a gray-scale limiting graphon. See
Figure 1 for an illustration for the half-graph and an Erdos-Reny´ı random graph.
(cid:140)ere is a natural local notion of convergence in dense graphs. We can ask that all induced (cid:128)nite
subgraph densities (e.g., the edge density, triangle density, Peterson graph density, ...) converge
simultaneously. We prove that a sequence of dense graphs converges in metric if and only if it is
subgraph convergent [20].
We also introduce several "global" notions of convergence [10, 21]. We have one notion which
corresponds to convergence of all (cid:128)nite two-body statistical physics models in the microcanonical
~~Christian Borgs and Jennifer Chayes
ensemble (the ensemble in which each species of vertex represents a (cid:128)xed percentage of all vertices).
We have another notion which corresponds to all multi-way cuts and bisections converging. We
show that a sequence of dense graphs converges according to these and a few other global notions
if and only if it converges in metric [21]. More recently, a notion of large deviations convergence
was de(cid:128)ned [10], which is also equivalent with the other global and local notions for dense graphs.
Sparse graphs of bounded degree are much more fragile. Here we have no notion of metric
convergence. (cid:140)e natural notion of local convergence is convergence of a graph rooted at a
random point, known as Benjamini-Schramm convergence [5]. Benjamini-Schramm convergence
is equivalent to subgraph convergence [11], but global notions of convergence are stronger [10].
(cid:140)e most interesting case is that of sparse graphs of unbounded average degree, like the power-
law networks in Facebook and LinkedIn. (cid:140)ese cases were much more complicated due to the fact
that much of the necessary graph theory (e.g., the relevant case of the weak Regularity Lemma)
had not yet been developed. Over the past (cid:128)ve years, we have developed two ways to generalize
the theory.
(cid:140)e (cid:128)rst way is by rescaling the empirical graphon function, dividing it by the edge density
ρ of the graph sequence (which is tending to zero in the case of sparse graphs). (cid:140)is was done
by Bollob´as and Riordan in the case when the graphs had no "dense spots," corresponding to the
graphon being a bounded function [8]. In collaboration with Cohn and Zhao [15, 16], we develop a
theory of "uniformly upper regular" sparse graphs of unbounded average degree; we show that
these converge to graphons in Lp spaces, corresponding to growing sequences with power-law
tails. In the process of doing this, we formulate and prove a weak form of the Regularity Lemma
for sparse graphs corresponding to graphons of unbounded degree.
(cid:140)e second way to get graph limits for graphs of unbounded average degree, again graphs with
very long tails, is by "stretching" the empirical graphon (and its domain) by 1/√
ρ so that the
integral of the graphon is again unity. (cid:140)is leads to a limit de(cid:128)ned on the positive quadrant rather
than the unit square, and hence these graphons provide a good description of networks where
the underlying features cannot be restricted to bounded domains. See Figure 2 for a comparison
of this with the rescaling approach. In work with Cohn and Holden [17], we develop a theory of
sparse graphs of unbounded degree with "uniformly regular tails," show how to construct limits
for sequences obeying this regularity condition, and prove many properties of the these graphons.
Finally, we show that any graph sequence which satis(cid:128)es both the conditions of uniform upper
regularity and uniformly regular tails must be dense; so dense graphs are the only overlap of our
two theories of sparse graphs of unbounded degree.
2 MODELING LARGE NETWORKS
(cid:140)e classic way to model large networks uses the so-called stochastic block model [32], which is a
generalization of the Erdos-Reny´ı random graph to k species of vertices, with (cid:128)xed densities of
each species of vertex, and (cid:128)xed probabilities that any two species connect to each other, including
a (cid:128)xed probability of intra-species connection, which is in general di(cid:130)erent within each species.
As graphs get larger and larger, reasonable descriptions have the number of species scale with
the number of vertices: k = k(n), which tends to lead to over(cid:128)(cid:138)ing. Instead, starting over a decade
ago [31], researchers began to model large networks non-parametrically by choosing n points
randomly from some feature space, x1, x2, · · · , xn ∈ Ω, and a two-variable, bounded symmetric
function W (xi , xj) : Ω× Ω → [0, 1]. A random graph consistent with this function is then generated
by saying that i is connected to j with probability W (xi , xj).
Christian Borgs and Jennifer Chayes
Fig. 2. Three graphons associated with the same simple graph G on five vertices: the emprical graphon used
in theory of dense graph convergence, the rescaled a version used in the uniformly upper regular theory of
sparse graph convergence, and the stretched version used in the theory for sparse graphs with uniformly
regular tails.
(cid:140)e graphs generated in this way can easily be seen to be dense, whereas real life networks tend
to be sparse. But our two methods for constructing graph limits for sequences of random sparse
graphs of unbounded degree naturally yield random models of massive sparse networks.
Our (cid:128)rst method [15] chooses features x1, x2, · · · , xn from some compact feature space, and
generates random graphs with long tails corresponding to unbounded graphons W , connecting
vertices with features xi and xj with probability min{1, ρW (xi , xj)}, where ρ is the desired target
density of our graph.
Our second method [17] is more complex: It chooses features x1, x2, · · · from an unbounded
feature space according to a Poisson process with an intensity which scales linearly with time.
At time t, the process connects vertices i and j born up to time t with probability W (xi , xj). (cid:140)e
resulting graph at time t retains only those vertices which have been connected to at least one
other vertex by that time, leading to a graph with a (cid:128)nite number of vertices at any (cid:128)nite time.
We show that this kind of model is quite natural by proving a generalization of the celebrated
Aldous-Hoover (cid:140)eorem [3, 33] to sparse graphs. In our se(cid:138)ing, it says that under suitable regularity
conditions, any family of graphs with vertices labeled by their birth time that is invariant under
measure-preserving transformations of time must be of the above form. Our model generalizes the
work of Caron and Fox [22], and is very similar to a model introduced simultaneously by Veitch
and Roy [41].
3 LEARNING SPARSE GRAPHS
How does one learn a network from a single sample, e.g., allowing us to predict how the network
might look when it's twice its current size? (cid:140)e traditional approach is to assume that the network
is a stochastic block model with k types of vertices, cluster the vertices according to type, and then
use this clustering to estimate the parameters of the model (the densities of each of the k types,
plus the k(k + 1)/2 connection probabilities within and between types) and then use that estimated
stochastic block model to make predictions about the network [4, 9, 24, 26–28, 32, 34, 38, 40, 42, 43].
See [1, 2] for recent work with rigorous consistency guarantees for sparse graphs.
approach [6, 7, 25, 35, 39]. Here the idea is to get an estimate,(cid:98)W for the graphon W representing
As we discussed above, for very large networks, it is o(cid:137)en be(cid:138)er to take a non-parametric
the network, and then generate realizations from that estimation. For bounded graphons, it had
been shown that this leads to consistent estimation for both dense and sparse graphs, see, e.g.,
[23, 30, 36, 44], to name a few of the more recent papers on the subject. In collaboration with
Christian Borgs and Jennifer Chayes
Cohn and Ganguly [14], we showed that this leads to consistent estimation for sparse massive
networks if, e.g., W ∈ L
2, provided that the average degree diverges. Hence one can use graphons
for statistically consistent estimation for power-law graphs. In collaboration with Smith [13], we
showed that, for sparse graphs corresponding to bounded W , it is possible to consistently estimate
while maintaining edge di(cid:130)erential privacy.
4 NETWORK COMPLETION AND COLLABORATIVE FILTERING ON SPARSE
GRAPHS
An area of some interest in economics is how to "complete" sparsely, noisily sampled networks.
For example, in development economics, one sometimes has measurements representing sparsely
and noisily sampled connections among individuals. How sparsely can we sample and still get an
accurate estimate of the missing links? Similarly, in bipartite networks like the Net(cid:131)ix user-movie
network or the Amazon consumer-product network, can we show that we can complete the network
even if it is very sparsely sampled with some general noise? Here we follow a collaborative (cid:128)ltering
approach, which however must be modi(cid:128)ed to account for the sparsity of the sample. What if
the sampling is so sparse that two people for whom we are trying to estimate the probability
of a connection have no connections in common? Or what if there are no sets of movies in
common between a given individual and another on the Net(cid:131)ix network? In collaboration with
Lee and Shah [18], we used the "expanded neighborhood" approach of Abbe and Sandon [1, 2],
who study estimation for stochastic block models. (cid:140)e idea is to look not just at individuals who
share a common connection, but instead expand the neighborhood until a common connection
is found. Similarly, we expand the bipartite user-movie-user-movie-· · · neighborhood until there
an overlap. Here we treat graphons as operators in the expansion and need to do estimates to
control the variance. Assume there are n individuals on the network, each described by features in
a d-dimensional space. We show that, if the underlying graphon describing this network is Lipshitz,
then the mean square error of our estimated graphon tends to zero provided that we sample the
network with density p = ω(d
n−1). For high-dimensional latent spaces, which tend to be the
appropriate descriptions for most real-world networks, this is a signi(cid:128)cant improvement over the
best previous result, that of Cha(cid:138)erjee [23], who showed that the mean square error of the estimated
graphon tends to zero provided that the network is sampled with density p = ω(n−2/(d +2)).
2
REFERENCES
[1] E. Abbe and C. Sandon. 2015. Community detection in general stochastic block models: fundamental limits and e(cid:129)cient
recovery algorithms. In Proceedings of the 56th Annual Symposium on Foundations of Computer Science (FOCS'15).
670–688.
[2] E. Abbe and C. Sandon. 2015. Recovering communities in the general stochastic block model without knowing the
parameters. In Advances in Neural Information Processing Systems 28 (NIPS'15). 676–684.
[3] D. Aldous. 1981. Representations for partially exchangeable arrays of random variables. J. Multivar. Anal. 11 (1981),
581–598.
[4] A. Anandkumar, R. Ge, D. Hsu, and S. M. Kakade. 2014. A tensor approach to learning mixed membership community
models. Journal of Machine Learning Research 15 (2014), 2239–2312.
[5] I Benjamini and O Schramm. 2001. Recurrence of distributional limits of (cid:128)nite planar graphs. Electronic Journal of
Probability 23 (2001), 1–13.
[6] P. J. Bickel and A. Chen. 2009. A nonparametric view of network models and Newman-Girvan and other modularities.
Proceedings of the National Academy of Sciences of the United States of America 106 (2009), 21068–21073.
[7] P. J. Bickel, A. Chen, and E. Levina. 2011. (cid:140)e method of moments and degree distributions for network models. Annals
of Statistics 39 (2011), 2280–2301.
[8] B. Bollob´as and O. Riordan. 2009. Metrics for sparse graphs. In Surveys in combinatorics 2009 (eds. S. Huczynska, J. D.
Mitchell, and C. M. Roney-Dougal), London Math. Soc. Lecture Note Ser. 365, Cambridge University Press. London Math.
Soc. Lecture Note Ser. 365, Cambridge University Press, 211–287.
Christian Borgs and Jennifer Chayes
177–214.
[9] R. B. Boppana. 1987. Eigenvalues and graph bisection: an average-case analysis. In 28th Annual Symposium on
Foundations of Computer Science. 280–285.
[10] C. Borgs, J. Chayes, and D Gamarnik. 2013. Convergent sequences of sparse graphs: A large deviations approach.
preprint, arXiv:1302.4615. To appear in Random Structures Algorithms (2013).
[11] C. Borgs, J. Chayes, J Kahn, and L. Lov´asz. 2013. Le(cid:137) and right convergence of graphs with bounded degree. Random
Structures Algorithms 42 (2013), 1–28.
[12] C. Borgs, J. Chayes, and L. Lov´asz. 2010. Moments of two-variable functions and the uniqueness of graph limits.
Geometric And Functional Analysis 19, 6 (2010), 1597–1619.
[13] C. Borgs, J.T. Chayes, and A. Smith. 2015. Private graphon estimation for sparse graphs. In Advances in Neural
[14] C Borgs, J. T. Chayes, H Cohn, and S Ganguly. 2015. Consistent nonparametric estimation for heavy-tailed sparse
Information Processing Systems 28. 1369–1377.
graphs. preprint, arXiv:1508.6675 (2015).
[15] C. Borgs, J. T. Chayes, H. Cohn, and Y. Zhao. 2014. An Lp theory of sparse graph convergence I: limits, sparse random
graph models, and power law distributions. preprint, arXiv:1401.2906 (2014).
[16] C. Borgs, J. T. Chayes, H. Cohn, and Y. Zhao. 2014. An Lp theory of sparse graph convergence II: LD convergence,
quotients, and right convergence. preprint, arXiv:1408.0744 (2014).
[17] C Borgs, J. T. Chayes, and N Cohn, H andd Holden. 2016. Sparse exchangeable graphs and their limits via graphon
processes. preprint, arXiv:1601.07134. To appear in Journal of Machine Learning Research (2016).
[18] C Borgs, J. T. Chayes, C. E Lee, and D. Shah. 2017. Sparse graphon Estimation via Neighbor Method. preprint (2017).
[19] C. Borgs, J. T. Chayes, L. Lov´asz, V. S´os, and K. Vesztergombi. 2006. Counting graph homomorphisms. In Topics in
discrete mathematics (eds. M. Klazar, J. Kratochv´ıl, M. Loebl, J. Matousek, R. (cid:138)omas, and P. Valtr), Springer. Springer,
315–371.
[20] C. Borgs, J. T. Chayes, L. Lov´asz, V. S´os, and K. Vesztergombi. 2008. Convergent graph sequences I: subgraph frequencies,
metric properties, and testing. Advances in Math. 219 (2008), 1801–1851.
[21] C. Borgs, J. T. Chayes, L. Lov´asz, V. S´os, and K. Vesztergombi. 2012. Convergent graph sequences II: multiway cuts and
statistical physics. Ann. of Math. 176 (2012), 151–219.
[22] F. Caron and E. B Fox. 2014. Sparse graphs using exchangeable random measures. preprint, arXiv:1401.1137 (2014).
[23] S. Cha(cid:138)erjee. 2015. Matrix estimation by universal singular value thresholding. Annals of Statistics 43, 1 (2015),
[24] Kamalika Chaudhuri, Fan Chung, and Alexander Tsiatas. 2012. Spectral clustering of graphs with general degrees in the
extended planted partition model. In Proceedings of the 25th Annual Conference on Learning Theory (JMLR Workshop and
Conference Proceedings Volume 23). 35.1–35.23. h(cid:138)p://www.jmlr.org/proceedings/papers/v23/chaudhuri12/chaudhuri12.
pdf
[25] D. S. Choi, P. J. Wolfe, and E. M. Airoldi. 2012. Stochastic blockmodels with a growing number of classes. Biometrika
99 (2012), 273–284.
227–284.
[26] A. Coja-Oghlan. 2010. Graph partitioning via adaptive spectral techniques. Combin. Probab. Comput. 19 (2010),
[27] A. Dasgupta, J. Hopcro(cid:137), R. Kannan, and P. Mitra. 2006. Spectral clustering by recursive partitioning. In Algorithms
– ESA 2006 (Lecture Notes in Computer Science), Y. Azar and T. Erlebach (Eds.), Vol. 4168. Springer, 256–267. h(cid:138)p:
//dx.doi.org/10.1007/11841036 25
[28] S.E. Fienberg, M.M. Meyer, and S.S. Wasserman. 1985. Statistical analysis of multiple sociometric relations. Journal of
the American Statistical Association 80 (1985), 51–67.
[29] A. Frieze and R. Kannan. 1999. (cid:139)ick approximation to matrices and applications. Combinatorica 19 (1999), 175–220.
[30] C. Gao, Y. Lu, and H. H. Zhou. 2015. Rate-optimal graphon estimation. Annals of Statististics 43 (2015), 2624–2652.
[31] P. D. Ho(cid:130), A. E. Ra(cid:137)ery, and M. S. Handcock. 2002. Latent space approaches to social network analysis. J. Amer. Statist.
Assoc. 97, 460 (2002), 1090–1098.
[32] P.W. Holland, K.B. Laskey, and S. Leinhardt. 1983. Stochastic blockmodels: (cid:128)rst steps. Social Networks 5 (1983),
[33] D. Hoover. 1979. Relations on probability spaces and arrays of random variables. preprint, Institute for Advanced Study,
109–137.
Princeton, NJ (1979).
(1998), 155–175.
[34] Mark Jerrum and Gregory B. Sorkin. 1998. (cid:140)e Metropolis algorithm for graph bisection. Discrete Appl. Math. 82
[35] O. Kallenberg. 1999. Multivariate sampling and the estimation problem for exchangeable arrays. Journal of (cid:138)eoretical
[36] Olga Klopp, Alexandre B. Tsybakov, and Nicolas Verzelen. 2017. Oracle inequalities for network models and sparse
Probability 12 (1999), 859–883.
graphon estimation. Ann. Statist. 45 (2017), 316–354.
933–957.
Foundations of Computer Science. 529–537.
Statist. 39 (2011), 1878–1915.
[38] F. McSherry. 2001. Spectral partitioning of random graphs. In Proceedings of the 42nd Annual IEEE Symposium on
[39] K. Rohe, S. Cha(cid:138)erjee, and B. Yu. 2011. Spectral clustering and the high-dimensional stochastic blockmodel. Ann.
[40] T. A. B. Snijders and K. Nowicki. 1997. Estimation and prediction for stochastic blockmodels for graphs with latent
block structure. Journal of Classi(cid:128)cation 14 (1997), 75–100.
[41] V. Veitch and D. M Roy. 2015. (cid:140)e class of random graphs arising from exchangeable random measures. preprint,
Christian Borgs and Jennifer Chayes
[37] L. Lov´asz and B. Szegedy. 2006. Limits of dense graph sequences. Journal of Combinatorial (cid:138)eory, Series B 96 (2006),
arXiv:1512.03099 (2015).
Statistical Association 82 (1987), 8–19.
[42] Yuchung J. Wang and George Y. Wong. 1987. Stochastic blockmodels for directed graphs. Journal of the American
[43] H.C. White, S.A. Boorman, and R.L. Breiger. 1976. Social structure from multiple networks. I. Blockmodels of roles and
positions. American Journal of Sociology 80 (1976), 730(cid:128)(cid:147)780.
[44] P. J. Wolfe and S. C. Olhede. 2013. Nonparametric graphon estimation. preprint, arXiv:1309.5936 (2013).
|
1509.03503 | 1 | 1509 | 2015-09-04T14:57:08 | NoSPaM Manual - A Tool for Node-Specific Triad Pattern Mining | [
"cs.SI",
"cs.CV",
"cs.DS",
"physics.data-an",
"physics.soc-ph"
] | The detection of triadic subgraph motifs is a common methodology in complex-networks research. The procedure usually applied in order to detect motifs evaluates whether a certain subgraph pattern is overrepresented in a network as a whole. However, motifs do not necessarily appear frequently in every region of a graph. For this reason, we recently introduced the framework of Node-Specific Pattern Mining (NoSPaM). This work is a manual for an implementation of NoSPaM which can be downloaded from www.mwinkler.eu. | cs.SI | cs |
NoSPaM Manual
A Tool for Node-Specific Triad Pattern Mining
Marco Winkler∗
October 10, 2018
Abstract
The detection of triadic subgraph motifs is a common methodology in complex-
networks research. The procedure usually applied in order to detect motifs eval-
uates whether a certain subgraph pattern is overrepresented in a network as a
whole. However, motifs do not necessarily appear frequently in every region of a
graph. For this reason, we recently introduced the framework of Node-Specific
Pattern Mining (NoSPaM) [9, 11]. This work is a manual for an implementation
of NoSPaM which can be downloaded from www.mwinkler.eu.
Contents
1 Introduction
2 How to use NoSPaM
2.1 Download and Installation . . . . . . . . . . . . . . . . . . . . . . . . . .
2.2 Running NoSPaM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.3 Output File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3 Algorithms
3.1 Randomization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.2 Counting of Node-Specific Triad Patterns . . . . . . . . . . . . . . . . . .
3.3 Node-Specific Triad Pattern Mining . . . . . . . . . . . . . . . . . . . . .
References
2
4
4
4
5
6
6
6
8
9
∗Institute for Theoretical Physics, University of Würzburg, Am Hubland, 97074 Würzburg, Germany,
[email protected]
1
Figure 1: All 13 possible non-isomorphic connected triadic subgraphs (subgraph patterns)
in directed unweighted networks.
1 Introduction
Analyzing networks in terms of their local substructure is a well-established methodol-
ogy in complex-network science [1, 3, 4, 6 -- 8]. Particularly triadic subgraph structures
have been studied intensively over the last 15 years [2, 4, 6, 10]. Apart from node
permutations, there are 13 connected triadic subgraph patterns in directed unweighted
networks (see Fig. 1). Those patterns that are significantly overrepresented in a graph
structure are referred to as motifs [6].
In order to evaluate the extent of an over- or underrepresentation, for each pattern
i, the framework commonly used compares its frequency of occurrence in the original
network under investigation, Noriginal,i, to the expected frequency of occurrence in an
ensemble of random networks with the same degree distribution and the same number
of unidirectional and bidirectional links as the original network, hNrand,ii. Over- and
underrepresentation of pattern i is then quantified through a Z score
(1)
Zi = Noriginal,i − hNrand,ii
σrand,i
where σrand,i represents the standard deviation of Nrand,i in the ensemble of the null
model. Hence, every network can be assigned a vector ~Z whose components comprise
the Z scores of all possible triad patterns of Fig. 1.
However, this approach does not account for potentially existing heterogeneities in
, is overrepresented in a
graph structures. Suppose, e.g., the feed-forward loop (FFL),
certain area of a graph, but, at the same time, highly underrepresented in another part of
the graph. On the global network level, the effects may cancel out such that the Z score
will be close to zero and possibly relevant structural information will be lost. Therefore,
we recently suggested the methodology of Node-Specific Pattern Mining (NoSPaM) [9,
11]. Instead of mining frequent subgraphs on the system level, NoSPaM investigates
I.e., for every node α, NoSPaM
the neighborhood of every single node separately.
considers only those triads in which α participates in. Since the position of node α in
the triadic subgraphs matters now, the symmetry of most patterns shown in Fig. 1 is
broken and the number of connected node-specific triad patterns increases from 13 to
30. These are shown in Fig. 2. To understand the increase in the number of patterns,
. From the perspective of one particular node, it splits
consider the ordinary subgraph
into the three node-specific triad patterns 14, 16, and 23 in Fig. 2. Furthermore, some
patterns are included in others, e.g. pattern 1 is a subset of pattern 3. In order to avoid
biased results, it is not double counted, i.e. an observation of pattern 3 will only increase
its corresponding count and not the one associated with pattern 1 [9, 11].
2
Figure 2: All possible connected, nonisomorphic triadic subgraph patterns in terms of a
distinct node (here: lower node).
For every node α in a graph, NoSPaM will compute Z scores for each of the 30
node-specific patterns i shown in Fig. 2,
i = N αoriginal,i −D
Z α
σαrand,i
E
N αrand,i
.
(2)
N αrand,i
N αoriginal,i is the number of appearances of pattern i in the triads node α participates in.
E is the expected frequency of pattern i in the triads node α is part of
Accordingly,D
in the ensemble of graphs with the same degree distribution and the same number of both
unidirectional and bidirectional links. σαrand,i is the corresponding standard deviation.
The following section of this manual provides for information on how to download and
run an implementation of NoSPaM. In Section 3, details of the applied algorithms are
discussed.
3
1234567891011121314151617181920212223242526272829302 How to use NoSPaM
2.1 Download and Installation
• Requirements: make sure to have a recent Java version installed (version 1.7 or
higher)
• Download: NoSPaM can be downloaded from www.mwinkler.eu following the
Supplementary Material link.
• Extract the nospam.zip file to whereever you prefer to store NoSPaM.
• Go to the command line terminal and navigate to the nospam directory.
• Generate executable class files by typing: javac *.java
• ∗In case of problems with the compilation process make sure that the PATH vari-
able includes the JDK, e.g. 'C:\Program Files\Java\jdk1.7.0_11\bin'
• Start a test run by typing: java nospam exampleNetwork.txt 2000 1500
2.2 Running NoSPaM
Input data must be stored in the followig format:
<source node 1><tab><target node 1>
<source node 2><tab><target node 2>
...
<source node M><tab><target node M>
Every line represents an edge of the network. The identities of the node must be repre-
sented by integer values. Any additional entries in a line (e.g. an edge weight) will be
ignored by the algorithm. The file type is arbitrary and can be, e.g., .txt, .dat, .csv,
etc...
The general command line syntax is as follows:
java nospam <filePath> <samples> <switching attempts>
• if the network file to be analyzed is already in the nospam directory (e.g. the file
exampleNetwork.txt), the variable <filePath> can simply be set to the value
<fileName>.<fileType>
• the variable <samples> specifies the number of instances from the randomized
ensemble to be used for estimating the average values,D
E, and the standard
N αrand,i
deviations, σαrand,i.
• the variable <switching attempts> specifies the number of microscopic rewiring
steps. It should be chosen proportionally to the number of edges, E, in the graph
and not smaller than E (see Section 3 and References [5] and [9] for details).
4
Figure 3: Example output file. The first column indicates the ids of the nodes. The
following 30 columns correspond to the node-specific patterns shown in Fig. 2 (in the same
order). For every node, there are four lines: the first one indicates the total number of
occurrences in the original network, N αoriginal,i; the second line indicates the mean number
of occurrences in the randomized ensemble,D
deviation in the randomized ensemble, σαrand,i; the fourth line indicates the node-specific
Z scores which can be obtained from the other three measures.
E; the third line indicates the standard
N αrand,i
2.3 Output File
The output of NoSPaM is written in a separate file of the same type as the input file.
Fig. 3 gives an example of such an output file. After the header lines, the evaluated data
D
is stored. For each node (indicated by the ids in the first column), the values of N αoriginal,i,
i are stored in the columns corresponding to the patterns i in
N αrand,i
Fig. 2.
E, σαrand,i, and Z α
) has appeared 16 times in the network under investigation.
For the output file shown in Fig. 3, e.g., from the perspective of the node with id
1, pattern 1 (
In the
randomized ensemble it appeared 15.42 times on average with a standard deviation of
2.15 resulting in a Z score, Z α=1
i=1 of 0.27 indicating a non-significant overrepresentation
) has appeard 5 times in the neighborhood of node
of the pattern. Further, pattern 2 (
1, while in the randomized ensemble it occurred 10.39 times on average with a standard
i=2 = −1.51 indicating an underrepresentation
deviation of 3.58 yielding a Z score of Z α=1
of the pattern.
5
(a)
(b)
Figure 4: Microscopic link-switchings performed to generate the randomized ensembles.
(a) Pair switch and loop switch for unidirectional links. (b) Pair switch for bidirectional
links.
3 Algorithms
3.1 Randomization
The generation of the random null model with the same degree distribution and the
same number of unidirectional and bidirectional links adjacent to each vertex as in the
network under investigation is realized by a link-swapping algorithm. The microscopic
switching rules are illustrated in Fig. 4.
The number of microscopic switching attempts is the only parameter of the random-
ization that needs to be specified in advance. The entire randomization procedure is
displayed in Algorithm 1. The Markov chain generated by successive link swappings
obeys detailed balance and coverges towards a uniform distribution of the networks in
the ensemble serving as the null model, i.e. every valid network is sampled with equal
probability. This fact is elaborated in depth in [9]. The number of switching attempts
should be chosen proportionally to the number of edges in the graph [5].
3.2 Counting of Node-Specific Triad Patterns
For counting the frequencies in which the distinct node-specific triad patterns occur, an
iteration over all connected triads is necessary. The procedure is illustrated in Algo-
rithm 2. Because it is computationally expensive to test all triads in the system (the
complexity is of order O (N 3)), we rather iterate over pairs of adjacent edges in the
graph. Since real-world networks are usually sparse, this is much more efficient [9].
6
Algorithm 1 Degree-preserving randomization of a graph
function Randomize(Graph G (V, E), no. of required steps)
s = 0
while s < number of required rewiring steps do
pick a random link e1 ∈ E
if e1 is unidirectional then
else
pick a 2nd unidirectional link e2 ∈ E at random
pick a 2nd bidirectional link e2 ∈ E at random
if e1 and e2 do not share a node then
rewire according to the pair-switch rules in Fig. 4
if one of the new links already exists then
undo the rewiring
end if
else if e1 and e2 participate in a loop then
rewire according to the loop-switch rule in Fig.4(a)
end if
end if
s++
end while
return randomized instance of G
end function
Algorithm 2 Counting of node-specific triad patterns
function NspPatternCounter(Graph G(V, E))
N : N × 30-dimensional array storing the pattern counts for every node of G
for every edge e ∈ E do
i, j ← IDs of e's nodes with i < j
C ← {} be list of candidate nodes to form triad patterns comprising e
C ← all neighbors of i
C ← all neighbors of j
for all c ∈ C do
if i + j < sum of IDs of all other connected
dyads in triad (ijc) then
increase the counts in N for i, j, and c for
their respective node-specific patterns
end if
end for
end for
return N
end function
7
3.3 Node-Specific Triad Pattern Mining
The evaluation of the node-specific Z scores is performed by Algorithm 3. For a more
detailed discussion of the algorithms including considerations of the compuational effort
see References [9, 11].
Algorithm 3 Node-specific triad pattern mining (NoSPaM)
function NoSPaM(Graph G, # required rewiring steps, # randomized instances)
Noriginal ← NspPatternCounter(G)
Nrand ← {}
Nsq,rand ← {}
for # randomized instances do
G ← Randomize(G, # required rewiring steps)
counts ← NspPatternCounter(G)
Nrand ← Nrand+ counts
Nsq,rand ← Nsq,rand+ counts ∗ counts
end for
Nrand ← Nrand/(#randomized instances)
Nsq,rand ← Nsq,rand/(#randomized instances)
Z ← (Noriginal − Nrand)/σrand
return Z
end function
σrand ←qNsq,rand − (Nrand ∗ Nrand)
8
References
[1] I. Albert and R. Albert. Conserved network motifs allow protein-protein interaction
prediction. Bioinformatics (Oxford, England), 20(18):3346 -- 52, Dec. 2004.
[2] U. Alon. Network motifs: theory and experimental approaches. Nature reviews.
Genetics, 8(6):450 -- 61, June 2007.
[3] M. Berlingerio, F. Bonchi, B. Bringmann, and A. Gionis. Mining graph evolution
rules. In Machine learning and knowledge discovery in databases, pages 115 -- 130.
Springer, 2009.
[4] R. Milo, S. Itzkovitz, N. Kashtan, R. Levitt, S. Shen-Orr, I. Ayzenshtat, M. Shef-
Science,
Superfamilies of evolved and designed networks.
fer, and U. Alon.
303(5663):1538 -- 42, Mar. 2004.
[5] R. Milo, N. Kashtan, S. Itzkovitz, M. Newman, and U. Alon. On the uniform
generation of random graphs with prescribed degree sequences. arXiv preprint
cond-mat/0312028, 2004.
[6] R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Network
motifs: simple building blocks of complex networks. Science, 298(5594):824 -- 7, Oct.
2002.
[7] M. Rahman, M. Bhuiyan, and M. Hasan. Graft: An efficient graphlet counting
method for large graph analysis. 2014.
[8] O. Sporns and R. Kötter. Motifs in Brain Networks. PLoS Biology, 2(11):e369,
2004.
[9] M. Winkler. On the Role of Triadic Substructures in Complex Networks. epubli
GmbH, Berlin, 2015.
[10] M. Winkler and J. Reichardt. Motifs in triadic random graphs based on Steiner
triple systems. Phys. Rev. E, 88(2):022805, Aug. 2013.
[11] M. Winkler and J. Reichardt. Node-specific triad pattern mining for complex-
In IEEE International Conference on Data Mining Workshop
network analysis.
(ICDMW), pages 605 -- 612, Dec 2014.
9
|
1706.00941 | 1 | 1706 | 2017-06-03T12:23:28 | DANI: A Fast Diffusion Aware Network Inference Algorithm | [
"cs.SI"
] | The fast growth of social networks and their privacy requirements in recent years, has lead to increasing difficulty in obtaining complete topology of these networks. However, diffusion information over these networks is available and many algorithms have been proposed to infer the underlying networks by using this information. The previously proposed algorithms only focus on inferring more links and do not pay attention to the important characteristics of the underlying social networks In this paper, we propose a novel algorithm, called DANI, to infer the underlying network structure while preserving its properties by using the diffusion information. Moreover, the running time of the proposed method is considerably lower than the previous methods. We applied the proposed method to both real and synthetic networks. The experimental results showed that DANI has higher accuracy and lower run time compared to well-known network inference methods. | cs.SI | cs |
A
DANI: A Fast Diffusion Aware Network Inference Algorithm
MARYAM RAMEZANI, Sharif University of Technology
HAMID R. RABIEE, Sharif University of Technology
MARYAM TAHANI, Sharif University of Technology
AREZOO RAJABI, Sharif University of Technology
The fast growth of social networks and their privacy requirements in recent years, has lead to increasing
difficulty in obtaining complete topology of these networks. However, diffusion information over these net-
works is available and many algorithms have been proposed to infer the underlying networks by using this
information. The previously proposed algorithms only focus on inferring more links and do not pay atten-
tion to the important characteristics of the underlying social networks In this paper, we propose a novel
algorithm, called DANI, to infer the underlying network structure while preserving its properties by using
the diffusion information. Moreover, the running time of the proposed method is considerably lower than
the previous methods. We applied the proposed method to both real and synthetic networks. The experi-
mental results showed that DANI has higher accuracy and lower run time compared to well-known network
inference methods.
Categories and Subject Descriptors: G.2.2 [Graph Theory]: Graph algorithms; H.3.3 [Information Stor-
age and Retrieval]: Information Filtering, Information Search and Retrieval
General Terms: Algorithms; Experimentation; Performance
Additional Key Words and Phrases: Social Networks, Network Inference, Diffusion Information, Community
Structure, Random Process Model
ACM Reference Format:
Maryam Ramezani, Hamid R. Rabiee, Maryam Tahani and Arezoo Rajabi, 2014. DANI: A Fast Community-
Preserving, Diffusion Aware Network Inference Algorithm. ACM Transaction on Intelligent Systems and
Technology. ACM V, N, Article A (January YYYY), 27 pages.
DOI:http://dx.doi.org/10.1145/0000000.0000000
1. INTRODUCTION
Online Social Networks (OSNs) that play an important role in the exchange of infor-
mation between people, have grown noticeably in the last few years. Diffusion is a
fundamental process over these networks by which information, ideas and new behav-
iors, namely contagion, disseminate over the network [Gomez Rodriguez et al. 2010].
Propagation of a contagion over a network creates a trace that is called cascade (Fig. 1)
[Gomez Rodriguez et al. 2010]. These cascades represent the diffusion behavior that
convey valuable information about the underlying network.
Some previous studies indicate that diffusion behavior and network structure are
tightly related [Easley and Kleinberg 2010; Eftekhar et al. 2013; Barbieri et al. 2013a;
2013b]. In other words, actions of users do not only emanate from their individual
Author's addresses: M. Ramezani (m [email protected]), H. R. Rabiee ([email protected]), M. Tahani
([email protected]) and A. Rajabi ([email protected]), Department of Computer Engineering,
Sharif University of Technology, Tehran, Iran.
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted
without fee provided that copies are not made or distributed for profit or commercial advantage and that
copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights
for components of this work owned by others than ACM must be honored. Abstracting with credit is per-
mitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component
of this work in other works requires prior specific permission and/or a fee. Permissions may be requested
from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212)
869-0481, or [email protected].
c(cid:13) YYYY ACM 0000-0000/YYYY/01-ARTA $15.00
DOI:http://dx.doi.org/10.1145/0000000.0000000
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:2
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
interests but also depend on the interaction pattern between them. Understanding
this relation can result in a more accurate analysis of social networks and the processes
taking place over them (e.g. diffusion).
One of the most important features of OSNs is their modular structure. Each module
in the network is a dense sub-graph called a community. In other words, a community
is a set of nodes which are densely connected to each other, and sparsely to the rest of
nodes. Nodes in a same community have common interests and similar actions [Chen
2011; Fortunato 2010]. For example, strongly connected communities of global web
networks often have pages with common topics [Fortunato 2010].
In many situations, the underlying network topology (nodes and the links between
them) may not be achievable for different reasons: 1)Rapid changes in the structure
of networks over time caused by the arrival and departure of members and alteration
in their friendships, and 2)Limited access to data due to the policy of OSNs and pri-
vacy of user profiles. Network topology inference is a solution to surmount the above
difficulties.
As mentioned before, the diffusion process is influenced by structure of the latent
underlying network which includes its community structure. Thus, observing the dif-
fusion behavior of nodes can help us to gain insight into the networks community
structure. In most cases, the only available observation is the time when a contagion
reaches a node, namely the infection time of a node [Gomez Rodriguez et al. 2010; My-
ers and Leskovec 2010; Eslami et al. 2011; Gomez-Rodriguez et al. 2011; Alpay et al.
2011; Gomez-Rodriguez and Scholkopf 2012]. Network inference includes a class of
studies, which aim to discover the latent network by utilizing these infection times in
different contagions. Several network inference algorithms have been proposed, but
most of them do not preserve the community structure during the inference process.
Despite their acceptable accuracy on detecting network links, the community structure
of the inferred network does not match with the original network.
Many community-based services are provided on OSNs. Since gathering information
about the entire network topology is often impossible, usually inferred networks from
the set of observations are being used. By considering community structures during
network inference, the community-based services such as optimizing search engines
[Zhong et al. 2008], visualizing large social networks [Heer and Boyd 2005], improving
recommendation systems [Sahebi and Cohen 2011], compressing network data [Boldi
and Santini 2010], and viral marketing [Leskovec et al. 2007] can be applied on the
inferred network, and lead to comparable results with the original underlying network.
In this paper, we propose a new Diffusion Aware Network Inference algorithm, called
DANI, which is intended to infer social networks from diffusion information while per-
severing the community structures. We consider the infection time of nodes in different
contagions as observations, and apply community detection algorithms on the inferred
network. Moreover, by comparing the detected communities of the actual network with
the inferred ones, we show that communities are detected successfully.
The main contributions of this paper are:
- Inferring networks while preserving their properties: Since it is not feasible to obtain
the real network structure, different structural based methods such as community
detection algorithms may use the inferred networks as an alternative. The previ-
ous network inferring works do not consider the density of edges and their degree
distributions in the underlying network. Consequently using community detection
methods on them deviates from community detection on the original network. How-
ever, other structural properties such as degree distribution and clustering coefficient
will be different from the ground truth. In this way, the ranking of nodes will be dis-
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:3
tributed based on their influence role. The proposed method overcomes this problem
by preserving the community structure while inferring the networks.
- Inferring networks with more connected nodes: Network nodes in inference problems
are the active nodes participating in at least one observed cascades. Hence, any active
node must have at least one connected link providing the required infrastructure for
cascades to spread through that link. Compared to the previous works, the proposed
method can produce an inferred network with more connected links for each node as
existed in the underlying network. In other words, our method produces less isolated
nodes compared to the previous methods.
- More scalability: The proposed method offers lower run time compared to the state
of the art methods while maintaining high precision. This property leads our work to
have more scalability that is a main limitation of the pervious works.
- Good performance independent of the network structure: Many of the state of the art
previous works such as [Gomez Rodriguez et al. 2010; Gomez-Rodriguez et al. 2011;
Gomez-Rodriguez and Scholkopf 2012] have good performance on the tree-based net-
works [Alpay et al. 2011], while the performance of the proposed method is not lim-
ited to any type of structure.
The rest of this paper is organized as follows. In Section 2, we introduce the prelimi-
naries on the concepts of community and diffusion and explain their interdependencies
in order to ascertain our concerns about preserving community structures during the
inference process. Related works are studied in Section 3. In Section 4, we define nota-
tions, formalize our problem and explain the proposed method. Experimental results
on synthetic and real datasets are presented in Section 5. Finally, we conclude the
paper and discuss future works in Section 6.
2. PRELIMINARIES ON COMMUNITIES AND DIFFUSION
A social network is usually represented by a graph G(V, E). Nodes (V ) and links (E) of
these graphs stand for people and their interactions, respectively. The role that differ-
ent nodes and links play in the network processes such as diffusion, varies and can be
described as [Chen et al. 2007; Xie et al. 2013; Fortunato 2010]:
- Intra-community links that connect nodes in the same community. Such nodes inter-
act frequently; therefore, these links are known as strong ties. Nodes that only have
links to other nodes in their own community are called core nodes. The core nodes
mostly affect their cohorts in a community more than other members of the network.
- Inter-community links that connect nodes of different communities. Due to low inter-
actions between such nodes, they are called weak ties. Nodes, which have at least one
inter-community link, are called boundary nodes. Such nodes play an important role
in information dissemination over different communities.
Analyzing the interactions between community members is an important issue in
social networking [Chen 2011]. In fact, the probability that a person would reject or
accept a contagion depends on the decision of his neighbors about that contagion. At
the same time, this probability affects the future decisions of neighborhood nodes in
the same community [Scripps et al. 2007]. By strong intra-community links, members
in a community are exposed to a contagion during a small interval from several paths.
In contrast, due to weak inter-community links between communities, propagation of
a contagion among them takes place with lower probability and pace.
Another interesting finding is that in many cases the impact of weak ties on a net-
work process (i.e. acceptance rate of a new product) is more powerful than strong ties
[Bakshy et al. 2012; Goldenberg et al. 2001]. We try to explain the above facts through
an example. A network with three communities is illustrated in Fig. 1. Suppose that
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:4
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
Fig. 1.
(Color online) Three communities are separated by rectangles around them. Strong ties (blue solid
undirected lines) form a community, and weak ties (green undirected dash lines) act as bridges between
different communities. Core nodes (green circles: {A, C, D, F, G, H, L}), and boundary nodes (orange circles:
{B, E, I, K, M, N, O}) are shown. The directed path (red directed lines and bold nodes) shows a typical
cascade over the network.
node D gets infected by a contagion. Other nodes in the community of node D will
be exposed to this contagion and become infected with high probability due to similar
interests and actions among them. Thus, the rate and extent of diffusion can be high
within a community. But how does the contagion disseminate over the network? For
this purpose, the contagion must spread out of the community by a boundary node
such as B, and infect another boundary node like K from a neighboring community,
and this only happens if there exists at least one inter-community link such as (B, I)
or (B, K). Therefore, weak ties have a critical role in the diffusion process over the
network. Since interaction on weak ties happens with lower probability, the diffusion
process may stop. In other words, diffusion and community may act against each other.
Communities may prevent a cascade, and in most cases when a cascade stops, a com-
munity can be detected [Easley and Kleinberg 2010; Barbieri et al. 2013a].
Therefore, it is necessary to understand the relation between the community struc-
ture and diffusion behavior of nodes in a network in order to infer the network cor-
rectly.
3. RELATED WORK
As discussed in the previous sections, we would like to infer a network by utilizing dif-
fusion information while taking into account its community structure. Consequently,
the most related research areas to our work are:
- Diffusion aware network inference: The methods that infer networks by observing
- Diffusion aware community detection: The methods that utilize the diffusion process
the diffusion network.
during community detection.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
B D A C G H L M N O F E K I DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:5
In this section, we will survey and explain the state of the art methods in each research
area.
3.1. Diffusion based Network Inference
This category of research tries to infer the edges of a network by using cascade in-
formation, which in most cases is the infection time of nodes in different cascades
[Gomez Rodriguez et al. 2010; Myers and Leskovec 2010; Eslami et al. 2011; Gomez-
Rodriguez et al. 2011; Alpay et al. 2011; Gomez-Rodriguez and Scholkopf 2012]. [Guille
et al. 2013] introduces a comprehensive survey on previous works in this area. In the
following, we describe some of the most important works in this category.
NETINF models each cascade as a tree on the network and uses an iterative al-
gorithm to infer the network from these trees by optimizing a sub-modular function
[Gomez Rodriguez et al. 2010]. Despite its high inference accuracy, it suffers from high
runtime which is a serious problem in real datasets. In addition, the performance of
NETINF decreases when the structure of the network being studied is not consistent
with the tree model [Alpay et al. 2011].
NETRATE is an improvement over NETINF. It assumes that cascades occur at dif-
ferent rates and temporally infers heterogeneous interactions with different transmis-
sion rates, which is closer to reality [Gomez-Rodriguez et al. 2011].
CoNNIE improves NETINF by adding an optimal and robust approach which uses
prior probabilistic knowledge about the relation between infection times [Myers and
Leskovec 2010].
Similar to NETINF, MultiTree models cascades with the trees, but considers all
the possible trees. By this approach, its accuracy is higher than NETINF, NETRATE
and CoNNIE when low number of cascades is available. Although, its running time
is several orders lower than other tree-based algorithms, but still it is not scalable.
[Gomez-Rodriguez and Scholkopf 2012].
DNE models diffusion as a Markov random walk and tries to define a weight for
each link according to the difference between the infection times of connected nodes in
different cascades [Eslami et al. 2011]. Its approach is independent of diffusion models.
FastINF is another method which uses the same approach to define the weight of links
[Alpay et al. 2011]. Both of these algorithms have a low runtime and work well on the
networks that do not have meaningful community structures.
The overall goal in such studies is to obtain the maximal number of edges of the
underlying network. The main drawbacks of this category of studies are as follows.
Algorithms like NETINF and others based on it, which use a spanning tree ap-
proach, maintain the structures, but are too slow. These methods have low performance
on networks with non-tree structures.
Others like DNE and FastINF distinguish no preference between different types
of the extracted edges. Despite their high accuracy, they do not consider the network
community structure. Running community detection algorithms on the output of these
methods leads to different communities from underlying network, because they do not
recover some weak inter-community or strong intra-community links. Therefore, few
large communities or many single members are seen in the networks inferred by them.
Our goal is to infer the network by utilizing cascade information such that the com-
munity structure of underlying network is preserved. In this regard, we desire to
maintain network community structure through the inference process by finding more
intra-community links to recognize relatively dense communities in the network.
3.2. Diffusion based Community Detection
Many community detection algorithms have been proposed in recent years. The main
assumption of these algorithms is the availability of the underlying network topology
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:6
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
(nodes and links between them). However, in many cases, the network topology (i.e.
friends, followers or following of users) is latent which causes the accuracy of tradi-
tional community detection algorithms to reduce.
Different interpretations of diffusion are used in community detection algorithms.
The most prevalent definitions are described in the following. 1) Artificial diffusion:
It is mainly produced by well-known diffusion models [Kempe et al. 2003] such as
Independent Cascade (IC) model [Saito et al. 2008] and Linear Threshold (LT) model
[Chen et al. 2010]. Moreover, some studies have introduced new behaviors for diffusion
[Shen et al. 2010]. 2) Real diffusion: It corresponds to a foreign traceable process on the
network that appears as part of a dataset information. For example, in news cascade
over Twitter (http://twitter.com), if user u tweets a post, his follower node v will see
this action on his page. In general, we say node v is exposed to a contagion, and can
retweet. Another example is voting stories in Digg (http://digg.com) which allows users
to post news that can propagate according to the rating of users.
We categorize community detection algorithms according to their diffusion type as
follows:
Detecting communities by artificial diffusion: These studies create artificial diffusion
over the network and offer a community detection algorithm that uses this diffusion
as part of its procedure. In multi-agent approaches, information such as color, is ex-
changed between nodes via the edges according to different diffusion models. At the
end, nodes with the same colors are detected as a community [Yang et al. 2009a].
Some works use label propagation in order to define communities. Nodes adopt the
maximum label of their neighbors in an iterative process, and at last nodes with iden-
tical labels form communities [RAGHAVAN et al. 2007; Costa 2004; Leung et al. 2009].
In another research, the number of common neighbors between nodes is used to define
the weight of edges as a similarity measure [Chen 2011]. By considering this assump-
tion, another work introduces a new comportment named diffusion, which combines
weighted edges in a hierarchical method to detect communities [Shen et al. 2010].
Detecting communities by real diffusion: The only major work in this category pro-
poses a stochastic generative model named CCN that uses both the complete network
topology and diffusion information to extract communities [Barbieri et al. 2013a]. This
model does not consider any special assumption about link formation, arrival proba-
bility of a contagion at each node, cascades models over the network, and rather tries
to model them with a random process. Despite good features such as overlapping com-
munity detection, this method suffers from high running time complexity. In [Barbieri
et al. 2013b], the authors expand CCN by considering that the underlying network is
not available. This method adopts a mathematical model similar to CCN, and uses an
independent cascade assumption to introduce a model called C-IC, and also uses NE-
TRATE to introduce a model called C-Rate. The output of this method is the network
communities without producing the links of network.
In general, low performance in the absence of network topology and being restricted
to undirected networks are the main drawbacks of previous community detection algo-
rithms. In contrast to prior algorithms, our method assumes the network topology to be
latent, and aims to infer the network utilizing infection time of nodes, which is avail-
able in most realistic cases. In addition, our method performs well for both directed
and undirected networks.
Network inference is the main goal of this article which is more related to works
explained in the 3.1 category. Community detection algorithms that are based on dif-
fusion concepts are not relevant to the proposed method in this paper, because they
assume that the complete network topology is accessible. On the other hand, [Barbieri
et al. 2013b] which is the only community detection work that does not consider the
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:7
aforementioned assumption, utilizes a network inference approach ([Gomez-Rodriguez
et al. 2011]).
4. PROPOSED METHOD
In this section, we first present the notations used in this paper, and then introduce
the proposed algorithm.
4.1. Notations and Definitions
Let G = (V, E) represent a network where V contains the set of nodes, and E contains
the directed or undirected links between nodes. We assume k = E (number of links)
is known, while no more information about the links is available. We assume to have a
set of different contagions as different cascades, C = {c1, c2, . . . , cM}. For each cascade
ci, we observe the infection time of nodes and have pairs of node ID and infection time,
ci = {(v0, t0), (v1, t1), . . . , (vn, tn)}. During the spread of a contagion some nodes may
not get infected. An infinity infection time is assigned to such nodes.
The propagation path of a contagion is hidden. In other words, we do not know by
which node, a node gets exposed to a contagion. It is assumed that a node can get
infected with a certain contagion just by one other node.
In general, infection times form a continuous sample space which makes their in-
terpretation somewhat difficult. In addition, the range of infection time may vary for
each contagion. For example, the order of infection time maybe in seconds for cascade
Ca, but in order of hours for another cascade Cb. Therefore, if we use the real value of
the infection times, we will not infer the links that Cb spreads over the network; since
the time differences in Cb are much larger than Ca, the information obtained from
Cb would be ignored. To overcome this problem, we define a function that maps these
continuous values to a set of discrete values and refer to the corresponding random
variable as infection label. Here, our goal is to discover the links of a static network
structure from the observed cascades. We do not consider the speed of cascades and
expect two different cascades to spread in the same manner for a same path on the
graph. We also ignore the impact of cascades on each others. Therefore, instead of time
of propagation, the sequence of propagation is important and we achieve this repre-
sentation by mapping time values to infection sequence order per each cascade. The
proposed infection time transformation can be described as follows.
(1) For each cascade cm, sort the elements according to their infection time (tu) in
an ascending order. The resulting sorted set is named Sm. Elements with infinity
infection time are omitted from Sm.
(2) For each node u, assign a label equal to its position in Sm, and replace its infection
time with that label.
(cid:26) index(Sm(tu)) if (tu ≺ ∞)
0
else
L(tu) =
(1)
This way, each cascade cm is a vector containing pairs of nodes and infection labels
that are sorted in an ascending order according to their infection labels, as depicted in
Eq. (2). From now on, we call this vector the cascade vector, CVm:
CVm = {(v0, L(t0)), (v1, L(t1)), . . . , (vn, L(tn))}
(2)
For simplicity we may use L(ti) and L(vi), interchangeably.
4.2. Problem Formulation
We assume, the underlying network G = (V, E) is unknown, and the only observation
is the set of cascades (C). If each node of network participates in at least one cascade,
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:8
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
the set of nodes V can be extracted from the observation. By considering all the links
between any pairs of these nodes {(u, v)u, v ∈ V }, we have a complete graph G. Our
goal is to obtain a weighted adjacency matrix A = {αuvu, v ∈ V, u (cid:54)= v} for graph G
such that each element αuv ≥ 0 of A is calculated considering the community structure
preservation property. We utilize the same assumptions and maximum likelihood esti-
mation as in [Gomez Rodriguez et al. 2010; Gomez-Rodriguez et al. 2011; Alpay et al.
2011; Gomez-Rodriguez and Scholkopf 2012]. These assumptions are used in the fol-
lowing to simplify the maximization process. We would like to assign weight for each
edge of complete graph G that maximizes the following likelihood function.
(cid:48)
G
= arg max
G
P (CG)
(3)
(cid:48)
Then, we extract a sub-graph G∗ of G
that has the k most weighted edges as proba-
ble edges of the latent network (k is the number of underlying network links which is
given as input).
For simplicity, we assume the spread probability of cascades to be independent and
identically distributed (i.i.d) over the graph. Therefore, the probability of observing the
cascade set over the networks is:
P (CG) =
P (ciG)
(4)
Graph G is composed of set of edges (u, v), and we assume that all edges are mutually
independent:
P (G) =
P (u, v)
(5)
i=m(cid:89)
i=1
(cid:89)
(u,v)∈G
Therefore, the probability that cascade ci spreads over graph G is given by Eq. (6),
assuming that the joint probability of edges are conditionally independent:
P (ciG) = P (ci{(u, v)}(u,v)∈E) =
P ({(u, v)}(u,v)∈Eci) × P (ci)
(cid:81)
P ({(u, v)}(u,v)∈E)
P ((u, v)ci) × P (ci)
P (u, v)
P (ci(u,v))P (u,v)
× P (ci)
=
(u,v)∈E
(cid:81)
(cid:81)
→ P (ciG) = P (ci)−(E−1) × (cid:89)
(cid:81)
(u,v)∈E
(u,v)∈E
(u,v)∈E
P (ci)
=
P (u, v)
(u,v)∈E
P (ci(u, v))
(6)
Where P (ci) is the prior probability for cascade formation, and we assume it is con-
stant for all cascades. Therefore, we can approximate the probability of cascade ci
propagating over G by Eq. (7):
P (ciG) ∝ (cid:89)
(u,v)∈G
P (ci(u, v))
(7)
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
(u,v)∈G
i=1
P (CG) ∝ i=m(cid:89)
∝ (cid:89)
log(P (CG)) ∝ (cid:88)
(u,v)∈G
(cid:89)
i=m(cid:89)
(cid:88)
i=1
P (ci(u, v))
P (ci(u, v))
(8)
(9)
DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:9
hence, by using Eq. (7), we can rewrite Eq. (4) as:
Applying log function on both sides of Eq. (8), yields:
log(P (ci(u, v))
(u,v)∈G
ci∈C
where P (ci(u, v)) represents the probability that cascade ci spreads through edge
(u, v). We try to define the probability P (ci(u, v)) in terms of observed information
from the hidden network structure. We interpret log(P (ci(u, v))) as the weight of edge
(u, v), and call it αci. We try to estimate this weight for each presumable link in the net-
work. In the rest of paper, we introduce the DANI algorithm in which αci is computed
according to the relations between community structure and diffusion information.
4.3. The DANI Algorithm
As mentioned before, our goal is to define a weight P (u, v) for each edge (u, v) that rep-
resents its existence probability in the underlying network. For this purpose, DANI
first utilizes diffusion information and estimates the weight of all potential edges. At
the second step, DANI considers the relation between community structures and dif-
fusion behavior and assigns another weight according to the joint behavior of nodes.
Finally, both of these weights are taken into account simultaneously, and the existence
probability of each edge is computed. In summary, we follow three steps: using infor-
mation diffusion network, maintaining the community structure, and the combination
of these steps.
Diffusion Information: From each cascade vector CVm we can construct a probable
directed graph. Each node u in this graph can get infected by a node v, if L(v) ≺
L(u). The probability of existence of edge (u, v) in this graph depends on the difference
between the infection label of u and v, such that more difference between the infection
labels of these nodes in CVm, decreases the participation probability of link (u, v) in
the contagion [Gomez Rodriguez et al. 2010]:
P (u, v) ∝
1
∆(L(u), L(v))
(10)
Fig. 2(a) illustrates a typical network and two of its distinct contagions. Their cas-
cade vectors and corresponding probable graphs (simply referred to as graph) are
shown in Fig. 2(b) and Fig. 2(c), respectively.
Each cascade vector CVm can be modeled as a discrete time stochastic process where
nodes stand for independent states and the sequence of nodes in the cascade vector
CVm represent the state of the process at discrete times. The transition probability
between different states (nodes), or in other words, the contagion transmission proba-
bility from a node to another node is equivalent to the weighted link between them.
At the present time the contagion transmission probability of each node (state) de-
pends on probability of being at its neighboring node in the immediate preceding pe-
riod, and is independent of its pervious time states or the traversed nodes. This prop-
erty is called the Markov Property. Hence, it can be thought that the states of former
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:10
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
Fig. 2.
(Color online) (a) A network topology. (b) Cascades over network: a bipartite graph with network
members in one side and contagions on the other. Infection of each user with a contagion is represented by
an edge from it to that contagion, where the infection time is the edge label. The cascade vector calculated
by the proposed method is also considered. (c) Markov chain and matrix for each cascade: probable directed
graph with the DANI algorithm. Edge probabilities are marked with thick and thin lines. The Markov
transition matrix per cascade is obtained from these graphs as shown here.
times are all accounted by incorporating the state of the last immediate time t. Assum-
ing the First Order Markov Property to hold, we have:
P r[Xt+1 = xt+1Xt = xt, Xt−1 = xt−1, . . . , X0 = x0]
= P r[Xt+1 = xt+1Xt = xt]
(11)
This stochastic process that exhibits the Markov property is called a Markov Chain
(MC). The number of states in our Markov chain is equal to the number of nodes, and
each cascade vector CVm is a finite Markov chain [Levin et al. 2009].
In order to define the Markov chain, we must compute its transition matrix. Each
element of this matrix represents the existence probability of an edge in the network.
As shown in Fig. 2(c), our goal is to find the transition matrix for each chain by utilizing
the corresponding cascade information.
At this point, we need to find the relation between the difference of the infection
labels of two nodes, and the probability that an edge exists between them. As discussed
before, this probability has an inverse relation with the difference of their infection
labels. Two approximations are used in the previous works:
(1) The probability of an edge only depends on the difference of the infection label of
nodes connected by it. In other words, for all pairs of nodes with the same values of
infection label difference, the existence probability is the same [Gomez Rodriguez
et al. 2010].
(2) Consider a cascade vector such that there exists a set of nodes (D), before v in this
vector. The probability that u infected v when D = {u}, is higher than the situation
where D (cid:31) 2, because a node z ∈ D with tz ≺ tv may have infected v. This
will reduce the probability that v has been infected by u. Moreover, the authors in
[Eslami et al. 2011] proved that in addition to the difference of infection times, the
number of infected nodes before node v, namely D, also affects the edge weights.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
(a) (b) (c) 20000000000000000000000000000bcbdcdebecedfbfcfdfegbgcgdgegfghhbhchdhehfrrrrrrPrrrrrrrrrrrrrrr1000000000000000abadaeafbdbebfdedfefrrrrrrrPrrrDANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:11
Considering the above points, the existence probability of an edge between nodes u
and v in the cascade vector (L(v) (cid:31) L(u)), using the infection label is:
du,v =
1
L(v) × (L(v) − L(u))
(12)
We use du,v to construct the transition matrix. The transition matrix P , is a stochas-
tic random matrix with the following features:
(1) Each element in P satisfies the following condition:
i, j = 1, 2, ..., n
0 ≤ Pij
(2) The sum of each row is equal to one:
∀i :
j=n(cid:88)
Pij = 1
To satisfy these conditions, the two-dimensional probability matrix should be nor-
malized. Dividing each element of this matrix by the sum of its corresponding row, the
Markov chain transition matrix (Pci), for cascade (ci) is obtained:
j=1
Pci (u, v) =
du =
(cid:88)
y∈V
du,v
du
du,y
(15)
Community Structure Information: As previously mentioned, community mem-
bers have similar interests and behaviors, and diffusion is more likely to spread among
them [Easley and Kleinberg 2010; Eftekhar et al. 2013; Barbieri et al. 2013a; 2013b].
Intuitively, they appear in same cascades more than nodes which are in different com-
munities. Thus the number of cascades passed between node u and v can be a sign
of coherence between these nodes. If u and v are community members, they become
infected jointly in more cascades compared to the cascades that only one of them has
been infected. We use the participations of pairs of nodes in different cascade as a mark
for finding the similarity in their behaviours.
On the other hand, consider two boundary nodes that connect adjacent communities.
These nodes may appear in same cascades due to the bridge role of weak ties in the
diffusion process. However, the frequency of such cases is negligible compared to the
number of cascades that every single one of them has participated in.
According to the above justifications, and the goal of inferring the links for each pair
of node (u, v), we define a function ψ (u, v) that assigns a weight to edge (u, v) by consid-
ering the nodes behaviourals based on the cascades information. In other words, this
weight is a node-node similarity based on the community structure that had impacted
the diffusion information. The formula for ψ (u, v) is similar to the Jaccard index [Jac-
card 1901]:
(13)
(14)
(16)
(17)
where In(u) is the set of cascades that u has participated in:
ψ (u, v) =
In(u)(cid:84) In(v)
In(u)(cid:83) In(v)
M(cid:83)
{i} if (u ∈ CVi)
∅
else
i=1
In(u) =
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:12
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
Fig. 3. The color map between any pair of nodes. (a) Community structure: If two nodes are in a commu-
nity, the pixel is black, otherwise it is white. Each block represents a specific community. (b) Similarity:
We measured similarity between any pair of nodes by Eq. (16). Dark pixels indicate more similarity. The
pixel of similarity matrix is darker wherever the community matrix is black, leading to the conclusion that
communities can be specified by using the node-node diffusion based similarity.
For computing the numerator of Eq. (16), u should appear earlier than v when both
participate in each CVi. The above node-node similarity can be used to detect the com-
munities. The main idea of many structured-based community detection algorithms is
grouping nodes based on the fact that when the similarity of two nodes is large, they
have more chance to be in a community [Du et al. 2007; Weng et al. 2013]. We also
provided a data driven study to show the relation between Eq. (16) and the aforemen-
tioned concept of community. To this end, we utilized an LFR network with 1000 nodes,
7692 links, 28 communities and 20000 cascades (which is described and analyzed in
Section 5). We changed the name of nodes such that nodes of a community are consec-
utively listed. For each pair of nodes, the color map community matrix and similarity
matrix in Fig. 3 show that nodes with more similarity are in the same community.
Since overlapping nodes are highly influential nodes [Bhat and Abulaish 2013], this
formula also works for overlapping communities. Because by using this equation, the
overlap nodes will take part in more common cascades and consequently gain large
values.
Total Information: The probability of direct contagion propagation between two
nodes would increase, if the difference of their infection times decreases. In other
words, the existence probability of edge (u, v) has a direct relationship with Pci(u, v).
From other perspective, larger values of ψ(u, v) correspond to more probability that
u and v are cohorts, and hence indicating edge (u, v) to be an intra-community link.
Therefore, direct impact of ψ(u, v) on the existence probability of edge (u, v) will lead
to infer the intra-community links that are the important links in the community de-
tection step. We define the probability weight of an edge at each cascade ci as:
(18)
where Pci (u, v), is the element (u, v) in the Markov transition matrix of the cascade ci.
αci(u, v) = Pci(u, v) × ψ(u, v)
To mathematically justify the above equation (Eq. (18)), let us consider the following
definition. According to [Malmgren et al. 2008], independent cascades over the network
are Poisson point processes that follow the exponential distribution [Gomez Rodriguez
et al. 2010]:
P (ci(u, v)) ∝ e
−(tv−tu )
θu,v
(19)
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
NodesNodes 0200400600800010020030040050060070080090000.10.20.30.40.50.60.70.80.91NodesNodes 0200400600800010020030040050060070080090000.050.10.150.20.250.30.350.40.450.5DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:13
Then, the probability of cascade ci spreading over an edge (u, v) has an inverse rela-
tion with the difference between infection times (infection labels) of node u and node v,
and the parameter θu,v. According to discussion in the "Diffusion Information" section
the authors in [Eslami et al. 2011] proved that a cascade spread over edge (u, v) does
not only rely on the infection label difference of nodes u and v, but also the set of nodes
(D) that has been infected before activation of node v. Therefore, P (ci(u, v)) is given
by:
(L(tv)(L(tv) − L(tu)))−1 × θu,v
)
(20)
By substituting Eq. (20) in Eq. (9) we obtain:
P (ci(u, v)) ∝ exp(
log (P (CG)) ∝ (cid:88)
(cid:88)
(u,v)∈G
ci∈C
−1
−1
log(exp(
(L(tv)(L(tv) − L(tu)))−1 × θu,v
))
(21)
Considering the logarithm of maximum likelihood function arg max(P (CG)) for
Eq. (21) we obtain:
G∗ ∝ arg max(
∝ arg min(
∝ arg max(
(u,v)∈G
(cid:88)
(cid:88)
(cid:88)
ci∈C
(cid:88)
(cid:88)
(cid:88)
(u,v)∈G
ci∈C
(u,v)∈G
ci∈C
−1
[L(tv)(L(tv) − L(tu))]−1 × θu,v
))
(
1
(
[L(tv)(L(tv) − L(tu))]−1 × θu,v
([L(tv)(L(tv) − L(tu))]−1 × θu,v))
))
(22)
In Eq. (22), the first term is identical to relation we extracted from diffusion infor-
mation, and the second term corresponds to the information about link that can map
to the relation extracted from community structure information:
G∗ ∝ arg max(
([L(tv)(L(tv) − L(tu))]−1
)
(23)
(cid:123)(cid:122)
Pci(u,v)
(cid:125)
× θu,v)
(cid:124)(cid:123)(cid:122)(cid:125)
ψ(u,v)
Then, according to our model the Maximum Likelihood Estimator (MLE) is given by:
G∗ ∝ arg max(
Pci (u, v)] × ψ (u, v))
(cid:88)
(u,v)∈G
(cid:124)
(cid:88)
(cid:88)
ci∈C
[
(u,v)∈G
∝ arg max(
(cid:88)
(cid:88)
ci∈C
(u,v)∈G
PC (u, v) × ψ (u, v))
(24)
where PC is the sum of the transition matrix of all cascades, preserving the Markov
matrix properties, and it stands for the total transition matrix of the Markov chain.
The DANI pseudo-code is presented in Algorithm 1, where Ptemp is used to keep the
sum of all transition matrices of cascade vectors. Then, Ptemp is normalized to obtain
the stochastic transition matrix PC, based on the diffusion information. In the next
step, by considering the community structures, ψ(u, v) is calculated and used along
with PC to produce the inferred network adjacency matrix, A. The normalization in the
process of computing PC keeps its stochastic transition property and its value within
the limits of ψ(u, v) values, and hence their multiplication stays in a fix range for all
the possible edges. Finally, we choose k edges of the inferred network with maximum
weight to construct G∗.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:14
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
ALGORITHM 1: DANI Pseudo-Code
Input: Set of cascades over network (C = {c1, c2, . . . cM}), Number of network links to be
Output: Inferred network (G∗)
for each cm = {(vi, ti)} ∈ C do
inferred (K)
Sm ← sort cm by ti;
L (ti) = index (Sm (ti));
CVm = {(vi, L (ti))};
for each u ∈ CVm, v ∈ CVm do
if (L(tu) < L(tv)) then
end
end
for each (u, v) ∈ Pci do
Pci (u, v) ← du.v(cid:80)
;
y∈V
du.y
Compute du,v according to Eq. (12);
Ptemp (u, v) ← Ptemp (u, v) + Pci (u, v);
end
end
for each (u, v) ∈ Ptemp do
(cid:80)
Ptemp(u, v) ← Ptemp(u,v)
Pc(u, v) ← Pc(u, v) + Ptemp(u, v);
Ptemp(u,y)
y∈V
;
end
for each (u, v) ∈ PC do
Compute ψ(u, v) according to Eq. (16);
A(u, v) = Pc(u, v) × ψ(u, v);
end
Gt ← sort A values;
for i = 1 to K do
G∗ ← G∗(cid:83){gi ∈ Gt} ;
end
Return G∗;
(cid:18) ncm
(cid:19)
2
Time complexity analysis: Consider a cascade cm with ncm infected nodes. Accord-
ing to Algorithm 1, any sorting has the time complexity of O(ncmlog(ncm )). There are
pair of nodes (u, v) for calculating du,v and other normalizations with the time
complexity of O(ncm
2). Therefore, if we have M different cascades with average num-
ber of nodes nc as the input, the DANI algorithm has a complexity of O(M × nc
2). It
is worth to mention that the baselines works for the competing methods in our experi-
mental analysis did not provide time complexity analysis for their algorithms, because
their methods are heavily dependent to the network structure. Instead they just re-
lied on experimental results for running times, which we also compare in the next
section. MultiTree and Netinf use greedy hill climbing to maximize the corresponding
sub-modular function through an iterative approach where an edge is inferred at each
step if by adding the edge a marginal improvement is achieved. After finding K edges,
their algorithms are terminated. In contrast, DANI is free of any iteration and thus
outperforms MultiTree and Netinf in running time.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:15
5. EXPERIMENTAL EVALUATION
In this section, first we introduce the evaluation criteria for two concepts of network in-
ference and community structures detection. In order to evaluate the proposed method,
we apply DANI to synthetic and real datasets and compare our results with other
static works under the same conditions. Since the main goal of this paper is network
inference while preserving the community structure, the community detection meth-
ods should work better when used with the proposed method. Therefore, we have se-
lected the state of the art inferring works for our comparison study instead of using
different community detection methods which is not necessary and feasible in the con-
text of this paper. The three selected methods for comparison include NETINF (as the
first proposed method in this area), DNE (as the fastest method), and MultiTree (as
the newest approach with superior performance over the previous tree-based methods
based on accuracy and running time).
5.1. Evaluation metrics
As mentioned before, previous methods focus on inferring network links with high
accuracy and overlook network properties such as community structure. Moreover,
most of these methods suffer from high running time. Considering the best practices,
we utilize two types of analysis as follows.
5.1.1. Network inference:. The main goal of this area is to obtain the highest similarity
between inferred and underlying networks. The most common and important issues in
this regard are the number of discovered links, and inference process duration. To this
end, the main criteria are as follows:
F-measure:. Precision and recall are two frequently used metrics, and are defined
as:
(cid:84) EG∗
(cid:84) EG∗
EG∗
EG
EG
EG
P recision =
Recall =
(25)
(26)
where EG and EG∗ represent the set of links in the original and inferred network,
and EG is the cardinality of EG. There is an inverse relation between recall and
precision. To consider both, their geometric mean, named F-measure (or F-score) is
used [Makhoul et al. 1999].
F − measure =
2 × P recision × Recall
P recision + Recall
Running time:. Most of the previous methods require more time to gain high accu-
racy. Therefore, running time is an important parameter to be considered in evaluation
of these methods.
Number of nodes:. The previous works only focus on the number of correct inferred
links. Despite their high accuracy, no connected links maybe detected for some nodes.
Hence, these nodes are omitted in the inferred network and consequently would not
be assigned to any community. As a result, only a fraction of original nodes, that are
presented in the inferred network, is used in evaluations.
Other network properties:. Preserving the clustering coefficient and degree distribu-
tion of nodes is another important concern. For each node, we calculate the relative
error between the exact value of each measure in the ground truth and inferred net-
work.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:16
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
5.1.2. Preserving community structure:. As mentioned before, our goal is to propose a
method to infer networks by preserving community structure of underlying network.
In order to compare the methods in this regard, we extract communities of underlying
and inferred networks by a well-known community detection algorithm and compare
the communities of these two networks in two ways:
- Comparing members of communities (NMI, PWF). These metrics evaluate the sim-
ilarity of each pairs of communities in real and inferred networks.
- Comparing properties of communities (density, conductance and number of commu-
nities). The average of these criteria over all communities of a network is utilized
to evaluate the differences of community structure for real and inferred networks.
Hence, for each criterion Y , we compute (cid:52)(Avg(Yr), Avg(Yi)), in which Avg(Yr) and
Avg(Yi) are average of criterion Y for all communities in real and inferred networks,
respectively.
Normalized Mutual Information (NMI):. NMI is a probabilistic information theo-
retic metric that compares the similarity of two sets of communities [Manning et al.
2008], and is defined as:
(cid:80)CB
−2(cid:80)CA
(cid:1) +(cid:80)CB
i=1 Ni.log(cid:0) Ni.
(cid:80)CA
j=1 Nijlog
i=1
N
(cid:16) Nij N
Ni.N.j
(cid:17)
(cid:16) N.j
N
j=1 N.jlog
(cid:17)
(27)
N M I(A, B) =
where N is a CA × CB matrix, and CA and CB are number of communities for original
and inferred networks, respectively. Each element of N corresponds to the number of
common memberships for each pair for communities. Ni. (N.j) is the row i (column
j) summation, and N is the total number of nodes or the sum of all matrix elements
[Duch and Arenas 2005]. The range of NMI values is between 0 and 1. Actually, NMI
for the same communities reaches 1, and 0 represents the overall difference. However,
for the overlapping communities this metric has been modified [McDaid et al. 2011;
Lancichinetti et al. 2009].
Pairwise F-measure (PWF):. Let HG and HG∗ represent the sets of node pairs in the
same community in the underlying network and the inferred network, respectively.
PWF measures how many pairs of nodes in a community at original network are cohort
in the communities of the inferred network [Yang et al. 2009b; Qi et al. 2012].
HG ∩ HG∗
P recision =
HG ∩ HG∗
HG
, Recall =
HG∗
2 × P recision × Recall
P recision + Recall
P W F =
(28)
(29)
We considered PWF, because it is not enough to rely solely on NMI [Xie et al. 2013].
Moreover, recent studies have discovered modularity [Newman 2006a] is not a reli-
able measurement [Duch and Arenas 2005]. In addition, because of sparsity in real
networks, the obtained modularity values are often incorrect.
Density:. Density indicates the ratio of actual intra-community links to all possible
links in a community [Vasudevan and Deo 2010]:
ES
(cid:16)VS(VS−1)
(cid:17)
δ(S) =
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
2
DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:17
Table I. LFR-benchmark characteristics. (N: #nodes, k:
Avg degree, maxK: max degree, t1: minus exponent for
the degree sequence, t2: minus exponent for the com-
munity size distribution, minC: Min community sizes,
maxC: Max community sizes).
N
1000
k maxK t1
15
2
50
t2 minC maxC
1
20
50
where Vs and Es represent the set of nodes and links for the community S, respectively.
Conductance:. This criterion presents the ratio between number of inter-community
links (cS), and intra-community links (mS) as follows: [Leskovec et al. 2008b].
∅ =
cS
(2mS + cS)
(30)
Density and conductance are complementary measures and are often considered to-
gether. For instance, the density of a k-clique subgraph with many links to the rest of
graph is high, while its conductance low. Therefore, these two criteria are often used
together to evaluate the candid methods. In this paper, we desire to have more simi-
larities in density and conductance among original and inferred networks.
Number of communities:. A measure called "Accuracy in the number of communi-
ties" was introduced in [Yang and Leskovec 2012] to determine whether the inferred
network has the same number of communities as the original network:
COG − COG∗
(31)
where COG and COG∗ are the cardinality of the set of communities for original and
inferred networks, respectively. The lower values of this metric indicate more similar-
ity.
COG
N C =
5.2. Network data
5.2.1. Synthetic datasets. We utilize two types of synthetic networks:
LFR-benchmark:. As mentioned before, one of the most important features of real
social networks is their community structure. To study the impact of this property on
the performance of algorithms, we used the LFR-benchmark [Lancichinetti and For-
tunato 2009; Lancichinetti et al. 2008] which provides real networking charactristics,
and its properties can be controlled to provide networks with build-in communities.
The generated networks have 1000 nodes with the characteristics shown in Table I.
An important attribute of these networks is a mixing parameter called µ, which rep-
resents the network community structure. For each node, µ is a numeric value which
is equal to the ratio of inter-community to entire links of that node. The value of µ
can change between 0 and 1, and its alterations would change the community struc-
ture of the network. Larger values of µ corresponds to less community structure in
the network, while decreasing this parameter would improve the community struc-
ture of the network. According to the experimental results, values over 0.5 for µ are
not suitable for highlighting the community structures. Therefore, we evaluated the
competing methods against various types of LFR-benchmark by using different values
of µ in the range of [0.1, 0.2, 0.3, 0.4, 0.5].
Real structures:. We used the real co-authorship network of scientists dataset that
inherently contains many community structures.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:18
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
Table II. Real networks and diffusion information over them. The specifications are for different months. Each network had
been changed during the months in a year [Gomez-Rodriguez et al. 2013].
For each of these networks, we generated various artificial cascades by using the
SNAP library [Leskovec 2014] with different models, and utilized the average behav-
iors against different cascade models in our analysis to show independence of the pro-
posed method from cascade models.
5.2.2. Real datasets. In this paper, we refer to a dataset as real, when its topology and
corresponding diffusion are accessible. We utilized two real networks over different
months for LinkedIn and News of the World sites; with community structures, nodes
and links that change overtime. All the specifications are listed in Table II.
These datasets have been gathered by using the MemeTracker from March 2011 to
February 2012 [Leskovec et al. 2008a]. We split all the months into eleven intervals
and discuss the performance of algorithms in these intervals. The network visualiza-
tions available at [Gomez-Rodriguez et al. 2013; Leskovec 2013] maybe used to demon-
strate the changes in structures and illustrate the communities for different months.
5.3. Results
We analyzed the results of three types of qualified networks based on the evaluation
metrics described above. The interpretation of the results are provided in the following
subsections.
5.3.1. Network inference:.
F-measure:. As Fig. 4 illustrates, the proposed algorithm (DANI) has a better per-
formance in inferring underlying networks compared to the competing methods. As
shown, DANI has a higher F-measure for LFR-benchmark networks with different
community structures (different values of µ). In this figure, X-axis represents the num-
ber of cascades in the network. For various community structures (mixing parameters)
and number of cascades, DANI outperformed DNE and MultiTree.
When µ changes from 0.1 to 0.3, DANI achieves higher F-measures in lower running
time than NETINF. As the community structure fades away (µ (cid:31) 0.3), F-measure for
DANI is four times better than DNE, and two times better than MultiTree. When
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
a)LinkedInMonth1234567891011#Node203306509552536490586560541464497#Edge426831204328582248207133953011277015501760#Cascade671409694917946223987663915622906776987336937964930129737172940378AvgCascadeLength1.682.112.372.412.442.502.582.432.452.472.26#Community1013161423252430263023AvgCommunitysize16.7020.2330.0637.5722.3919.8424.7518.620.4214.120.17AvgDensity0.50740.503110.40790.44280.44610.53860.42500.48100.42040.5430.5055AvgConductance0.01140.04490.14620.15190.16110.17440.21910.22020.16580.14140.0889b)NewsoftheWorldMonth1234567891011#Node16131839241011881033843675517559594#Edge55915811786150214637739364537499804074807688#Cascade4902076104657042687428631382683133189412578541025146908798836215952824AvgCascadeLength1.872.402.512.362.402.432.422.552.622.602.58#Community918211943393032262528AvgCommunitysize15.8917.5018.7619.6329.1427.2622.0320.5823.8421.8215.89AvgDensity0.49160.50670.49630.52540.46920.44880.39340.57080.55400.52470.5859AvgConductance0.05870.12720.09380.08110.25370.20340.20170.17460.20450.13050.1789DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:19
Fig. 4.
network. Each part is for a special mixing parameter (µ). Figures show averages over 10 runs.
(Color online) F-measure and running time against different number of cascades in LFR-benchmark
the number of cascades over the network becomes more than the number of links
((cid:31) 7692), F-measure for NETINF is 0.1 more than the F-measure for DANI, while the
time complexity of NETINF was much more than DANI. For the same case, MultiTree
achieved the same F-measure as NETINF, while its running time was better than
NETINF, but higher than DANI.
For the NetScience dataset (Fig. 5), F-measure of DANI was consistently more than
DNE. For small number of cascades, DANI had higher F-measure than NETINF and
MultiTree. Therefore, when the number of cascades are higher than the number of
the links ((cid:31) 2742), NETINF and MultiTree infer the links accurately, but they require
considerably higher running time compared to DNE and DANI.
For the real datasets, we display the results for 11 different months (Figs. 6 and 7).
It can be seen that DANI with higher F-measure retrieves more network links.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.1NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.2NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.3NETINFDNEMultiTreeDANI02004006008001000120002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.1NETINFMultiTreeDNEDANI020040060080010001200140016001800200002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.2NETINFMultiTreeDNEDANI05001000150020002500300002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.3NETINFMultiTreeDNEDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.4NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.9102000400060008000100001200014000160001800020000F-measure# Cascadesμ=0.5NETINFDNEMultiTreeDANI050010001500200025003000350002000400060008000100001200014000160001800020000Time (sec)# Cascadesμ=0.4NETINFMultiTreeDNEDANI050010001500200025003000350002000400060008000100001200014000160001800020000Time (sec)#Cascadesμ=0.5NETINFMultiTreeDNEDANIA:20
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
Fig. 5.
(Color online) Test of the algorithms on a real network with the NetScience [Newman 2006b] artifi-
cial cascade; 1590 nodes, 2742 edges, and 191 communities. The communities are detected by the OSLOM al-
gorithm [Lancichinetti et al. 2011]. Results are shown for the inferring scope: a) F-measure, and b) Running
Time, and the community detection scope: c) Pairwise F-measure, and d) Normalized Mutual Information.
Figures show averages over 10 runs.
Fig. 6.
(Color online) Tests of the algorithms on LinkedIn dataset in 11 consecutive interval months.
Investigations show that most of the cascades over real networks are short, and the
number of long diffusion processes are small [Leskovec et al. 2006]. A major contagion
over networks usually does not have one seed user, and broadcasts in several different
locations on the network. Each cascade motion from different users is being seen as
a separated cascade. Furthermore, the wide spread of a contagion may situate on a
network, but inevitably does not occur during a long cascade.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
00.10.20.30.40.50.60.70.80.910500100015002000250030003500400045005000F-measure# CascadesNETINFDNEMultiTreeDANI(a)0123456780500100015002000250030003500400045005000Time (sec)# CascadesNETINFMultiTreeDNEDANI(b)00.10.20.30.40.50.60.70.80.910500100015002000250030003500400045005000Pairwise F-measure (PWF)# CascadesNETINFMultiTreeDNEDANI(c)00.10.20.30.40.50.60.70.80.910500100015002000250030003500400F-measure# Cascades00.10.20.30.40.50.60.70.80.91501003005001000150020002500300040005000Normalized Mutual Information (NMI) # CascadesDNEMultiTreeNETINFDANI(d)00.050.10.150.20.250.30.350.40.450.51234567891011F-measureMonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.451234567891011Normalized Mutual Information (NMI) MonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.451234567891011pairwised F-measure (PWF)MonthsMultiTreeDNENETINFDANI010020030040050060070080090010002.86E+081.29E+092.29E+093.29E+09Time (sec) #Edges*#Cascades NETINFMultiTreeDANIDNEDANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:21
Fig. 7.
months.
(Color online) Tests of the algorithms on News of the World dataset in 11 consecutive interval
By checking the number and the length of cascades in these datasets, we concluded
that the lengths of cascades are short in every month (Table II). Based on our experi-
ments on a real network with artificial set of cascades (Fig. 8), NETINF and MultiTree
accuracy are low in short cascade lengths, and their dependency on the length of cas-
cades is greater than DANI. However, MultiTree serves better than NETINF in short
cascades, and therefore performs better in real networks.
On average, in LinkedIn network, DANI has 35.1% improvement in F-measure ver-
sus NETINF, 34.3% versus MultiTree, and 10.0% versus DNE. Moreover, in News of
the World network, this improvement is 77.91% against NETINF, 74.40% against Mul-
tiTree, and 42.26% against DNE.
Number of nodes:. Table III displays the behavior of these algorithms for the num-
ber of detected nodes of the inferred networks. DNE can just retrieve a few set of nodes,
and most of the links of the networks are not inferred. Although, NETINF and Multi-
Tree are better than DNE in this regard, but their loss error is more than 20%. DANI
infers the nodes with an accuracy close to 90%. In other words, DANI infers maximum
number of nodes compare to the other methods. The results show that DANI is more
capable in detecting nodes in the inference process, which has not been considered in
prior works.
Other network properties:. The relative error of network properties between the
inferred and underlying network is illustrated in Table III. In most cases, DANI has
much less error than baseline methods in term of nodes degree. In addition, the clus-
tering coefficient metric is better maintained by DANI.
Running time:. In order to have a fair comparison, we used the available C++ im-
plementations in SNAP library [Leskovec 2014] for all prior algorithms, and imple-
mented DANI in the same framework. We compared runtimes in the LFR-benchmark
(Fig. 4) that showed DANI was several order of magnitude faster. In the NetScience
dataset for different number of cascades, the run time is shown in Fig. 5. For running
time in real data sets, similar to the approach used in [Alpay et al. 2011], we measured
time versus number of cascades and links as shown in Figs. 6 and 7. On average,
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
00.10.20.30.40.50.61234567891011F-measureMonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.450.51234567891011Normalized Mutual Information (NMI) MonthsMultiTreeDNENETINFDANI00.050.10.150.20.250.30.350.40.450.51234567891011pairwised F-measure (PWF)MonthsMultiTreeDNENETINFDANI010002000300040005000600070002.86E+081.29E+092.29E+093.29E+09Time (sec) #Edges*#Cascades NETINFMultiTreeDANIDNEA:22
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
(Color online) The F-measure across different cascade lengths (in 350 cascades) for
the Football dataset [Girvan and Newman 2002], with 115 nodes and 615 links.
Fig. 8.
DANI is 85.35% faster than NETINF, and 84.11% faster than Multitree. In general, the
running time of algorithms is ordered as tN ET IN F (cid:31) tM ultiT ree (cid:31) tDAN I (cid:31) tDN E.
In all cases, our method has lower run time than tree-based algorithms, and its speed
is close to DNE. The running time performance must be analyzed against inference
accuracy and preserving community structures.
As illustrated, DANI achieves acceptable results with low running times, while other
algorithms require higher running times to infer the networks with high accuracy.
Evaluating the scalability:. As we already mentioned the time complexity of
DANI depends on the number of users involved in cascades (nodes of network) which
could be extremely large. Here, we demonstrate the scalability of DANI against the
competing methods by showing the results on a real large scale network. In addition,
parallel methods such as MapReduce can be used for making DANI even more scal-
able, but to observe fairness, we did not utilized any of them here. We studied a large
Twitter network that sampled public tweets from the Twitter streaming API in the
range of 24 March to 25 April at 2012 [Weng et al. 2013]. By utilizing the follower
network and hashtag retweeting, we did some preprocessing by: 1) Considering any
unique pair of hashtag and source ID as a separate cascade, 2) Keeping links that
were being involved in at least one cascade, 3) Choosing users taking part in more
than 2 cascades, and 4) Removing nodes of cascade that were not a member of network
nodes. The result was a network of 124023 nodes, 182783 links, and 213875 cascades
with an average length of 2.29. While DANI correctly inferred 79.64% of the links in
terms of F-measure during 1 hour and 4 minutes, the other three competing methods
did not yield any reasonable results during this time period.
5.3.2. Preserving community structure:. One of the important properties of social net-
works is their community structure and our goal in this paper is to preserve this prop-
erty during the network inference process. To achieve this goal, the inferred network
must have the same community structure as the underlying network. Therefore, the
properties such as density, conductance, community size and number of communities
are some important characteristics, which we considered in our evaluations.
To detect communities in real and inferred networks, we reviewed different com-
munity detection algorithms to find an algorithm which can work with a variety of
networks such as directed and undirected, support overlapping communities, detect
communities with high accuracy, not require prior knowledge about the number of
output communities, and require low memory and time for a sparse graph. Finally,
the OSLOM algorithm was chosen which meets the above requirements. OSLOM is
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
0.30.40.50.60.70.80.9101234567891011F-measure Cascades Length NETINFDNEMultiTreeDANIDANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:23
Fig. 9.
numbers of cascades in the LFR-benchmark. Figures show averages over 10 runs.
(Color online) Normalized mutual information versus different community structures for various
the first algorithm that uses statistical features to identify the communities. To as-
sess the accuracy, OSLOM uses local modularity measurement to avoid global errors
[Lancichinetti et al. 2011].
NMI:. Fig. 9 illustrates the values of NMI on each inferred LFR-benchmark network
with varying values for µ, and different number of cascades. As it can be observed,
specially for fewer number of cascades, DANI performs perfectly. For higher number
of cascades, the NMI values for DANI is closer to NMI of NETINF and MultiTree,
while DNE has lower NMI values in all cases. Figs. 6 and 7 show the NMI values of
all algorithms for real datasets. As illustrated in Fig. 5, for Netscience with artificial
cascades, the running time of DANI is much lower, while its NMI is equal or more than
NETINF.
For the LinkedIn dataset, as a real network, on average DANI performs 24.09%,
89.98% and 23.89% better than NETINF, MultiTree and DNE, respectively. Our im-
provements in News of the World dataset against NETINF, MultiTree, and DNE was
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
00.010.020.030.040.050.060.070.080.090.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=100NETINFDNEMultiTreeDANI00.050.10.150.20.250.30.350.40.450.50.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=500NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=1000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.90.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=3000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.90.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=4000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.90.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=5000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=7000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=10000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=12000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=15000NETINFDNEMultiTreeDANI00.10.20.30.40.50.60.70.80.910.10.20.30.40.5Normalized Mutual Information (NMI) μ#cascades=20000NETINFDNEMultiTreeDANIA:24
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
Table III. Difference of metrics between communities at inferred and original networks for real datasets. Values are averaged over
different number of cascades for the NetScience dataset, and over different months for LinkedIn and News of the World. Variances
are shown in parentheses.
Dataset
NetScience
LinkedIn
News of the World
Total Metrics
#Node
Degree
Clusteringcoeff
Density
#Community
Conductance
#Node
Degree
Clusteringcoeff
Density
#Community
Conductance
#Node
Degree
Clusteringcoeff
Density
#Community
Conductance
DNE
453.77 (210502.3)
0.583 (0.0498)
0.457 (0.0395)
0.0403 (0.0004)
0.477 (0.060)
0.00515 (0.00002)
109.73 (399.42)
0.747 (0.003)
0.0416 (0.0006)
0.24 (0.01)
0.21 (0.02)
0.04 (0.0007)
67.73 (2024.22)
0.888 (0.024)
0.12 (0.004)
0.315 (0.0193)
0.17 (0.01)
0.035 (0.0006)
NETINF
445.41 (217805)
0.575 (0.0645)
0.487 (0.0418)
0.0401 (0.0003)
0.460 (0.076)
0.00703 (0.00004)
53.64 (79.25)
0.807 (0.001)
0.0757 (0.0018)
0.10 (0.006)
0.45 (0.30)
0.03 (0.0003)
25.64 (305.25)
0.925 (0.016)
0.09 (0.004)
0.124 (0.005)
0.29 (0.02)
0.029 (0.0007)
DANI
445.41 (217805)
0.529 (0.0714)
0.359 (0.0733)
0.0232 (0.0002)
0.404 (0.093)
0.00786 (0.00006)
8.91 (19.70)
0.712 (0.002)
0.0643 (0.0004)
0.05 (0.002)
0.30 (0.08)
0.02 (0.0004)
3.91 (11.49)
0.688 (0.007)
0.09 (0.001)
0.107 (0.003)
0.16 (0.01)
0.029 (0.0006)
MultiTree
445.41 (217805)
0.569 (0.064)
0.478 (0.0418)
0.0433 (0.0006)
0.474 (0.069)
0.00511 (0.00003)
54.18 (95.36)
0.805 (0.001)
0.0772 (0.0018)
0.09 (0.003)
0.38 (0.03)
0.02 (0.0003)
26.00 (302)
0.918 (0.015)
0.09 (0.004)
0.134 (0.007)
0.30 (0.03)
0.038 (0.0012)
14.48%, 94.83%, and 15.84%, respectively. The differences between inferred and original
networks, based on the criteria of Subsection 5.1 is listed in Table III. As the results
show, DANI has the closest values to the original network which indicates its capabil-
ity in preserving the community structures.
PWF:. For the NetScience dataset, DANI achieves higher PWF compared to the
other methods at all number of cascades smaller than 5000. For the LinkedIn network,
on average DANI achieves 67.72%, 73.30% and 29.08% improvement in PWF against
NETINF, MultiTree and DNE, respectively. Moreover, for News of the World, on aver-
age DANI achieves 31.29%, 35.57% and 19.94% improvement against NETINF, Multi-
Tree and DNE, respectively.
Density:. The inferred network by DNE has a high density which is very differ-
ent from the underlying network. However, NETINF, MultiTree and DANI achieve a
density similar to the underlying network, while DANI performs better than the com-
peting algorithms.
Conductance:. The conductance of all competing algorithms are similar. Consider-
ing the average and variance of all intervals in one year, DANI performs marginally
better than other methods for all datasets.
Number of communities:. For this metric, DANI achieved the best performance in
detecting the number of communities for the inferred network compared to the original
network.
6. CONCLUSION
Many works have been done to infer networks by using information diffusion, but they
often neglect preserving the features of underlying networks. Community structure
is one of the most important features in social networks and community detection
algorithms need the network topology to extract their communities. Therefore, these
algorithms cannot be applied on networks derived by the previous proposed network
inference methods.
In this paper, we introduced a new algorithm to infer networks which maintains
the community structure. To verify this claim, we applied the proposed (DANI), NET-
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:25
INF, DNE, and MultiTree methods to real and artificial networks, and compared the
community structure of original and inferred networks with each other. Moreover, we
utilized some of the main community structure metrics to evaluate the inferred net-
works by different methods. The results showed that our algorithm accurately infers
networks while preserving the community structures. In addition, DANI consumed
less time to achieve the same or higher accuracy than the competing methods. Another
advantage of the proposed method is the fact that its performance is independent of
the length of cascades.
As a future work, we are trying to detect communities just based on diffusion in-
formation without the need for inferring networks. In other words, we try to find the
community of each node only based on the diffusion process.
REFERENCES
Altan Alpay, Deniz Demir, and Jie Yang. 2011. FASTINF: A Fast Algorithm to Infer Social Networks from
Cascades. (2011). http://snap.stanford.edu/class/cs224w-2011/proj/jieyang Finalwriteup v3.pdf
Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012. The Role of Social Networks in
Information Diffusion. In Proceedings of the 21st International Conference on World Wide Web (WWW
'12). ACM, New York, NY, USA, 519–528.
Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2013a. Cascade-based community detection. In
WSDM, Stefano Leonardi, Alessandro Panconesi, Paolo Ferragina, and Aristides Gionis (Eds.). ACM,
33–42.
Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2013b. Influence-Based Network-Oblivious Com-
munity Detection. In ICDM. 955–960.
S.Y. Bhat and M. Abulaish. 2013. Overlapping Social Network Communities and Viral Marketing. In Com-
putational and Business Intelligence (ISCBI), 2013 International Symposium on. 243–246.
Paolo Boldi and Massimo Santini. 2010. Compressing Social Networks by Community Detection. Technical
Report RI-DSI 330-10. Dipartimento di Scienze dellInformazione.
Weidong Chen. 2011. Discovering communities by information diffusion. In Fuzzy Systems and Knowledge
Discovery (FSKD), 2011 Eighth International Conference on, Vol. 2. 1123–1132.
Wei Chen, Yifei Yuan, and Li Zhang. 2010. Scalable influence maximization in social networks under the
linear threshold model. In Data Mining (ICDM), 2010 IEEE 10th International Conference on. IEEE,
88–97.
Xiaojie Chen, Feng Fu, and Long Wang. 2007. Prisoner's Dilemma on community networks. Physica A:
Statistical Mechanics and its Applications 378, 2 (May 2007), 512–518.
L. F. Costa. 2004. Hub-Based Community Finding. (2004). (unpublished).
Nan Du, Bin Wu, Xin Pei, Bai Wang, and Liutong Xu. 2007. Community Detection in Large-scale Social
Networks. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and
Social Network Analysis (WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 16–25.
J. Duch and A. Arenas. 2005. Community detection in complex networks using Extremal Optimization.
D. Easley and J. Kleinberg. 2010. Networks, Crowds, and Markets: Reasoning About a Highly Connected
Physical Review E 72 (2005), 027104.
World. Cambridge University Press.
Milad Eftekhar, Yashar Ganjali, and Nick Koudas. 2013. Information Cascade at Group Scale. In Proceed-
ings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD
'13). ACM, New York, NY, USA, 401–409.
Motahhare Eslami, Hamid R. Rabiee, and Mostafa Salehi. 2011. DNE: A Method for Extracting Cascaded
Diffusion Networks from Social Networks. In SocialCom/PASSAT. IEEE, 41–48.
Santo Fortunato. 2010. Community detection in graphs. Physics Reports 486 (2010), 75–174.
M. Girvan and M. E. J. Newman. 2002. Community structure in social and biological networks. Proceedings
of the National Academy of Sciences 99, 12 (2002), 7821–7826.
Jacob Goldenberg, Barak Libai, and Eitan Muller. 2001. Talk of the network: A complex systems look at the
underlying process of word-of-mouth. Marketing letters 12 (2001), 211–223.
Manuel Gomez-Rodriguez, David Balduzzi, and Bernhard Schlkopf. 2011. Uncovering the Temporal Dynam-
ics of Diffusion Networks. In Twenty-eighth International Conference on Machine Learning, Bellevue,
Washington, Lise Getoor and Tobias Scheffer (Eds.). Omnipress, 561–568.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
A:26
M. Ramezani, H.R. Rabiee, M. Tahani and A. Rajabi
Manuel Gomez Rodriguez, Jure Leskovec, and Andreas Krause. 2010. Inferring Networks of Diffusion and
Influence. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery
and Data Mining (KDD '10). ACM, New York, NY, USA, 1019–1028.
Manuel Gomez-Rodriguez, Jure Leskovec, and Bernhard Schlkopf. 2013. Structure and dynamics of infor-
mation pathways in online media. In WSDM, Stefano Leonardi, Alessandro Panconesi, Paolo Ferragina,
and Aristides Gionis (Eds.). ACM, 23–32.
Manuel Gomez-Rodriguez and Bernhard Scholkopf. 2012. Submodular Inference of Diffusion Networks from
Multiple Trees. In Proceedings of the 29th International Conference on Machine Learning. Omnipress,
New York, NY, USA, 489–496.
Adrien Guille, Hakim Hacid, Ccile Favre, and Djamel A. Zighed. 2013. Information diffusion in online social
networks: a survey. SIGMOD Record 42, 2 (2013), 17–28.
Jeffrey Heer and Danah Boyd. 2005. Vizster: Visualizing Online Social Networks. In INFOVIS '05: Proceed-
ings of the Proceedings of the 2005 IEEE Symposium on Information Visualization. IEEE Computer
Society, Washington, DC, USA, 5.
Paul Jaccard. 1901. ´Etude comparative de la distribution florale dans une portion des Alpes et des Jura.
Bulletin del la Soci´et´e Vaudoise des Sciences Naturelles 37 (1901), 547–579.
David Kempe, Jon Kleinberg, and Eva Tardos. 2003. Maximizing the spread of influence through a social
network. In KDD '03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge
discovery and data mining. ACM Press, 137–146.
Andrea Lancichinetti and Santo Fortunato. 2009. Benchmarks for testing community detection algorithms
on directed and weighted graphs with overlapping communities. Physical Review E 80, 1 (jul 2009),
016118.
Andrea Lancichinetti, Santo Fortunato, and J´anos Kert´esz. 2009. Detecting the overlapping and hierarchical
community structure in complex networks. New Journal of Physics 11 (mar 2009), 033015.
Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark graphs for testing commu-
nity detection algorithms. Physical Review E 78, 4 (2008), 046110.
Andrea Lancichinetti, Filippo Radicchi, Jos´e J Ramasco, and Santo Fortunato. 2011. Finding statistically
significant communities in networks. PloS one 6, 4 (2011), e18961.
Jure Leskovec. 2013. INFOPATH supporting website. (2013). http://snap.stanford.edu/infopath/graphs.html
Jure Leskovec. 2014. SNAP: A general purpose network analysis and graph mining library in C++. (2014).
http://snap.stanford.edu/snap/
Jure Leskovec, Lada A. Adamic, and Bernardo A. Huberman. 2007. The Dynamics of Viral Marketing. ACM
Transactions on the Web (TWEB) 1, 1 (2007), 5.
Jure Leskovec, Lars Backstrom, and Jon Kleinberg. 2008a. MemeTracker: tracking news phrases over the
web. (2008). http://memetracker.org/
Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney. 2008b. Statistical properties
of community structure in large social and information networks. In WWW '08: Proceeding of the 17th
international conference on World Wide Web. ACM, New York, NY, USA, 695–704.
Jure Leskovec, Ajit Singh, and Jon Kleinberg. 2006. Patterns of Influence in a Recommendation Network.
In Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD). Springer Berlin Heidel-
berg, 380–389.
Ian XY Leung, Pan Hui, Pietro Lio, and Jon Crowcroft. 2009. Towards real-time community detection in
large networks. Physical Review E 79, 6 (2009), 066107.
David Asher Levin, Yuval Peres, and Elizabeth Lee Wilmer. 2009. Markov chains and mixing times. Ameri-
can Mathematical Soc.
J. Makhoul, F. Kubala, R. Schwartz, and R. Weischedel. 1999. Performance Measures For Information Ex-
traction. In Proceedings of the DARPA Broadcast News Workshop. 249–252.
R. Dean Malmgren, Daniel B. Stouffer, Adilson E. Motter, and Lu´ıs A. N. Amaral. 2008. A Poissonian expla-
nation for heavy tails in e-mail communication. Proceedings of the National Academy of Sciences 105,
47 (Nov 2008), 18153–18158.
Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schtze. 2008. Introduction to Information Re-
trieval. Cambridge University Press, Cambridge, UK.
Aaron F. McDaid, Derek Greene, and Neil J. Hurley. 2011. Normalized Mutual Information to evaluate
overlapping community finding algorithms. CoRR abs/1110.2515 (2011).
Seth A. Myers and Jure Leskovec. 2010. On the Convexity of Latent Social Network Inference. In NIPS,
John D. Lafferty, Christopher K. I. Williams, John Shawe-Taylor, Richard S. Zemel, and Aron Culotta
(Eds.). Curran Associates, Inc., 1741–1749.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
DANI: A Fast Community-Preserving, Diffusion Aware Network Inference Algorithm
A:27
M E Newman. 2006a. Modularity and community structure in networks. Proc Natl Acad Sci U S A 103, 23
(Jun 2006), 8577–8582.
M. E. J. Newman. 2006b. Finding community structure in networks using the eigenvectors of matrices.
Physical Review E 74, 3 (2006), 036104.
Guo-Jun Qi, Charu C. Aggarwal, and Thomas S. Huang. 2012. Community Detection with Edge Content
in Social Media Networks. In ICDE, Anastasios Kementsietsidis and Marcos Antonio Vaz Salles (Eds.).
IEEE Computer Society, 534–545.
Usha Nandini RAGHAVAN, R´eka ALBERT, and Soundar KUMARA. 2007. Near linear time algorithm to
detect community structures in large-scale networks. Physical Review. E, Statistical, nonlinear, and soft
matter physics 76, 3 (2007).
Shaghayegh Sahebi and William Cohen. 2011. Community-based recommendations: a solution to the cold
start problem. In Workshop on Recommender Systems and the Social Web, RSWEB.
Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. 2008. Prediction of Information Diffusion Probabili-
ties for Independent Cascade Model. In KES (3), Ignac Lovrek, Robert J. Howlett, and Lakhmi C. Jain
(Eds.), Vol. 5179. Springer, 67–75.
Jerry Scripps, Pang-Ning Tan, and Abdol-Hossein Esfahanian. 2007. Node roles and community structure
in networks. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and
social network analysis (WebKDD/SNA-KDD '07). ACM, New York, NY, USA, 26–35.
Keyi Shen, Li Song, Xiaokang Yang, and Wenjun Zhang. 2010. A Hierarchical Diffusion Algorithm for Com-
munity Detection in Social Networks. 2013 International Conference on Cyber-Enabled Distributed Com-
puting and Knowledge Discovery 0 (2010), 276–283.
Mahadevan Vasudevan and Narsingh Deo. 2010. Community Identification Algorithm using Relative edge
density measure. Congressus Numeratium 204 (2010), 147–160.
Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. 2013. Virality prediction and community structure in
social networks. Scientific reports 3 (2013).
Jierui Xie, Stephen Kelley, and Boleslaw K. Szymanski. 2013. Overlapping Community Detection in Net-
works: the State of the Art and Comparative Study. ACM Computing Surveys (CSUR) 45, 4 (2013),
43:1–43:35.
Bo Yang, Jing Huang, Dayou Liu, and Jiming Liu. 2009a. A Multi-Agent Based Decentralized Algorithm for
Social Network Community Mining. 2012 IEEE/ACM International Conference on Advances in Social
Networks Analysis and Mining 0 (2009), 78–82.
Jaewon Yang and Jure Leskovec. 2012. Community-Affiliation Graph Model for Overlapping Network Com-
munity Detection. In ICDM, Mohammed Javeed Zaki, Arno Siebes, Jeffrey Xu Yu, Bart Goethals, Geof-
frey I. Webb, and Xindong Wu (Eds.). IEEE Computer Society, 1170–1175.
Tianbao Yang, Rong Jin, Yun Chi, and Shenghuo Zhu. 2009b. A Bayesian Framework for Community De-
tection Integrating Content and Link. In Proceedings of the Twenty-Fifth Conference on Uncertainty in
Artificial Intelligence. 615–622.
Ming Zhong, Cao Zhong, and others. 2008. TopSeer: A Novel Scholar Search Engine based on Community
Detection in Citation Network. In 11th Joint International Conference on Information Sciences. Atlantis
Press.
ACM Transactions on Intelligent Systems and Technology, Vol. V, No. N, Article A, Publication date: January YYYY.
|
1804.03665 | 3 | 1804 | 2019-07-25T14:37:04 | An information-theoretic, all-scales approach to comparing networks | [
"cs.SI",
"cs.IT",
"cs.IT",
"physics.data-an",
"physics.soc-ph"
] | As network research becomes more sophisticated, it is more common than ever for researchers to find themselves not studying a single network but needing to analyze sets of networks. An important task when working with sets of networks is network comparison, developing a similarity or distance measure between networks so that meaningful comparisons can be drawn. The best means to accomplish this task remains an open area of research. Here we introduce a new measure to compare networks, the Network Portrait Divergence, that is mathematically principled, incorporates the topological characteristics of networks at all structural scales, and is general-purpose and applicable to all types of networks. An important feature of our measure that enables many of its useful properties is that it is based on a graph invariant, the network portrait. We test our measure on both synthetic graphs and real world networks taken from protein interaction data, neuroscience, and computational social science applications. The Network Portrait Divergence reveals important characteristics of multilayer and temporal networks extracted from data. | cs.SI | cs |
An information-theoretic, all-scales approach to comparing
networks
James P. Bagrow1,2,* and Erik M. Bollt3
1Department of Mathematics & Statistics, University of Vermont, Burlington, VT, United States
2Vermont Complex Systems Center, University of Vermont, Burlington, VT, United States
3Department of Mathematics, Clarkson University, Potsdam, NY, United States
*Corresponding author. Email: [email protected], Homepage: bagrow.com
July 25, 2019
Abstract
As network research becomes more sophisticated, it is more common than ever for
researchers to find themselves not studying a single network but needing to analyze sets of networks.
An important task when working with sets of networks is network comparison, developing a sim-
ilarity or distance measure between networks so that meaningful comparisons can be drawn. The
best means to accomplish this task remains an open area of research. Here we introduce a new
measure to compare networks, the Network Portrait Divergence, that is mathematically principled,
incorporates the topological characteristics of networks at all structural scales, and is general-purpose
and applicable to all types of networks. An important feature of our measure that enables many of
its useful properties is that it is based on a graph invariant, the network portrait. We test our measure
on both synthetic graphs and real world networks taken from protein interaction data, neuroscience,
and computational social science applications. The Network Portrait Divergence reveals important
characteristics of multilayer and temporal networks extracted from data.
Keywords -- network comparison; graph similarity; multilayer networks; temporal networks; weighted
networks; network portraits; GitHub; Arabidopsis; C. Elegans connectome.
Code -- https://github.com/bagrow/network-portrait-divergence
1 Introduction
Recent years have seen an explosion in the breadth and depth of network data across a variety of scientific
domains [1, 2, 3]. This scope of data challenges researchers, and new tools and techniques are necessary
1
for evaluating and understanding networks. It is now increasingly common to deal with multiple networks
at once, from brain networks taken from multiple subjects or across longitudinal studies [4], to multilayer
networks extracted from high-throughput experiments [5], to rapidly evolving social network data [6, 7, 8]. A
common task researchers working in these areas will face is comparing networks, quantifying the similarities
and differences between networks in a meaningful manner. Applications for network comparison include
comparing brain networks for different subjects, or the same subject before and after a treatment, studying
the evolution of temporal networks [9], classifying proteins and other sequences [10, 11, 12], classifying
online social networks [11], or evaluating the accuracy of statistical or generative network models [13].
Combined with a clustering algorithm, a network comparison measure can be used to aggregate networks in
a meaningful way, for coarse-graining data and revealing redundancy in multilayer networks [5]. Treating
a network comparison measure as an objective function, optimization methods can be used to fit network
models to data.
Approaches to network comparison can be roughly divided into two groups, those that consider or
require two graphs defined on the same set of nodes, and those that do not. The former eliminates the need
to discover a mapping between node sets, making comparison somewhat easier. Yet, two networks with
identical topologies may have no nodes or edges in common simply because they are defined on different sets
of nodes. While there are scenarios where assuming the same node sets is appropriate -- for example, when
comparing the different layers of a multilayer network one wants to capture explicitly the correspondences
of nodes between layers [5] -- here we wish to relax this assumption and allow for comparison without node
correspondence, where no nodes are necessarily shared between the networks.
A common approach for comparison without assuming node correspondence is to build a comparison
measure using a graph invariant. Graph invariants are properties of a graph that hold for all isomorphs of the
graph. Using an invariant mitigates any concerns with the encoding or structural representation of the graphs,
and the comparison measure is instead focused entirely on the topology of the network. Graph invariants may
be probability distributions. Suppose P and Q represent two graph-invariant distributions corresponding to
graphs G1 and G2, respectively. Then, a common approach to comparing G1 and G2 is by comparing P and
2
Q. Information theory provides tools for comparing distributions, such as the Jensen-Shannon divergence:
DJS(P, Q) =
1
2
KL(P M) +
KL(Q M)
1
2
(1)
where KL(P Q) is the Kullback-Leibler (KL) divergence (or relative entropy) between P and Q and
M = (P + Q)/2 is the mixture distribution of P and Q. The Jensen-Shannon divergence has a number of
nice properties, including that it is symmetric and normalized, making it a popular choice for applications
such as ours [14, 15]. In this work, we introduce a novel graph-invariant distribution that is general and free
of assumptions and we can then use common information-theoretic divergences such as Jensen-Shannon to
compare networks via these graph invariants.
The rest of this paper is organized as follows. In Sec. 2 we describe network portraits [16], a graph
invariant matrix representation of a network that is useful for visualization purposes but also capable of
comparing pairs of networks. Section 3 introduces Network Portrait Divergences, a principled information-
theoretic measure for comparing networks, building graph-invariant distributions using the information
contained within portraits. Network Portrait Divergence has a number of desirable properties for a network
comparison measure. In Sec. 4 we apply this measure to both synthetic networks (random graph ensembles)
and real-world datasets (multilayer biological and temporal social networks), demonstrating its effectiveness
on practical problems of interest. Lastly, we conclude in Sec. 5 with a discussion of our results and future
work.
2 Network portraits
Network portraits were introduced in [16] as a way to visualize and encode many structural properties of a
given network. Specifically, the network portrait B is the array with ((cid:96), k) elements
B(cid:96),k ≡ the number of nodes who have k nodes at distance (cid:96)
(2)
3
Figure 1: Example networks and their portraits. The random network is an Erdős-Rényi graph while the real network is
the NCAA Division-I football network [17]. Colors denote the entries of the portrait matrix B (Eq. (2); white indicates
B(cid:96),k = 0).
for 0 ≤ (cid:96) ≤ d and 0 ≤ k ≤ N − 1, where distance is taken as the shortest path length and d is the graph's
diameter 1. The elements of this array are computed using, e.g., Breadth-First Search. Crucially, no matter
how a graph's nodes are ordered or labeled the portrait is identical. We draw several example networks and
their corresponding portraits in Fig. 1.
This matrix encodes many structural features of the graph. The zeroth row stores the number of nodes
N in the graph:
The first row captures the degree distribution P(k):
B0,k = Nδk,1.
B1,k = NP(k),
1Note that a distance (cid:96) = 0 is admissible, with two nodes i and j at distance 0 when i = j. This means that the matrix B so
defined has a zeroth row. It also has a zeroth column, as there may be nodes that have zero nodes at some distance (cid:96). This occurs
for nodes with eccentricity less than the graph diameter.
4
KentOhioStateMichiganWesternMichiganPennStateWisconsinBowlingGreenStateOhioPurdueMichiganStateNorthernIllinoisTempleNavyBallStateSyracuseVirginiaTechEasternMichiganBostonCollegeWestVirginiaNorthCarolinaMiamiOhioCentralMichiganMiamiFloridaMarshallAkronRutgersPittsburghBuffaloNorthwesternToledoIndianaIowaStateBrighamYoungSouthernMethodistFresnoStateHawaiiMiddleTennesseeStateConnecticutNorthCarolinaStateDukeCentralFloridaArmyCincinnatiMississippiMemphisLouisianaStateMississippiStateAlabamaBirminghamSouthernMississippiArkansasSouthCarolinaLouisvilleTennesseeKentuckyFloridaGeorgiaGeorgiaTechFloridaStateVirginiaClemsonWakeForestVanderbiltEastCarolinaMarylandAuburnLouisianaMonroeAlabamaHoustonTulaneNotreDameLouisianaTechTulsaMissouriIowaIllinoisMinnesotaTexasChristianColoradoNevadaNewMexicoSanDiegoStateColoradoStateUtahNebraskaTexasA&MTexasElPasoTexasTechNorthTexasOklahomaTexasUtahStateNevadaLasVegasBaylorKansasOklahomaStateBoiseStateWyomingRiceUCLAAirForceArkansasStateIdahoKansasStateSanJoseStateNewMexicoStateLouisianaLafayetteSouthernCaliforniaWashingtonStateArizonaStateStanfordArizonaOregonStateOregonWashingtonCaliforniaas neighbors are at distance (cid:96) = 1. The second row captures the distribution of next-nearest neighbors, and
so forth for higher rows. The number of edges M isN
k=0 kB1,k = 2M. The graph diameter d is
d = max{(cid:96) B(cid:96),k > 0 for k > 0}.
N
The shortest path distribution is also captured: the number of shortest paths of length (cid:96) is 1
k=0 kB(cid:96),k.
2
And the portraits of random graphs present very differently from highly ordered structures such as lattices
(Fig. 1), demonstrating how dimensionality and regularity of the network is captured in the portrait [16].
One of the most important properties of portraits is that they are a graph invariant:
Definition 2.1. A graph invariant is a property of a graph that is invariant under graph isomorphism, i.e.,
it is a function f such that f (G) = f (H) whenever G and H are isomorphic graphs.
Theorem 2.1. The network portrait (Eq. (2)) is a graph invariant.
Proof. Let f : VG → VH be a vertex bijection between two graphs G = (VG, EG) and H = (VH, EH) such
that the number of edges between every pair of vertices (i, j) in G equals the number of edges between their
images ( f (i), f (j)) in H. Then G and H are isomorphic. Let (cid:96)G(i, j) be the length of the shortest path
between nodes i and j in G. For two isomorphic graphs G and H, (cid:96)G(i, j) = (cid:96)H( f (i), f (j)) for all i and j in
G, since the shortest path tuples (i, . . . , j) in G and ( f (i), . . . , f (j)) in H are the same length. All elements
in the matrix B(G) are computed by aggregating the values of (cid:96)G(i, j). Therefore, B(G) = B(H).
(cid:3)
Note that the converse is not necessarily true:
that f (G) = f (H) does not imply that G and H are
isomorphic. As a counter-example, the non-isomorphic distance-regular dodecahedral and Desargues graphs
have equal portraits [16].
Portraits of weighted networks The original work defining network portraits [16] did not consider weighted
networks, where a scalar quantity wi j is associated with each (i, j) ∈ E. An important consideration is that
path lengths for weighted networks are generally computed by summing edge weights along a path, leading
to path lengths (cid:96) ∈ R (typically) instead of path lengths (cid:96) ∈ Z. To address this, in the Appendix (App. A) we
generalize the portrait to weighted networks, specifically accounting for how real-valued path lengths must
change the definition of the matrix B.
5
k
(cid:44) N
j=0
j=0
2.1 Comparing networks by comparing portraits
Given that a graph G admits a unique B-matrix makes these portraits a valuable tool for network comparison.
Instead of directly comparing graphs G and G(cid:48), we may compute their portraits B and B(cid:48), respectively, and
then compare these matrices. We review the comparison method in our previous work [16]. First, compute
for each portrait B the matrix C consisting of row-wise cumulative distributions of B:
C(cid:96),k =
B(cid:96), j
B(cid:96), j .
(3)
The row-wise Kolmogorov-Smirnov test statistic K(cid:96) between corresponding rows (cid:96) in C and C(cid:48):
(cid:12)(cid:12)(cid:12)C(cid:96),k − C(cid:48)
(cid:96),k
(cid:12)(cid:12)(cid:12)
K(cid:96) = max
allows a metric-like graph comparison. This statistic defines a two-sample hypothesis test for whether or not
the corresponding rows of the portraits are drawn from the same underlying, unspecified distribution. If the
two graphs have different diameters, the portrait for the smaller diameter graph can be expanded to the same
size as the larger diameter graph by defining empty shells (cid:96) > d as B(cid:96),k = Nδ0,k. Lastly, aggregate the test
statistics for all pairs of rows using a weighted average to define the similarity ∆(G, G(cid:48)) between G and G(cid:48):
∆(G, G(cid:48)) ≡ ∆(B, B(cid:48)) =
(cid:96) α(cid:96)K(cid:96)
(cid:96) α(cid:96)
B(cid:96),k +
B(cid:48)
(cid:96),k
k>0
where
α(cid:96) =
k>0
,
(4)
(5)
is a weight chosen to increase the impact of the lower, more heavily occupied shells.
While we did develop a metric-like quantity for comparing graphs based on the KS-statistics (Eqs. (4)
and (5)), we did not emphasize the idea. Instead, the main focus of the original portraits paper was on the use
of the portrait for visualization. In particular, Eq. (4) is somewhat ad hoc. Here we now propose a stronger
means of comparison using network portraits that is interpretable and grounded in information theory.
6
3 An information-theoretic approach to network comparison
Here we introduce a new way of comparing networks based on portraits. This measure is grounded in
information theory, unlike the previous, ad hoc comparison measure, and has a number of other desirable
attributes we discuss below.
The rows of B may be interpreted as probability distributions:
P(k (cid:96)) =
1
N
B(cid:96),k
(6)
is the (empirical) probability that a randomly chosen node will have k nodes at distance (cid:96). This invites an
immediate comparison per row for two portraits:
KL(P(k (cid:96)) Q(k (cid:96))) =
P(k (cid:96)) log P(k (cid:96))
Q(k (cid:96)),
(7)
k
where KL(p q) is the Kullback-Liebler (KL) divergence between two distributions p and q, and Q is
defined as per Eq. (6) for the second portrait (i.e., Q(k (cid:96)) = 1
(cid:96),k). The KL-divergence admits an
information-theoretic interpretation that describes how many extra bits are needed to encode values drawn
N(cid:48) B(cid:48)
from the distribution P if we used the distribution Q to develop the encoding instead of P.
However, while this seems like an appropriate starting point for defining a network comparison, Eq. (7)
has some drawbacks:
1. KL(P(k) Q(k)) is undefined if there exists a value of k such that P(k) > 0 and Q(k) = 0. Given
that rows of the portraits are computed from individual networks, which may have small numbers
of nodes, this is likely to happen often in practical use.
2. The KL-divergence is not symmetric and does not define a distance.
3. Defining a divergence for each pair of rows of the two matrices gives max(d, d(cid:48)) + 1 separate
divergences, where d and d(cid:48) are the diameters of G and G(cid:48), respectively. To define a scalar
comparison value (a similarity or distance measure) requires an appropriate aggregation of these
values, just like the original approach proposed in [16]; we return to this point below.
The first two drawbacks can be addressed by moving away from the KL-divergence and instead using, e.g., the
7
c n2
N2 ,
c
Jensen-Shannon divergence or Hellinger distance. However, the last concern, aggregating over max(d, d(cid:48))+1
difference quantities, remains for those measures as well.
Given these concerns, we propose the following, utilizing the shortest path distribution encoded by the
network portraits. Consider choosing two nodes uniformly at random with replacement. The probability
that they are connected is
where nc is the number of nodes within connected component c, the sum
connected components, and the nc satisfy
c runs over the number of
c nc = N. Likewise, the probability the two nodes are at a
c n2
(8)
distance (cid:96) from one another is
# paths of length (cid:96)
# paths
=
1(cid:0)
c n2
c
(cid:1) N
k=0
kB(cid:96),k .
Lastly, the probability that one of the two nodes has k − 1 other nodes at distance (cid:96) is given by
kB(cid:96),k
k(cid:48) k(cid:48)B(cid:96),k(cid:48)
.
(9)
(10)
We propose to combine these probabilities into a single distribution that encompasses the distances
between nodes weighted by the "masses" or prevalences of other nodes at those distance, giving us the
probability for choosing a pair of nodes at distance (cid:96) and for one of the two randomly chosen nodes to have
k nodes at that distance (cid:96):
P(k, (cid:96)) =
c n2
N2
c
kB(cid:96),k
k(cid:48) k(cid:48)B(cid:96),k(cid:48)
=
kB(cid:96),k
N2
c
c n2
k(cid:48) k(cid:48)B(cid:96),k(cid:48)
kB(cid:96),k =
n2
c
(cid:44) N2
and likewise for Q(k, (cid:96)) using B(cid:48) instead of B. However, this distribution is not normalized
(11)
(12)
unless the graph G is connected. It will be advantageous for this distribution to be normalized in all instances,
k
(cid:96)
c
8
therefore, we condition this distribution on the two randomly chosen nodes being connected:
P(k, (cid:96)) =
k(cid:48) k(cid:48)B(cid:96),k(cid:48)
c n2
c
kB(cid:96),k
k(cid:48) k(cid:48)B(cid:96),k(cid:48)
=
kB(cid:96),k
c n2
c
.
(13)
This now defines a single (joint) distribution P (Q) for all rows of B (B(cid:48)) which can then be used to define a
single KL-divergence between two portraits:
max(d,d(cid:48))
N
KL(P(k, (cid:96)) Q(k, (cid:96))) =
P(k, (cid:96)) log P(k, (cid:96))
Q(k, (cid:96))
(14)
where the log is base 2.
(cid:96)=0
k=0
Definition 3.1. The Network Portrait Divergence DJS(G, G(cid:48)) between two graphs G and G(cid:48) is the Jensen-
Shannon divergence as follows,
DJS(G, G(cid:48)) ≡ 1
2
KL(P M) +
KL(Q M)
1
2
(15)
2 (P + Q) is the mixture distribution of P and Q. Here P and Q are defined by Eq. (13), and the
where M = 1
KL(· ·) is given by Eq. (14).
The Network Portrait Divergence 0 ≤ DJS ≤ 1 provides a single value to quantify the dissimilarity of
the two networks by means of their distance distributions, with smaller DJS for more similar networks and
larger DJS for less similar networks. Unlike the KL divergence, DJS is symmetric, DJS(G, G(cid:48)) = DJS(G(cid:48), G)
and
DJS is a metric [18].
√
The Network Portrait Divergence has a number of desirable properties2. It is grounded in information
theory, which provides principled interpretation of the divergence measure. It compares networks based
entirely on the structure of their respective topologies:
the measure is independent of how the nodes in
the network are indexed and, further, does not assume the networks are defined on the same set of nodes.
Network Portrait Divergence is relatively computationally efficient; unlike graph edit distance measures, for
example, because Network Portrait Divergence is based on a graph invariant and expensive optimizations
such as "node matching" are not needed. Both undirected and directed networks are treated naturally, and
2Code implementing Network Portrait Divergence is available at https://github.com/bagrow/network-portrait-divergence.
9
disconnected networks can be handled without any special problems. Using the generalization of network
portraits to weighted networks (see App. A), the Network Portrait Divergence can also be used to compare
weighted networks. Lastly, all scales of structure within the two networks contribute simultaneously to the
Network Portrait Divergence via the joint neighbor-shortest path length distribution (Eq. (13)), from local
structure to motifs to the large scale connectivity patterns of the two networks.
4 Results
Now we explore the use of the Network Portrait Divergence (Definition 3.1) to compare networks across
a variety of applications. We study both synthetic example graphs, to benchmark the behavior of the
comparison measure under idealized conditions. Then real world network examples are presented to better
capture the types of comparison tasks researchers may encounter.
4.1 Synthetic networks
To understand the performance of the Network Portrait Divergence, we begin here by examining how it
relates different realizations of the following synthetic graphs:
1. Erdős-Rényi (ER) graphs G(N, p) [19], the random graph on N nodes where each possible edge
exists independently with constant probability p;
2. Barabási-Albert (BA) graphs G(N, m) [20], where N nodes are added sequentially to a seed graph
and each new node attaches to m existing nodes according to preferential attachment.
Figure 2 shows the distributions of DJS for different realizations of ER and BA graphs with the same
parameters, as well as the cross-comparison distribution using DJS to compare one realization of an ER graph
with one realization of a BA graph where both graphs have the same average degree (cid:104)k(cid:105) but other parameters
may vary. Overall we note that realizations drawn from the same ensemble have relatively small Network
Portrait Divergence, with ER falling roughly in the range 0 < DJS < 0.5 and BA between 0.1 < DJS < 0.4
(both smaller than the max(DJS) = 1). In contrast, DJS is far higher when comparing one ER to one BA
graph, with DJS > 0.6 in our simulations. The Network Portrait Divergence captures the smaller differences
between different realizations of a single networks ensemble with correspondingly smaller values of DJS
10
Figure 2: Comparing network models. As a simple starting point, here we compare pairs of Erdős-Rényi (ER)
realizations with the same parameters, pairs of Barabási-Albert (BA) realizations with the same parameters, and pairs
of one ER graph versus one BA graph (but with the same number of nodes and average degree). For these examples,
Network Portrait Divergence has high discriminative power.
while the larger differences between networks from different ensembles are captured with larger values of
DJS.
4.2 Measuring network perturbations with Network Portrait Divergence
Next, we ask how well the Network Portrait Divergence measures the effects of network perturbations.
We performed two kinds of rewiring perturbations to the links of a given graph G: (i) random rewiring,
where each perturbation consists of deleting an existing link chosen uniformly at random and inserting a
link between two nodes chosen uniformly at random; and (ii) degree-preserving rewirings [21], where each
perturbation consists of removing a randomly chosen pair of links (i, j) and (u, v) and inserting links (i, u)
and (j, v). The links (i, j) and (u, v) are chosen such that (i, u) (cid:60) E and (j, v) (cid:60) E, ensuring that the degrees
of the nodes are constant under the rewiring.
We expect that random rewirings will lead to a stronger change in the network than the degree-preserving
rewiring. To test this, we generate an ER or BA graph G, apply a fixed number n of rewirings to a copy
of G, and use the Network Portrait Divergence to compare the networks before and after rewirings. Figure
3 shows how DJS changes on average as a function of the number of rewirings, for both types of rewirings
and both ER and BA graphs. The Network Portrait Divergence increases with n, as expected. Interestingly,
below n ≈ 100 rewirings, the different types of rewirings are indistinguishable, but for n > 100 we see that
11
0.00.20.40.60.81.0Network Portrait Divergence DJS0246810121416Prob. densityCompare ER graphsCompare BA graphsER vs. BA graphs (same k)Figure 3: Expected Network Portrait Divergence between an unmodified graph and a copy perturbed by edge rewiring.
(left) Erdős-Rényi graph (N = 300, p = 3/299); (right) Barabási-Albert graph (N = 300, m = 3). A random rewiring
is the deletion of an edge chosen uniformly at random followed by the insertion of a new edge between two nodes
chosen uniformly at random. Degree-preserving rewiring chooses a pair of edges (u, v) and (x, y) and rewires them
across nodes to (u, x) and (v, y) such that the degrees of the chosen nodes remain unchanged [21]. Errorbars denote ±
1 s.d.
random rewirings lead to a larger divergence from the original graph than degree-preserving rewirings. This
is especially evident for BA graphs, where the scale-free degree distribution is more heavily impacted by the
random rewiring than for ER graphs. The overall DJS is also higher in value for BA graphs than ER graphs.
This is plausible because the ER graph is already maximally random, whereas many correlated structures
exist in a random realization of the BA graph model that can be destroyed by perturbations [22].
4.3 Comparing real networks
We now apply the Network Portrait Divergence to real world networks, to evaluate its performance when used
for several common network comparison tasks. Specifically, we study two real-world multiplex networks,
using DJS to compare across the layers of these networks. We also apply DJS to a temporal network,
measuring how the network changes over time. This last network has associated edge weights, and we
consider it as both an unweighted and a weighted network.
The datasets for the three real-world networks we study are as follows:
Arabidopsis GPI network The Genetic and Protein Interaction (GPI) network of Arabidopsis Thaliana
12
100101102103Number of rewirings0.10.20.30.40.50.60.7DJSErdsRényiRandom rewiringDegree-preserving rewiring100101102103Number of rewiringsBarabásiAlberttaken from BioGRID 3.2.108 [23, 5]. This network consists of 6,980 nodes representing proteins and
18,654 links spread across seven multiplex layers. These layers represent different interaction modes
from direct interaction of protein and physical associations of proteins within complexes to suppressive
and synthetic genetic interactions. Full details of the interaction layers are described in [5].
C. elegans connectome The network taken from the nervous system of the nematode C. elegans. This multi-
plex network consists of 279 nodes representing non-pharyngeal neurons and 5,863 links representing
electrical junctions and chemical synapses. Links are spread across three layers: an electric junction
layer (17.6% of links), a monadic chemical synapse layer (28.0% of links), and a polyadic chemical
synapse layer (54.4% of links) [24, 25]. The first layer represents electrical coupling via gap junctions
between neurons, while links in the other layers represent neurons coupled by neurotransmitters. C.
elegans has many advantages as a model organism in general [26, 27], and its neuronal wiring diagram
is completely mapped experimentally [27, 28], making its connectome an ideal test network dataset.
Open source developer collaboration network This network represents the software developers working
on open source projects hosted by IBM on GitHub (https://github.com/ibm). This network is temporal,
evolving over the years 2013-2017, allowing us to compare its development across time. Aggregating
all activity, this network consists of 679 nodes and 3,628 links. Each node represents a developer who
has contributed to the source code of the project, as extracted from the git metadata logs [29, 30, 31].
Links occur between developers who have edited at least one source code file in common, a simple
measure of collaboration. To study this network as a weighted network, we associate with each link
(i, j) an integer weight wi j equal to the number of source files edited in common by developers i and j.
For these data, the Network Portrait Divergence reveals several interesting facets of the multilayer
structure of the Arabidopsis network (Fig. 4). First, both the direct interaction and physical association
layers are the most different, both from each other and from the other layers, with the synthetic interactions
layer being most different from the direct and physical layers. The remaining five layers show interesting
relationships, with suppressive and synthetic genetic interactions being the most distinct pair (DJS = 0.553)
among these five layers. The additive and suppressive layers were also distinct (DJS = 0.365). De Domenico
et al. observed a similar distinction between the suppressive and synthetic layers [5].
13
Figure 4: Using Network Portrait Divergence to compare across layers of multiplex networks. The (i, j) entry of each
matrix illustrates the Network Portrait divergence between layer i and layer j of the corresponding multiplex network.
Network Portrait Divergence can reveal similarities and differences across the different multiplex layers.
The multilayer C. elegans network, consisting of only three layers, is easier to understand than Ara-
bidopsis. Here we find that the electrical junction layer is more closely related to the monadic synapse
layer than it is to the polyadic synapse layer, while the polyadic layer is more closely related to the monadic
synapse layer than to the electrical junction layer. The C. elegans data aggregated all polyadic synapses
together into one layer accounting for over half of the total links in the network, but it would be especially
interesting to determine what patterns for dyadic, triadic, etc. synapses can be revealed with the Network
Portrait Divergence.
The third real-world network we investigate is a temporal network (Fig. 5). This network encodes the
collaboration activities between software developers who have contributed to open source projects owned by
IBM on GitHub.com. Here each node represents a developer and a links exist between two developers when
they have both edited at least one file in common among the source code hosted on GitHub. This network
is growing over time as more projects are open-sourced by IBM, and more developers join and contribute
to those projects. We draw the IBM developer network for each year from 2013 to 2017 in Fig. 5A, while
Fig. 5B shows the change in size of these networks over time. Lastly, Fig. 5C demonstrates how DJS captures
patterns in the temporal evolution of the network, in particular revealing the structural similarity between
2015 and 2016, a period that showed a distinct slowdown in network growth compared with prior and
14
directphysicaladditivesuppressivesyntheticassociationcolocalizationdirectphysicaladditivesuppressivesyntheticassociationcolocalizationArabidopsis GPI networkElectrJMonoSynPolySynElectrJMonoSynPolySynC.elegans connectome0.00.20.40.60.81.0Network Portrait Divergence DJS0.00.20.40.60.81.0Network Portrait Divergence DJSFigure 5: Network Portrait Divergence and the temporal evolution of the IBM GitHub collaboration network. (A) The
IBM collaboration networks, each one aggregated from a year of developer activity on IBM's GitHub projects. (B)
Growth of the IBM network over time. The inset tracks the Network Portrait Divergence of the network away from
the first year. (C) Network Portrait Divergences comparing networks across years. The decreased growth rate from
2015 to 2016 is captured by a very close divergence. Otherwise, the divergences are quite high, especially between the
extreme years, demonstrating the dynamic changes the IBM collaboration underwent during the data window. Panel C
treats the network as unweighted.
subsequent years.
Figure 6 shows the Network Portrait Divergence comparing different years of the IBM developer network,
as per Fig. 5 but now accounting for edge weights. Shortest path lengths were found using Dijkstra's algorithm
based on reciprocal edge weights (see App. A for details). The weighted portraits require binning the path
length distributions (see App. A). Here we show four such binnings, based on quantiles of the weighted path
length distributions, from b = 100 bins (each bin accounts for 1% of shortest paths) to b = 10 (each bin
accounts for 10% of shortest paths). Note that each DJS is defined with its own portrait binning, as the quantiles
of L = L(G)∪L(G(cid:48)) may vary across different pairs of networks, where L(G) = {(cid:96)i j i, j ∈ V ∧ (cid:96)i j < ∞} is
the set of all unique shortest path lengths in G. Overall, the relationships between the different time periods
15
20132014201520162017ABCFigure 6: Weighted Network Portrait Divergence for comparing the IBM developer network over time. The weighted
portraits depend on a choice of binning (see App. A); here we see that the pattern of similarities between networks is
robust to changes in binning.
of the network do not depend strongly on the choice of binning, and we capture patterns across time similar
to, though not identical to, the patterns found analyzing the unweighted networks (shown in Fig. 5).
5 Conclusion
In this paper we have introduced a measure, the Network Portrait Divergence, for comparing networks,
and validated its performance on both synthetic and real-world network data. Network Portrait Divergence
provides an information-theoretic interpretation that naturally encompasses all scales of structure within
networks. It does not require the networks to be connected, nor does it make any assumptions as to how the
two networks being compared are related, or indexed, or even that their node sets are equal. Further, Network
Portrait Divergence can naturally handle both undirected and directed, unweighted networks, and we have
introduced a generalization for weighted networks. The Network Portrait Divergence is based on a graph
invariant, the network portrait. Comparison measures based on graph invariants are desirable as they will
only be affected by the topology of the networks being studied, and not other externalities such as the format
or order in which the networks are recorded or analyzed. The computational complexity of the Network
Portrait Divergence compares favorably to many other graph comparison measures, particularly spectral
measures, but it remains a computation that is quadratic in the number of nodes of the graph. To scale to
very large networks will likely require further efficiency gains, probably from approximation strategies to
efficiently infer the shortest path distributions [32].
Our approach bears superficial similarities with other methods. Graph distances and shortest path length
16
2013201420152016201720132014201520162017100 portrait bins201320142015201620172013201420152016201750 portrait bins201320142015201620172013201420152016201720 portrait bins201320142015201620172013201420152016201710 portrait bins0.00.20.40.60.81.0Network Portrait Divergence DJSdistributions are components common to many network comparison methods, including our own, although
the Network Portrait Divergences utilizes a unique composition of all the shortest path length distributions
for the networks being compared. At the same time, other methods, including ours, use the Jensen-Shannon
divergence to build comparison measures. For example, the recent work of Chen et al. [15] uses the
Shannon entropy and Jensen-Shannon Divergence of a probability distribution computed by normalizing e A,
the exponential of the adjacency matrix also known as the communicability matrix. This is an interesting
approach, as are other approaches that examine powers of the adjacency matrix, but it suffers from a drawback:
when comparing networks of different sizes, the underlying probability distributions must be modified in an
ad hoc manner [15]. The Network Portrait Divergence, in contrast, does not need such modification.
The Network Portrait Divergence, and other methods, is based upon the Jensen-Shannon divergence
between graph-invariant probability distributions, but many other information-theoretic tools exist for com-
paring distributions, including f -divergences such as the Hellinger distance or total variation distance,
Bhattacharyya distance, and more. Using different measures for comparison may yield different interpreta-
tions and insights, and thus it is fruitful to better understand their use across different network comparison
problems.
Network Portrait divergence lends itself well to developing statistical procedures when combined with
suitable graph null models. For example, one could quantify the randomness of a structural property of a
network by comparing the real network to a random model that controls for that property. Further, to estimate
the strength or significance of an observed divergence between graphs G1 and G2, one could generate a large
number of random graph null proxies for either G1 or G2 (or both) and compare the divergences found between
those nulls with the divergence between the original graphs. These comparisons could be performed using
a Z-test or other statistical procedure, as appropriate. Exploring this and other avenues for Network Portrait
Divergence-based statistical procedures is a fruitful direction for future work.
In general, because of the different potential interpretations and insights that researchers performing
network comparison can focus on, the network comparison problem lacks quantitative benchmarks. These
benchmarks are useful for comparing different approaches systematically. However, the comparison problem
is not as narrowly defined as, for example, graph partitioning, and thus effective methods may highlight very
different facets of comparison. While specific benchmarks can be introduced for specific facets, due to a
17
lack of standardized, systematic benchmarks, most researchers introducing new comparison measures focus
on a few tasks of interest, as we do here. Bringing clarity to the literature by defining and validating an
appropriate benchmarking suite would be a valuable contribution to the network comparison problem, but
we consider this to be beyond the scope of our current work.
Instead, we have focused our method on
highlighting several areas, particularly within real world applications but also using some intuitive synthetic
scenarios, where the method is effective.
As network datasets increase in scope, network comparison becomes an increasingly common and
important component of network data analysis. Measures such as the Network Portrait Divergence have
the potential to help researchers better understand and explore the growing sets of networks within their
possession.
Abbreviations
JSD, Jensen-Shannon Divergence; BA, Barabási-Albert; ER, Erdős-Rényi; KL, Kullback-Leibler; GPI,
Genetic and Protein Interaction.
A Portraits and Network Portrait Divergences for weighted networks
The portrait matrix B (Eq. (2)) is most naturally defined for unweighted networks since the path lengths for
unweighted networks count the number of edges traversed along the path to get from one node to another.
Since the number of edges is always integer-valued, these lengths can be used to define the rows of B. For
weighted networks, on the other hand, path lengths are generally computed by summing edge weights along
a path and will generally be continuous rather than integer-valued.
To generalize the portrait to weighted networks requires (i) using an algorithm for finding shortest paths
accounting for edge weights (here we will use Dijkstra's algorithm [33]), and (ii) defining an appropriate
aggregation strategy to group shortest paths by length to form the rows of B. The algorithm for finding
shortest paths defines the complexity of computing the portrait: The single-source Dijkstra's algorithm with
a Fibonacci heap runs in O(M + N log N) time [34] for a graph of V = N nodes and E = M edges. This
is more costly than the single-source Breadth-First Search algorithm we use for unweighted graphs, which
18
runs in O(M + N) time. Computing B requires all pairs of shortest paths, therefore the total complexity for
computing a weighted portrait is O(MN + N2 log N). This again is more costly than the total complexity for
the unweighted portrait, O(MN + N2) , but this is unavoidable as finding minimum-cost paths is generically
more computationally intensive than finding minimum-length paths.
The simplest choice for aggregating shortest paths by length is to introduce a binning strategy for the
continuous path lengths. Let d0 = 0 < d1 < · · · < db+1 = Lmax define a set of b intervals or bins, where
Lmax is the length of the longest shortest path. Then the weighted portrait B can be defined such that Bi,k ≡
the number of nodes with k nodes at distances di ≤ (cid:96) < di+1. That is, the i-th row of the weighted portrait
accounts for all shortest paths with lengths falling inside the i-th bin [di, di+1). (We also take the last bin to
be inclusive on both sides, [db, Lmax]).
To compute B using a binning requires determining the b + 1 bin edges. Here we consider a simple,
adaptive binning based on quantiles of the shortest path distribution, but a researcher is free to adopt a
different binning strategy as needed. Let L(G) = {(cid:96)i j i, j ∈ V ∧ (cid:96)i j < ∞} be the set of all unique shortest
path lengths between connected pairs of nodes in graph G. We then define our binning to be the b contiguous
intervals that partition L into subsets of (approximately) equal size. Taking b = 100, for example, ensures
that each bin contains approximately 1% of the shortest path lengths. The number of bins b can be chosen
by the researcher to suit her needs, or automatically using any of a number of histogram binning rules such
as Freedman-Diaconis [35] or Sturges' Rule [36].
Figure 7 shows the portrait for a weighted network, in this case taken from the IBM developer collaboration
network. Edge (i, j) in this network has associated non-negative edge weight wi j = the number of files edited
in common by developers i and j. The network is the union of the networks shown in Fig. 5A; we draw the
is (cid:96)i j =n
giant connected component of this network in Fig. 7A. For this network, we consider shortest paths found
using Dijkstra's algorithm with reciprocal edge weights, i.e., the "length" of a path (i = i0, i1, i2, . . . , in+1 = j)
it,it +1, as larger edge weights define more closely related developers. However, this choice is
not necessary in general. The cumulative distribution of shortest path lengths, which we computed on all
t=0 w−1
components of the network, is shown in Fig. 7B. Lastly, Fig. 7C shows the portrait B for this network. For
illustration, we draw the vertical positions of the rows in this matrix using the bin edges. These bin edges
are highlighted on the cumulative distribution shown in Fig. 7B.
19
Figure 7: A weighted network and its portrait. (A) The network of developers contributing to IBM projects on GitHub.
This is the giant connected component of the union of all graphs shown in Fig. 5A. The weight on edge (i, j) represents
the number of source files edited in common by developers i and j. Node size is proportional to degree; node color
is proportional to betweenness centrality. (B) The cumulative distribution of shortest path lengths (cid:96) computed using
Dijkstra's algorithm with reciprocal edge weights. (C) The weighted network portrait. The vertical marks in panel B
denote the path length binning used in C.
With a new definition for B now in place for weighted networks, the Network Portrait Divergence can
be computed exactly as before (Definition 3.1). However, to compare portraits for two graphs G and G(cid:48), it
is important for the path length binning to be the same for both. We do this here by computing b bins as
quantiles of L = L(G) ∪ L(G(cid:48)) and then compute B(G) and B(G(cid:48)) as before. This ensures the rows of B
and B(cid:48) are compatible in the distributions used within Definition 3.1.
Acknowledgments
We thank Laurent Hébert-Dufresne for helpful comments. J.P.B. was supported by the National Science
Foundation under Grant No. IIS-1447634. E.M.B. would like to thank the Army Research Office (N68164-
EG) and the Office of Naval Research (N00014-15-1-2093), and also DARPA.
20
AReferences
[1] J. S. Bader, A. Chaudhuri, J. M. Rothberg, and J. Chant, "Gaining confidence in high-throughput
protein interaction networks," Nature Biotechnology, vol. 22, no. 1, p. 78, 2004. 1
[2] D. Lazer, A. S. Pentland, L. Adamic, S. Aral, A. L. Barabasi, D. Brewer, N. Christakis, N. Contractor,
J. Fowler, M. Gutmann et al., "Life in the network: the coming age of computational social science,"
Science (New York, NY), vol. 323, no. 5915, p. 721, 2009. 1
[3] E. Landhuis, "Neuroscience: Big brain, big data," Nature, vol. 541, pp. 559 -- 561, 2017. 1
[4] R. Whelan, P. J. Conrod, J.-B. Poline, A. Lourdusamy, T. Banaschewski, G. J. Barker, M. A. Bellgrove,
C. Büchel, M. Byrne, T. D. Cummins et al., "Adolescent impulsivity phenotypes characterized by
distinct brain networks," Nature Neuroscience, vol. 15, no. 6, p. 920, 2012. 2
[5] M. De Domenico, V. Nicosia, A. Arenas, and V. Latora, "Structural reducibility of multilayer networks,"
Nature Communications, vol. 6, p. 6864, 2015. 2, 13
[6] G. Palla, A.-L. Barabási, and T. Vicsek, "Quantifying social group evolution," Nature, vol. 446, no.
7136, p. 664, 2007. 2
[7] M. Szell, R. Lambiotte, and S. Thurner, "Multirelational organization of large-scale social networks in
an online world," Proc. Natl. Acad. Sci. U.S.A., vol. 107, no. 31, pp. 13 636 -- 13 641, 2010. 2
[8] J. P. Bagrow, D. Wang, and A.-L. Barabasi, "Collective response of human populations to large-scale
emergencies," PLOS ONE, vol. 6, no. 3, p. e17680, 2011. 2
[9] P. Holme and J. Saramäki, "Temporal networks," Physics Reports, vol. 519, no. 3, pp. 97 -- 125, 2012. 2
[10] N. Shervashidze, S. Vishwanathan, T. Petri, K. Mehlhorn, and K. Borgwardt, "Efficient graphlet kernels
for large graph comparison," in Artificial Intelligence and Statistics, 2009, pp. 488 -- 495. 2
[11] P. Yanardag and S. Vishwanathan, "Deep graph kernels," in Proceedings of the 21th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining. ACM, 2015, pp. 1365 -- 1374. 2
[12] M. Niepert, M. Ahmed, and K. Kutzkov, "Learning convolutional neural networks for graphs," in
International conference on machine learning, 2016, pp. 2014 -- 2023. 2
[13] D. R. Hunter, S. M. Goodreau, and M. S. Handcock, "Goodness of fit of social network models,"
Journal of the American Statistical Association, vol. 103, no. 481, pp. 248 -- 258, 2008. 2
[14] M. De Domenico and J. Biamonte, "Spectral entropies as information-theoretic tools for complex
network comparison," Phys. Rev. X, vol. 6, p. 041062, Dec 2016. 3
[15] D. Chen, D.-D. Shi, M. Qin, S.-M. Xu, and G.-J. Pan, "Complex network comparison based on
communicability sequence entropy," Physical Review E, vol. 98, no. 1, p. 012319, 2018. 3, 17
[16] J. P. Bagrow, E. M. Bollt, J. D. Skufca, and D. Ben-Avraham, "Portraits of complex networks," EPL
(Europhysics Letters), vol. 81, no. 6, p. 68004, 2008. 3, 5, 6, 7
[17] J. Park and M. E. Newman, "A network-based ranking system for us college football," Journal of
Statistical Mechanics: Theory and Experiment, vol. 2005, no. 10, p. P10014, 2005. 4
21
[18] D. M. Endres and J. E. Schindelin, "A new metric for probability distributions," IEEE Transactions on
Information Theory, vol. 49, no. 7, pp. 1858 -- 1860, July 2003. 9
[19] P. Erdös and A. Rényi, "On random graphs, I," Publicationes Mathematicae (Debrecen), vol. 6, pp.
290 -- 297, 1959. 10
[20] A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, no. 5439,
pp. 509 -- 512, 1999. 10
[21] Z. Li, P. J. Mucha, and D. Taylor, "Network-ensemble comparisons with stochastic rewiring and von
neumann entropy," arXiv preprint arXiv:1704.01053, 2017. 11, 12
[22] R. Albert and A.-L. Barabási, "Statistical mechanics of complex networks," Rev. Mod. Phys., vol. 74,
no. 1, p. 47, 2002. 12
[23] C. Stark, B.-J. Breitkreutz, T. Reguly, L. Boucher, A. Breitkreutz, and M. Tyers, "BioGRID: a general
repository for interaction datasets," Nucleic acids research, vol. 34, no. suppl_1, pp. D535 -- D539, 2006.
13
[24] B. L. Chen, D. H. Hall, and D. B. Chklovskii, "Wiring optimization can relate neuronal structure and
function," Proc. Natl. Acad. Sci. U.S.A., vol. 103, no. 12, pp. 4723 -- 4728, 2006. 13
[25] M. De Domenico, M. A. Porter, and A. Arenas, "MuxViz: a tool for multilayer analysis and visualization
of networks," Journal of Complex Networks, vol. 3, no. 2, pp. 159 -- 176, 2015. 13
[26] S. Brenner, "The genetics of caenorhabditis elegans," Genetics, vol. 77, no. 1, pp. 71 -- 94, 1974. 13
[27] J. G. White, E. Southgate, J. N. Thomson, and S. Brenner, "The structure of the nervous system of the
nematode caenorhabditis elegans," Philos Trans R Soc Lond B Biol Sci, vol. 314, no. 1165, pp. 1 -- 340,
1986. 13
[28] D. H. Hall, Z. F. Altun et al., C. elegans Atlas. Cold Spring Harbor Laboratory Press, 2007. 13
[29] C. Bird, P. C. Rigby, E. T. Barr, D. J. Hamilton, D. M. German, and P. Devanbu, "The promises and
perils of mining git," in Mining Software Repositories, 2009. MSR'09. 6th IEEE International Working
Conference on.
IEEE, 2009, pp. 1 -- 10. 13
[30] E. Kalliamvakou, G. Gousios, K. Blincoe, L. Singer, D. M. German, and D. Damian, "The promises and
perils of mining github," in Proceedings of the 11th working conference on mining software repositories.
ACM, 2014, pp. 92 -- 101. 13
[31] M. Klug and J. P. Bagrow, "Understanding the group dynamics and success of teams," Royal Society
Open Science, vol. 3, no. 4, p. 160007, 2016. 13
[32] M. Potamias, F. Bonchi, C. Castillo, and A. Gionis, "Fast shortest path distance estimation in large
networks," in Proceedings of the 18th ACM conference on Information and knowledge management.
ACM, 2009, pp. 867 -- 876. 16
[33] E. W. Dijkstra, "A note on two problems in connexion with graphs," Numerische mathematik, vol. 1,
no. 1, pp. 269 -- 271, 1959. 18
22
[34] M. L. Fredman and R. E. Tarjan, "Fibonacci heaps and their uses in improved network optimization
algorithms," Journal of the ACM (JACM), vol. 34, no. 3, pp. 596 -- 615, 1987. 19
[35] D. Freedman and P. Diaconis, "On the histogram as a density estimator: L 2 theory," Zeitschrift für
Wahrscheinlichkeitstheorie und verwandte Gebiete, vol. 57, no. 4, pp. 453 -- 476, 1981. 19
[36] H. A. Sturges, "The choice of a class interval," Journal of the American Statistical Association, vol. 21,
no. 153, pp. 65 -- 66, 1926. 19
23
|
1509.02533 | 1 | 1509 | 2015-09-08T20:10:04 | Absorbing random-walk centrality: Theory and algorithms | [
"cs.SI",
"cs.DS"
] | We study a new notion of graph centrality based on absorbing random walks. Given a graph $G=(V,E)$ and a set of query nodes $Q\subseteq V$, we aim to identify the $k$ most central nodes in $G$ with respect to $Q$. Specifically, we consider central nodes to be absorbing for random walks that start at the query nodes $Q$. The goal is to find the set of $k$ central nodes that minimizes the expected length of a random walk until absorption. The proposed measure, which we call $k$ absorbing random-walk centrality, favors diverse sets, as it is beneficial to place the $k$ absorbing nodes in different parts of the graph so as to "intercept" random walks that start from different query nodes.
Although similar problem definitions have been considered in the literature, e.g., in information-retrieval settings where the goal is to diversify web-search results, in this paper we study the problem formally and prove some of its properties. We show that the problem is NP-hard, while the objective function is monotone and supermodular, implying that a greedy algorithm provides solutions with an approximation guarantee. On the other hand, the greedy algorithm involves expensive matrix operations that make it prohibitive to employ on large datasets. To confront this challenge, we develop more efficient algorithms based on spectral clustering and on personalized PageRank. | cs.SI | cs | Absorbing random-walk centrality:
Theory and algorithms
Charalampos Mavroforakis
Dept. of Computer Science
Boston University
Boston, U.S.A.
[email protected]
Michael Mathioudakis and Aristides Gionis
Helsinki Institute for Information Technology HIIT
Dept. of Computer Science, Aalto University
Helsinki, Finland
[email protected]
5
1
0
2
p
e
S
8
]
I
S
.
s
c
[
1
v
3
3
5
2
0
.
9
0
5
1
:
v
i
X
r
a
Abstract—We study a new notion of graph centrality based on
absorbing random walks. Given a graph G = (V, E) and a set of
query nodes Q ⊆ V , we aim to identify the k most central nodes
in G with respect to Q. Specifically, we consider central nodes to
be absorbing for random walks that start at the query nodes Q.
The goal is to find the set of k central nodes that minimizes the
expected length of a random walk until absorption. The proposed
measure, which we call k absorbing random-walk centrality, favors
diverse sets, as it is beneficial to place the k absorbing nodes in
different parts of the graph so as to “intercept” random walks
that start from different query nodes.
Although similar problem definitions have been considered in
the literature, e.g., in information-retrieval settings where the
goal is to diversify web-search results, in this paper we study
the problem formally and prove some of its properties. We show
that the problem is NP-hard, while the objective function is
monotone and supermodular, implying that a greedy algorithm
provides solutions with an approximation guarantee. On the other
hand, the greedy algorithm involves expensive matrix operations
that make it prohibitive to employ on large datasets. To confront
this challenge, we develop more efficient algorithms based on
spectral clustering and on personalized PageRank.
Keywords-graph mining; node centrality; random walks
I. INTRODUCTION
A fundamental problem in graph mining is to identify the
most central nodes in a graph. Numerous centrality measures
have been proposed,
including degree centrality, closeness
centrality [14], betweenness centrality [5], random-walk cen-
trality [13], Katz centrality [9], and PageRank [4].
In the interest of robustness many centrality measures use
random walks: while the shortest-path distance between two
nodes can change dramatically by inserting or deleting a single
edge, distances based on random walks account for multiple
paths and offer a more global view of the connectivity between
two nodes. In this spirit, the random-walk centrality of one
node with respect to all nodes of the graph is defined as the
expected time needed to come across this node in a random
walk that starts in any other node of the graph [13].
In this paper, we consider a measure that generalizes
random-walk centrality for a set of nodes C with respect to
a set of query nodes Q. Our centrality measure is defined as
the expected length of a random walk that starts from any
node in Q until it reaches any node in C — at which point
the random walk is “absorbed” by C. Moreover, to allow for
adjustable importance of query nodes in the centrality measure,
we consider random walks with restarts, that occur with a fixed
probability α at each step of the random walk. The resulting
computational problem is to find a set of k nodes C that
optimizes this measure with respect to nodes Q, which are
provided as input. We call this measure k absorbing random-
walk centrality and the corresponding optimization problem
k-ARW-CENTRALITY.
To motivate the k-ARW-CENTRALITY problem, let us con-
sider the scenario of searching the Web graph and summa-
rizing the search results. In this scenario, nodes of the graph
correspond to webpages, edges between nodes correspond to
links between pages, and the set of query nodes Q consists
of all nodes that match a user query, i.e., all webpages that
satisfy a keyword search. Assuming that the size of Q is large,
the goal is to find the k most central nodes with respect to Q,
and present those to the user.
Our key results in this paper are the following: we show
that the k-ARW-CENTRALITY problem is NP-hard, and we
show that the k absorbing random-walk centrality measure
is monotone and supermodular. The latter property allows us
to quantify the approximation guarantee obtained by a natural
greedy algorithm, which has also been considered by previous
work [18]. Furthermore, a naıve implementation of the greedy
algorithm requires many expensive matrix inversions, which
make the algorithm particularly slow. Part of our contribu-
It is clear that ordering the nodes of the graph by their
individual random-walk centrality scores and taking the top-k
set does not solve the k-ARW-CENTRALITY problem, as these
nodes may all be located in the same “neighborhood” of the
graph, and thus, may not provide a good absorbing set for
the query. On the other hand, as the goal is to minimize the
expected absorption time for walks starting at Q, the optimal
solution to the k-ARW-CENTRALITY problem will be a set of
k, both centrally-placed and diverse, nodes.
This observation has motivated researchers in the informa-
tion-retrieval field to consider random walks with absorbing
states in order to diversify web-search results [18]. However,
despite the fact that similar problem definitions and algorithms
have been considered earlier, the k-ARW-CENTRALITY prob-
lem has not been formally studied and there has not been a
theoretical analysis of its properties.
tion is to show how to make use of the Sherman-Morrison
inversion formula to implement the greedy algorithm with
only one matrix inversion and more efficient matrix× vector
multiplications.
Moreover, we explore the performance of faster, heuristic
algorithms, aiming to identify methods that are faster than
the greedy approach without significant loss in the quality of
results. The heuristic algorithms we consider include the per-
sonalized PageRank algorithm [4], [10] as well as algorithms
based on spectral clustering [17]. We find that, in practice, the
personalized PageRank algorithm offers a very good trade-off
between speed and quality.
The rest of the paper is organized as follows. In Section II,
we overview previous work and discuss how it compares
to this paper. We define our problem in Section III and
provide basic background results on absorbing random walks
in Section IV. Our main technical contributions are given in
Sections IV and V, where we characterize the complexity of
the problem, and provide the details of the greedy algorithm
and the heuristics we explore. We evaluate the performance of
algorithms in Section VII, over a range of real-world graphs,
and Section VIII is a short conclusion. Proofs for some of the
theorems shown in the paper are provided in the Appendix.
II. RELATED WORK
Many works in the literature explore ways to quantify the
notion of node centrality on graphs [3]. Some of the most
commonly-used measures include the following: (i) degree
centrality, where the centrality of a node is simply quantified
by its degree; (ii) closeness centrality [11], [14], defined
as the average distance of a node from all other nodes on
the graph; (iii) betweenness centrality [5], defined as the
number of shortest paths between pairs of nodes in the graph
that pass through a given node; (iv) eigenvector centrality,
defined as the stationary probability that a Markov chain on
the graph visits a given node, with Katz centrality [9] and
PageRank [4] being two well-studied variants; and (v) random-
walk centrality [13], defined as the expected first passage time
of a random walk from a given node, when it starts from a
random node of the graph. The measure we study in this paper
generalizes the notion of random-walk centrality to a set of
absorbing nodes.
Absorbing random walks have been used in previous work
to select a diverse set of nodes from a graph. For example,
an algorithm proposed by Zhu et al. [18] selects nodes in the
following manner: (i) the first node is selected based on its
PageRank value and is set as absorbing; (ii) the next node to be
selected is the node that maximizes the expected first-passage
time from the already selected absorbing nodes. Our problem
definition differs considerably from the one considered in that
work, as in our work the expected first-passage times are
always computed from the set of query nodes that are provided
in the input, and not from the nodes that participate in the
solution so far. In this respect, the greedy method proposed
by Zhu et al. is not associated with a crisp problem definition.
Another conceptually related line of work aims to select a
diverse subset of query results, mainly within the context of
document retrieval [1], [2], [16]. The goal, there, is to select k
query results to optimize a function that quantifies the trade-off
between relevance and diversity.
Our work is also remotely related to the problem studied
by Leskovec et al. on cost-effective outbreak detection [12].
One of the problems discussed there is to select nodes in the
network so that the detection time for a set of cascades is
minimized. However, their work differs from ours on the fact
that they consider as input a set of cascades, each one of finite
size, while in our case the input consists of a set of query nodes
and we consider a probabilistic model that generates random
walk paths, of possibly infinite size.
III. PROBLEM DEFINITION
We are given a graph G = (V, E) over a set of nodes V
and set of undirected edges E. The number of nodes V is
denoted by n and the number of edges E by m. The input
also includes a subset of nodes Q ⊆ V , to which we refer as
the query nodes. As a special case, the set of query nodes Q
may be equal to the whole set of nodes, i.e., Q = V .
Our goal is to find a set C of k nodes that are central with
respect to the query nodes Q. For some applications it makes
sense to restrict the central nodes to be only among the query
nodes, while in other cases, the central nodes may include any
node in V . To model those different scenarios, we consider a
set of candidate nodes D, and require that the k central nodes
should belong in this candidate set, i.e., C ⊆ D. Some of the
cases include D = Q, D = V , or D = V \Q, but it could also
be that D is defined in some other way that does not involve
Q. In general, we assume that D is given as input.
The centrality of a set of nodes C with respect to query
nodes Q is based on the notion of absorbing random-walks
and their expected length. More specifically, let us consider
a random walk on the nodes V of the graph, that proceeds
at discrete steps: the walk starts from a node q ∈ Q and, at
each step moves to a different node, following edges in G,
until it arrives at some node in C. The starting node q of
the walk is chosen according to a probability distribution s.
When the walk arrives at a node c ∈ C for the first time,
it terminates, and we say that the random walk is absorbed
by that node c. In the interest of generality, and to allow
for adjustable importance of query nodes in the centrality
measure, we also allow the random walk to restart. Restarts
occur with a probability α at each step of the random walk,
where α is a parameter that is specified as input to the problem.
When restarting, the walk proceeds to a query node selected
randomly according to s. Intuitively, larger values of α favor
nodes that are closer to nodes Q.
We are interested in the expected length (i.e., number of
steps) of the walk that starts from a query node q ∈ Q until it
gets absorbed by some node in C, and we denote this expected
(C). We then define the absorbing random-walk
length by acq
Q
centrality of a set of nodes C with respect to query nodes Q, by
that the random walk visits node j having started from node i
is given by the (i, j)-entry of the T × T matrix
∞(cid:88)
F =
T T = (I − PT T )
P(cid:96)
−1 ,
(3)
(cid:88)
q∈Q
acQ(C) =
s(q) acq
Q
(C).
The problem we consider in this paper is the following.
(cid:96)=0
Problem 1 (k-ARW-CENTRALITY) We are given a graph
G = (V, E), a set of query nodes Q ⊆ V , a set of candidate
nodes D ⊆ V , a starting probability distribution s over V
such that s(v) = 0 if v ∈ V \ Q, a restart probability α, and
an integer k. We ask to find a set of k nodes C ⊆ D that
minimizes acQ(C), i.e., the expected length of a random walk
that starts from Q and proceeds until it gets absorbed in some
node in C.
In cases where we have no reason to distinguish among the
query nodes, we consider the uniform starting probability
distribution s(q) = 1/Q. In fact, for simplicity of exposition,
hereinafter we focus on the case of uniform distribution.
However, we note that all our definitions and techniques
generalize naturally, not only to general starting probability
distributions s(q), but also to directed and weighted graphs.
(cid:18) F
(cid:19)
which is known as the fundamental matrix of the absorbing
random walk. Allowing the possibility to start the random walk
at an absorbing node (and being absorbed immediately), we
see that the expected length of a random walk that starts from
node i and gets absorbed by the set C is given by the i-th
element of the following n × 1 vector
0
1,
L = LC =
(4)
where 1 is an T × 1 vector of all 1s. We write L = LC to
emphasize the dependence on the set of absorbing nodes C.
The expected number of steps when starting from a node
in Q and until being absorbed by some node in C is then
obtained by summing over all query nodes, i.e.,
acQ(C) = sT LC.
(5)
IV. ABSORBING RANDOM WALKS
A. Efficient computation of absorbing centrality
In this section we review some relevant background on
absorbing random walks. Specifically, we discuss how to
calculate the objective function acQ(C) for Problem 1.
Let P be the transition matrix for a random walk, with
P(i, j) expressing the probability that the random walk will
move to node j given that it is currently at node i. Since
random walks can only move to absorbing nodes C, but not
away from them, we set P(c, c) = 1 and P(c, j) = 0, if j (cid:54)= c,
for all absorbing nodes c ∈ C. The set T = V \ C of non-
absorbing nodes is called transient. If N (i) are the neighbors
of a node i ∈ T and di = N (i) its degree, the transition
probabilities from node i to other nodes are
(cid:26) α s(j)
P(i, j) =
(1 − α)/di + α s(j)
if j ∈ Q \ N (i),
if j ∈ N (i).
(1)
= sT
Here, s represents the starting probability vector. For example,
for the uniform distribution over query nodes we have s(i) =
1/Q if i ∈ Q and 0 otherwise. The transition matrix of the
random walk can be written as follows
=
with
(cid:18) PT T PT C
(cid:19)
0
I
P =
.
(2)
Equation (5) pinpoints the difficulty of the problem we
consider: even computing the objective function acQ(C) for a
candidate solution C requires an expensive matrix inversion;
−1. Furthermore, searching for the optimal set
F = (I − PT T )
C involves an exponential number of candidate sets, while
evaluating each one of them requires a matrix inversion.
In practice, we find that we can compute acQ(C) much
faster approximately, as shown in Algorithm 1. The algorithm
follows from the infinite-sum expansion of Equation (5).
acQ(C) = sT LC = sT
1 = sT
(cid:19)
(cid:18) F
(cid:19)
(cid:18) P(cid:96)
0
T T
0
1 =
∞(cid:88)
(cid:96)=0
(cid:96)=0 P(cid:96)
T T
(cid:19)
(cid:19)(cid:33)
∞(cid:88)
(cid:96)=0
T T
0
0
sT
(cid:18) (cid:80)∞
(cid:32) ∞(cid:88)
(cid:18) P(cid:96)
(cid:32) ∞(cid:88)
(cid:33)
(cid:18) PT T
(cid:19)
1 =
x(cid:96)
(cid:96)=0
(cid:96)=0
1
1
x(cid:96)1,
x0 = s
T and x(cid:96)+1 = x(cid:96)
(6)
Note that computing each vector x(cid:96) requires time O(n2).
Algorithm 1 terminates when the increase of the sum due to
the latest term falls below a pre-defined threshold .
0
.
V. PROBLEM CHARACTERIZATION
We now study the k-ARW-CENTRALITY problem in more
detail. In particular, we show that the function acQ is mono-
tone and supermodular, a property that is used later to provide
an approximation guarantee for the greedy algorithm. We also
show that k-ARW-CENTRALITY is NP-hard.
In the equation above, I is an (n − T) × (n − T) identity
matrix and 0 a matrix with all its entries equal to 0; PT T
is the T × T sub-matrix of P that contains the transition
probabilities between transient nodes; and PT C is the T×C
sub-matrix of P that contains the transition probabilities from
transient to absorbing nodes.
The probability of the walk being on node j at exactly (cid:96)
steps having started at node i, is given by the (i, j)-entry of
the matrix P(cid:96)
T T . Therefore, the expected total number of times
Algorithm 1 ApproximateAC
T
Input: Transition matrix PT T , threshold ,
starting probabilities s
Output: Absorbing centrality acQ
x0 ← s
δ ← x0 · 1
ac ← δ
(cid:96) ← 0
while δ < do
x(cid:96)+1 ← x(cid:96)
δ ← x(cid:96)+1 · 1
ac ← ac + δ
(cid:96) ← (cid:96) + 1
(cid:18) PT T
(cid:19)
0
return ac
Recall that a function f : 2V → R over subsets of a ground
set V is submodular if it has the diminishing returns property
f (Y ∪ {u}) − f (Y ) ≤ f (X ∪ {u}) − f (X),
(7)
for all X ⊆ Y ⊆ V and u (cid:54)∈ Y . The function f is super-
modular if −f is submodular. Submodularity (and supermod-
ularity) is a very useful property for designing algorithms. For
instance, minimizing a submodular function is a polynomial-
time solvable problem, while the maximization problem is
typically amenable to approximation algorithms,
the exact
guarantee of which depends on other properties of the function
and requirements of the problem, e.g., monotonicity, matroid
constraints, etc.
Even though the objective function acQ(C) is given in
closed-form by Equation (5), to prove its properties we find
it more convenient to work with its descriptive definition,
namely, acQ(C) being the expected length for a random walk
starting at nodes of Q before being absorbed at nodes of C.
For the rest of this section we consider that the set of query
nodes Q is fixed, and for simplicity we write ac = acQ.
Proposition 1 (Monotonicity) For all X ⊆ Y ⊆ V it is
ac(Y ) ≤ ac(X).
The proposition states that absorption time decreases with
Next we show that the absorbing random-walk centrality
more absorbing nodes. The proof is given in the Appendix.
measure ac(·) is supermodular.
Proposition 2 (Supermodularity) For all sets X ⊆ Y ⊆ V
and u (cid:54)∈ Y it is
ac(X) − ac(X ∪ {u}) ≥ ac(Y ) − ac(Y ∪ {u}).
(8)
Proof: Given an instantiation of a random walk, we define
the following propositions for any pair of nodes i, j ∈ V , non-
negative integer (cid:96), and set of nodes Z:
A(cid:96)
i,j(Z): The random walk started at node i and visited node j
after exactly (cid:96) steps, without visiting any node in set Z.
B(cid:96)
i,j(Z, u): The random walk started at node i and visited
node j after exactly (cid:96) steps, having previously visited
node u but without visiting any node in the set Z.
It is easy to see that the set of random walks for which A(cid:96)
i,j(Z)
is true can be partitioned into those that visited u within the
first (cid:96) steps and those that did not. Therefore, the probability
that proposition A(cid:96)
i,j(Z) is true for any instantiation of a
random walk generated by our model is equal to
i,j(Z)(cid:3) = Pr(cid:2)A(cid:96)
i,j(Z ∪ {u})(cid:3) + Pr(cid:2)B(cid:96)
i,j(Z, u)(cid:3) .
Pr(cid:2)A(cid:96)
(9)
Now, let Λ(Z) be the number of steps for a random walk
to reach the nodes in Z. Λ(Z) is a random variable and its
expected value over all random walks generated by our model
is equal to ac(Z). Note that the proposition Λ(Z) ≥ (cid:96) + 1
is true for a given instantiation of a random walk only if
there is a pair of nodes q ∈ Q and j ∈ V \ Z, for which the
proposition A(cid:96)
q,j(Z) is true. Therefore,
Pr [Λ(Z) ≥ (cid:96) + 1] =
(cid:88)
(cid:88)
q∈Q
j∈V \Z
Pr(cid:2)A(cid:96)
q,j(Z)(cid:3) .
From the above, it is easy to calculate ac(Z) as
ac(Z) = E[Λ(Z)]
(cid:96)=0
∞(cid:88)
∞(cid:88)
∞(cid:88)
∞(cid:88)
(cid:96)=1
(cid:96)=0
=
=
=
=
(cid:96) Pr [Λ(Z) = (cid:96)]
Pr [Λ(Z) ≥ (cid:96)]
Pr [Λ(Z) ≥ (cid:96) + 1]
(cid:88)
(cid:88)
Pr(cid:2)A(cid:96)
q,j(Z)(cid:3) .
(cid:96)=0
q∈Q
j∈V \Z
(10)
(11)
(12)
The final property we will need is the observation that, for
X ⊆ Y , B(cid:96)
i,j(Y, u) implies B(cid:96)
i,j(X, u) and thus
i,j(Y, u)(cid:3) .
By using Equation (11), the Inequality (8) can be rewritten as
i,j(X, u)(cid:3) ≥ Pr(cid:2)B(cid:96)
Pr(cid:2)B(cid:96)
(cid:88)
q,j(X)(cid:3)−
Pr(cid:2)A(cid:96)
(cid:88)
∞(cid:88)
(cid:88)
(cid:88)
Pr(cid:2)A(cid:96)
q,j(Y )(cid:3)−
(cid:88)
(cid:88)
∞(cid:88)
j∈V \{X∪{u}}
j∈V \X
j∈V \Y
q∈Q
(cid:96)=0
(cid:96)=0
q∈Q
j∈V \{Y ∪{u}}
∞(cid:88)
(cid:88)
q∈Q
(cid:96)=0
∞(cid:88)
(cid:88)
q∈Q
(cid:96)=0
≥
Pr(cid:2)A(cid:96)
q,j(X ∪ {u})(cid:3)
Pr(cid:2)A(cid:96)
q,j(Y ∪ {u})(cid:3) .
(13)
j∈V \Y
j∈V \X
j∈V \X
j∈V \{Y ∪{u}}
j∈V \{X∪{u}}
above inequality as
Pr(cid:2)A(cid:96)
Pr(cid:2)A(cid:96)
We only need to show that the inequality holds for an arbitrary
value of (cid:96) and q ∈ Q, that is
(cid:88)
Pr(cid:2)A(cid:96)
(cid:88)
Pr(cid:2)A(cid:96)
Notice that Pr(cid:2)A(cid:96)
(cid:88)
Pr(cid:2)A(cid:96)
(cid:88)
Pr(cid:2)A(cid:96)
q,j(X)(cid:3) − (cid:88)
q,j(X ∪ {u})(cid:3) ≥
q,j(Y )(cid:3) − (cid:88)
q,j(Y ∪ {u})(cid:3) .
i,u(Y ∪ {u})(cid:3) = 0, so we can rewrite the
q,j(X)(cid:3) − (cid:88)
q,j(X ∪ {u})(cid:3) ≥
q,j(Y )(cid:3) − (cid:88)
q,j(Y ∪ {u})(cid:3) .
i,j(X)(cid:3) − (cid:88)
Pr(cid:2)A(cid:96)
Pr(cid:2)A(cid:96)
(cid:88)
i,j(X, u)(cid:3)
Pr(cid:2)B(cid:96)
≥ (cid:88)
i,j(Y, u)(cid:3)
Pr(cid:2)B(cid:96)
i,j(Y )(cid:3) − (cid:88)
(cid:88)
Pr(cid:2)A(cid:96)
To show the latter inequality we start from the left hand side
and use Inequality (12). We have
i,j(Y ∪ {u})(cid:3) ,
i,j(X ∪ {u})(cid:3)
Pr(cid:2)A(cid:96)
Pr(cid:2)A(cid:96)
Pr(cid:2)A(cid:96)
(cid:88)
j∈V \X
=
j∈V \X
j∈V \X
j∈V \Y
j∈V \X
(14)
(15)
j∈V \Y
j∈V \Y
=
j∈V \Y
j∈V \Y
which completes the proof.
Finally, we establish the hardness of k absorbing centrality,
defined in Problem 1.
Theorem 1 The k-ARW-CENTRALITY problem is NP-hard.
Proof: We obtain a reduction from the VERTEXCOVER
problem [6]. An instance of the VERTEXCOVER problem is
specified by a graph G = (V, E) and an integer k, and asks
whether there exists a set of nodes C ⊆ V such that C ≤
k and C is a vertex cover, (i.e., for every (i, j) ∈ E it is
{i, j} ∩ C (cid:54)= ∅). Let V = n.
Given an instance of the VERTEXCOVER problem, we
construct an instance of the decision version of k-ARW-
CENTRALITY by taking the same graph G = (V, E) with
query nodes Q = V and asking whether there is a set of
absorbing nodes C such that C ≤ k and acQ(C) ≤ 1 − k
n.
We will show that C is a solution for VERTEXCOVER if
and only if acQ(C) ≤ 1 − k
n.
Assuming first that C is a vertex cover. Consider a random
walk starting uniformly at random from a node v ∈ Q = V .
If v ∈ C then the length of the walk will be 0, as the walk
will be absorbed immediately. This happens with probability
C/V = k/n. Otherwise, if v (cid:54)∈ C the length of the walk
will be 1, as the walk will be absorbed in the next step (since
C is a vertex cover all the neighbors of v need to belong in
C). This happens with the rest of the probability 1 − k/n.
Thus, the expected length of the random walk is
= 1 − k
n
acQ (C) = 0 · k
n
1 − k
n
+ 1 ·
(cid:18)
(cid:19)
(16)
Conversely, assume that C is not a vertex cover for G. Then,
there should be an uncovered edge (u, v). A random walk that
starts in u and then goes to v (or starts in v and then goes to u)
will have length at least 2, and this happens with probability
n2 . Then, following a similar reasoning as
at least 2
n
in the previous case, we have
≥ 2
dmax
1
∞(cid:88)
∞(cid:88)
(cid:18)
k=1
k=0
(cid:19)
acQ(C) =
=
≥
k Pr (absorbed in exactly k steps)
Pr (absorbed after at least k steps)
1 − k
n
+
2
n2 > 1 − k
n
.
(17)
VI. ALGORITHMS
This section presents algorithms to solve the k-ARW-
CENTRALITY problem. In all cases, the set of query nodes
Q ⊆ V is given as input, along with a set of candidate nodes
D ⊆ V and the restart probability α.
A. Greedy approach
The first algorithm is a standard greedy algorithm, denoted
Greedy, which exploits the supermodularity of the absorbing
random-walk centrality measure. It starts with the result set C
equal to the empty set, and iteratively adds a node from the
set of candidate nodes D, until k nodes are added. In each
iteration the node added in the set C is the one that brings the
largest improvement to acQ.
As shown before, the objective function to be minimized,
i.e., acQ, is supermodular and monotonically decreasing. The
Greedy algorithm is not an approximation algorithm for this
minimization problem. However, it can be shown to provide
an approximation guarantee for maximizing the absorbing
centrality gain measure, defined below.
Definition 1 (Absorbing centrality gain) Given a graph G,
a set of query nodes Q, and a set of candidate nodes D, the
absorbing centrality gain of a set of nodes C ⊆ D is defined
as
acgQ(C) = mQ − acQ(C),
where mQ = minv∈D{acQ({v})}.
Justification of the gain function. The reason to define
the absorbing centrality gain is to turn our problem into a
submodular-maximization problem so that we can apply stan-
dard approximation-theory results and show that the greedy
algorithm provides a constant-factor approximation guarantee.
The shift mQ quantifies the absorbing centrality of the best
single node in the candidate set. Thus, the value of acgQ(C)
expresses how much we gain in expected random-walk length
Q is that acg(cid:48)
when we use the set C as absorbing nodes compared to when
we use the best single node. Our goal is to maximize this gain.
Observe that the gain function acgQ is not non-negative ev-
erywhere. Take for example any node u such that acQ({u}) >
mQ. Then, acgQ({u}) < 0. Note also that we could have
obtained a non-negative gain function by defining gain with
respect to the worst single node, instead of the best. In other
Q(C) = MQ − acQ(C), with
words, the gain function acg(cid:48)
MQ = maxv∈D{acQ({v})}, is non-negative everywhere.
Nevertheless, the reason we use the gain function acgQ
instead of acg(cid:48)
Q takes much larger values than
acgQ, and thus, a multiplicative approximation guarantee on
acg(cid:48)
Q is a weaker result than a multiplicative approximation
guarantee on acgQ. On the other hand, our definition of
acgQ creates a technical difficulty with the approximation
guarantee, that is defined for non-negative functions. Luckily,
this difficulty can be overcome easily by noting that, due to the
monotonicity of acgQ, for any k > 1, the optimal solution of
the function acgQ, as well as the solution returned by Greedy,
are both non-negative.
Approximation guarantee. The fact that the Greedy algo-
rithm gives an approximation guarantee to the problem of
maximizing absorbing centrality gain is a standard result from
the theory of submodular functions.
Proposition 3 The function acgQ is monotonically increasing,
and submodular.
Proposition 4 Let k > 1. For the problem of finding a set
C ⊆ D with C ≤ k, such that acgQ(C) is maximized, the
Greedy algorithm gives a(cid:0)1 − 1
(cid:1)-approximation guarantee.
e
We now discuss the complexity of the Greedy algorithm.
A naıve implementation requires computing the absorbing
centrality acQ(C) using Equation (5) for each set C that
needs to be evaluated during the execution of the algorithm.
However, applying Equation (5) involves a matrix inversion,
which is a very expensive operation. Furthermore, the number
of times that we need to evaluate acQ(C) is O(kD), as
for each iteration of the greedy we need to evaluate the
improvement over the current set of each of the O(D)
candidates. The number of candidates can be very large, e.g.,
D = n, yielding an O(kn4) algorithm, which is prohibitively
expensive.
We can show, however, that we can execute Greedy sig-
nificantly more efficiently. Specifically, we can prove the
following two propositions.
Proposition 5 Let Ci−1 be a set of i − 1 absorbing nodes,
Pi−1 the corresponding transition matrix, and let Fi−1 =
(I − Pi−1)−1. Let Ci = Ci−1 ∪ {u}. Given Fi−1 the value
acQ(Ci) can be computed in O(n2).
Proposition 6 Let C be a set of absorbing nodes, P the
corresponding transition matrix, and F = (I − P)−1. Let
C(cid:48) = C − {v} ∪ {u}, u, v ∈ C. Given F the value acQ(C(cid:48))
can be computed in time O(n2).
The proofs of these two propositions can be found in the Ap-
Algorithm 2 Greedy
Input: graph G, query nodes Q, candidates D, k ≥ 1
Output: a set of k nodes C
Compute acQ({v}) for arbitrary v ∈ D
For each u ∈ (D − {v}), use Prop.6 to compute acQ(u)
Select u1 ∈ D s.t. u1 ← arg maxu∈D acQ(u)
Initialize solution C ← {u1}
for i = 2..k do
For each u ∈ D, use Prop.5 to compute acQ(C ∪ {u})
Select ui ∈ D s.t. ui ← arg maxui∈(D−C) acQ(C ∪{u})
Update solution C ← C ∪ {ui}
return C
pendix. Proposition 5 implies that in order to compute acQ(Ci)
for absorbing nodes Ci in O(n2), it is enough to maintain the
matrix Fi−1, computed in the previous step of the greedy al-
gorithm for absorbing nodes Ci−1. Proposition 6, on the other
hand, implies that we can compute the absorbing centrality
of each set of absorbing nodes of a fixed size i in O(n2),
given the matrix F, which is computed for one arbitrary set of
absorbing nodes C of size i. Combined, the two propositions
above yield a greedy algorithm that runs in O(kn3) and offers
the approximation guarantee discussed above. We outline it as
Algorithm 2.
Practical speed-up. We found that the following heuristic lets
us speed-up Greedy even further, with no significant loss in
the quality of results. To select the first node for the solution
set C (see Algorithm 2), we calculate the PageRank values of
all nodes in D and evaluate acQ only for the t << k nodes
with highest PageRank score, where t is a fixed parameter.
In what follows, we will be using this heuristic version of
Greedy, unless explicitly stated otherwise.
B. Efficient heuristics
Even though Greedy runs in polynomial time, it can be
quite inefficient when employed on moderately sized datasets
(more than some tens of thousands of nodes). We thus describe
algorithms that we study as efficient heuristics for the problem.
These algorithms do not offer guarantee for their performance.
Spectral methods have been used extensively for the problem
of graph partitioning. Motivated by the wide applicability
of this family of algorithms, here we explore three spectral
algorithms: SpectralQ, SpectralC, and SpectralD. We start by
a brief overview of the spectral method; a comprehensive
presentation can be found in the tutorial by von Luxburg [17].
the
original graph into a low-dimensional Euclidean space so
that distances between nodes in the graph correspond to Eu-
clidean distances between the corresponding projected points.
A standard spectral embedding method, proposed by Shi
and Malik [15], uses the “random-walk” Laplacian matrix
LG = I − D−1A of a graph G, where A is the adjacency
matrix of the graph, and forms the matrix U = [u2, . . . , ud+1]
whose columns are the eigenvectors of LG that correspond to
The main idea of spectral approaches is to project
the smallest eigenvalues λ2 ≤ . . . ≤ λd+1, with d being the
target dimension of the projection. The spectral embedding is
then defined by mapping the i-th node of the graph to a point
in Rd, which is the i-row of the matrix U.
The algorithms we explore are adaptations of the spectral
method. They all start by computing the spectral embedding
φ : V → Rd, as described above, and then, proceed as follows:
SpectralQ performs k-means clustering on the embeddings of
the query nodes, where k is the desired size of the result set.
Subsequently, it selects candidate nodes that are close to the
computed centroids. Specifically, if si is the size of the i-th
cluster, then ki candidate nodes are selected whose embedding
is the nearest to the i-th centroid. The number ki is selected
so that ki ∝ si and(cid:80) ki = k.
SpectralC is similar to SpectralQ, but it performs the k-means
clustering on the embeddings of the candidate nodes, instead
of the query nodes.
SpectralD performs k-means clustering on the embeddings of
the query nodes, where k is the desired result-set size. Then,
it selects the k candidate nodes whose embeddings minimize
the sum of squared (cid:96)2-distances from the centroids, with no
consideration of the relative sizes of the clusters.
Personalized Pagerank (PPR). This is the standard Pager-
ank [4] algorithm with a damping factor equal to the restart
probability α of the random walk and personalization prob-
abilities equal to the start probabilities s(q). Algorithm PPR
returns the k nodes with highest PageRank values.
Degree and distance centrality. Finally, we consider the
standard degree and distance centrality measures.
Degree returns the k highest-degree nodes. Note that this
baseline is oblivious to the query nodes.
Distance returns the k nodes with highest distance centrality
with respect to Q. The distance centrality of a node u is
defined as dc(u) =
(cid:16)(cid:80)
(cid:17)−1
v∈Q d(u, v)
.
VII. EXPERIMENTAL EVALUATION
A. Datasets
We evaluate the algorithms described in Section VI on two
sets of real graphs: one set of small graphs that allows us
to compare the performance of the fast heuristics against the
greedy approach; and one set of larger graphs, to compare the
performance of the heuristics against each other on datasets
of larger scale. Note that the bottleneck of the computation
lies in the evaluation of centrality. Even though the technique
we describe in Section IV-A allows it to scale to datasets
of tens of thousands of nodes on a single processor, it is
still prohibitively expensive for massive graphs. Still, our
experimentation allows us to discover the traits of the different
algorithms and understand what performance to anticipate
when they are employed on graphs of massive size.
The datasets are listed in Table I. Small graphs are obtained
from Mark Newman’s repository1, larger graphs from SNAP.2
Dataset
TABLE I: Dataset statistics
E
78
159
254
425
613
2 891
4 141
14 496
25 998
13 932
23 409
karate
dolphins
lesmis
adjnoun
football
kddCoauthors
livejournal
ca-GrQc
ca-HepTh
roadnet
oregon-1
V
34
62
77
112
115
2 891
3 645
5 242
9 877
10 199
11 174
For kddCoauthors, livejournal, and roadnet we use
samples of the original datasets. In the interest of repeatability,
our code and datasets are made publicly available.3
B. Evaluation Methodology
Each experiment in our evaluation framework is defined
by a graph G, a set of query nodes Q, a set of candidate
nodes D, and an algorithm to solve the problem. We evaluate
all algorithms presented in Section VI. For the set of candidate
nodes D, we consider two cases: it is equal to either the set of
query nodes, i.e., D = Q, or the set of all nodes, i.e., D = V .
Query nodes Q are selected randomly, using the following
process: First, we select a set S of s seed nodes, uniformly
at random among all nodes. Then, we select a ball B(v, r)
of predetermined radius r = 2, around each seed v ∈ S.4
Finally, from all balls, we select a set of query nodes Q of
predetermined size q, with q = 10 and q = 20, respectively,
for the small and larger datasets. Selection is done uniformly
at random.
Finally, the restart probability α is set to α = 0.15 and the
starting probabilities s are uniform over Q.
C. Implementation
All algorithms are implemented in Python using the Net-
workX package [8], and were run on an Intel Xeon 2.83GHz
with 32GB RAM.
D. Results
Figure 1 shows the centrality scores achieved by different
algorithms on the small graphs for varying k (note: lower is
better). We present two settings: on the left, the candidates are
all nodes (D = V ), and on the right, the candidates are only
the query nodes (D = Q). We observe that PPR tracks well
the quality of solutions returned by Greedy, while Degree and
Distance often come close to that. Spectral algorithms do not
perform that well.
Figure 2 is similar to Figure 1, but results on the larger
datasets are shown, not including Greedy. When all nodes are
candidates, PPR typically has the best performance, followed
by Distance, while Degree is unreliable. The spectral algo-
rithms typically perform worse than PPR.
1http://www-personal.umich.edu/%7Emejn/netdata/
2http://snap.stanford.edu/data/index.html
3https://github.com/harrymvr/absorbing-centrality
4For the planar roadnet dataset we use r = 3.
When only query nodes are candidates, all algorithms
typically
demonstrate similar performance, which is most
worse than the performance of PPR (the best performing
algorithm) in the previous setting. Both observations can be
explained by the fact that the selection is very restricted by
the requirement D = Q, and there is not much flexibility for
the best performing algorithms to produce a better solution.
In terms of running time on the larger graphs, Distance
returns within a few minutes (with observed times between 15
seconds to 5 minutes) while Degree returns within seconds (all
observed times were less than 1 minute). Finally, even though
Greedy returns within 1-2 seconds for the small datasets, it
does not scale well for the larger datasets (running time is
orders of magnitude worse than the heuristics and not included
in the experiments).
Based on the above, we conclude that PPR offers the best
trade-off of quality versus running time for datasets of at least
moderate size (more than 10 k nodes).
VIII. CONCLUSIONS
In this paper, we have addressed the problem of finding
central nodes in a graph with respect to a set of query nodes Q.
Our measure is based on absorbing random walks: we seek
to compute k nodes that minimize the expected number of
steps that a random walk will need to reach at (and be
“absorbed” by) when it starts from the query nodes. We have
shown that the problem is NP-hard and described an O(kn3)
greedy algorithm to solve it approximately. Moreover, we
experimented with heuristic algorithms to solve the problem on
large graphs. Our results show that, in practice, personalized
PageRank offers a good combination of quality and speed.
REFERENCES
[1] R. Agrawal, S. Gollapudi, A. Halverson, and S. Ieong. Diversifying
the Second ACM International
search results.
Conference on Web Search and Data Mining, pages 5–14. ACM, 2009.
[2] A. Angel and N. Koudas. Efficient diversity-aware search. ACM, June
In Proceedings of
[3] P. Boldi and S. Vigna. Axioms for centrality.
Internet Mathematics,
2011.
2014.
[4] S. Brin and L. Page. The anatomy of a large-scale hypertextual web
search engine. Computer Networks and ISDN Systems, 30, 1998.
[5] L. Freeman. A set of measures of centrality based upon betweenness.
Sociometry, 40, 1977.
[6] M. Garey and D. Johnson. Computers and intractability; A guide to the
theory of NP-completeness. W. H. Freeman & Co., 1990.
[7] G. H. Golub and C. F. Van Loan. Matrix computations, volume 3. JHU
Press, 2012.
[8] A. A. Hagberg, D. A. Schult, and P. J. Swart. Exploring network
structure, dynamics, and function using NetworkX. In SciPy, 2008.
[9] L. Katz. A New Status Index Derived from Sociometric Index.
Psychometrika, 1953.
[10] A. N. Langville and C. D. Meyer. A survey of eigenvector methods for
web information retrieval. SIAM review, 47(1):135–161, 2005.
[11] H. J. Leavitt. Some effects of certain communication patterns on group
performance. The Journal of Abnormal and Social Psychology, 1951.
[12] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and
N. Glance. Cost-effective outbreak detection in networks. In SIGKDD.
ACM, 2007.
[13] J. D. Noh and H. Rieger. Random walks on complex networks. Phys.
Rev. Lett., 92, 2004.
[14] G. Sabidussi. The centrality index of a graph. Psychometrika, 31, 1966.
[15] J. Shi and J. Malik. Normalized cuts and image segmentation. IEEE
transactions on Pattern Analysis and Machine Intelligence, 22(8):888–
905, 2000.
[16] M. R. Vieira, H. L. Razente, M. C. N. Barioni, M. Hadjieleftheriou,
D. Srivastava, A. J. M. Traina, and V. J. Tsotras. On query result diver-
sification. 2011 IEEE International Conference on Data Engineering,
pages 1163–1174, 2011.
[17] U. Von Luxburg. A tutorial on spectral clustering.
Statistics and
computing, 17(4):395–416, 2007.
[18] X. Zhu, A. Goldberg, J. Van Gael, and D. Andrzejewski.
Improving
diversity in web search results re-ranking using absorbing random walks.
In NAACL-HLT, 2007.
APPENDIX
A. Proposition 1
Proposition (Monotonicity) For all X ⊆ Y ⊆ V it
ac(Y ) ≤ ac(X).
is
Proof: Write GX for the input graph G where the set X
are absorbing nodes. Define GY similarly. Let Z = Y \ X.
Consider a path p in GX drawn from the distribution induced
by the random walks on GX. Let Pr [p] be the probability of
the path and (cid:96)(p) its length. Let P(X) and P(Y ) be the set
of paths on GX and GY . Finally, let P(Z, X) be the set of
paths on GX that pass from Z, and P(Z, X) the set of paths
on GX that do not pass from Z. We have
ac(X) =
(cid:88)
(cid:88)
≥ (cid:88)
=
p∈P(X)
p∈P(Y )
= ac(Y ),
p∈P(Z,X)
Pr [p] (cid:96)(p)
Pr [p] (cid:96)(p) +
(cid:88)
p∈P(Z,X)
Pr [p] (cid:96)(p)
Pr [p] (cid:96)(p)
where the inequality comes from the fact that a path in GX
passing from Z and being absorbed by X corresponds to a
shorter path in GY being absorbed by Y .
B. Proposition 5
Proposition Let Ci−1 be a set of i − 1 absorbing nodes,
Pi−1 the corresponding transition matrix, and Fi−1 = (I −
Pi−1)−1. Let Ci = Ci−1 ∪ {u}. Given Fi−1, the centrality
score acQ(Ci) can be computed in time O(n2).
The proof makes use of the following lemma.
Lemma 1 (Sherman-Morrison Formula [7]) Let M be a
square n×n invertible matrix and M−1 its inverse. Moreover,
let a and b be any two column vectors of size n. Then, the
following equation holds
(M + abT )−1 = M−1 − M−1abT M−1/(1 + bT M−1a).
Proof: Without loss of generality, let the set of absorbing
nodes be Ci−1 = {1, 2, . . . , i − 1}. As in Section VI, the
expected number of steps before absorption is given by the
formulas
acQ(Ci−1) = sT
Q
Fi−11,
Notice that
=
0(i−1)×n
−pi,1 . . . − pi,n
pi+1,0 . . . pi+1,n
0(n−i−1)×n
A(cid:48) − A = (I − P(cid:48)) − (I − P) = P − P(cid:48)
= a2bT
2 − a1bT
1
where pi,j denotes the transition probability from node i to
node j in a transition matrix P0 where neither node i or i + 1
is absorbing, and the column-vectors a1, b1, a2, b2 are defined
as
0 . . . 0 1 0
a1 = [
b1 = [pi,1 . . . pi,n]
i−1
(cid:122)(cid:125)(cid:124)(cid:123)
(cid:122)(cid:125)(cid:124)(cid:123)
i−1
0 . . . 0]
n−i−1
(cid:122)(cid:125)(cid:124)(cid:123)
(cid:122)(cid:125)(cid:124)(cid:123)
n−i−1
0 . . . 0 0 1
a2 = [
0 . . . 0]
b2 = [pi+1,1 . . . pi+1,n].
By an argument similar with the one we made in the proof
of Proposition 5, we can compute F(cid:48) in the following two
steps from F, each costing O(n2) operations for the provided
parenthesization
Z = F − (Za2)(bT
F(cid:48) = Z + (Fa1)(bT
2 Z)/(1 + bT
1 F)/(1 + bT
2 (Za2)),
1 (Fa1)).
We have thus shown that, given F, we can compute F(cid:48), and
therefore acQ(C(cid:48)) as well, in time O(n2).
with Fi−1 = A−1
i−1 and Ai−1 = I − Pi−1.
We proceed to show how to increase the set of absorbing nodes
by one and calculate the new absorption time by updating Fi−1
in O(n2). Without loss of generality, suppose we add node i
to the absorbing nodes Ci−1, so that
Ci = Ci−1 ∪ {i} = {1, 2, . . . , i − 1, i}.
Let Pi be the transition matrix over G with absorbing nodes
Ci. Like before, the expected absorption time by nodes Ci is
given by the formulas
acQ(Ci) = sT
Q
Fi1,
with Fi = A−1
i
and Ai = I − Pi.
Notice that
Ai − Ai−1 = (I − Pi) − (I − Pi−1) = Pi−1 − Pi
0(i−1)×n
pi,1 . . . pi,n
0(n−i)×n
=
= abT
where pi,j denotes the transition probability from node i to
node j in transition matrix Pi−1, and the column-vectors a
and b are defined as
(cid:122)(cid:125)(cid:124)(cid:123)
i−1
(cid:122)(cid:125)(cid:124)(cid:123)
n−i
0 . . . 0], and
0 . . . 0 1
a = [
b = [pi,1 . . . pi,n].
By a direct application of Lemma 1, it is easy to see that we
can compute Fi from Fi−1 with the following formula, at a
cost of O(n2) operations.
Fi = Fi−1 − (Fi−1a)(bT Fi−1)/(1 + bT (Fi−1a))
We have thus shown that, given Fi−1, we can compute Fi,
and therefore acQ (Ci) as well, in O(n2).
C. Proposition 6
Proposition Let C be a set of absorbing nodes, P the
corresponding transition matrix, and F = (I − P)−1. Let
C(cid:48) = C − {v} ∪ {u}, for u, v ∈ C. Given F, the centrality
score acQ(C(cid:48)) can be computed in time O(n2).
Proof: The proof is similar to the proof of Proposition 5.
Without loss of generality, let the two sets of absorbing nodes
be
C = {1, 2, . . . , i − 1, i}, and
C(cid:48) = {1, 2, . . . , i − 1, i + 1}.
Let P(cid:48) be the transition matrix with absorbing nodes C(cid:48). The
absorbing centrality for the two sets of absorbing nodes C and
C(cid:48) is expressed as a function of the following two matrices
F = A−1, with A = I − P, and
F(cid:48) = A(cid:48)−1, with A(cid:48) = (I − P(cid:48)).
(a) karate
(b) dolphins
(c) lesmis
(d) adjnoun
(e) football
Fig. 1: Results on small datasets for varying k and s = 2.
(a) ca-GrQc
(b) ca-HepTh
(c) livejournal
(d) oregon-1
(e) roadnet
(f) kddCoauthors
Fig. 2: Results on large datasets for varying k and s = 5.
|
1210.3266 | 1 | 1210 | 2012-10-11T15:17:35 | Detecting dense communities in large social and information networks with the Core & Peel algorithm | [
"cs.SI",
"cs.DS",
"physics.soc-ph"
] | Detecting and characterizing dense subgraphs (tight communities) in social and information networks is an important exploratory tool in social network analysis. Several approaches have been proposed that either (i) partition the whole network into clusters, even in low density region, or (ii) are aimed at finding a single densest community (and need to be iterated to find the next one). As social networks grow larger both approaches (i) and (ii) result in algorithms too slow to be practical, in particular when speed in analyzing the data is required. In this paper we propose an approach that aims at balancing efficiency of computation and expressiveness and manageability of the output community representation. We define the notion of a partial dense cover (PDC) of a graph. Intuitively a PDC of a graph is a collection of sets of nodes that (a) each set forms a disjoint dense induced subgraphs and (b) its removal leaves the residual graph without dense regions. Exact computation of PDC is an NP-complete problem, thus, we propose an efficient heuristic algorithms for computing a PDC which we christen Core and Peel. Moreover we propose a novel benchmarking technique that allows us to evaluate algorithms for computing PDC using the classical IR concepts of precision and recall even without a golden standard. Tests on 25 social and technological networks from the Stanford Large Network Dataset Collection confirm that Core and Peel is efficient and attains very high precison and recall. | cs.SI | cs |
1
Detecting dense communities in large social and
information networks with the Core & Peel algorithm
Marco Pellegrini
Filippo Geraci
Institute for Informatics and
Institute for Informatics and
Institute for Informatics and
Consiglio Nazionale delle
Consiglio Nazionale delle
Consiglio Nazionale delle
Via Moruzzi 1, 56124 Pisa,
Via Moruzzi 1, 56124 Pisa,
Via Moruzzi 1, 56124 Pisa,
Telematics
Ricerche
Italy
Telematics
Ricerche
Italy
Miriam Baglioni
Telematics
Ricerche
Italy
[email protected]
[email protected]
[email protected]
ABSTRACT
Detecting and characterizing dense subgraphs (tight com-
munities) in social and information networks is an impor-
tant exploratory tool in social network analysis. Several
approaches have been proposed that either (i) partition the
whole network into "clusters", even in low density region,
or (ii) are aimed at finding a single densest community (and
need to be iterated to find the next one). As social networks
grow larger both approaches (i) and (ii) result in algorithms
too slow to be practical, in particular when speed in ana-
lyzing the data is required.
In this paper we propose an
approach that aims at balancing efficiency of computation
and expressiveness/manageability of the output community
representation. We define the notion of a partial dense cover
(PDC) of a graph. Intuitively a PDC of a graph is a collec-
tion of sets of nodes that (a) each set forms a disjoint dense
induced subgraphs and (b) its removal leaves the residual
graph without dense regions. Exact computation of PDC
is an NP-complete problem, thus, we propose an efficient
heuristic algorithms for computing a PDC which we christen
Core & Peel. Moreover we propose a novel benchmarking
technique that allows us to evaluate algorithms for comput-
ing PDC using the classical IR concepts of precision and
recall even without a golden standard. Tests on 25 social
and technological networks from the Stanford Large Net-
work Dataset Collection confirm that Core & Peel is efficient
and attains very high precison and recall.
1.
INTRODUCTION
Finding dense sub-networks in complex (social, communi-
cation, technological, biological) networks is a key exploratory
tool in complex network analysis as often one can spot emerg-
ing phenomena liked to these regions with an above-average
level of activity. As we will use social networks as a key
metaphor we will talk of dense communities of nodes.
A brief taxonomy of approaches to community de-
tection. The recent literature the detection of community
structures in complex graphs can be roughly split into three
trends.
The fist approach has concentrated on partitioning the
nodes of a graph into clusters (or modules) so to favor the
formation of modules for which intra-modules connections
are favored over inter-module connections (e.g. the classical
algorithm of Girvan and Newman [19]). This approach uses
a non-local definition of "density" and postulates that every
node should belong to some community (or alternatively)
that all communities even if a low density or hard to dis-
tinguish from the background are of interest (approach A).
Being a partition of the nodes, the communities found are
disjoint.
The second approach postulates that a connected com-
munity maximizing the density should be sought [3, 8]. A
collection of dense communities can be constructed by re-
moving the community found from the input graph and
iterating the method on the residual graph (approach B).
Communities found in this way are disjoint.
A third approach aims at enumerating all dense subgraphs
within the graph, usually with a condition of maximality,
but allowing overlaps among communities (see e.g. PalE-
tAl05)(approach C). In the worst case, the size of the out-
put of an algorithm listing all maximal cliques (or maximal
dense subgraphs) can be exponentially larger than the size
of the input.
Any of the aforementioned approaches has its pros and
cons. Very Large social networks currently available pose
a challenge to community analysis approaches in terms of
computation time, main memory storage and readability of
the algorithms' results.
So while approaches (A) and (C) may reveal a complex
community landscape, they do so in a quite unfocussed man-
ner, that implies slow computations, and/or high memory
consumption, and an output that may need further anal-
ysis/modelling/visualization to be of use.
In contrast ap-
proach (B) may be fast if appropriate heuristics are em-
ployed, but reveals only a single community in an otherwise
more complex landscape. A the simple solution consisting in
iterating approach (B) over the residual graph obtained by
removing the found densest community would be an over-
shooting for this problem, taking us back to the problem of
an excessive time complexity.
2
The fourth approach, which is advocated in this paper as
well as in others (see e.g.
[28], [12], [18] [9], [36]) is that
of collecting in one go a collection of disjoint dense com-
munities above a certain size and density thresholds. This
approach is suitable for very large graphs since the output
is easy to interpret, visualize, and feed to further filters and
analytic tools, in particular it is often the method of choice
for the web graphs because of their size.
Our contribution. This paper presents two main contri-
butions. The first is a formalization of the problem of (dis-
joint) communities detection as that of computing a partial
dense cover of a graph and an efficient algorithm (christened
Core & Peel) for computing heuristically the partial dense
covers of a graph. The second contribution is methodolog-
ical and aims at improving our capability of measuring the
quality of an heuristic algorithms for (disjoint) community
detection. In particular we propose a scheme that allow us
to measure performance by classical IR concepts of precision
and recall or realistic (i.e. non-random) graphs even without
using a golden standard.
The Core & Peel algorithm. We present an heuris-
tic algorithm for detecting all sufficiently dense subgraphs
of a graph G whose removal produces a residual graph G′
without dense subgraphs. The main idea consists in visiting
the nodes of a graph in an appropriate order and for each
visited node (called a seed) we look in the neighborhood of
the seed in order to isolate those nodes in the neighborhood
that, together with the seed, can participate in an a suffi-
ciently dense induced subgraph. The order of the visit of
the node is chosen so to visit first those nodes more likely to
contribute in a larger dense subgraph. Large and dense sub-
graph must be detected only once so to avoid wasting time
re-discovering the same subgraph multiple times (i.e. with
by a single seed) thus once such dense subgraph is detected
its component vertices are marked and cannot be used as
seeds any more. The visit order is produced by computing
first the core number of each node in the graph, which rep-
resent an upper bound to the average degree of the largest
clique (or quasi-clique) incident to a node. Once a suitable
region around a seed is detected that is likely to hold a dense
subgraph, we employ a variant of the peeling procedure de-
scribed by Charikar in [8] to extract the dense subgraph.
The key definitions and the algorithm is described in 4.
Benchmarking methodology.
In may areas of com-
puter science the lack of a common benchmarking methodol-
ogy is often recognized as one of the main obstacles towards
speedy progress in solving the key problems of that area.
The IR community has been one of the first success stories
in setting up an effective benchmarking methodology codi-
fied through the TREC conference series. For the problem of
clique detection the TCS and OR communities established
the DIMACS benchmark collection. While many methods
for community detection have been proposed recently, there
is still no accepted benchmarking methodology. Most pa-
pers address the issue of algorithmic validation by planting
a few dense subgraph in a random graph and comparing the
predicted dense subgraph against the planted ones. This
"standard" approach is however wanting in many respects.
(a) First of all it is well known that the basic Erdos-R´enyi
random graph model is not suitable for modelling complex
(social, technological, etc..) networks, while on the other
hand it is still an open area of research that of producing
suitable generative graph models. At the moment no single
model can cover the whole range of applications.
(b) Secondly, the embedded communities should not skew
too much the underlying graph distribution (e.g. the ver-
tex degree distribution) so to avoid making the instances
amenable to approach based on simple statistical filters.
(c) Thirdly, the possible presence of native (non-planted)
dense subgraphs complicates the assessment as any method
since detecting such nodes cannot be considered a fault of
the algorithm, and should be weighted positively rather than
ignored.
In section 5 we propose a method that copes with issues
(a),(b) and (c) and results in a more stringent and realistic
assessment for community detection algorithms. In particu-
lar we are able to define both precision and recall measure-
ments that are standard and well understood measures of
quality in IR applications.
2. PREVIOUS WORK
Most of the known results are for finding a single maxi-
mum size dense subgraph (or clique). In [29] V.E. Lee et al.
give a survey of the state of the art on algorithms for dense
subgraph discovery. Here we recall the main known results.
Densest subgraph detection. Dense subgraphs can be
defined in a variety of ways: if we seek the subgraph H of G
maximizing the average degree 2E(H)/V (H), then there
is an exact polynomial algorithm based on max-flow/min-
cut computations [16, 20]. A second exact polynomial time
algorithm based on a reduction to LP is shown in [8]. A
simple greedy (1/2)-approximation algorithm1 is also shown
in [8].
If we look for the densest subgraph with exactly k-vertices
(dks), which is an NP-complete problem, Feige et al.
[14]
gave an O(n−1/3+ǫ)-approximation algorithm, where n =
V , and ǫ > 0 an arbitrarily small positive constant. The
approximation coefficient has been later improved in [6] to
O(n−1/4+ǫ). It is known that this problem does not admit
a PTAS, unless some hard complexity hypothesis holds [25].
If we look for the densest subgraph with at least k-vertices
(dalks) Andersen et al. [3] give an efficient (1/3)-approximation
algorithm for this problem, based on core decomposition. In
the same paper it is shown that the densest at most k prob-
lem (damks) is as hard as dks. Somewhat more complex (still
polynomial) algorithms (based on LP and/or max-flow) at-
tain an approximation factor of 1/2 for dalks [2, 26].
A different notion of "density" is used in the definition
of γ-quasi cliques. A graph G = (V, E) is a γ-quasi clique
if every node in G is adjacent to at least γ(V − 1) nodes
in G. The densest subgraph problem (with this notion of
density) can be recast as the problem of finding the largest
induced subgraph that is a γ-quasi clique, for a fixed value
of γ. Heuristics for detecting quasi-cliques are developed in
[30, 1]. A method for detecting quasi-cliques tailored for
external memory computations is given in [38]. Since, for
γ = 1 we obtain a clique, this problem is in general as hard
as maximum clique detection.
1A ρ-approximation algorithm A for a maximization prob-
lem, with 0 ≤ ρ ≤ 1 is an algorithm that, calling OPT the
value of the objective function f (.) ≥ 0 for the optimal so-
lution, returns a solution x, whose value of the objective
function f (x) is such that ρOP T ≤ f (x) ≤ OP T .
3
When the subgraph sought are relatively large and dense,
a sampling approach based on shingling by Gibson et al.
[18] works well in practice.
In [37] Wang et al. define dense subgraph by placing
a lower bound on the number of common neighbors for
each pair of adjacent nodes in the subgraph, and propose
a method based on iterating an efficient triangle counting
black-box algorithm.
Maximum clique. The maximum clique problem for a
graph G requires to find the the largest complete subgraph
of G, and is a classical NP-complete problem. Since this
problem is also hard to approximate [23] the research effort
has been directed towards heuristic, or exact algorithms still
exponential in the worst case, but able to be fast in practice
over certain classes of input graphs (see [7] for a survey).
Other graphs.
In this paper we restrict ourselves to
generic (undirected) graphs. There is also a vast literature
which we do not touch here (and corresponding different
definitions) for directed graphs, for bipartite graphs, and
other generalizations or specializations of graphs.
Dense subgraphs and communities in social net-
works. In social graphs often communities are defined in
terms of dense subgraphs (see [15, 19, 33, 27]. Also dense bi-
partite subgraphs are important in some applications since
web communities are often modeled a as bipartite subgraphs
of hubs and authorities (see e.g. [28, 12]).
Partial dense covers approaches. A work that has
similar aims as ours is in [9], where a partial vertex cover
with dense subgraphs is sought.
In [36] wang et al. map
the problem into a real geometric space and look for dense
clusters of points in this space.
Core Decomposition. Since we use heavily properties
of the core decomposition of a graph, we survey some related
results. The k-core of a graph G = (V, E) is defined in [34]
as an induced subgraph H of G, of minimum degree at least
k. The core number of a vertex v of G is the order of the
largest k-core to which v belongs. The core decomposition
of a graph is a partition of the nodes into equivalence classes
by the core number of its vertices. The core number cn(G)
of a a graph is the maximum core number of any vertex in
v.
A very efficient method (linear in the graph size O(V +
E)) for computing the core decomposition of a graph was
proposed in [5]. For a graph too large to fit in RAM memory
a method in [10] allows to compute the core decomposition
of a graph with O(cn(G)) scans of the data. Several applica-
tions of core decomposition to the analysis of networks are
listed in [10].
The core decomposition is used as a preliminary phase in
the approximate algorithms in [3] for the densest at-least-k
subgraph problem (dalk).
3. PRELIMINARIES
Let G = (V, E ⊂ V × V ) be a simple (undirected) graph (no
self-loops, no multiple edges).
A subset Q ⊂ V induces a subgraph HQ = (Q, EQ), where
EQ = {(a, b) ∈ Ea ∈ Q ∧ b ∈ Q}.
A nice survey of concepts and algorithms related to local
density of subgraphs is in [27]. We restrict ourselves to local
density definitions, that are those for which the density of a
subset Q is a function depending on Q only and EQ.
For a graph G is average degree is:
av(G) =
2E
V
,
thus the ratio E/V is just half the average degree.
Define as density of a graph D(G) the following ratio:
D(G) =
=
2E
V (V − 1)
,
E
(cid:0)V
2 (cid:1)
which gives the ratio of the number of edges in G to the
maximum possible number of edges in a complete graph with
the same number of nodes.
Cliques are subgraphs of density 1, and finding a maximum
induced clique in a graph G is an NP-complete problem.
Several relaxations of the notion of clique have been pro-
posed (see [4]) for a survey), most of which also lead to
NP-complete decision problems.
In the data mining literature it ha emerged the concept of
quasi-clique. Given a parameter γ ∈ [0..1], a γ-quasi clique
is a graph G = (V, E) such that:
∀v ∈ V NG(v) ≥ γ(V − 1),
where N (G(v) = {u ∈ V (v, u) ∈ E} is the set of neigh-
bors of v in G.
Note that a γ-quasi clique has density D(G) ≥ γ. In general
however for a dense graph with density D(G) we cannot
infer a bound on the value of γ for which it is a quasi-clique
(except for the value D(G) = 1 that implies γ = 1, and
those cases covered by Tur'an's and Dirac's theorems ([35,
11].
If we impose a lower bound to the number of nodes k of ver-
tices in a subgraph, then the average degree and the den-
sity depend only on the number of edges, and the attain
maximum value for the same graph. Otherwise finding the
subgraph of maximum average degree, or the subgraph of
maximum density are quite different problems, the latter ad-
mitting a polynomial time solution, the latter NP-complete.
In this paper we aim at detecting dense-subgraphs with a
lower bounds on the size of the graph and to its density.
However the heuristic we propose is best understood by
referring to the case of cliques and quasi-cliques. Isolated
cliques and quasi-cliques have a regular structure for which
it is easy to derive useful properties. When we look ad the
induced cliques and induced quasi-cliques in a graph, we can-
not guarantee that those properties are preserved, although
they are in general rather robust with respect to the per-
turbations produced by the other nodes, and thus are often
preserved in real-life social graphs.
4. HEURISTIC FOR DENSE COVER
4.1 Partial dense cover of a graph
In this paper we propose an alternative approach that
aims at balancing efficiency of computation and expressive-
ness/manageability of the output community representation.
Our aim is to compute for a graph G = (V, E) and param-
eters q ∈ [1, ..V ] and density parameter δ ∈ [0.0, ..1.0], a
partial dense cover P DC(G) of G. We denote by D[G] the
density of G, i.e the ratio of E and V (V − 1)/2.
A partial dense cover P DG(G) is a collection of subsets
of V , {C1, ..., Ck}. With the following properties
4
a ∀j ∈ [1..k], Cj ⊆ V
b Node-disjointness: ∀j, h ∈ [1..k], j 6= h ⇒ Cj ∩Ck = ∅.
c Large size and density. ∀j ∈ [1..k],
Cj ≥ q, and
∀j ∈ [1..k], D[G[Cj ]] ≥ δ.
d Internal maximality: The union of any two sets Ci,
and Cj induces a subgraph satisfying the other condi-
tions and of density lower than the minimum density
of G[Ci] and G[Cj ].
e External maximality: The residual graph G[V \Sk
i=1 Ci]
does not contain any induced subgraph satisfying the
other conditions.
f Radius constraint: Each subgraph G[Ci] has radius 1
or 2.
The best way to justify the notion of a partial dense cover
is to consider it as a relaxation of the well known concept
of a minimum clique partition (problem GT15 in [17]. A
minimum clique partition of a graph G = (V, E) is a par-
tition of the vertex set V into k disjoint subsets so that
the graph induced in G by each subset is a clique. Com-
puting a clique cover of minimum size (k) is a well known
NP-complete problem [17], and it is hard to approximate
[31].
In a clique cover every clique satisfies the radius constraint
(f), as any clique has radius 1, however graphs of radius 1
are not cliques in general. The radius constraint to 1 or 2 is
set in order to attain an efficient computation, but as we will
see later, we will be able to cover a wide range of non-trivial
communities.
The cover we seek is partial since we do not insist that any
vertex must belong to some covering set, however we ask in
(e) that the residual graph must not contain a subgraph
that may be part of the cover. Note that this condition
(d) implies that the problem we define is still NP-hard. In
particular, for the density parameter δ = 1.0, our problem
reduces to assessing whether a graph contains no clique of
size al least q, which is equivalent to the NP-complete max-
imum clique problem.
The internal maximality constraint (d) is not problematic
from a computational point of view since it can always be
enforces "a posteriori" in polynomial time starting from a
cover that satisfies the other constraints.
For δ = 1.0 and q = 1 the problem is reduced to that
of computing a minimal clique cover, that is, a clique cover
which cannot be improved by locally merge two sets in the
cover. This extreme case can be solved polynomially, but,
naturally it is different from the minimum cover problem.
The size parameter q and density parameter δ ensure that
we can focus the computational effort towards those part of
the graph that are more interesting (i.e. of large size and
high density) with the aim of attaining computational effi-
ciency and controlling the amount of information gathered
in a run of the algorithm.
4.2 An Algorithm to compute partial dense
covers
As noted above computing a partial dense cover PDC(G)
of a graph is an NP complete problem. In this section we
will give an efficient heuristic algorithm which is based on
combining in a novel way several algorithms and procedure
already present separately in literature. For each step we
will give "hand weaving" arguments as to it role and an intu-
itive reason as to why it contributes to solving the PDC(G)
computation efficiently.
4.3 Heuristic Algorithm Core & Peel
Phase I. Initially we compute the Core Decomposition of
G ( denoted with CD(G)). Moreover we compute for each
vertex v in G the Core Count of v , denoted with CC(v) ,
defined as the number of neighbors of v having core number
at least as large as C(v). Next, we sort the vertices of V in
decreasing lexicographic order of their core values C(v) and
core count value CC(v).
Phase II. In phase II we consider each node v in turn, in
the order given by phase I. For each v we construct the set
N r
C(v)(v) of neighbors of v at distance r in G having core
number at least C(v). If N r
C(v)(v) < q we do not process
this node any more. Otherwise we compute the density δ(v)
of the induced subgraph G[N r
C(v)(v)]. If this density is too
small: δ(v) ≤ δlow, for a user defined threshold δlow we do
not process this node any more. Nodes that pass the size
and density tests go to phase III.
Phase III. In this phase we take v and the induced sub-
graph G[N r
C(v)(v)] and we apply a variant of the peeling
procedure described in [8], that iteratively removes modes
if minim degree in the graph. The peeling procedure stops
(and report failure) when the number of nodes drops below
the threshold q. The peeling procedure stops (and reports
success) when the density of the resulting subgraph is above
or equal to the user defined threshold δ. The set of nodes
returned by the successful peeling procedure is added to the
output cover set, and its elements are marked so to be ex-
cluded from further consideration.
Phases II and III are executed interleaved so to (1) enforce
that the covering sets produced are disjoint, and (2) avoid
discovering multiple times the same dense subgraph.
4.4 Justifications of phase I
The core decomposition of a graph G = (V, E) associates
to any vertex v a number C(v) which is the largest number
such that v has al least C(v) neighbors having core number
at least C(v).
Consider now a clique Kx if size x, for each node v in Kx
its core number is x − 1. If Kx is an induced subgraph of
G, then its core number can only be larger than x − 1, thus
C(v) is an upper bound to the size of the largest induced
clique incident to v.
Consider a quasi-clique Kx,γ, for each node v in Kx its
core number is at least γ(x − 1).
If Kx,γ is an induced
subgraph of G, then its core number can only be larger,
thus thus C(v) is an upper bound to the size of the largest
(in terms of average degree) quasi-clique incident to v.
Thus if the upper bound provided by the core number
is tight, examining the nodes in (decreasing) order of their
core number allows us to home in first on the largest cliques
(or quasi-cliques), and subsequently the smaller ones.
In a clique Kx each node is a leader for the clique, meaning
that it is at distance 1 to any other node in the clique. Thus
the first node of Kx encountered in the order computed in
phase I is always a leader.
In the case of of quasi-cliques
we just suppose the existence of at least one leader node.
For an isolated quasi-clique the leader node will have the
the maximum possible core count value, thus by sorting (in
5
the lexicographic order) on the core count value we push the
leader node to be discovered first in the order (assuming all
nodes in the quasi-clique have the same core number). For
an induced quasi-clique the influence of other nodes may
increase the value of the core count for any node, but, as-
suming that the relative order between the leader and the
other nodes does not change, we still obtain the effect of
encountering the leader before the other nodes of the quasi-
clique.
The core number gives us an estimate of the largest (in
terms of average degree) quasi-clique (or clique) a node can
be incident to, thus it provides a very powerful filter. Also
fortunately there is a very efficient algorithm of complex-
ity O(V + E) that computes the core decomposition of a
graph [5].
Also it has been observed empirically that in social graph
often the core number and the core count of any node are
much smaller than its degree (which is also an obvious upper
bound on the size of the largest clique incident to v). Thus
subsequent operations are intuitively less expensive when
their complexity can be charged onto the core number or
the core count values of a node and its neighbors.
4.5 Justification of phase II
In Phase II we count the number of edges in the subgraph
induced by the node v and its neighbours with equal or
higher core value. Phase II is equivalent to computing a
restricted local clustering coefficient of a node v, where the
computation is restricted to the neighboring nodes of v of
sufficiently high core number.
Classical result of Turan and Dirac (see [35], [11]) guar-
antee the existence of a clique (or a clique with a few edges
missing) in graphs with sufficiently many edges. (approxi-
mately above n2/4 for a graph of n nodes). Although it is
possible to derive some thresholds from these classical re-
sults, such threshold would give us only sufficient conditions
but not necessary ones to the existence of a clique in the
graph that is exhamined in phase II. Since the purpose of
phase II is to trade off the number of invocations of phase III
with the chance that phase III may find a sufficiently dense
subgraph, we resort to a more ad-hoc strategy for selecting
thresholds. We set δlow = δ/2, which did perform well in
our experiments.
4.6 Justification of phase III
The peeling procedure we use is similar to one described
in [8]. It consists in an iterative procedure that remove a
node of minimum degree (ties resolved arbitrarily) and all
incident edges, then iterates on the residual graph. In [8] the
graph of highest average degree constructed in this process is
returned as output. We modify this procedure by returning
the first subgraph generated that satisfies the density and
size constraints.
It is shown in [8] that this procedure is (1/2)-approximate
for the average degree , i.e. it returns a subgraph whose av-
erage degree is with a factor (1/2) of that of the subgraph
of highest average degree. Empirically, we rely on the intu-
ition that, in our setting, the input to the peeling procedure
as produced after phase II is a superset of the output that
is tight enough and dense enough so that the peeling pro-
cedure converges quickly to isolating the embedded dense
subgraph, in a typical situation.
We also use a novel heuristic to solve cases of ties within
the peeling algorithm in [8]. When two or more vertices are
of minimum degree the original peeling procedure picks one
arbitrarily. In our variant we compute the sum of degrees
of the adjacent nodes D(v) = Pw∈N(v) d(w) and we select
the vertex among those of minimum degree minimizing D(.).
This secondary selection criterion is inspired by observations
in [22], where the objective is to select an independent set
by iteratively removing small degree nodes, which is a dual
problem that of detecting cliques.
4.7 Influence of radii
In our algorithm we assume that the dense community has
radius r = 1 or r = 2. This technical restriction is needed
in order to ensure that we can recover efficiently a superset
of the community node set starting from a leader seed node.
As we will argue below this restriction is not severe as it
covers a wide range of cases of interest either precisely or
with high probability.
Case r = 1. As mentioned above in a clique Kn of n
nodes every node is at distance 1 from any other node, thus
every node is a center and the radius is r = 1. If we start re-
moving edges from Kn we maintain the property r = 1 with
certainty up to ⌊n/2⌋ − 1 edge removals, while the number
of centers is reduced. If we look at the edge removal as a
random uniform selection of a pair of nodes and we remove
of the edge joining them (if still existing) we can model this
process similarly to the well known Coupon collector problem
[32] thus the expected number of edge deletions before all
nodes are selected at least once is approximately (n/2) ln n.
Thus even for a fair relaxation from the clique we retain
the property with high probability of to this limit since the
Coupon Collector number has a distribution highly concen-
trated around the expected value.
In certain applications a node that represents a center (re-
alizes r = 1) in a dense subgraph can be interpreted as a
"leader" of the group (since it has relationships with all the
members of the group) and thus being a feature characteriz-
ing the proper communities. In effect in many social graphs
(e.g. Twitter graph) there is a natural leader-follower dy-
namics.
Case r = 2. If we remove edges but the degree of each
node is at least ⌊n/2⌋ then by the pigeon hole principle each
pair of nodes in the community will have a neighbor in com-
mon, thus the radius of the subgraph is 2 and every node
is a center (with r = 2). Thus the algorithm set with pa-
rameters r = 2 is (potentially) able to recover in phase I a
superset of any γ-quasi clique for γ ≥ 0.5.
Consider the following random process. We take a set V
of n vertices , for each v ∈ V we select its neighbor vertex set
by picking vertices in V with probability p. The property
that any two nodes have a non-empty neighbor intersection
can be rephrased as the requirement that the corresponding
intersection graph (see [24]) is complete. The threshold value
of p so that this property holds with high probability is
p = r 2 log n
n
Since the expected number of neighbors of any node v is
pn, we have that the graph is an O(p)-quasi clique withe
high probability. Thus we are able to retain the property
r = 2 and the fact that all nodes are centers ever at a quite
6
low overall density.
5. TESTING EFFECTIVENESS
5.1 Testing methodology
The quality of the heuristic proposed will be tested em-
pirically by the planted solution methodology [13]. For a
given input graph G and parameters δ, and q we implant
randomly a certain number of subgraphs in G, by adding
edges, so to force the presence of a subgraph of size ¯q ≥ q
and density ¯δ ≥ δ. We call this graph G′ the planted graph.
By measuring the number of such planted subgraphs that
are found by running H −P DG blindly on the planted graph
we can measure the effectiveness of H −P DG in finding such
structures. In IR terms we can thus measure the recall of
the method. Experiments on 12 data sets (not shown in
this paper) indicate that using this simple methodology the
performance is close to 100% in terms of recall for planted
cliques of size equal to the average degree of the graph G.
This methodology was adopted in [12].
In order to better assess the potential of the method how-
ever we resort to a more taxing testing methodology.
In
particular we want to measure not only the algorithm's ca-
pability of detecting planted dense subgraph, but also the
property that no dense subgraphs are left in the residual
graph after the application of the algorithm.
2, and we run H −P DG on G′
Thus we operate as follows. We take the input graph G
and we apply the H − P DG algorithm, thus obtaining a
set of dense subgraphs and a residual graph G1. We then
apply a second time H − P DG to G1 possibly obtaining
a few more communities and a second residual graph G2.
Next we plant dense subgraphs in G2 obtaining the planted
graph G′
2. In the ideal case G2,
being a residual graph after two applications of H − P DG
is already empty of dense subgraphs, thus the all and only
communities we should find are those we planed in G′
2. Now
we can define properly the notion of precision and recall of
the algorithm. Each planted community that is not found
reduces the recall, while each found community that was not
planted reduces the precision. We can obviously also define
the harmonic mean of the two measures that is known as
F-measure which gives us a more synthetic measurement.
Note that we apply H − P DG twice before generating the
planting graph on which we measure precision and recall.
In general one can try to increase the precision by iterating
several time H − P DG on the residual graph resulting from
the previous iteration. We chose to limit the iterations to a
fixed and small number (two) for two orders of reasons, the
first one is that the cost of the execution in terms of time
increases2. The second and more important one is that even
with two applications the precision already reaches values
close to 1, while further iteration have no direct impact on
the recall, thus the F-measure would not be much affected
by further iterations.
Choice of parameters.
The choice of size and density of the planted communities
is critical. If we plant communities too large and dense the
degree of the selected nodes will be biased and even a simple
2This marginal cost could be kept under control by doing
incremental updates of the data structures, rather than a re-
computation from scratch and by examining only the nodes
whose immediate neighborhood has been affected by the up-
dates.
minded approach can easily detect the nodes belonging to
these communities. We choose the planted communities so
that their average degree is equal to the half the average
degree of the host graph (i.e roughly E/V ). Moreover we
choose the number of planted communities so to modify no
more than 1% of the total number of nodes.
The searching algorithm is given as parameters (minimum
size, density) exactly the parameters used for the plant-
ing of the communities. The list of detected communities
is matched with the list of embedded communities, and a
planted community is marked as "detected" if its vertex set
overlaps by more than 50% with a detected community. Pre-
cision and recall are computed with respect to the commu-
nities (not their node-sets).
Note that one could improve the recall "by default" by
performing the search with parameters of minimum size and
minimum density slightly lower than those used for the gen-
eration.
In this case we are less likely to miss embedded
nodes, and the embedded community would be a subset of a
larger detected community without incurring in any penalty.
In order to make a fair assessment of the proposed algorithm
we will not use this option. In general, however, such strat-
egy is beneficial when one sees H − P DG as a filter to be
used to feed candidate communities (of much smaller size
w.r.t the original graph G) to exact but computationally
expensive methods, such as for example methods based on
ILP developed in [4].
Other testing methodologies.
In [9] the evaluation of the
accuracy is done, for the case of non bipartite graphs, by
generating random graphs with 100 nodes and 2000 edges
that contains three dense subgraphs which cover 75% of the
nodes of the graph. Precision and recall are computed with
respect to the node-sets and the F-values obtained are close
to 1.
In [36] the evaluation of the accuracy is done by embed-
ding four dense subgraphs (with 8 nodes each and density
70%) in a random sparser graph of total of 60 nodes. Also,
in this case the planted communities cover more than 50%
of the nodes of the graph. In [36] it is shown that all four
dense subgraphs are detected using the CSV-plot.
Although the results shown in [9, 36] are quite good for
small random graphs with high community coverage, it is
not clear if measurements obtained allows to infer similar
performance in social graphs whose size, degree distribution
and community structure are so different.
For this reasons we decided to develop a new, more de-
manding, testing methodology, which is closer to the ap-
plicative scenarios where the targets are social and techno-
logical graphs.
5.2 Benchmark data set
The experiments are conducted on 25 graphs downloaded
from the Stanford Large Network Dataset Collection [21].
This collection comprises several graph types including: In-
ternet autonomous systems, Authors collaboration networks,
Internet peer-to-peer networks, E-mail communication net-
works, Citation networks, Web graphs, Trust networks, Road
networks, and Product co-purchasing networks. Basic graph
statistics are shown in Table 3, other measures are available
at [21].
5.3 Experiments
7
In Tables 1 and 2 we report average precision, average re-
call and average F-measure over all 25 data sets, for density
ranging from 100% to 50% and radius ranging from 1 to 2.
Tables 4, 5, 6, and 7 report the precision, recall and fmea-
sure of the method on each test file for varying radius and
density values.
In the first set of experiment we embed cliques (100%
dense, radius 1) of size roughly E/V , data are reported
in Table 4. Note that the recall is always quite high; it is
above 90% in all 25 cases. Precision is slightly worse (above
90% in 22 cases out of 25). The combination though the
F-measure however is above 90% in 23 cases out of 25, and
never below 0.85. On average, precision is about 96% and
recall about 99%. When we keep the radius to 1, but we re-
duce the density to 70% (see 5), there is a reduction in preci-
sion and recall, with recall above 90% in 11 tests, precision
above 90% in 12 tests, with average precision about 83%
and average recall about 84%. When we relax the radius
constraint to radius=2 at 70% density, 14 test cases attain
precision above 90%, 10 recall above 90%, and 8 F-measure
above 90%, however while the average recall reduces to 78%,
the average precision is maintained at 85%. Finally when
we leave the radius to 2 and set the density to 50% we have
very similar values for average precision and average recall.
Thus, we conclude that the computation at radius 2 is not
so sensitive to the density threshold.
Tables 8, 9, 10, and 11 report on the time measurement
on each test file, with data for each phase, for the total
time spent, and the time spent per edge. The initial phase
that consists in the core decomposition is linear in the size
of the graph, while all other computations involve the local
neighborhood of some node, thus it is interesting to measure
the time spent per edge as a common criterion of comparison
for different runs of the algorithm. One can observe that the
time spend for edge is rather stable, in the region of 10−6 to
10−5 seconds for radius =1 (Tables 8, 9) and in the range
10−4 to 10−3 seconds for radius=2 (Tables 10, 11). Some
slower runs for radius=1 are noticeable for some of the web-
graphs (files 23, and 25). In the total time we include the
cost of run 3 whose purpose is to measure the effectiveness of
runs 1 and 2, thus, if this reliability measure is not needed,
it can be skipped and the total time reduced by about 1/3.
Since the experimental code has been developed in Python
we expect that a factor 10 in timing can be easily gained by
switching to an implementation in the C language.
measure
average precision
average recall
average fmeasure
average precision
average recall
average fmeasure
radius
d=1
d=1
d=1
d=1
d=1
d=1
density
1.0
1.0
1.0
0.7
0.7
0.7
value
0.95429535884
0.98965535788
0.97020508204
0.83020137232
0.83947183728
0.82681618136
Table 1: Averages output quality statistics for ra-
dius 1.
6. CONCLUSIONS
8
measure
average precision
average recall
average fmeasure
average precision
average recall
average fmeasure
radius
d=2
d=2
d=2
d=2
d=2
d=2
density
0.7
0.7
0.7
0.5
0.5
0.5
value
0.8557872834
0.780538866
0.78194706944
0.77783144912
0.82669275188
0.78456921128
Table 2: Averages output quality statistics for ra-
dius 2.
In this paper we have presented a method to quickly find
dense sub-graphs (communities) in graphs. The novelty of
the approach relies on the combination of existing methods
to speed up the community discovery. The experiments con-
ducted on various types of graphs show the effectiveness and
the reliability of the method.
7. REFERENCES
[1] J. Abello, M. G. C. Resende, and S. Sudarsky.
Massive quasi-clique detection. In S. Rajsbaum,
editor, LATIN, volume 2286 of Lecture Notes in
Computer Science, pages 598 -- 612. Springer, 2002.
[2] R. Andersen. Finding large and small dense
subgraphs. CoRR, abs/cs/0702032, 2007.
[3] R. Andersen and K. Chellapilla. Finding dense
subgraphs with size bounds. In K. Avrachenkov,
D. Donato, and N. Litvak, editors, WAW, volume
5427 of Lecture Notes in Computer Science, pages
25 -- 37. Springer, 2009.
[4] B. Balasundaram. Graph Theoretic Generalizations Of
Clique: Optimization And Extensions. PhD thesis,
Texas A&M University, 2007.
[5] V. Batagelj and M. Zaversnik. An O(m) algorithm for
cores decomposition of networks. CoRR,
cs.DS/0310049, 2003.
[6] A. Bhaskara, M. Charikar, E. Chlamtac, U. Feige, and
A. Vijayaraghavan. Detecting high log-densities: an
o(n1/4) approximation for densest k-subgraph. In L. J.
Schulman, editor, STOC, pages 201 -- 210. ACM, 2010.
[7] I. M. Bomze, M. Budinich, P. M. Pardalos, and
M. Pelillo. The maximum clique problem. In Handbook
of Combinatorial Optimization, pages 1 -- 74. Kluwer
Academic Publishers, 1999.
[8] M. Charikar. Greedy approximation algorithms for
finding dense components in a graph. In K. Jansen
and S. Khuller, editors, APPROX, volume 1913 of
Lecture Notes in Computer Science, pages 84 -- 95.
Springer, 2000.
[9] J. Chen and Y. Saad. Dense subgraph extraction with
application to community detection. IEEE
Transactions on Knowledge and Data Engineering,
24(7), 2012.
[10] J. Cheng, Y. Ke, S. Chu, and M. T. Ozsu. Efficient
core decomposition in massive networks. In
S. Abiteboul, K. Bohm, C. Koch, and K.-L. Tan,
editors, ICDE, pages 51 -- 62. IEEE Computer Society,
2011.
[11] G. A. Dirac. Extensions of tur´an theorem on graphs.
Acta Mathematica Academiae Scientiarum
Hungaricae, 14:417 -- 422, 1963.
[12] Y. Dourisboure, F. Geraci, and M. Pellegrini.
Extraction and classification of dense implicit
communities in the web graph. TWEB, 3(2), 2009.
[13] U. Feige. Rigorous analysis of heuristics for np-hard
problems. In SODA, page 927. SIAM, 2005.
[14] U. Feige, D. Peleg, and G. Kortsarz. The dense
k-subgraph problem. Algorithmica, 29(3):410 -- 421,
2001.
[15] S. Fortunato. Community detection in graphs. Phys.
Rep., 486:75 -- 174, 2010.
[16] G. Gallo, M. D. Grigoriadis, and R. E. Tarjan. A fast
parametric maximum flow algorithm and applications.
SIAM J. Comput., 18(1):30 -- 55, 1989.
[17] M. R. Garey and D. S. Johnson. Computers and
Intractability: A Guide to the Theory of
NP-Completeness. W. H. Freeman, 1979.
[18] D. Gibson, R. Kumar, and A. Tomkins. Discovering
large dense subgraphs in massive graphs. In K. Bohm,
C. S. Jensen, L. M. Haas, M. L. Kersten, P.-A.
Larson, and B. C. Ooi, editors, VLDB, pages 721 -- 732.
ACM, 2005.
[19] M. Girvan and M. E. J. Newman. Community
structure in social and biological networks. Proc. Natl.
Acad. Sci. USA, pages 7821 -- 7826, 2002.
[20] A. V. Goldberg. Finding a maximum density
subgraph. Technical Report UCB/CSD-84-171, EECS
Department, University of California, Berkeley, 1984.
[21] S. Graphs. http://snap.stanford.edu/data/.
[22] M. M. Halld´orsson and J. Radhakrishnan. Greed is
good: approximating independent sets in sparse and
bounded-degree graphs. In F. T. Leighton and M. T.
Goodrich, editors, STOC, pages 439 -- 448. ACM, 1994.
[23] J. Hastad. Clique is hard to approximate within
n1-epsilon. In FOCS, pages 627 -- 636. IEEE Computer
Society, 1996.
[24] M. Karo´nski, E. R. Scheinerman, and K. B.
Singer-Cohen. On random intersection graphs: The
subgraph problem. Comb. Probab. Comput.,
8(1-2):131 -- 159, Jan. 1999.
[25] S. Khot. Ruling out ptas for graph min-bisection,
dense k-subgraph, and bipartite clique. SIAM J.
Comput., 36(4):1025 -- 1071, 2006.
[26] S. Khuller and B. Saha. On finding dense subgraphs.
In S. Albers, A. Marchetti-Spaccamela, Y. Matias,
S. E. Nikoletseas, and W. Thomas, editors, ICALP
(1), volume 5555 of Lecture Notes in Computer
Science, pages 597 -- 608. Springer, 2009.
[27] S. Kosub. Local density. In U. Brandes and
T. Erlebach, editors, Network Analysis, volume 3418
of Lecture Notes in Computer Science, pages 112 -- 142.
Springer, 2004.
[28] R. Kumar, P. Raghavan, S. Rajagopalan, and
A. Tomkins. Trawling the web for emerging
cyber-communities. Computer Networks,
31(11-16):1481 -- 1493, 1999.
[29] V. E. Lee, N. Ruan, R. Jin, and C. Aggarwal. A
survey of algorithms for dense subgraph discovery. In
C. C. Aggarwal, H. Wang, and A. K. Elmagarmid,
editors, Managing and Mining Graph Data, volume 40
of The Kluwer International Series on Advances in
Database Systems, pages 303 -- 336. Springer US, 2010.
[30] G. Liu and L. Wong. Effective pruning techniques for
mining quasi-cliques. In W. Daelemans, B. Goethals,
and K. Morik, editors, Machine Learning and
Knowledge Discovery in Databases, volume 5212 of
Lecture Notes in Computer Science, pages 33 -- 49.
Springer Berlin / Heidelberg, 2008.
[31] C. Lund and M. Yannakakis. On the hardness of
approximating minimization problems. J. ACM,
41:960 -- 981, September 1994.
[32] R. Motwani and P. Raghavan. Randomized
Algorithms. Cambridge University Press, 1995.
[33] M. Newman. The structure and function of complex
networks. SIAM Review, 45(2):167 -- 256, 2003.
[34] S. B. Seidman. Network structure and minimum
degree. Social Networks, 5(3):269 -- 287, 1983.
[35] P. Tur´an. On an extremal problem in graph theory.
Math. Fiz. Lapok, 48:436 -- 452, 1941.
[36] N. Wang, S. Parthasarathy, K.-L. Tan, and A. K. H.
Tung. Csv: visualizing and mining cohesive subgraphs.
In J. T.-L. Wang, editor, SIGMOD Conference, pages
445 -- 458. ACM, 2008.
[37] N. Wang, J. Zhang, K.-L. Tan, and A. K. H. Tung.
On triangulation-based dense neighborhood graphs
discovery. PVLDB, 4(2):58 -- 68, 2010.
[38] Z. Zeng, J. Wang, L. Zhou, and G. Karypis.
Out-of-core coherent closed quasi-clique mining from
large dense graph databases. ACM Trans. Database
Syst., 32(2):13, 2007.
9
# Type
1. AutonomousSystemGraphs
2. AutonomousSystemGraphs
3. AutonomousSystemGraphs
4. AutonomousSystemGraphs
5. AutonomousSystemGraphs
6. CitationNetworks
7. CitationNetworks
8. CitationNetworks
9. CollaborationNetworks
10. CollaborationNetworks
11. CollaborationNetworks
12. CollaborationNetworks
13. CommunicationNetwork
14.
15. ProductCo-Purchasing
16. RoadNetworks
17. RoadNetworks
18. RoadNetworks
19.
20.
21.
22.
23. WebGraphs
24. WebGraphs
25. WebGraphs
SignedNetworksP1
SignedNetworksP1
SocialNetwork
SocialNetwork
InternetPeerToPeer
Graph Name
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
Email-Enron
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
soc-sign-Slashdot090221
wiki-Talk
soc-Epinions1
soc-Slashdot0902
web-BerkStan
web-Google
web-Stanford
# nodes # edges
105722
22190596
25144
46818
65460
841754
704570
33037894
186878
28968
236978
51946
367662
295784
4886816
5533214
3083796
3843320
1000962
9319130
811480
1008460
13298940
8644102
3985272
26389
1696415
6474
11174
11461
34546
27770
3774768
23133
5242
12008
9877
36692
62586
403394
1965206
1088092
1379917
82140
2394385
75879
82168
685230
875713
281903
E/V
4,0062905
13,08087703
3,883843065
4,189905137
5,711543495
24,36617843
25,37162405
8,75229789
8,078416116
5,526135063
19,73500999
5,259289258
10,02022239
4,726040968
12,11425058
2,815589816
2,834131673
2,785182007
12,18604821
3,892076671
10,69439502
12,2731477
19,4079944
9,870930316
14,13703295
Table 3: List of 25 graphs test from Stanford Large Network Dataset Collection with number of nodes,
number of edges and ratio E/V .
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
# Graph Name
1.
2.
3.
4.
5.
6.
7.
8.
9
10
11
12
13 Email-Enron
14
15
16
17
18
19
20 wiki-Talk
21
22
23 web-BerkStan
24 web-Google
25 web-Stanford
soc-Epinions1
soc-Slashdot0902
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
soc-sign-Slashdot090221
# nodes
5
14
5
5
6
25
26
9
9
6
20
6
11
5
13
4
4
4
13
4
11
14
20
10
15
density
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
av. degree
4
13
4
4
5
24
25
8
8
5
19
5
10
4
12
3
3
3
12
34
10
13
19
9
14
precision
0,928571429
0,998351195
0,961538462
0,843137255
0,791666667
1
1
1
0,739130435
1
1
0,914285714
0,942857143
1
1
0,974968112
0,976884422
0,982360923
0,992063492
0,954465429
1
1
0,994186047
0,904260915
0,958656331
recall
0,99047619
0,999587288
1
0,977272727
1
1
1
1
1
1
1
1
1
1
1
0,933516525
0,938094582
0,944450484
0,992063492
0,996324451
1
1
0,998540146
0,981724729
0,989333333
F-measure
0,958525346
0,99896886
0,980392157
0,905263158
0,88372093
1
1
1
0,85
1
1
0,955223881
0,970588235
1
1
0,953792162
0,957096638
0,963032755
0,992063492
0,974945845
1
1
0,996358339
0,941401972
0,973753281
Num. Embedded
105
2423
25
44
38
27
21
8388
51
17
12
32
66
250
620
13101
7253
9199
126
11971
137
117
685
1751
375
Table 4: Experiments with embedding of communities of radius 1, 100% dense of average degree about E/V .
We report the size of the communities embedded, the recall precision and f-measure of our algorithm.
10
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
# Graph Name
1.
2.
3 .
4.
5.
6.
7.
8.
9
10.
11.
12.
13. Email-Enron
14.
15.
16.
17.
18.
19.
20. wiki-Talk
21
22
23 web-BerkStan
24 web-Google
25 web-Stanford
soc-Epinions1
soc-Slashdot0902
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
soc-sign-Slashdot090221
# nodes
7
20
7
7
8
35
37
12
12
8
28
8
15
7
18
4
4
4
18
5
15
20
28
14
21
density
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
av. degree
5
14
5
5
6
25
26
9
9
6
20
6
11
5
13
3
3
3
13
4
11
14
20
10
15
precision
0,905405405
0,940600522
0,857142857
0,783783784
0,631578947
1
0,8
0,972490988
0,444444444
0,866666667
0,3
0,75
0,612903226
1
0,965517241
1
1
0,999705623
0,984848485
0,923212253
0,775510204
0,971014493
0,872641509
0,576139089
0,821428571
recall
0,893333333
0,849646226
1
0,935483871
0,857142857
0,947368421
0,533333333
0,814814815
0,736842105
1
0,375
1
0,791666667
0,786516854
1
0,984225524
0,984375
0,984490506
0,714285714
0,931502558
0,752475248
0,817073171
0,756646217
0,768185452
0,77238806
F-measure
0,899328859
0,892812887
0,923076923
0,852941176
0,727272727
0,972972973
0,64
0,886697803
0,554455446
0,928571429
0,333333333
0,857142857
0,690909091
0,880503145
0,98245614
0,992050059
0,992125984
0,992039728
0,828025478
0,927338877
0,763819095
0,887417219
0,810514786
0,658444673
0,796153846
Num. Embedded
75
1696
18
31
28
19
15
6291
38
13
8
24
48
178
448
9826
5440
6899
91
9577
101
82
489
1251
268
Table 5: Experiments with embedding of communities of radius 1, 70% dense of average degree about E/V .
We report the size of the communities embedded, the recall precision and f-measure of our algorithm.
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
# Graph Name
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13. Email-Enron
14.
15.
16.
17.
18.
19.
20. wiki-Talk
21.
22.
23. web-BerkStan
24 web-Google
25. web-Stanford
soc-Epinions1
soc-Slashdot0902
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
soc-sign-Slashdot090221
# nodes
7
20
7
7
8
35
37
12
12
8
28
8
15
7
18
4
4
4
18
5
15
20
28
14
21
density
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
0,7
av. degree
5
14
5
5
6
25
26
9
9
6
20
6
11
5
13
3
3
3
13
4
11
14
20
10
15
precision
0,948717949
0,918563923
0,947368421
0,885714286
0,675
1
1
0,979404193
0,421875
0,666666667
0,583333333
0,8
0,634920635
1
0,991150442
0,99922179
0,999193873
0,99904943
0,925925926
0,922119447
0,788235294
0,923076923
0,884520885
0,64084507
0,859778598
recall
0,986666667
0,618514151
1
1
0,964285714
0,684210526
0,2
0,846606263
0,710526316
0,923076923
0,875
1
0,833333333
0,578651685
1
0,914716059
0,911397059
0,914045514
0,274725275
0,843165918
0,663366337
0,292682927
0,736196319
0,872901679
0,869402985
F-measure
0,967320261
0,739252995
0,972972973
0,939393939
0,794117647
0,8125
0,333333333
0,908176315
0,529411765
0,774193548
0,7
0,888888889
0,720720721
0,733096085
0,995555556
0,955103342
0,953278216
0,954658996
0,423728814
0,880877059
0,720430108
0,444444444
0,803571429
0,739086294
0,864564007
Num. Embedded
75
1696
18
31
28
19
15
6291
38
13
8
24
48
178
448
9826
5440
6899
91
9577
101
82
489
1251
268
Table 6: Experiments with embedding of communities of radius 2, 70% dense of average degree about E/V .
We report the size of the communities embedded, the recall precision and f-measure of our algorithm.
11
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
# Graph Name
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13. Email-Enron
14.
15.
16.
17.
18.
19.
20. wiki-Talk
21.
22.
23. web-BerkStan
24. web-Google
25. web-Stanford
soc-Epinions1
soc-Slashdot0902
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
soc-sign-Slashdot090221
# nodes
10
28
10
10
12
50
52
18
18
12
40
12
22
10
26
6
6
6
26
8
22
28
40
20
30
density
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
0,5
av. degree
5
14
5
5
6
25
26
9
9
6
20
6
11
5
13
3
3
3
13
4
11
14
20
10
15
precision
0,894736842
0,770140429
0,8
0,846153846
0,464285714
1
0,714285714
0,873723104
0,46
0,727272727
0,25
0,842105263
0,5
1
0,987261146
0,99908383
0,99917287
0,999130435
0,942857143
0,941370768
0,776315789
0,962962963
0,62915601
0,374229346
0,691542289
recall
0,980769231
0,860445912
1
1
0,684210526
1
0,5
0,95851216
0,92
1
0,333333333
1
0,787878788
0,696
1
0,998931298
0,999448428
0,999347684
0,523809524
0,952380952
0,867647059
0,448275862
0,719298246
0,693714286
0,743315508
F-measure
0,935779817
0,812792512
0,888888889
0,916666667
0,553191489
1
0,588235294
0,91415577
0,613333333
0,842105263
0,285714286
0,914285714
0,611764706
0,820754717
0,993589744
0,999007558
0,99931063
0,999239048
0,673469388
0,946843854
0,819444444
0,611764706
0,671214188
0,48618342
0,716494845
Num. Embedded
52
1211
12
22
19
13
10
4194
25
8
6
16
33
125
310
6550
3626
4599
63
5985
68
58
342
875
187
Table 7: Experiments with embedding of communities of radius 2, 50% dense of average degree about E/V .
We report the size of the communities embedded, the recall precision and f-measure of our algorithm.
file name
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
num.
1
2
3
4
5
6
7
8
9
10
11
12
13 Email-Enron
14
15
16
17
18
19
20 wiki-Talk
21
22
23 web-BerkStan
24 web-Google
25 web-Stanford
soc-Epinions1
soc-Slashdot0902
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
soc-sign-Slashdot090221
numarcs
105722
22190596
25144
46818
65460
841754
704570
33037894
186878
28968
236978
51946
367662
295784
4886816
5533214
3083796
3843320
1000962
9319130
811480
1008460
13298940
8644102
3985272
time ph1
0.34
181.12
0.06
0.11
0.14
3.3
3.75
721.13
0.46
0.07
0.3
0.17
1.1
1.12
28.04
107.29
45.23
63.58
3.95
198.96
3.43
3.9
1066.51
61.88
91.5
time ph2
0.32
373.33
0.08
0.12
0.21
3.42
3.94
786
0.54
0.07
0.46
0.17
1.57
1.22
28.27
99.73
41.92
59.38
4.37
213.97
4.14
4.7
2897.22
75.49
106.75
time ph3
0.34
414.16
0.1
0.13
0.23
3.31
3.88
797.23
0.58
0.07
0.6
0.18
1.83
1.25
27.37
100.2
43.51
58.61
4.57
165.91
4.67
4.79
2890.32
82.16
268.76
total time
1
968.61
0.24
0.36
0.58
10.03
11.57
2304.36
1.58
0.21
1.36
0.52
4.5
3.59
83.68
307.22
130.66
181.57
12.89
578.84
12.24
13.39
6854.05
219.53
467.01
cost per arc
9.46e-06
4.36e-05
9.55e-06
7.69e-06
8.86e-06
1.19e-05
1.64e-05
6.97e-05
8.45e-06
7.25e-06
5.74e-06
1.00e-05
1.22e-05
1.21e-05
1.71e-05
5.55e-05
4.24e-05
4.72e-05
1.29e-05
6.21e-05
1.51e-05
1.33e-05
5.15e-04
2.54e-05
1.17e-04
Table 8: Experiments with embedding of communities of radius 1, 100% density. Timing of phase,1, 2 and 3
and total time (in seconds), and time pr arc.
12
file name
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
num.
1
2
3
4
5
6
7
8
9
10
11
12
13 Email-Enron
14
15
16
17
18
19
20 wiki-Talk
21
22
23 web-BerkStan
24 web-Google
25 web-Stanford
soc-Epinions1
soc-Slashdot0902
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
oc-sign-Slashdot090221
numarcs
105722
22190596
25144
46818
65460
841754
704570
33037894
186878
28968
236978
51946
367662
295784
4886816
5533214
3083796
3843320
1000962
9319130
811480
1008460
13298940
8644102
3985272
time ph1
0.3
159.25
0.06
0.11
0.14
2.08
1.84
702.65
0.4
0.06
0.29
0.14
0.84
1.08
23.04
103.42
45.93
60.25
3.4
128.42
2.31
3.32
65.43
56.76
43.93
time ph2
0.3
192.38
0.06
0.11
0.15
2.42
2.07
765.72
0.4
0.06
0.25
0.14
0.92
1.17
23.04
100.03
43.61
57.78
4.11
142.71
2.81
3.88
103.16
53.59
47.11
time ph3
0.33
203.75
0.06
0.12
0.16
2.45
2.53
786.36
0.44
0.06
0.27
0.15
0.98
1.22
22.56
99.82
44.2
58.66
4.23
154.92
3.37
3.96
99.81
54.02
60.47
total time
0.93
555.38
0.18
0.34
0.45
6.95
6.44
2254.73
1.24
0.18
0.81
0.43
2.74
3.47
68.64
303.27
133.74
176.69
11.74
426.05
8.49
11.16
268.4
164.37
151.51
cost per arc
8.80e-06
2.50e-05
7.16e-06
7.26e-06
6.87e-06
8.26e-06
9.14e-06
6.82e-05
6.64e-06
6.21e-06
3.42e-06
8.28e-06
7.45e-06
1.17e-05
1.40e-05
5.48e-05
4.34e-05
4.60e-05
1.17e-05
4.57e-05
1.05e-05
1.11e-05
2.02e-05
1.90e-05
3.80e-05
Table 9: Experiments with embedding of communities of radius 1, 70% density. Timing of phase,1, 2 and 3,
total time (in seconds), and time per arc.
file name
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
num.
1
2
3
4
5
6
7
8
9
10
11
12
13 Email-Enron
14
15
16
17
18
19
20 wiki-Talk
21
22
23 web-BerkStan
24 web-Google
25 web-Stanford
soc-Epinions1
soc-Slashdot0902
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
soc-sign-Slashdot090221
numarcs
105722
22190596
25144
46818
65460
841754
704570
33037894
186878
28968
236978
51946
367662
295784
4886816
5533214
3083796
3843320
1000962
9319130
811480
1008460
13298940
8644102
3985272
time ph1
2.94
10902.6
0.51
0.96
1.08
68.42
68.98
1796
5.53
0.48
3.26
1.44
13.42
9.48
322.33
237.53
120.03
152.14
359.46
14539.25
169.48
375.55
10322.09
241.02
2122.91
time ph2
18.64
19621.01
1.83
3.62
3.24
88.93
161.12
2077.75
6.72
0.75
9.68
1.78
23.38
9.6
317.33
234.08
117.52
149.46
418.74
15883.42
233.11
424.08
21415.46
445.79
3970.01
time ph3
20.17
25241.08
1.49
1.87
2.78
89.38
170.39
2150.96
7.02
0.76
11.01
1.75
40.11
9.62
310.45
227.45
115.2
145.01
428.14
6385.09
250.23
429.07
15577.4
510.39
3123.08
total time
41.75
55764.69
3.83
6.45
7.1
246.73
400.49
6024.71
19.27
1.99
23.95
4.97
76.91
28.7
950.11
699.06
352.75
446.61
1206.34
36807.76
652.82
1228.7
47314.95
1197.2
9216
cost per arc
3.95e-04
2.51e-03
1.52e-04
1.38e-04
1.08e-04
2.93e-04
5.68e-04
1.82e-04
1.03e-04
6.87e-05
1.01e-04
9.57e-05
2.09e-04
9.70e-05
1.94e-04
1.26e-04
1.14e-04
1.16e-04
1.21e-03
3.95e-03
8.04e-04
1.22e-03
3.56e-03
1.38e-04
2.31e-03
Table 10: Experiments with embedding of communities of radius 2, 70%. Timing of phase,1, 2 and 3 and
total time (in seconds), and time per arc.
13
file name
as-caida20071112
as-skitter
as20000102
oregon1-010526
oregon2-010526
cit-HepPh
cit-HepTh
cit-Patents
ca-CondMat
ca-GrQc
ca-HepPh
ca-HepTh
num.
1
2
3
4
5
6
7
8
9
10
11
12
13 Email-Enron
14
15
16
17
18
19
20 wiki-Talk
21
22
23 web-BerkStan
24 web-Google
25 web-Stanford
p2p-Gnutella31
amazon0601
roadNet-CA
roadNet-PA
roadNet-TX
oc-sign-Slashdot090221
soc-Epinions1
soc-Slashdot0902
numarcs
105722
22190596
25144
46818
65460
841754
704570
33037894
186878
28968
236978
51946
367662
295784
4886816
5533214
3083796
3843320
1000962
9319130
811480
1008460
13298940
8644102
3985272
time ph1
2.11
2212
0.44
0.74
0.82
44.63
35.52
1426.51
4.57
0.39
1.85
1.13
8.48
8.2
263.66
200.26
99.3
125.83
339.9
14793.02
93.41
341.68
5382.16
177.88
1133.52
time ph2
7.06
4198.62
0.57
1.28
1.25
73.97
83.87
1564.77
5.43
0.56
3.78
1.4
13.71
8.6
283.89
196.21
97.69
124.1
404.43
15704.76
158.88
404.75
5311.22
223.74
1859.58
time ph3
5.77
5365.61
0.6
1.29
1.31
72.63
124.16
1584.58
5.78
0.59
4.06
1.42
29.75
8.63
272.97
191.29
93.52
120.3
408.17
6636.37
261.85
412.42
5286.71
250.02
1889.28
total time
14.94
11776.23
1.61
3.31
3.38
191.23
243.55
4575.86
15.78
1.54
9.69
3.95
51.94
25.43
820.52
587.76
290.51
370.23
1152.5
37134.15
514.14
1158.85
15980.09
651.64
4882.38
cost per arc
1.41e-04
5.31e-04
6.40e-05
7.07e-05
5.16e-05
2.27e-04
3.46e-04
1.39e-04
8.44e-05
5.32e-05
4.09e-05
7.60e-05
1.41e-04
8.60e-05
1.68e-04
1.06e-04
9.42e-05
9.63e-05
1.15e-03
3.98e-03
6.34e-04
1.15e-03
1.20e-03
7.54e-05
1.23e-03
Table 11: Experiments with embedding of communities of radius 2, 50%. Timing of phase,1, 2 and 3 and
total time (in seconds) and time per arc.
14
|
1109.1808 | 1 | 1109 | 2011-09-08T19:09:04 | The use of microblogging for field-based scientific research | [
"cs.SI",
"cs.DL",
"physics.soc-ph"
] | Documenting the context in which data are collected is an integral part of the scientific research lifecycle. In field-based research, contextual information provides a detailed description of scientific practices and thus enables data interpretation and reuse. For field data, losing contextual information often means losing the data altogether. Yet, documenting the context of distributed, collaborative, field-based research can be a significant challenge due to the unpredictable nature of real-world settings and to the high degree of variability in data collection methods and scientific practices of different researchers. In this article, we propose the use of microblogging as a mechanism to support collection, ingestion, and publication of contextual information about the variegated digital artifacts that are produced in field research. We perform interviews with scholars involved in field-based environmental and urban sensing research, to determine the extent of adoption of Twitter and similar microblogging platforms and their potential use for field-specific research applications. Based on the results of these interviews as well as participant observation of field activities, we present the design, development, and pilot evaluation of a microblogging application integrated with an existing data collection platform on a handheld device. We investigate whether microblogging accommodates the variable and unpredictable nature of highly mobile research and whether it represents a suitable mechanism to document the context of field research data early in the scientific information lifecycle. | cs.SI | cs | The use of microblogging for field-based scientific research
Alberto Pepe
Center for Astrophysics &
Institute for Quantitative Social Science
Harvard University
Cambridge, MA, USA
[email protected]
Matthew S. Mayernik
NCAR Library
National Center for Atmospheric Research
Boulder, CO, USA
[email protected]
1
1
0
2
p
e
S
8
]
I
S
.
s
c
[
1
v
8
0
8
1
.
9
0
1
1
:
v
i
X
r
a
Abstract—Documenting the context in which data are col-
lected is an integral part of the scientific research lifecycle. In
field-based research, contextual information provides a detailed
description of scientific practices and thus enables data inter-
pretation and reuse. For field data, losing contextual informa-
tion often means losing the data altogether. Yet, documenting
the context of distributed, collaborative, field-based research
can be a significant challenge due to the unpredictable nature
of real-world settings and to the high degree of variability
in data collection methods and scientific practices of different
researchers. In this article, we propose the use of microblogging
as a mechanism to support collection, ingestion, and publication
of contextual information about the variegated digital artifacts
that are produced in field research. We perform interviews
with scholars involved in field-based environmental and urban
sensing research, to determine the extent of adoption of Twitter
and similar microblogging platforms and their potential use for
field-specific research applications. Based on the results of these
interviews as well as participant observation of field activities,
we present the design, development, and pilot evaluation of a
microblogging application integrated with an existing data col-
lection platform on a handheld device. We investigate whether
microblogging accommodates the variable and unpredictable
nature of highly mobile research and whether it represents a
suitable mechanism to document the context of field research
data early in the scientific information lifecycle.
I . TH E CON TEX T O F FIE LD RE SEARCH DATA
Digital
technologies, such as sensor networks in the
environmental sciences, social networking tools in the social
sciences, and the digitization of cultural artifacts in the
humanities, allow researchers to produce digital research
products with volumes and complexities much greater than
were possible in the past. This deluge of digital artifacts
offers tremendous opportunity for new kinds of research [1].
The integration of many diverse data streams from numerous
small-scale projects can enable synthesis and longitudinal
studies of large-scale environmental phenomena such as
climate change and species shifts. Similarly, the digital in-
tegration of historical texts, photos, and maps from libraries
and archives all over the world can enable comparative
humanities projects that would otherwise be difficult or im-
possible to conduct. But while the possibilities of these kinds
of digital resources are exciting, they also present tremen-
dous challenges. Scientific artifacts that originate in digital
form exist in a wide array of genres, including manuscripts,
publications, data,
instrument
laboratory and field notes,
calibrations, preprints, grant proposals, talks, slides, patent
applications, theses, and dissertations, among others. This
ensemble of artifacts and the relationships among them can
be conceptualized as a lifecycle [2]. Artifacts that originate
for one purpose at a stage of the lifecycle may be sought
later for other purposes and at other stages, or they may
be in active use for some time and then lay dormant or be
discarded.
Increasingly, scientific artifacts such as data and articles
are being produced in collaborative research settings. As
research becomes more distributed and dependent on digital
means for collection and dissemination of research prod-
ucts, collections of digital resources, in order to be useful
outside local settings, must be supplemented by information
about the resources themselves. Understanding the context
in which data and documents were produced, and the ways
that they were modified and analyzed, is essential if they
are to be used, shared, and re-used. This “information about
data” is commonly referred to as “metadata,” though the
term metadata often connotes formalized description and
representation schemes. In distributed scientific collabora-
tions, however, creating and collecting contextual informa-
tion about digital artifacts is a significant challenge due to
the high degree of variability in data collection methods, data
types, and data uses. Contextual information about scientific
artifacts, or “contextual data”, are often shared informally as
well as formally in scientific collaborations [3].
In this paper, we focus on the challenge of capturing and
collecting contextual information in dedicated scientific data
repositories. This challenge is compounded by the various
and amorphous conceptions of “context” itself. Paul Dourish
provides some light on the topic in an analysis of differing
conceptions of “context” in computing. He illustrates how
discussions of “context” are better conceived as discussions
of “practices” [4]. Contextual information about a scientific
observation or experiment is, indeed, a description of scien-
tific practices: for example, the data collection process, the
equipment used, the researchers involved in the observation,
and the exact location of an observation. These types of
contextual data are often only minimally described or left out
entirely from the presentation of research results in scholarly
publications, which are often all that researchers have when
finding and using data collected by someone else.
Researchers apply their own field expertise to evaluate
data collected by others for relevancy and identify any
potential problems [5]. Data digital libraries and repositories
provide access to data, but as long as researchers must rely
on often incomplete published reports of the data collection
processes as data quality verification, data are of very little
use for future research, as they cannot be interpreted. When
these contextual data are not available, the reusability and
reproducibility of scientific results is at stake. As recently
noted by Stodden [6], data reusability and reproducibility
of results are crucial to modern scientific communication,
especially as scientific inquiry progressively becomes more
dependent on scientific computation. Besides reproducibility,
the availability of data and tools also ensures that further
research on the same or other data sources can be conducted.
Cultural norms of data sharing in different scientific
communities are intimately tied to the contexts of data
production, namely the social practices, relationships, and
material conditions in which data production takes place
[7]. Because scientific practices change significantly from
domain to domain (and even from project
to project),
providing researchers with reliable tools and techniques to
describe their data collection practices and the context of
their research can be a challenge [8], [9]. This challenge is
even more marked in field based research that uses sensing
technologies and Wireless Sensing Systems (WSS). With the
addition of WSS, field research in areas such as environ-
mental biology, seismology and urban sensing is becoming
highly instrumented, computational, and collaborative [10].
The utility of data collected in situ with these systems, be it a
natural reserve or an urban context, increases when coupled
with contextual data that describe the setting in which
the observations were taken: the equipment used to collect
data, the researchers involved, and specific environmental
conditions. Ensuring capture, description and preservation
of these data is a fundamental task for scientific information
management, as large volumes of sensor-collected data are
linked to specific times and places and are thus irreplaceable.
For these data,
losing descriptive contextual
information
means losing the data altogether [11].
With these notions in mind, what tools can we provide
scientists with to support collection of contextual data and
documentation of the variegated artifacts that are produced
in the scientific information lifecycle? In particular, can
contextual data be collected in the field via handheld devices
such as smart phones? These devices are now ubiquitous,
contain many capabilities that might be useful for collecting
contextual data, and can be equipped with both custom and
commercial software applications. In this article, we discuss
the use of microblogging, or short text annotations, as a
mechanism to document
the context and data collection
practices of field-based research applications. We describe
our design considerations of a handheld application and
report on the results of interviews and a pilot study with
researchers involved in in situ ecological monitoring and
related sensing research conducted in the field in natural
and urban contexts.
I I . SC I EN T I FIC U S E S O F M ICROBLOGG ING
Microblogging is a form of online communication by
which users publish and broadcast content to the public
or to a limited group of contacts. While blogging al-
lows the publication of lengthy, multi-media, user-generated
content, microblogging is limited to very brief, text-only
messages. On the popular microblogging platform Twitter
(http://twitter.com), microblog posts are commonly known
as tweets. Tweets are similar to SMS messages exchanged
on cell phones, being 140 characters in length, at most. The
brief format of tweets makes microblogging a timely and
dynamic means of online communication. Microblogging is
used to exchange and broadcast different types of informa-
tion.
Scholars from many disciplines—social, political, and
computer scientists, for example—are increasingly becom-
ing interested in the profusion of user-generated data avail-
able on microblogging sites. As more and more people share
information about themselves via these social media, the
emotional, political, cultural, and behavioral traits of entire
communities begin to emerge. For example, researchers have
recently drawn upon microblogging corpora to study news
diffusion in geographic local networks [12], and to model
public mood levels against socio-economic indicators [13].
But scientists are not only analyzing Twitter and similar
microblogging platforms. They are also increasingly using
them. Scientists use Twitter to network with other scientists,
to support the organization of scientific events, and to publi-
cize their work. A recent survey conducted among computer
scientists revealed Twitter to be among the top three services
for dissemination of scientific information [14]. In other
related research, based on interviews and content analysis, it
has been noted that Twitter has recently grown into a well-
established vehicle of informal scientific citation [15]. Twit-
ter has also been noted to be the current platform of choice
to support the communication infrastructure of conferences:
researchers use microblogging to produce aggregated real-
time proceedings and to network with fellow attendees [16].
It is unclear, however, the degree to which the penetration
of Twitter and other microblogging services in scientific
practices extends beyond the functions of social networking
and information dissemination. Scientists use microblogging
to publicize their work, exchange scientific information,
cite interesting scientific work, and become acquainted with
other scientists in their community. As we note in the next
section, scientists also potentially can use microblogging and
similar content publication services as an integral component
of their scientific research activities, specifically to capture
and document the context of highly-mobile field-based envi-
ronmental and urban research. Are microblogging services
used by field researchers to capture contextual information
very early in the scientific data lifecycle, enabling them
to document and adjust their research methods and data
collection practices as they interact with each other, the
experiment location, the data collection equipment, and other
technical and social constraints?
I I I . WHY M ICROB LOGG ING I S CONV EN I ENT TO
DOCUM ENT TH E CON TEX T O F FIE LD R E SEARCH DATA
The work presented in this article is developed within
the scope of the Center for Embedded Networked Sensing
(CENS), a National Science Foundation Science and Tech-
nology Center involved in theoretical and applied work in
the field of wireless communication networks and sensor
technologies. CENS is a multi-institution research center
which is comprised of five member universities in Cali-
fornia: University of California, Los Angeles; University
of Southern California; University of California, Riverside;
California Institute of Technology; and University of Cal-
ifornia, Merced. CENS’ goals are to develop, construct
and apply sensing technologies to address questions in the
natural environment (habitat ecology, marine microbiology,
environmental contaminant transport, seismology) as well as
in social and urban contexts. The type of research conducted
at CENS is mostly conducted by teams of five to ten people
in field settings and it spans a wide spectrum of disciplines
and applications related to and supporting sensor network
research.
In sensor network research, a deployment is a research
activity in which sensors, sensor delivery platforms, or wire-
less communication systems are taken out into the field to
study phenomena of scientific interest. CENS deployments
have taken place at numerous locations in California (at
various national reserves, lakes, streams, and mountains) and
around the world (including Bangladesh, Central and South
America). CENS researchers engaged in sensor deployments
normally work in small teams in specific locales using newly
developed instrumentation and create heterogeneous data
sources. As such, they require flexibility to adjust research
plans on the fly. The use of wireless sensing systems adds
complexity to both the research activities and the kinds of
information that researchers produce, because such systems
are difficult to deploy in unpredictable field settings and
often produce unreliable measurements.
The goal of our research, in the Statistics and Data Prac-
tices Team at CENS, is to develop tools and applications that
facilitate the collection and interpretation of data in scientific
practices and field-based activities at CENS. In recent work,
we have participated in the development of two digital
data repositories: one for sensor-collected raw data, called
SensorBase (http://sensorbase.org/) [17], and one for related
contextual information, called CENS Deployment Center
(http://censdc.cens.ucla.edu/) [18]. These two platforms are
intended to function in parallel, as they represent different
“views” of data relative to the same scientific lifecycle.
SensorBase provides access to raw data and the Deployment
Center provides enough contextual information to interpret
them. More detailed information about the data hosted by
these two repositories is shown in Table 1.
Raw data collected, produced, and managed by scientists
and engineers performing WSS-based field research are ex-
tremely heterogeneous in nature. This is due both to the fact
that sensor network research involves the interaction among
researchers from a wide spectrum of domains with differ-
ing scientific data practices (e.g., biologists, seismologists,
electrical engineers, computer scientists) and to the fact that
different research applications necessarily produce different
kinds of data. Data handled by CENS field researchers differ
not only in media types (text, images, audio, video, software)
but also in the conceptual role that these data have within
a broader data lifecycle [2]. For this reason, Sensorbase has
been designed and constructed as a central server with a flex-
ible, and highly customizable metadata schema. Moreover,
to encourage scientists to publish their data, SensorBase
employs a light-weight data ingestion mechanism by which
users upload and share data in a way functionally similar
to the way by which bloggers post and share personal blog
posts.
The contextual data hosted on the Deployment Center are
less heterogeneous in content and format than raw data are.
They mostly describe the details of the setting in which
field research is performed, such as information about field
practices, equipment, times, and locations. The contextual
information that CENS researchers create for their own use
in their day-to-day work, however, exist in multiple media
formats and are most frequently conveyed using free text
annotations or images associated with a time and location.
Researchers within CENS rarely create documentation that
is not directly tied to their own use of their data, and
correspondingly,
they rarely share data with users from
outside of their immediate projects [19]. With these notions
in mind, we seek to determine whether micro-blogging is
a viable ingestion mechanism for contextual data in field-
based research. In other words, while blogging represents
a convenient metaphor to figuratively represent the act of
publishing and sharing raw data, is microblogging a valid
metaphor to represent the act of publishing and sharing con-
textual data? In order to test the utility of microblogging as
a mechanism for the ingestion and publication of contextual
data we consider two crucial data challenges associated with
most field-based research: interoperability and mobility.
• Interoperability. A conceptual and technical discrep-
ancy exists among available metadata standards used
to collect and represent contextual data in sensor net-
Table I
S ID E -BY- S ID E OV ERV I EW O F TH E RAW DATA AND CONT EX TUA L DATA R E PO S I TOR I E S
Hosted data
SensorBase
Raw and unprocessed data collected from sensors, semi-
processed and analyzed data
CENS Deployment Center
Contextual data, descriptive information about field practices,
equipment, times, and locations
Data types
Heterogeneous (ASCII tables, images, audio)
Free text annotations, images
Metadata
Minimal, customizable; may vary by research field, applica-
tion, and working group
May vary depending on the field, but time and location are
usually recorded
Ingestion
Blogging
Micro-blogging?
work research. Locally-specific metadata representa-
tion formats for datasets and field notes often fail
to inter-operate. In research areas new to computer-
based instrumentation, few standards for description
and annotation of resources such as sensor-collected
ecological data are widely used.
The challenge of interoperability could be addressed
by the lightweight nature of microblogging as a data
posting service: microblog posts are brief and text-
only. This means that microblogging services are fairly
easy to implement in existing data collection platforms;
also, collected microblog information is easily fed into
existing data digital libraries. This also means that there
is no need to create domain- or discipline-specific data
models to accommodate different types of contextual
information (e.g. contextual data collected in seismo-
logical projects and marine biology deployments). All
contextual information embedded in microblogs can
be collected and stored as text (and HTML links, in
the form of text). Thus, microblogging could be an
interoperable solution to document the context of field
research practices. In turn, the availability of generic
(i.e. domain-independent) contextual
information in
data digital libraries facilitates data sharing both within
and across domains.
• Mobility. Ecological field deployments using wireless
sensing systems necessarily involve in-field data cre-
ation, retrieval, and tracking. Understanding how high-
ly variable field-based methods impact the resulting
data products is essential
to understanding and in-
terpreting data on both short and long terms. Many
field locations where WSS deployments take place do
not have Internet or local area network connectivity.
Thus, approaches to collecting information about data
collection activities for WSS deployments cannot be
solely web-based. Mobile applications and devices may
enable field researchers to perform basic data collection
and management operations when working in remote
locations where Internet connectivity is lacking.
The challenge of mobility could be addressed by the
nature of microblog data: microblog posts natively
carry metadata that is fundamental to contextual infor-
mation, such as author and timestamp data—essential
to reconstruct the link between the gathered contextual
data and specific real-world situations. As discussed in
the previous section, due to the unpredictable nature
of mobile sensing research, losing, or failing to record,
temporal information might make data collected in the
field unusable. This is true, in most cases, not only for
the collected sensor data but also for related contextual
data. In a similar way, associating microblog posts
with author information ensures data consistency and
enables data reuse and exchange. Author and temporal
metadata embedded in the gathered contextual informa-
tion can be immediately published on the web, when
researchers are in the field and a wireless Internet link
exists, or can be stored locally on the device and later
published on the web when Internet connectivity is
lacking.
IV. DO FIE LD R E SEARCH ER S U SE TW I T TER ?
Having argued that microblogging presents features that
make it a suitable mechanism to collect contextual data in
field-based sensor applications, we performed an exploratory
survey among field researchers to determine the current
extent of adoption of Twitter and similar microblogging plat-
forms, be it for research or social purposes. We conducted
interviews with eight scholars of different ranks (research
staff and graduate students) involved in field research of
various kinds (ecology, biology, environmental science, and
urban sensing). Interviews were conducted in person or
via email in a semi-structured format. The questions asked
throughout the interview are the following:
1) Have you ever used a micro-blogging service (e.g.
Twitter)? If yes, what have you used micro-blogging
services for? Do you use micro-blogging for research
purposes?
2) Do you know of other researchers in your discipline
who use micro-blogging for research purposes? If so,
what do they use micro-blogging for?
3) Do you think that
implementing a micro-blogging
service on top of existing data collection tools/devices
would assist you in your field work in any way? What
specific information would micro-blogging facilitate to
collect in the field?
4) Do you think that micro-blogging could enable ex-
change of information (i.e., research-based conversa-
tions) with fellow researchers during field activities?
If so, in what ways would that be useful for you?
When asked about their micro-blogging practices, nearly
all interviewed researchers said that they either do not use
Twitter (or any similar micro-blogging platform), or if they
do, their use is limited solely to social interactions. Only
one researcher actively employed Twitter both for social and
research purposes. This use is specifically limited within the
scope of Budburst, a citizen science mobile sensing project
aimed at collecting data on phenology and climate change
(http://budburst.org/). Project participants contribute to this
project by performing multiple observations of the same
plants, documenting “phenophases” such as their first leaf,
the first flower, and the first fruit of trees, shrubs, flowers,
and grasses. There are multiple ways to make and record
budburst observations,
including sms text, a smartphone
application, and Twitter. On Twitter, users mark tweets
about observations with a given hashtag (#budburst). The
application scrapes the tweet corpus daily and a stream
of observations becomes available to users and researchers
on the project. The same researcher also indicated another
research use of Twitter, which is not directly field-based,
but that is related to the aforementioned project. In what
they jokingly referred to as “opportunistic” participatory
sensing, they continuously search the public Twitterverse
for phenology-related keywords, such as “spring”, “bloom”,
“blossoming”, etc. They log tweets containing these key
terms and their geotag, if available. Analysis of this corpus
allows them to correlate user-contributed Twitter events with
life cycle events in plants.
All the researchers that do not use Twitter also indicated
that they do not know of any colleagues who do use it for
research purposes. Some researchers were aware, however,
of some field-based research applications that use aspects of
blogging or micro-blogging as their data ingest mechanism.
One researcher mentioned the existence of a Facebook
application for beach contamination source tracking. In the
realm of urban sensing, a researcher mentioned a project
of a colleague who uses the distribution of tweets across
cities to look at urban landscapes and urban density. Nearly
all interviewed researchers indicated that the current most
common and beneficial use of Twitter for research purposes
has to do with scientific communication, dissemination of
scientific results, and gaining visibility in one’s scientific
community:
[Student (Biology)] I know some researchers who seem
to use Twitter for informing their “followers” of their
goings-on, which often include what research/field cam-
paigns they’re working on.. I’ve also seen a fair bit of
micro-blogging of “popular” research, i.e. links to fun,
kinda cool research...
[Student (Ecology)] What I could picture for me per-
sonally as a graduate student is maybe augmenting my
personal research website, so I could see using Twitter
to maybe update people on the status of my research,
and using that application to do that. I guess it would
be a way to gain a wider audience and feedback for
my research,
in real
time. I see that as a potential
application.
Researchers indicated a number of ways by which mi-
croblogging services could assist their field work practices.
One researcher suggested the use of Twitter feeds for auto-
matic notification of instrument failures. Device failure is a
problem that spans across all mobile sensing applications.
The use of a Twitter feed, in addition to email notifications,
would allow researchers to instantaneously subscribe to
multiple devices, re-broadcast (retweet) given failures to
a broader/different research community, and publish notes
and annotations concomitant with the failure messages, for
public viewing. One respondent mentioned the potential
of microblogging platforms to foster public awareness and
interest in scientific research. For example, it was suggested
that Twitter feeds could be useful to publish water quality
data about particular beaches. This in turn, has the potential
to serve the research community—other researchers might
be interested in harvesting, storing and reusing those data—
as well as the public—citizen scientists and beachgoers may
find interest in the data and in the processes by which those
data were collected.
Some researchers pointed to an important shortcoming of
Twitter: its inability to function in field locations in which
Internet connectivity is not available. As discussed above,
the mobile and unpredictable nature of most scientific field
research implies that Internet connectivity may be lacking
for extended periods of time. If Twitter had to be used as
a note-taking tool for the collection of contextual data, how
would it behave in the absence of Internet connection? The
doubts expressed by interviewed researchers point to the
importance to employ microblogging services with offline
capabilities when performing field experiments.
With regard to the last question of the interview, many
researchers were unsure whether microblogging is a viable
platform for exchange of research-based information during
field activities, for two main reasons: the potential lack of
connectivity in field settings and the public nature of Twitter.
The connectivity issue was raised as a major cause for the
inability to communicate while in the field:
[Research staff (Ecology)] Again, there is the connec-
tivity issue. It’s not clear how this would be better than
”.
walkie-talkie, or just saying, “lets all meet here at
I have been using my twitter account to post about the
progress of projects, but these are just general posts, not
field work specific.
Other researchers were worried about the public nature of
Twitter, and thus the issue of publishing raw, non-certified
field data into the public:
[Student (Biology)] I suppose micro-blogging could
foster collaboration between researchers while in the
field, but with the public nature of things like Twitter I
don’t know that it would be appropriate for sharing data
or results of field work prior to any QA/QC processes.
Although Twitter does allow accounts to be private, i.e., to be
accessible only by a selected group of contacts, researchers
expressed the need to make openly available certain sections
of their Twitter feeds, while restricting others.
In sum, although all researchers in our study possess
some familiarity with Twitter, very few actually employ
microblogging services actively. Some of them use Twit-
ter for promotion of their scientific work and to network
with other scientists. Although most interviewed researchers
consider feasible and convenient
the use of Twitter to
support field-based research, only one of them has personally
experimented in this regard, collecting field data about
phenophases and climate change. Two major shortcomings
of Twitter were put forward: its inability to work in offline
mode and its limited range of options on access privileges.
Combining these findings with the fact
that CENS re-
searchers largely create documentation that is directly tied to
their own use of their data [19] suggests that microblogging
has little added value for field researchers in-and-of-itself as
a research tool that exists in isolation from other research
tools and the data themselves. In the next section, we present
a mobile application that tries to address this problem by
bringing the microblogging service closer to the data.
V. SY ST EM D E S IGN AND D EVE LO PM EN T
In light of interview results and ongoing participant ob-
servation with field researchers, we outline the requirements
and sketch the design of a microblogging-like system that
would allow collection of data and field contextual metadata
together. As we discussed, researchers engaged in sensor-
based field work perform research in a very mobile manner,
they work in small
teams using ad-hoc methods,
they
produce heterogeneous data sources, and require enough
flexibility to adjust research plans and data ingestion mech-
anisms. In designing, deploying and testing a data collection
tool for this community, we focus on enabling flexible and
adaptive research.
Our design and code base derived from another CENS
project, the EcoPDA project1 . The EcoPDA application pro-
vided a handheld system with which to conduct biodiversity
surveys. Our application sought to develop a more general-
purpose system which could be used in any type of field
research. We also drew design ideas from other similar
1 http://www.teamnetwork.org/en/content/ecopda
projects. The ButterflyNet project2 was another project to
develop a handheld application for collecting field research
data, but required specialized paper and pens to use. The
Cybertracker project3 provides another handheld tool for
performing field research, but again is designed to be used to
perform biodiversity surveys, and as such is not as general
purpose as we would like our application to be.
Our development follows a usability engineering lifecycle,
which organizes the design process around two phases:
(i) requirements analysis and (ii) design, testing, and de-
velopment [20]. In the first phase, requirements analysis,
we developed a user profile based on our discussions with
field researchers. We performed contextual analysis of the
users’ main work tasks, set usability goals, analyzed the
platform capabilities and constraints, and created general
design principles. Field research in the ecological and envi-
ronmental sciences takes on many forms depending on the
research questions being asked. In recent sensor network
deployments, we have observed that scientists and engineers
involved in field work collect in their notebooks many di-
verse kinds of contextual data such as information relative to
the equipment used, participants of the project, annotations
of various types, and a number of tasks performed during,
before and after the field work [18]. Some of this information
is very domain-specific. For example, researchers involved
in the study of environmental sensing and image acquisition
collect information that indicates the detailed models and
characteristics of the imaging sensors installed and used.
Researchers working in urban sensing field projects collect
and store entirely different contextual data, such as social
and demographic information relative to the urban environ-
ment being studied. Although disparate kinds of contextual
data are being collected, there are certain categories of field
activities that occur with regularity across all domains and
practices of field-based research. This allows us to focus our
design and development efforts on specific categories of field
activities, yet leaving the system sufficiently open to enable
user appropriation, i.e., researchers may progressively use
the provided microblogging functionality for uses that are
outside the initially intended use of field-based note taking.
Our design requirements and principles stem from our
interviews as well as from ongoing and past participant
observation of field research activities at CENS and can be
summarized as follows:
• Provide full metadata customization and flexibility: In
the field, highly varied kinds of data are produced.
We would like to give researchers full control over
the metadata required in the documenting the context
of these data. Some researchers might want to create
pre-existing metadata schemes. Others might want to
produce solely unstructured free-text annotations.
2 http://hci.stanford.edu/research/butterflynet/butterflynet/
3 http://www.cybertracker.org/
• Specify data collection protocols: When researchers
choose to specify their own collection procedures, they
have to be able to fully customize the data collection
interface to those procedures.
• Collect repeatable data: Researchers often repeat data
collection procedures, both to replicate previous results
and to augment prior experiments. The system must
allow them to re-use data collection protocols that they
have already created and used.
• Perform their field activity as fast with the application
as without: Time spent in the field is precious. If our
system noticeably slows researchers down, its useful-
ness is greatly diminished.
• Easily integrate the field data collected with the tool
into their existing data collections: Researchers in most
sciences are already facing challenges in organizing
and using digital data resources, thus our system must
integrate with existing data and data tools.
• Provide both online and offline ingestion and access:
Researchers must be able to both access and populate
the system (i.e., produce microblogging annotations)
from any location (their office, or the field) whether
they are online or offline.
• Allow both public and private publication of content:
Some content, such as preliminary observations, sen-
sitive material, and equipment
information,
is only
intended for a close circle of researchers, directly
involved in a field project. Other content can be safely
made open and publicly available. The system must
allow users to publish content in both public and private
mode, and to quickly switch between these two modes,
if needed.
• Produce data annotations that “live with” the data:
Packaging data and its contextual information increases
the usefulness, and consequently the value, of the data
itself. Thus, we would like to develop a microblogging
service that not only produces annotations, but it also
gives users the possibility to associate those annotations
with specific datasets subsets of data, and data points.
The second design phase—design/testing/development—
involves a number of iterative steps, including: conceptual
modeling, conceptual mockups, setting screen design stan-
dards, prototyping, evaluation of the standards and prototyp-
ing, interface design, and evaluation of the interface design
by gathering user feedback.
The focus of our development work thus far has centered
around the development of a Twitter-like annotation platform
that would integrate with existing data collection tools and
instruments employed in the field. One such tool
is an
application which runs on a handheld device and allows
field researchers to collect tabular data. The application,
developed on Windows Mobile 6.1 operating system and
currently tested on Samsung Omnia smart phones, features
Figure 1.
A screen capture of the mobile phone application for the
collection of tabular data.
a simple web interface by which users can “author” data
collection tables prior to going out in the field, i.e., they
have the option to structure a basic metadata schema a priori.
Once in the field, these data collection tables are customiz-
able, in that they can be changed and re-used, facilitating
data repeatability. Figure 1 shows a screen capture of a
data collection table on the mobile phone. The menu on the
bottom right shows the options available to the user, which
include standard options such as adding an entry (data point),
and adding columns to the table.
Following the list of requirements and principles outlined
above, we developed a note taking service that operates
within this data collection tool. The service gives users two
additional options: to add/view notes and display the geo-
tagged items, as shown in the menu on the bottom right
of Figure 1. When using these functionalities, a user is
presented with a note taking interface, shown in Figure 2.
Importantly, since the annotation service can be invoked
directly from within a specific data table, annotations can
be made data-specific, i.e. directly associated with a given
dataset or data table. The initial prototype only allows
geo-tag function pulls the latitude and longitude of the
user’s current location from the phone’s built in GPS
receiver and links the coordinates to the data point or
note that was tagged. The user can then filter the display
to view the data points and notes that have been geo-
tagged4 . Also, devices that have GPS capability may
not be usable in field locations because of physical
obstructions. In these cases, users can self-describe
the location using the free-text note field. Although
geographically less precise than GPS, these descriptions
might provide some context when GPS data are entirely
missing.
• Annotation feed:
the lower portion of the interface
provides a list of recent annotations in reverse chrono-
logical order, similar to the Twitter news feed.
Not shown in the images are two other components of
the note taking application which reflect our design consid-
erations. First, the service does not depend on an Internet
connection to function. It stores all annotations locally until
they are pushed, at given time intervals, to a desired online
database, or microblogging service. When no Internet is
available, all stored annotations are stored and queued in the
system and then pushed online as soon as a connection be-
comes available. Second, we have only partly addressed the
problem relative to access privileges. As discussed above,
users should be able to decide whether to publish certain
annotations publicly or with a restricted group of contacts.
For the time being, we have addressed this problem in the
following manner. All annotations produced are pushed by
default to an online private microblogging database that is
only accessible by CENS field researchers. However, our
planned approach is that upon submitting an annotation,
users will be asked whether they also want to push the
annotation to a public microblogging service (e.g., a Twitter
account), or to Sensorbase and/or the CENS Deployment
Center. Using these mechanisms, field researchers can make
annotations without worrying about
the availability of a
wireless Internet connection. They also can be certain that all
their notes are eventually pushed to a private online database,
and in addition will be able to choose which ones are pushed
to an online microblogging platform for public viewing.
And finally, because we noted that a number of interviewed
researchers use Microsoft Excel formats for their day-to-
day data collection, manipulation, and analysis, we allow
users to export their data and notes in an Excel file, again
enabling the data to “live with” the contextual notes. The
Excel output allows users to integrate their data collected via
our application with their existing data collected via other
means.
In the next section, we present a use case scenario of the
4 It has been noted that in many situations the GPS coordinates are of
little meaning or use in and of themselves [21]. To address this problem,
we are exploring ways to visually present the geo-tagged information, for
example through a map interface.
Figure 2. A screen capture of the note taking interface for the collection
of contextual data.
annotation at the level of data tables, but in subsequent
development we plan to extend the annotation capability to
specific data rows, columns, and points. For example, in the
case of Figure 1, if the menu is invoked under row_id 3
and column Nitrate, the relative annotation will be stored
specifically within the scope of that data table. This allows
annotations to “live with” the data, i.e., full integration of
annotation functionalities with existing data and services,
by being stored in the same XML output file. The note
taking interface we developed, shown in Figure 2, is not
very different from typical microblogging content publishing
services. It is composed of the following elements:
• Date- and time-stamp: The service automatically pop-
ulates date and time fields, which are stored alongside
the text annotation. This can be altered if needed (e.g.,
if the researcher wants to make a note about a past
event or set a reminder about a future event).
• Text box: This box contains the content of the anno-
tation. Unlike Twitter, the maximum allowed count is
not limited to 140 characters.
• Geo-tagging functionality: Users can geo-tag data po-
ints and notes by checking the “Geo-tag this” box. The
application together with the results of preliminary user pilot
study.
V I . P I LOT S TUDY
Our first round of pilot users consisted of three scientists
with extensive experience in performing environmental and
ecological research in field settings. The pilot tests took
place indoors in a laboratory setting, and focused on the
usability and utility of both the data collection and note
taking applications described in the previous section. The
pilot test protocol consisted of five tasks aimed at testing
the main functionalities of the system, and how easy the
application was to learn and use. First, we had the users test
the web interface that allows them to create data collection
tables, and second, we had them test the application using
these tables. This involved opening the tables, taking data,
customizing the tables by creating new columns,
taking
notes, and finally exporting the data. In this stage, we did not
help users in any way, to mimic a real-world environment
as much as possible. We asked users to think aloud as they
completed the tasks in order to gain a better understanding
of their thought processes.
The feedback from our pilot users highlighted some
positive and negative aspects of our prototype system. Users
liked the ability to create their own data tables, and the
ability to customize the tables during the data collection
process, by adding new columns. They also liked the mobile
aspect of the application, in that the small size of a mobile
phone will not be an encumbrance as they perform their
research activities in varied field settings. The small size
of the application had both positive and negative aspects,
however. Both users reported that the small screen size of
the phones might prove to be hard to see in some situations,
specifically mentioning button size and text size as potential
issues. We also identified individual pages and functions that
were either hard to use (such as the data import function) or
did not work as we had anticipated. This enabled us to see
where the application needed to be streamlined or changed
in order to provide smoother user experience.
The other main motivation of the pilot test was to get
feedback on the notetaking capabilities of the mobile data
collection application. All three pilot users are not active
Twitter users. One user said that they had previously utilized
smartphones to take and post pictures during field research,
but none of them currently uses Twitter or any other mi-
croblogging service for field research in any major way. Pilot
users were invited to utilize the note taking device. They
noted that this application would be most useful for taking
notes on the spot while in the field. One tester stated that this
meant that they would not have to carry a notebook around,
and it would allow them to attach the location information
to their notes. All users agreed that the collection of notes as
short text messages and their preservation and distribution
via a database or website would be very useful. Two users
also suggested that the note taking application is most useful
in situations that involve collecting information about events.
More specifically, sending notes out as microblogs is useful
in providing notifications to other members of the research
team or to the general public that a certain event has taken
place, or that important thresholds in data collection have
been achieved. All users also mentioned that attaching GPS
or other location information to the annotations certainly
increased their information utility.
V I I . CONC LU S ION
Throughout this article, we have stressed the importance
of contextual information and data in understanding and
using information resources in any setting, from single-
investigator projects to distributed and collaborative projects.
In particular, we focus on the challenges related to collecting
contextual
information while performing research in the
field, especially when using wireless sensing systems in
unpredictable and ever-changing field settings. We have
suggested that using microblogging as a text annotation tool
might allow the ingest and publication of contextual data
from the field because microblogging offers a convenient
platform to mimic some of the annotation functions of a
notebook.
Results of our interviews with field researchers suggests
that microblogging is not widely used as a field research
tool currently, but that potential exists for microblogging
to be widely adopted as a de facto field annotation tool,
at least for two reasons. First, microblogging is already a
widely popular and used form of scientific communication
and networking on the web. Researchers are familiar with
microblogging tools, and the ubiquity of these tools across
social settings and technical platforms ensures that they will
be widely available for adoption and appropriation. Second,
certain aspects of microblogging accommodate the highly
mobile nature of field research, specifically, its broad range
of uses and applications, and the heterogeneous nature of
data produced. Yet, we identified certain shortcomings of
Twitter and similar microblogging platforms: their inability
to work in offline mode,
their limited range of access
privilege options, and their current isolation from other data
collection and annotation tools.
Based on our interview results and participant observation
with a community of ecological, environmental, and urban
sensing researchers involved in field work, we presented
the design and development of a microblogging-inspired
application for the collection of observational and contextual
data from field research activities. We discussed how our
application accommodates field research by addressing the
aforementioned challenges and by integrating directly with
the data and existing data collection tools. Finally, we ran a
preliminary pilot test to evaluate the utility and usability
of the tabular data and note taking applications. While
the pilot test was very limited in scope and scale, it was
useful to gather expert feedback from field scientists on key
functionalities of our application, and shape ideas for the
next steps. A fuller evaluation of the application will be
conducted at a later date, in real-world settings.
This study suggests that the use of microblogging services
in existing handheld and other in-field data collection de-
vices can prove an interoperable and mobile tool to produce
and publish contextual data in the unpredictable, variable
settings of highly-mobile field research, but, crucially, only
if the microblogging tools are integrated within the larger set
of field researchers’ technologies and practices. Collecting
contextual data about scientific artifacts is a continual chal-
lenge in digital library and repository creation and adoption.
We envision that researchers using microblogging tools as
part of their field research activities will engage in patterns
of interactivity (e.g. sharing annotations, subscribing to each
other annotation feeds, etc.) that are ultimately beneficial
for the pursuit of collaborative field research, in that these
annotations and collaborative feeds can serve as a source for
contextual information about data, publications, field notes
and images, technical reports, and any number of other dig-
ital resource genres that are and will be collected and made
available in digital libraries. We hope that widespread use of
microblogging and related annotation tools in field research
will enrich scientific data repositories with important con-
textual information, thus enabling reuse and interpretation
of data collected in field activities.
R E FER ENC E S
[1] C. L. Borgman, Scholarship in the digital age. Cambridge,
MA: MIT Press, 2007.
[2] A. Pepe, M. Mayernik, C. L. Borgman, and H. Van de
Sompel, “From Artifacts to Aggregations: Modeling Scientific
Life Cycles on the Semantic Web,” Journal of the American
Society for Information Science and Technology, vol. 61,
no. 3, pp. 567–582, 2010.
[3] P. Edwards, M. Mayernik, A. Batcheller, C. Borgman, and
G. Bowker, “Science friction: data, metadata, and collab-
oration in the interdisciplinary sciences,” Social Studies of
Science, Forthcoming.
[4] P. Dourish, “What we talk about when we talk about context,”
Personal and Ubiquitous Computing, vol. 8, pp. 19–30, 2004.
[8] G. Chin and C. Lansing, “Capturing and supporting contexts
for scientific data sharing via the biological sciences col-
laboratory,” in Proceedings of the 2004 ACM conference on
Computer Supported Cooperative Work, 2004, pp. 409–418.
[9] J. C. Wallis, C. L. Borgman, M. S. Mayernik, and A. Pepe,
“Moving archival practices upstream: An exploration of the
life cycle of ecological sensing data in collaborative field
research.” International Journal of Digital Curation, vol. 3,
no. 1, 2008.
[10] D. Cuff, M. Hansen, and J. Kang, “Urban sensing: out of the
woods,” Commun. ACM, vol. 51, no. 3, pp. 24–33, 2008.
[11] A. Pepe, C. L. Borgman, J. C. Wallis, and M. S. Mayernik,
“Knitting a fabric of sensor data resources,” in Proceedings
of ACM IEEE International Conference on Information Pro-
cessing in Sensor Networks, 2007.
[12] S. Yardi and D. Boyd, “Tweeting from the town square:
Measuring geographic local networks,” in Proceedings of
the International Conference on Weblogs and Social Media,
Washington, DC, 2010.
[13] J. Bollen, A. Pepe, and H. Mao, “Modeling public mood and
emotion: Twitter sentiment and socio-economic phenomena,”
in Proceedings of the Fifth International AAAI Conference on
Weblogs and Social Media, 2011.
[14] J. Letierce, A. Passant, J. Breslin, and S. Decker, “Un-
derstanding how twitter is used to widely spread scientific
messages,” in Proceedings of the WebSci10: Extending the
Frontiers of Society On-Line, March 2010.
[15] J. Priem and K. Light Costello, “How and why scholars
cite on twitter,” in Proceedings of the American Society for
Information Science and Technology Meeting, Pittsburgh, PA,
USA, 2010.
[16] W. Reinhardt, M. Ebner, G. Beham, and C. Costa, “How
people are using twitter during conferences,” in Proceedings
of the 5th EduMedia conference, Salzburg, 2009, pp. 145–
156.
[17] L. Chang, N. Yau, M. Hansen, and D. Estrin, “Sensorbase.org
- a centralized repository to slog sensor network data,” in
DCOSS Euro-American Workshop on Middleware for Sensor
Networks Proceedings, 2006.
[18] M. S. Mayernik, J. C. Wallis, C. L. Borgman, and A. Pepe,
“Adding Context to Content: The CENS Deployment Cen-
ter.” in Proceedings of ASIST 2007: Joining Research and
Practice: Social Computing and Information Science, 2007.
[5] A. Zimmerman, “Not by metadata alone: the use of diverse
forms of knowledge to locate data for reuse,” Int. J. Digit.
Libr., vol. 7, no. 1, pp. 5–16, 2007.
[19] M. S. Mayernik, “Metadata realities for cyberinfrastructure:
data authors as metadata creators.” Ph.D. dissertation, Uni-
versity of California, Los Angeles, 2011.
[6] V. Stodden, “Enabling Reproducible Research: Open Li-
censing For Scientific Innovation,” International Journal of
Communications Law and Policy, vol. 13, 2009.
[20] D. J. Mayhew, “The usability engineering lifecycle,” in CHI
’99: CHI ’99 extended abstracts on Human factors in comput-
ing systems. New York, NY, USA: ACM, 1999, pp. 147–148.
[7] J. Vertesi and P. Dourish, “The value of data: considering the
context of production in data economies,” in Proceedings of
the ACM 2011 conference on Computer Supported Coopera-
tive Work. New York, NY, USA: ACM, 2011, pp. 533–542.
[21] A. Sorvari, J. Jalkanen, R. Jokela, A. Black, K. Koli,
M. Moberg, and T. Keinonen, “Usability issues in utilizing
context metadata in content management of mobile devices.”
in Proceedings of NordiCHI ’04, 2004, pp. 357–363.
|
1210.2018 | 2 | 1210 | 2013-03-22T17:01:15 | Community Structure Detection in Complex Networks with Partial Background Information | [
"cs.SI",
"physics.soc-ph"
] | Constrained clustering has been well-studied in the unsupervised learning society. However, how to encode constraints into community structure detection, within complex networks, remains a challenging problem. In this paper, we propose a semi-supervised learning framework for community structure detection. This framework implicitly encodes the must-link and cannot-link constraints by modifying the adjacency matrix of network, which can also be regarded as de-noising the consensus matrix of community structures. Our proposed method gives consideration to both the topology and the functions (background information) of complex network, which enhances the interpretability of the results. The comparisons performed on both the synthetic benchmarks and the real-world networks show that the proposed framework can significantly improve the community detection performance with few constraints, which makes it an attractive methodology in the analysis of complex networks. | cs.SI | cs |
Community Structure Detection in Complex Networks
with Partial Background Information
Zhong-Yuan Zhanga
aSchool of Statistics, Central University of Finance and Economics,
P.R.China
Abstract
Constrained clustering has been well-studied in the unsupervised learning
society. However, how to encode constraints into community structure detec-
tion, within complex networks, remains a challenging problem. In this paper,
we propose a semi-supervised learning framework for community structure
detection. This framework implicitly encodes the must-link and cannot-link
constraints by modifying the adjacency matrix of network, which can also be
regarded as de-noising the consensus matrix of community structures. Our
proposed method gives consideration to both the topology and the functions
(background information) of complex network, which enhances the inter-
pretability of the results. The comparisons performed on both the synthetic
benchmarks and the real-world networks show that the proposed framework
can significantly improve the community detection performance with few con-
straints, which makes it an attractive methodology in the analysis of complex
networks.
1. Introduction
Evidences have shown that there are often modules or community struc-
tures in complex networks [1]. For example, a community could be a set of
proteins that have similar functions in a protein-protein interaction (PPI)
network, or it could be a group of fans that like visiting similar kind of mu-
sic web pages, or a university club, etc. Though there is still no standard
and clear definition of community structure, we may regard a community
in complex networks as a set of nodes that have similar link-pattern, or in
other words, these nodes have similar preference and connect to the other
nodes in a similar way. The most common and widely studied community
Preprint submitted to EPL
September 10, 2018
is a subgraph that is densely interconnected but loosely connected with the
rest of the graph. Meanwhile, there are also other types of communities. Dis-
covering communities is very important for revealing the organization and
the functions of the network, such as understanding how the units in some
systems communicate with each other and work together, or learning how
the new ideas or diseases spread in a group of persons [2], etc.
How to detect community structures has thus become a hot topic, and
many interesting models and algorithms have been developed and have achieved
good results. But all of these methods are in essence a kind of unsupervised
learning, meaning that they only make use of the network topology infor-
mation. However, in many real scenarios, there is usually some background
information that could also be used in detecting the communities. This in-
formation can be treated as additional constraints, and how to combine the
information with the network topology to guide the detecting process is an
interesting problem that is worthy of working on.
In this paper, we propose a semi-supervised framework to incorporate
prior information into community structure detection. Our framework is flex-
ible to integrate various known information. One can easily provide pairwise
constraints on a few nodes in the network, specifying whether they must
or cannot be in the same community structure, based on the background
information and domain knowledge. For example, the nodes that have sim-
ilar functions should be must-link, or the nodes that have different opinions
should be cannot-link. The framework implicitly encodes the must-link and
cannot-link constraints by modifying the adjacency matrix of the network,
which can also be regarded as the de-noising process of the consensus matrix
of the community structures, i.e., creating connections within communities
and removing connections across communities.
2. Semi-supervised learning for community structure detection
In this section, we formulate our semi-supervised framework for commu-
nity structure detection. Firstly, we introduce the definition of adjacency
matrix A[0] of an undirected and unweighted simple graph G with n nodes:
A[0]
ij =(cid:26) 1,
0,
if i ∼ j
if i = j or i ≁ j,
where i ∼ j means there is an edge between node i and j, and i ≁ j means
there is no edge between them. Here A[0] is n × n and symmetric.
2
Note that the diagonal elements of A[0] are all zeros, but these zeros are
obviously different from the ones at the off-diagonal positions which mean
there are no connections between the nodes. Hence we here set the diago-
nal elements of A[0] to 1. The revised adjacency matrix is denoted by A[1].
Another variation of A[0] is its complementary matrix C [A] = 1 − A[0].
2.1. Incorporating prior knowledge into adjacency matrix
In many real applications, we often have some background information
that can be used for community structure detection. Specifically, we consider
the following two types of pairwise constraints:
• Must-Link constraints CM L: (i, j) ∈ CM L means that the two nodes
i and j must belong to the same community,
• Cannot-Link constraints CCL:
(i, j) ∈ CCL means that the two
nodes i and j cannot belong to the same community.
We incorporate the constraints CM L and CCL into the adjacency matrix A[1]
to get a new matrix B as follows:
Bij =
where α is a positive constant.
α,
0,
A[1]
ij
if (i, j) ∈ CM L
if (i, j) ∈ CCL
otherwise,
(1)
As one can see, if we set α to 1, and for all the pairs of nodes, we know
whether they should belong to CM L or CCL, or in other words, we know very
well the community structures in the graph, the adjacency matrix will reduce
to the standard consensus matrix, whose (i, j)th element means whether node
i and node j are in the same community, 1 means yes and 0 means no. Hence
from the viewpoint of consensus matrix, incorporating prior knowledge can
be regarded as the de-noising process.
We have tried different α, i.e., α = 1 and α = 2, and the results of α = 2
always get better. We omit the comparisons here due to space limit.
After incorporating background information into the adjacency matrix,
we then apply nonnegative matrix factorization (NMF), spectral clustering
and InfoMap, which are of the most common and widely-used models in
unsupervised learning, for community structure detection.
3
2.2. Nonnegative matrix factorization (NMF, [3, 4, 5, 8])
NMF can be expressed as follows: given a nonnegative objective matrix
X of size n × m, columns of which are samples and rows are features, we try
to find two nonnegative matrices F of size n × k and G of size m × k such
that: X ≈ F GT . This problem is often formulated as the following nonlinear
programming:
min
F,G
s.t.
J(XkF GT )
F > 0, G > 0,
(2)
where J(XkF GT ) is the cost function that measures the dissimilarity between
X and F GT , and > 0 means that F and G should not have negative entries.
The most popular algorithm designed for NMF is multiplicative update rules.
The objective matrix X for NMF can be selected as B.
In [6], it showed that the diffusion-kernel-based similarity matrix SK 1
was the best choice for the objective matrix X among all the candidates,
hence we also tested the performance of SK in this paper.
The community structures of the network can be obtained from G: node
i is of community k if Gik is the largest element in the ith row of G.
1) Standard NMF with least squares error: If J(XkF GT ) is selected as the
least squares error: J(XkF GT ) = kX − F GT k2
F , the algorithm of multi-
plicative update rules can be summarized in Algorithm 1. In this paper,
the iteration number iter is set to 100.
1Definition of diffusion kernel K and the similarity matrix SK [6, 7]: K = lim
n→∞
(1 +
βL
n
)n = expm(βL), where L is the opposite Laplacian of A[0]:
Lij =
and di is the degree of node i.
1
−di
0
if i ∼ j
if i = j
otherwise,
We set β = 0.2 in this paper. Note that there is a MATLAB command "expm" for the
exponential of a matrix.
Kij
.
SKij =
pKiiKjj
4
Algorithm 1 Nonnegative Matrix Factorization (Least Squares Error)
Input: X, iter
Output: F, G.
1: for t = 1 : iter do
2:
Fik := Fik
(XG)ik
(F GT G)ik
3: Gik := Gik
4: end for
(X T F )ik
(GF T F )ik
2) Standard NMF with K-L divergence:
KL divergence: J(XkF GT ) =Xi,j
corresponding update rules of F and G are:
(F GT )ij
If J(XkF GT ) is selected as the
− Xij + (F GT )ij], the
Xij
[Xij log
Fik :=
Gjk :=
Fik
Pj Gjk Xj
Pi Fik Xi
Gjk
Xij
(F G)ij
Gjk;
Xij
(F G)ij
Fik.
3) Symmetric NMF (SNMF): There is a variant of NMF for semi-supervised
clustering, whose objective function can be formulated as: kX −GSGT k2
F .
The update rules of G and S are [5]:
Gik := Gik
(XGS)ik
(GSGT GS)ik
Sik := Sik
(GT XG)ik
(GT GSGT G)ik
;
.
4) Bayesian NMF [8]:
It optimizes the NMF model under the Bayesian
framework, and can get better results under some circumstances.
2.3. Spectral Clustering [9]
Spectral clustering is very powerful in its simplicity and effectiveness,
which can be summarized in Algorithm 2. Note that there are many varia-
tions of the standard one, and the detailed analysis can be found in [10, 11].
5
2.4. InfoMap [12]
This model grew out of information theory, and tries to reveal the com-
munities by optimizing a quality function about the minimum description
length of random walks on the network. The model is among the best for
community detection [13].
Algorithm 2 Spectral Clustering
Input: B ∈ Rn×n
Output: Community Label Y ∈ Rn×1 of the n nodes
1: L = D1/2BD1/2, where D is the diagonal matrix with the element Dii =
Pj Bij .
2: Formimg the matrix X = [x1, x2, · · · , xk] ∈ Rn×k, where xi, i =
1, 2, · · · , k are the top k eigenvectors of L.
3: Normalizing X so that rows of X have the same L2 norm: Xij =
ij)1/2.
Xij/(Pj X 2
4: Clustering rows of X into k clusters by K-means.
5: Yi = j if the ith row is assigned to cluster j.
2.5. An illustrative example
We close this section by an illustrative example as follows: we try to de-
tect the community structures in a GN network with 128 nodes (For details,
see Data Description, Zout = 10.). The network has 4 communities with
32 nodes each. The heatmap of the corresponding adjacency matrix A[1] is
shown as the leftmost in Fig. 1. If we have prior knowledge about the net-
work structure so that we can determine a percentage of pairs of nodes as
must-link or cannot-link, we can incorporate them into A[1]. As one can see in
Fig. 1, the adjacency matrix becomes more and more clear as the percentage
of pairs constrained increases, and finally reduces to the standard consen-
sus matrix of the community structures. This example demonstrates that
background information is valuable to improve the accuracy of community
structure detection.
6
Figure 1: An illustrative example to show the process of incorporating prior information
into the adjacency matrix as de-noising the consensus matrix.
3. Experimental Results
In this section, we empirically demonstrated the effectiveness of our pro-
posed semi-supervised framework for community structure detection by ap-
plying NMF, spectral clustering and InfoMap with the de-noised consensus
matrices to several well-studied networks.
3.1. Data Description
We used both synthetic and real-world networks to test the effectiveness
of our methods. The details of these datasets are as follows:
1) GN [1] : Maybe the most widely used benchmarks are GN networks. The
network has 128 nodes which are divided into four non-overlapping com-
munities with 32 nodes each. The degree of each node is Zin+Zout = 16,
in other words, each node averagely has exactly 16 edges which randomly
connect Zin nodes in its own community and Zout nodes in other commu-
nities. As one can see, with the increasing Zout, the community structures
will become less clear and the problem more challenging. In this paper,
we set Zout to 8.
2) LFR [14] : Indeed, in most of the real applications, the community struc-
tures are more complicated than GN networks. The size of the network
might be larger, or the numbers of the nodes in different communities
might not be identical, or different nodes might have different positions,
i.e., some are superstars or hubs and should have higher degrees while
the others are leaves. The LFR benchmark networks are thus proposed
to address these problems.
In LFR networks, both the degree and the
7
community size distributions are power laws, with exponents γ and β,
which is more practical. Each node has a fraction 1 − µ of its links with
the nodes in its own community and a fraction µ with the other ones.
Here µ is called the mixing parameter.
We set the parameters of the LFR network as follows: the number of
nodes was 1000, the average degree of the nodes was 20, the maximum
degree was 50, the exponent of the degree distribution γ was 2 and that
of the community size distribution β was 1, and the mixing parameter µ
was 0.8. The communities were non-overlapping.
3) Karate [15]: this dataset contains the network of friendships between 34
members of a karate club at an American university. This club was by
chance split into two smaller ones due to the divergence of opinions about
the club fees.
4) Football [1]: this dataset contains the network of American football games
(not soccer) between Division IA colleges during regular season Fall 2000.
There are 115 nodes representing the football teams while an edge means
there was a game between the teams connected by the edge. The teams
were divided into 12 conferences, and all teams except few (mainly in
two conferences) played against the ones in the same conference more
frequently than those in other conferences.
3.2. Assess Standards
In our experiments, the normalized mutual information (NMI, [16]) was
used as the standard to evaluate the community structure detection perfor-
mance. The value can be formulated as follows:
NMI(M1, M2) =
k
Pi=1
k
Pj=1
nij log
nijn
i n(2)
n(1)
j
vuut k
Pi=1
n(1)
i
log
n(2)
j
log
n(1)
i
n ! k
Pj=1
,
n(2)
j
n !
where M1 is the ground-truth cluster label and M2 is the computed cluster
label, k is the community number, n is the number of nodes, nij is the number
of nodes in the ground-truth cluster i that are assigned to the computed
cluster j, n(1)
is
the number of nodes in the computed cluster j, log is the natural logarithm.
is the number of nodes in the ground-truth cluster i and n(2)
j
i
8
Compared with simply counting the number of misclassified nodes, NMI is
more informative, especially suitable for imbalanced datasets (i.e., the num-
bers of the nodes in different communities are not identical). For example, in
a four-sample toy data, the ground-truth cluster label could be 1, 1, 1, 2. The
computed cluster labels of two different models were 1, 1, 1, 1 and 1, 1, 2, 2
respectively.
In other words, the smaller cluster was masked and not de-
tected by the first model, hence the second model should be better though it
also had one sample mis-clustered. But the accuracy (number of misclassified
nodes divided by the number of nodes in the graph) results of these two mod-
els were all 75%, which was misleading. On the other hand, the NMI under
3 · 4
3 · 4
1 · 4
1 · 4
this case was 0 (the numerator of NMI was: 3 log
+ 1 · log
= 0) and
34.56% respectively, which was relatively more reasonable and informative.
In the case study, we also used the modularity function Q [17, 18] as the
standard to determine the best community number k. The function can be
defined as follows:
Q =XCk "L(VCk , VCk)
L(V, V )
−(cid:18)L(VCk , V )
L(V, V ) (cid:19)2# ,
where Ck is the kth community in the graph, L(V1, V2) = Pi∈V1,j∈V2,i6=j
aij is the element of A[0].
aij, and
The larger the values of NMI and Q, the better the graph partitioning
results.
Firstly, we compared the clustering performance of NMF-based models
with different similarity measures including A[0], A[1], C [A] and SK. The
results show that A[1] is a competitive one, though there is no single winner.
Note that calculating the diffusion kernel is time consuming for large scale
networks, hence we used A[1] for the NMF-based models in the following
experiments. The details are omitted here due to space limit.
3.3. Results Analysis
In this subsection, we systematically compared the results of NMI ob-
tained by the models on the artificial datasets and the karate network with
prior knowledge available. For an undirected network with n nodes, there
are totally n(n − 1)/2 node pairs available. We randomly picked out some
pairs of nodes, and determined whether they belonged to CM L or CCL: if the
two nodes had the same community label, they were must-link, otherwise,
9
they were cannot-link. The results were averages of ten trails and given in
Fig. 2 and Table 1. From these figure and table, one can observe that:
i)
The trends of all the models are generally identical and the values of the av-
eraged NMI increase with the increasing percentage of pairs constrained; ii)
for synthetic datasets: GN and LFR, the model of InfoMap and the spectral
clustering are better than the NMF-based models, especially for the LFR
datasets; iii) for the karate network, NMF with least squares error performs
better; iv) our proposed framework is flexible and model independent, or in
other words, it can be naturally combined with many models, such as NMF,
spectral clustering, InfoMap, etc.
In summary, our proposed semi-supervised framework does greatly en-
hance the results of community structure detection by benefitting from the
user provided background information.
3.4. A Case Study: College Football Network
In this subsection, we used the college football network for a case study,
and saw the partitioning results of NMF LSE given different percentages of
pairs constrained. Actually, we also tried spectral clustering and got similar
results. Details of spectral clustering are omitted here due to space limit.
The teams were separated into 12 conferences, and most of them played
against the ones in the same conference more frequently. However, the teams
37, 43, 81, 83, 91 (in conference IA Independents), 12, 25, 51, 60, 64, 70, 98 (in
conference Sunbelt), 111, 29 and 59 played more frequently against the ones
in other conferences. Table 2 lists the basic information about these teams,
from which one can observe that three out of five teams in IA Independents
never played against the ones in the same conference and the other two teams
played only once.
Firstly, we tried to determine the community number k. We compared
the values of modularity Q at different k, and the function achieved its peak
value at k = 11. By combining the results of Q values in Table 3 with
the information in Table 2, we set the community number k = 11 and the
teams in IA Independents would be assigned to the other eleven conferences
based on the outputs of NMF. Hence there were 115 − 5 = 110 teams with
ground-truth conference labels and totally 110 × (110 − 1)/2 = 5995 team
pairs available. We randomly selected some pairs as constraints: if the two
teams of the pair were in the same conference, they were must-link (ML),
otherwise, they were cannot-link (CL).
10
1
0.8
0.6
0.4
0.2
I
M
N
1%
2%
3%
4%
5% 10% 20% 30% 40% 50%
percentage of pairs constrained
1
0.8
0.6
0.4
0.2
I
M
N
0
1%
NMF_LSE
NMF_KL
SNMF
Spectral
Bayesian NMF
InfoMap
2%
3%
4%
5% 10% 20% 30% 40% 50%
percentage of pairs constrained
(a) GN, Zout = 8, α = 2.
(b) LFR, µ = 0.8, α = 2.
Figure 2: Averaged NMI of different models for different percentages of node pairs con-
strained on GN and LFR datasets. The black horizontal line is the best NMI result that
had ever got by NMF LSE, NMF KL, SNMF, Bayesian NMF, spectral clustering and In-
foMap with no prior knowledge available. "LSE" means least squares error, "KL" means
K-L divergence, "SNMF" means symmetric NMF.
Table 1: Averaged NMI of different models given different percentages of node pairs con-
strained on the karate dataset. "P" means percentage of node pairs constrained. Meanings
of "LSE", "KL" and "SNMF" are identical with that in Fig. 2, and "SP" means spectral
clustering.
P
P
P
Models
P
P
P
P
P
PP
1%
2%
3%
4%
5%
10%
20%
NMF LSE NMF KL SNMF
SP
99.84%
98.86%
99.67%
99.84%
99.84%
100%
100%
73.38% 59.53% 90.19%
73.44% 51.50% 90.19%
82.86% 54.06% 95.10%
85.18% 60.96% 96.73%
89.24% 53.74% 95.10%
89.14% 57.91% 100%
98.37% 56.57% 100%
Figure 3 gives the resulting partitions of NMF corresponding to differ-
ent percentages of pairs constrained. When given no prior knowledge con-
strained, there were 5 abnormal teams mis-clustered: teams 29, 60, 64, 98,
111; But after randomly given 5 percent of pairs constrained, the results
were significantly improved and only two abnormal teams were mis-clustered:
teams 29 and 111. Finally, when given 20 percent, there was only one team
mis-clustered: team 59. From these results, one can see that: 1) NMF is
11
really good enough in that only some abnormal teams are not correctly clus-
tered; 2) our semi-supervised clustering framework does take the background
information and domain knowledge into consideration, which makes the par-
titioning results more explainable.
Table 2: Basic information about the abnormal teams that played more frequently against
the ones in the other conferences. "T" means the team id, "F" means the times that the
team played against the other ones in the same conference or in the other conferences, "S"
means the same conference, "O" means the other conferences.
❍
❍
❍
F
T
❍
❍
❍
37
43
81
83
91
12
25
51
S O
0
0
1
1
0
4
3
3
8
7
10
10
9
6
7
6
❍
❍
❍
F
T
❍
❍
❍
60
64
70
98
111
29
59
S O
2
2
3
3
0
0
2
6
7
8
5
11
9
8
Table 3: Values of averaged Q functions of NMF LSE and spectral clustering. The range
of the community number k that we have tried is 8 ∼ 12. The peak values were achieved
at k = 11. Meaning of "LSE" is identical with that in Fig. 2.
❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤❤
Community Number
Models
8
9
10
11
12
NMF LSE Spectral Clustering
0.5770
0.5831
0.5890
0.5934
0.5885
0.5932
0.5927
0.5942
0.5978
0.5951
3.5. How to give the prior knowledge: randomly or based-on-rule
Finally, we ask an interesting question: how to select the prior information
and incorporate them into the models? To the best of our knowledge, in
practice, the most widely used method is to randomly select some pairs
12
(a)
(b)
(c)
(d)
Figure 3: Comparison of the results of NMF corresponding to different percentages of
pairs constrained. (a): Real grouping in football dataset. There are 12 conferences of 8-12
teams (nodes) each. (b): Outputs of NMF without any prior knowledge. (c): Outputs of
NMF corresponding to 5 percent of pairs constrained. (d): Outputs of NMF corresponding
to 20 percent of pairs constrained.
13
1
0.8
0.6
0.4
0.2
I
M
N
0
1%
NMF_LSE
NMF_KL
SNMF
Spectral
Bayesian NMF
InfoMap
2%
3%
4%
5% 10% 20% 30% 40% 50%
percentage of pairs constrained
Figure 4: Averaged NMI of different models for different percentages of node pairs con-
strained on GN datasets (Zout = 8). The prior knowledge are given based on rule.
Meanings of the black horizontal line, "LSE", "KL" and "SNMF" are identical with that
in Fig. 2.
of samples or nodes and manually determine whether they are must-link
or cannot-link based on the domain knowledge. But are there any better
methods to select the pairs that can either reduce the workload or improve
the clustering performance, or both? Indeed, for a large scale network, a very
small percentage of pairs may still mean a huge workload. In this subsection,
we attempted to introduce a new rule-based method to address this problem.
Firstly, we computed the hamming distances between all pairs of nodes (rows
of A[1]), and sorted the distances to find the largest and the smallest ones
(this step can be finished by programming calculation, not manually). We
selected the pairs that have the largest distances and the smallest distances
simultaneously. For example, if we wanted to select P pairs of nodes, we
selected P/2 pairs with the largest distances, and also selected P/2 pairs
with the smallest distances. Then we manually decided whether the selected
pairs were must-link or cannot-link and incorporated them into the clustering
process. The results on GN datasets are shown in Fig. 4, from which one
can observe that our preliminary results are not good enough compared with
that of randomly based. Hence we leave the problem open and believe that
it deserves further study.
4. Conclusions and Future work
In this paper, we introduced a semi-supervised community structure de-
tection framework for complex network analysis. The framework adopts a
simple strategy to add the supervision of pairwise must-link and cannot-link
constraints into the adjacency matrix, which can be regarded as de-noising of
14
the consensus matrix of community structures. The experiments on both the
synthetic and real-world networks have demonstrated the effectiveness of the
proposed framework. In summary, it can combine the network's functions
(background information and domain knowledge) with its topology, mak-
ing the community structure detection more effective and the results more
practical.
We would like to close this paper by raising two interesting problems.
Firstly, as we have mentioned above, are there any better methods that
can be used for selecting the constraints? A good attempt is the work in
[19], which selected the constraints based on various similarity measures,
not randomly. Secondly, the proposed framework is very flexible, and can
be naturally combined with some other semi-supervised learning models.
Researches on this kind of combination are our future working directions.
5. Acknowledgement
This work is supported by National Natural Science Foundation of China
under Grant No. 61203295. The author is very appreciated the reviewers'
valuable comments.
References
[1] M. Girvan, M. E. J. Newman, Proceedings of the National Academy of
Sciences 99 (12) (2002) 7821 -- 7826.
[2] X. Wu, Z. Liu, Physica A 387 (2008) 623 -- 630.
[3] D. D. Lee, H. S. Seung, Nature 401 (6755) (1999) 788 -- 791.
[4] D. D. Lee, H. S. Seung, NIPS, 2000, pp. 556 -- 562.
[5] Y. Chen, M. Rege, M. Dong, J. Hua, Seventh IEEE International Con-
ference on, IEEE, 2007, pp. 103 -- 112.
[6] R. Wang, S. Zhang, Y. Wang, X. Zhang, L. Chen, Neurocomputing 72
(2008) 134 -- 141.
[7] R. I. Kondor, J. Lafferty,
in:
International Conference on Machine
Learning (ICML), 2002, pp. 315 -- 322.
15
[8] I. Psorakis, S. Roberts, M. Ebden, B. Sheldon, Physical Review E 83 (6)
(2011) 066114.
[9] A. Ng, M. Jordan, Y. Weiss, Advances in neural information processing
systems 2 (2002) 849 -- 856.
[10] H. Shen, X. Cheng, Journal of Statistical Mechanics: Theory and Ex-
periment 2010 (2010) P10020.
[11] X. Ma, L. Gao, Journal of Statistical Mechanics: Theory and Experi-
ment 2011 (2011) P05012.
[12] M. Rosvall, C. Bergstrom, Proceedings of the National Academy of Sci-
ences 105 (4) (2008) 1118 -- 1123.
[13] A. Lancichinetti, S. Fortunato, Physical Review E 80 (5) (2009) 056117.
[14] A. Lancichinetti, S. Fortunato, F. Radicchi, Phys. Rev. E 78 (2008)
046110.
[15] W. W. Zachary, Journal of Anthropological Research 33 (1977) 452 -- 473.
[16] A. Strehl, J. Ghosh, Journal of Machine Learning Research 3 (2002)
583 -- 617.
[17] M. Newman, M. Girvan, Physical review E 69 (2) (2004) 026113.
[18] M. Newman, Proceedings of the National Academy of Sciences 103 (23)
(2006) 8577 -- 8582.
[19] X. Ma, L. Gao, X. Yong, L. Fu, Physica A: Statistical Mechanics and
its Applications 389 (1) (2010) 187 -- 197.
16
|
1601.05575 | 2 | 1601 | 2016-04-21T09:54:42 | SibRank: Signed Bipartite Network Analysis for Neighbor-based Collaborative Ranking | [
"cs.SI"
] | Collaborative ranking is an emerging field of recommender systems that utilizes users' preference data rather than rating values. Unfortunately, neighbor-based collaborative ranking has gained little attention despite its more flexibility and justifiability. This paper proposes a novel framework, called SibRank that seeks to improve the state of the art neighbor-based collaborative ranking methods. SibRank represents users' preferences as a signed bipartite network, and finds similar users, through a novel personalized ranking algorithm in signed networks. | cs.SI | cs | SibRank: Signed Bipartite Network Analysis for Neighbor-based Collaborative
Ranking
Abstract
Bita Shams a and Saman Haratizadeh a
a University of Tehran, Faculty of New Science and Technology
Amir Abad, North Kargar Street, Tehran, Iran14395-1374
Collaborative ranking is an emerging field of recommender systems that utilizes users'
preference data rather than rating values. Unfortunately, neighbor-based collaborative
ranking has gained little attention despite its more flexibility and justifiability. This paper
proposes a novel framework, called SibRank that seeks to improve the state of the art
neighbor-based collaborative ranking methods. SibRank represents users' preferences as a
signed bipartite network, and finds similar users, through a novel personalized ranking
algorithm in signed networks.
Keywords: Recommender System, Collaborative Ranking, Signed Network, Similarity
Measure, Preference Data, Personalized Ranking;
1 Introduction
Recommendation systems exploit users' historical data in order to suggest a small set of
relevant services among a large volume of irrelevant ones. Traditionally, these systems seek
to predict user's interests through gathering and prediction of ratings given by him to
services or products. In recent years a variation of recommender systems, called
collaborative ranking, has emerged that focuses on ranking data instead of ratings [1,2] to
find the best items to recommend.
Rankings seem to be more informative and reliable source of information to reflect users'
preferences and interests [2,3]: users' ratings commonly follow a baseline that is a function
of time[4]. For instance, a user that assigns a rate of 4 to an average movie "A" now, might
tend to assign 3 to that movie in the future. However, in both times, he probably would not
prefer that average movie over an excellent movie "B". So, he persistently ranks "B" over
"A" while the rates he gives to those movies may change over time. Furthermore, the goal
of a recommender system is to find and recommend the most relevant items [3,5,6].
Therefore, it is more important to accurately predict the user's priorities rather than the
absolute ratings he would give to items. For example, consider a case that a target user
would rate the movies "A" and "B" with 4 and 5 respectively, that is r(A)=4 and r(B)=5.
Suppose that some rate prediction algorithm, predicts ratings r(A)=2 and r(B)=3, while
another algorithm predicts r(A)=5 and r(B)=4. Although, in rate based framework, the
latter one is considered more accurate in the sense of rate prediction, it is clear that the
former one would correctly rank "B" higher than "A" and will probably make a better
recommendation.
Recently, several researchers have approached recommendation from a ranking-
oriented perspective. These approaches can be categorized into two groups: model-based
collaborative ranking methods (MCR) and neighbor-based collaborative ranking methods
(NCR). MCR techniques try to learn the latent factors of users and items while optimizing
1
a ranking criterion (e.g. Normalized Discounted Cumulative Gain (NDCG))[1,5,7] while
NCR algorithms exploit the concept of users' similarity to infer a ranking over the user's
uncollected items[2,6,8–11]
Neighbor-based collaborative ranking has not been investigated as much as model-
based ranking. The reason is possibly that it is not straightforward to calculate the similarity
among users when each user's profile is a set of preferences [12] Most of the current NCR
algorithm have exploited Kendall correlation that takes into account users' agreements and
disagreements over pairwise comparisons [2,10,11]. However, Kendall measure, has
originally been proposed to compare similarity between total orders (i.e. ranking over a set
of distinct items)[12] Therefore, it is not directly applicable to recommender systems where
each user has partially ranked a different subset of items. To resolve this issue, current NCR
techniques calculate users' similarity based on their common comparisons and ignore the
information available through the uncommon rankings. This approach suffers from some
shortcomings: First, Kendall correlation does not take in to account the confidence or
reliability of the source of information: the similarity calculated over a small set of common
comparisons is not as reliable as one calculated over a large set of comparisons. Second,
Kendall correlation between users with no common comparison is equal to zero, simply
because this measure ignores all other available information in the data that can be used to
discriminate between such users. These problem are more serious in in sparse datasets
where users rarely have a common pairwise comparison. As illustrated in Fig.1a, in a sparse
data set, Kendall correlation and its variants would be zero for more than 87% of pairs of
users. Also, in average, more than 96% of the users among which the Kendall correlation
is one, have only one common pairwise comparison (See Fig.1b). That clearly indicates
that when one uses Kendall correlation for finding similar users, not only all users with no
common comparison with the target user are ignored, but also the recommendation is highly
affected by those users who have only one common pairwise comparison with the target
user.
Figure 1. Statistical properties of Kendall Correlation in a sample dataset of movielense100K
containing 10 ratings for each user. a) Distribution of Kendall correlation of users b) Distribution
of the number of common pairwise preferences among users whose Kendall Correlation is one
This paper proposes a novel NCR framework, called SibRank, to resolve these issues.
SibRank first construct a signed bipartite network, called SiBreNet, to represent users'
preferences. Then, it exploits a novel similarity measure, called SRank, to calculate
similarity among the target user and all other users in SiBreNet.
The main contributions of this paper can be summarized as below:
2
To our knowledge, this is the first work that takes advantages of signed networks to
capture the similarity among users' ranking. This paper represents ranking data as
a signed bipartite graph to comprise different kinds of information about agreement
and disagreement of users over their preferences.
We propose a novel similarity measure in signed networks that reflects a global
view of agreements and disagreements between users.
We conducted set of experiments to assess the performance of SibRank. The results
show some improvements compared to one of the best current algorithms called
EigenRank.
2 Related works
2.1 Neighbor-based Collaborative Ranking
The first neighbor-based collaborative ranking algorithm was proposed in [2]. The paper
introduced a general framework, called EigenRank, which is now widely followed by other
NCR techniques[8–10,13]. It finds similar users to the target user based on users'
preferences. Based on those neighboring users, EigenRank infers the preference matrix for
the target user, using which it infers a ranking over the unseen items, and recommends the
top ones to him. This framework is commonly used in all neighbor-based collaborative
ranking algorithms with slight modifications; the main difference often lies in the similarity
measures used by NCR techniques for finding similar users. EigenRank uses the Kendall
Correlation measure and calculates the similarities considering the concordant and
discordant pairwise preferences in the users' preferences. EduRank[13] modifies the
Kendall measure by also considering compatible preference. The compatible case occurs
when one user neither agrees nor disagrees another user over a distinct comparison. For
example, consider three users u, v, p that all have compared two items (a, b) and the results
are (a>b), (a<b), (a=b) for u, v and p, respectively. u and v disagrees over this comparison,
while, p's verdict is compatible with those of both a and b. These versions of Kendall
measure do not considers the importance of each preference for finding similar users to the
target user. VSRank[8] introduces another measure, called weighted Kendall, to cover this
issue. However, this approach, like the previous ones, still does not consider the reliability
for the calculated similarities and also can't determine the proximity between users with no
common pairwise comparisons. Additionally, it has been designed to exploit the rating data,
and, consequently is not applicable in ranking-oriented systems with no ratings available.
In this paper, we propose a novel similarity measure that addresses the issues through
personalized ranking in a signed network representing users' preferences. The proposed
approach is applicable in all cases of preference data such as ratings, binary relevance
feedbacks, and, pairwise preferences. Since, in our method, we model the data in the form
of a graph, we will first present a brief review of the current available graph-based
approaches for recommendation.
2.2 Graph-based recommendation
Graph structure provides effective tools to model and analyze direct and indirect relations
among users. This has resulted in a large number of researches in graph-based
recommendation algorithms. These algorithms commonly focus on binary data (i.e. like,
3
dislike) and rarely pay attention to ratings. They use the graph structure to efficiently
calculate some "closeness" value among users, items, or between users and items. Li and
Chen formulated recommendation problem as calculating closeness of users and items in a
bipartite graph. Anhui [14] investigated how to calculate similarity among users in a user-
movie bipartite network. Another study [15] follows that approach in a tripartite graph
containing users, items, and tags. The authors in [16] calculate closeness of all types of
objects in a heterogeneous network. Xiang, et al. captured the long-term and short-term
preferences of users in a tripartite graph of users, items, and sessions [17]. Yao, et al. have
exploited a multi-layer graph to make context-aware recommendations [18]
To our knowledge, none of these algorithms focuses on modeling ranking and preference
data through signed networks, and, consequently, SibRank is the first algorithm in the
family of NCR algorithms that exploits signed networks to represent the ranking data and
to calculate a similarity among users' priorities.
2.3. Personalized ranking in signed networks
Computing similarity of nodes to a particular node, termed as a personalized ranking of
nodes, is one of the main challenging issues in social and information networks. Despite a
large series of personalized ranking algorithms such as personalized PageRank or Katz
similarity, few have focused on signed networks containing positive and negative relations.
Ranking nodes in signed network have mainly been studied in the domain of trust/distrust
relationships: Guha, et al.[19] extend the Katz similarity for signed networks through
multiplication of signed adjacency network or considering one-step propagation of distrust.
Additionally, a series of algorithms have been proposed through extending PageRank for
signed networks. For example, EigenTrust [20] first removes the negative links from the
network and then, ranks the nodes in the resulting network, so, a negative link between two
nodes, is treated just like an absent link, while they represent totally different facts.
PolarityRank [21] is another algorithm that classifies the nodes' labels through propagation
of ranks from some predetermined representatives for both positive and negative groups.
PageTrust [22] takes into account negative links through decreasing the number of random
walkers at nodes with large negative links. Exponential ranking algorithm [23] is an
extension of PageRank algorithms that modifies the transition probability matrix in the
sense that the random walker follows positive links with higher probability than negative
links. Similarly, some other ranking algorithms assume that nodes reaching from paths
passing negative links should be ranked less than those reaching from paths passing positive
links [24,25]. Essentially. these algorithms, first decompose the network to the negative
and positive networks containing only negative and positive networks, respectively. Then,
they define the ranking of each node based on the difference of its ranking in positive and
negative networks. Another signed ranking algorithm, Troll-Trust [26], models the absolute
value of nodes' reputation as a Bernoulli random variable that can be interpreted as how
much one should trust a particular user.
Most of the mentioned algorithms extend PageRank considering additive propagation of
distrust which refers to the social belief that" I don't respect someone not respected by
someone that I don't respect" [19]. Although this idea is somehow reasonable in terms of
distrust propagation, it is untenable for calculating users' similarities in signed bipartite
4
preference networks. In this case, users who disagree the discordant preferences are
probably as similar as those users who agree over concordant preferences. Therefore, we
adopt a signed multiplicative propagation approach which follows another social belief,
called social balance theory, that tells "enemies of my enemy and friends of my friend are
friends, while, the enemies of my friend and friends of my enemy are enemies" [21].
3 SibRank Framework
SibRank is a novel NCR framework that seeks to improve the current state of the art
algorithm through considering direct and indirect agreements and disagreements of users.
It first maps the users' rankings to a Signed Bipartite preference Network, called SiBreNet).
Then, it calculates the closeness of users to the target user, and, labels the most similar ones
as neighbors. After that, it estimates the preference matrix of the target user based on his
neighbors' verdicts, infers a total ranking for him and recommends the Top-N items.
3.1 Construction of SiBreNet
SiBreNet represents users' priorities using two types of nodes (i.e. users and preference)
and two types of relations: positive and negative relations. A user is connected to a
preference node with a positive edge if he agrees with that preference and is connected to
a preference with a negative edge, if he disagrees with that preference. There is no edge
between a user and a particular preference if his opinion is unknown about that preference.
Figure 2 illustrates a schematic example of SiBreNet; Jack is connected with a positive
edge to the preference node {A>B} because he ranks A over B. On the other hand, Mike
believes that B is better than A, and, so Mike and {A>B} are connected with a negative link.
Figure 2: An example of SiBreNet in case of four users and three items. Red and green
lines indicate negative and positive relations, receptively.
5
Definition 1 (SiBreNet): SiBreNet is a bipartite Graph (<V, E,W>) where V is the set of
nodes and E is the set relations among nodes. V is composed of two subsets: user nodes U
p.
The pseudo-code of SiBreNet construction is shown in Algorithm.1. It initializes a bipartite
graph including one node for each user (Line 1-3). Then, it makes an alphabetical order on
and preference nodes P; = ∪ . Each edge (u,p) is labeled with a weight , that
indicates the agreement ( , = ) or disagreement ( , = ) of user u to preference
items (Line 5) and creates the preference nodes (Line 6-8). For each pair of items , the
order: if A comes before B, it will add the preference node { < |